[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.3.4] remove duplicate changes from 0.3.3.5-rc to 0.3.3.9
commit 669426f3d438bd299495f9ae150ff2e2a4a0a8b1
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date: Sat Sep 8 15:21:49 2018 -0400
remove duplicate changes from 0.3.3.5-rc to 0.3.3.9
---
ReleaseNotes | 102 +++--------------------------------------------------------
1 file changed, 4 insertions(+), 98 deletions(-)
diff --git a/ReleaseNotes b/ReleaseNotes
index ae419a2d9..0ee587c48 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -4,9 +4,9 @@ changes in each development snapshot, see the ChangeLog file.
Changes in version 0.3.4.8 - 2018-09-10
Tor 0.3.4.8 is the first stable release in its series; it includes
- several compilation and portability fixes.
+ compilation and portability fixes.
- The Tor 0.3.4 series includes several improvements for running Tor in
+ The Tor 0.3.4 series includes improvements for running Tor in
low-power and embedded environments, which should help performance in
general. We've begun work on better modularity, and included preliminary
changes on the directory authority side to accommodate a new bandwidth
@@ -15,15 +15,8 @@ Changes in version 0.3.4.8 - 2018-09-10
Tor's testing infrastructure. Finally, we've continued to refine
our anti-denial-of-service code.
- Below are the changes since 0.3.3.5-rc. For a list of only the changes
- since 0.3.4.7-rc, see the ChangeLog
-
- o Directory authority changes:
- - The "Bifroest" bridge authority has been retired; the new bridge
- authority is "Serge", and it is operated by George from the
- TorBSD project. Closes ticket 26771.
- - Add an IPv6 address for the "dannenberg" directory authority.
- Closes ticket 26343.
+ Below are the changes since 0.3.3.9. For a list of only the changes
+ since 0.3.4.7-rc, see the ChangeLog file.
o New system requirements:
- Tor no longer tries to support old operating systems without
@@ -75,21 +68,12 @@ Changes in version 0.3.4.8 - 2018-09-10
uninitialised buffer. They now log a warning about the empty file
instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha.
- o Major bugfixes (security, directory authority, denial-of-service, also in 0.3.3.6):
- - Fix a bug that could have allowed an attacker to force a directory
- authority to use up all its RAM by passing it a maliciously
- crafted protocol versions string. Fixes bug 25517; bugfix on
- 0.2.9.4-alpha. This issue is also tracked as TROVE-2018-005.
-
o Major bugfixes (crash):
- Avoid a rare assertion failure in the circuit build timeout code
if we fail to allow any circuits to actually complete. Fixes bug
25733; bugfix on 0.2.2.2-alpha.
o Major bugfixes (directory authority):
- - Stop leaking memory on directory authorities when planning to
- vote. This bug was crashing authorities by exhausting their
- memory. Fixes bug 26435; bugfix on 0.3.3.6.
- Avoid a crash when testing router reachability on a router that
could have an ed25519 ID, but which does not. Fixes bug 25415;
bugfix on 0.3.3.2-alpha.
@@ -118,11 +102,6 @@ Changes in version 0.3.4.8 - 2018-09-10
controlled by a consensus parameter. Fixes bug 25226; bugfix
on 0.2.4.14-alpha.
- o Major bugfixes (rust, testing):
- - Make sure that failing tests in Rust will actually cause the build
- to fail: previously, they were ignored. Fixes bug 26258; bugfix
- on 0.3.3.4-alpha.
-
o Minor features (accounting):
- When Tor becomes dormant, it now uses a scheduled event to wake up
at the right time. Previously, we would use the per-second timer
@@ -150,9 +129,6 @@ Changes in version 0.3.4.8 - 2018-09-10
Closes ticket 26006.
o Minor features (compilation):
- - When building Tor, prefer to use Python 3 over Python 2, and more
- recent (contemplated) versions over older ones. Closes
- ticket 26372.
- When compiling with --enable-openbsd-malloc or --enable-tcmalloc,
tell the compiler not to include the system malloc implementation.
Fixes bug 20424; bugfix on 0.2.0.20-rc.
@@ -257,11 +233,6 @@ Changes in version 0.3.4.8 - 2018-09-10
- Avoid a needless malloc()/free() pair every time we handle an ntor
handshake. Closes ticket 25150.
- o Minor features (relay, diagnostic):
- - Add several checks to detect whether Tor relays are uploading
- their descriptors without specifying why they regenerated them.
- Diagnostic for ticket 25686.
-
o Minor features (Rust, portability):
- Rust cross-compilation is now supported. Closes ticket 25895.
@@ -300,13 +271,6 @@ Changes in version 0.3.4.8 - 2018-09-10
subsystem. Fixes bug 25675; bugfix on 0.2.7.3-rc. Found by
Coverity; this is CID 1433643.
- o Minor bugfixes (circuit path selection):
- - Don't count path selection failures as circuit build failures.
- This change should eliminate cases where Tor blames its guard or
- the network for situations like insufficient microdescriptors
- and/or overly restrictive torrc settings. Fixes bug 25705; bugfix
- on 0.3.3.1-alpha.
-
o Minor bugfixes (client):
- Don't consider Tor running as a client if the ControlPort is open,
but no actual client ports are open. Fixes bug 26062; bugfix
@@ -318,13 +282,6 @@ Changes in version 0.3.4.8 - 2018-09-10
- Remove the unused variable n_possible from the function
channel_get_for_extend(). Fixes bug 25645; bugfix on 0.2.4.4-alpha
- o Minor bugfixes (compatibility, openssl):
- - Work around a change in OpenSSL 1.1.1 where return values that
- would previously indicate "no password" now indicate an empty
- password. Without this workaround, Tor instances running with
- OpenSSL 1.1.1 would accept descriptors that other Tor instances
- would reject. Fixes bug 26116; bugfix on 0.2.5.16.
-
o Minor bugfixes (compilation):
- Silence a spurious compiler warning on the GetAdaptersAddresses
function pointer cast. This issue is already fixed by 26481 in
@@ -338,17 +295,11 @@ Changes in version 0.3.4.8 - 2018-09-10
code that calls routerinfo_get_my_routerinfo() twice, assuming
that the second call will succeed if the first one did. Fixes bug
26269; bugfix on 0.2.8.2-alpha.
- - Fix a compilation warning on some versions of GCC when building
- code that calls routerinfo_get_my_routerinfo() twice, assuming
- that the second call will succeed if the first one did. Fixes bug
- 26269; bugfix on 0.2.8.2-alpha.
- Refrain from compiling unit testing related object files when
--disable-unittests is set to configure script. Fixes bug 24891;
bugfix on 0.2.5.1-alpha.
- The --enable-fatal-warnings flag now affects Rust code as well.
Closes ticket 26245.
- - Silence unused-const-variable warnings in zstd.h with some GCC
- versions. Fixes bug 26272; bugfix on 0.3.1.1-alpha.
- Avoid a compiler warning when casting the return value of
smartlist_len() to double with DEBUG_SMARTLIST enabled. Fixes bug
26283; bugfix on 0.2.4.10-alpha.
@@ -369,16 +320,9 @@ Changes in version 0.3.4.8 - 2018-09-10
policy/* requests. Also, let controller know if an error is
transient (response code 551) or not (response code 552). Fixes
bug 25852; bugfix on 0.2.8.1-alpha.
- - Handle the HSADDRESS= argument to the HSPOST command properly.
- (Previously, this argument was misparsed and thus ignored.) Fixes
- bug 26523; bugfix on 0.3.3.1-alpha. Patch by "akwizgran".
- Parse the "HSADDRESS=" parameter in HSPOST commands properly.
Previously, it was misparsed and ignored. Fixes bug 26523; bugfix
on 0.3.3.1-alpha. Patch by "akwizgran".
- - Improve accuracy of the BUILDTIMEOUT_SET control port event's
- TIMEOUT_RATE and CLOSE_RATE fields. (We were previously
- miscounting the total number of circuits for these field values.)
- Fixes bug 26121; bugfix on 0.3.3.1-alpha.
- Make CIRC_BW event reflect the total of all data sent on a
circuit, including padding and dropped cells. Also fix a mis-
counting bug when STREAM_BW events were enabled. Fixes bug 25400;
@@ -423,17 +367,10 @@ Changes in version 0.3.4.8 - 2018-09-10
directory authorities have to be ahead of the client before this
warning will occur. Fixes bug 25756; bugfix on 0.2.2.25-alpha.
- o Minor bugfixes (hardening):
- - Prevent a possible out-of-bounds smartlist read in
- protover_compute_vote(). Fixes bug 26196; bugfix on 0.2.9.4-alpha.
-
o Minor bugfixes (in-process restart):
- Always call tor_free_all() when leaving tor_run_main(). When we
did not, restarting tor in-process would cause an assertion
failure. Fixes bug 26948; bugfix on 0.3.3.1-alpha.
- - When shutting down, Tor now clears all the flags in the control.c
- module. This should prevent a bug where authentication cookies are
- not generated on restart. Fixes bug 25512; bugfix on 0.3.3.1-alpha.
o Minor bugfixes (Linux seccomp2 sandbox):
- Allow the nanosleep() system call, which glibc uses to implement
@@ -448,10 +385,6 @@ Changes in version 0.3.4.8 - 2018-09-10
authenticate direct connections to relays. Fixes bug 26927; bugfix
on 0.3.0.1-alpha.
- o Minor bugfixes (memory, correctness):
- - Fix a number of small memory leaks identified by coverity. Fixes
- bug 26467; bugfix on numerous Tor versions.
-
o Minor bugfixes (onion service):
- Fix a memory leak when a v3 onion service is configured and gets a
SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha.
@@ -473,13 +406,6 @@ Changes in version 0.3.4.8 - 2018-09-10
miscalculating the index for next-generation onion services. Fixes
bug 24977; bugfix on 0.3.2.1-alpha.
- o Minor bugfixes (path selection):
- - Only select relays when they have the descriptors we prefer to use
- for them. This change fixes a bug where we could select a relay
- because it had _some_ descriptor, but reject it later with a
- nonfatal assertion error because it didn't have the exact one we
- wanted. Fixes bugs 25691 and 25692; bugfix on 0.3.3.4-alpha.
-
o Minor bugfixes (portability):
- Fix compilation of the unit tests on GNU/Hurd, which does not
define PATH_MAX. Fixes bug 26873; bugfix on 0.3.3.1-alpha. Patch
@@ -505,10 +431,6 @@ Changes in version 0.3.4.8 - 2018-09-10
here.) Fixes bug 24910; bugfix on 0.2.4.17-rc.
o Minor bugfixes (relay):
- - Relays now correctly block attempts to re-extend to the previous
- relay by Ed25519 identity. Previously they would warn in this
- case, but not actually reject the attempt. Fixes bug 26158; bugfix
- on 0.3.0.1-alpha.
- Avoid a crash when running with DirPort set but ORPort turned off.
Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha.
@@ -583,21 +505,6 @@ Changes in version 0.3.4.8 - 2018-09-10
result files, to avoid spurious failures. Fixes bug 27295; bugfix
on 0.2.7.3-rc.
- o Minor bugfixes (testing, compatibility):
- - When running the ntor_ref.py and hs_ntor_ref.py tests, make sure
- only to pass strings (rather than "bytes" objects) to the Python
- subprocess module. Python 3 on Windows seems to require this.
- Fixes bug 26535; bugfix on 0.2.5.5-alpha (for ntor_ref.py) and
- 0.3.1.1-alpha (for hs_ntor_ref.py).
- - When running the hs_ntor_ref.py test, make sure only to pass
- strings (rather than "bytes" objects) to the Python subprocess
- module. Python 3 on Windows seems to require this. Fixes bug
- 26535; bugfix on 0.3.1.1-alpha.
- - When running the ntor_ref.py test, make sure only to pass strings
- (rather than "bytes" objects) to the Python subprocess module.
- Python 3 on Windows seems to require this. Fixes bug 26535; bugfix
- on 0.2.5.5-alpha.
-
o Minor bugfixes (testing, openssl compatibility):
- Our "tortls/cert_matches_key" unit test no longer relies on
OpenSSL internals. Previously, it relied on unsupported OpenSSL
@@ -733,7 +640,6 @@ Changes in version 0.3.4.8 - 2018-09-10
Closes ticket 25268.
-
Changes in version 0.3.3.9 - 2018-07-13
Tor 0.3.3.9 moves to a new bridge authority, meaning people running
bridge relays should upgrade.
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits