[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Tor 0.1.1.8-alpha is out
I could just spit. I have just finished redoing torpark for chinese
and english and uploaded to server and suddenly... wham... tor 18
Oh well, that is the price of progress.
ST
On 10/7/05, Roger Dingledine <arma@xxxxxxx> wrote:
> This is the eighth development snapshot for the 0.1.1.x series. The
> main changes are that clients now use the new directory protocol, that
> servers that are tight on resources stop advertising their DirPort,
> and that we use OpenSSL's AES if it's available.
>
> http://tor.eff.org/download.html
>
> Changes in version 0.1.1.8-alpha - 2005-10-07
> o New features (major):
> - Clients don't download or use the directory anymore. Now they
> download and use network-statuses from the trusted dirservers,
> and fetch individual server descriptors as needed from mirrors.
> See dir-spec.txt for all the gory details.
> - Be more conservative about whether to advertise our DirPort.
> The main change is to not advertise if we're running at capacity
> and either a) we could hibernate or b) our capacity is low and
> we're using a default DirPort.
> - Use OpenSSL's AES when OpenSSL has version 0.9.7 or later.
>
> o New features (minor):
> - Try to be smart about when to retry network-status and
> server-descriptor fetches. Still needs some tuning.
> - Stop parsing, storing, or using running-routers output (but
> mirrors still cache and serve it).
> - Consider a threshold of versioning dirservers (dirservers who have
> an opinion about which Tor versions are still recommended) before
> deciding whether to warn the user that he's obsolete.
> - Dirservers can now reject/invalidate by key and IP, with the
> config options "AuthDirInvalid" and "AuthDirReject". This is
> useful since currently we automatically list servers as running
> and usable even if we know they're jerks.
> - Provide dire warnings to any users who set DirServer; move it out
> of torrc.sample and into torrc.complete.
> - Add MyFamily to torrc.sample in the server section.
> - Add nicknames to the DirServer line, so we can refer to them
> without requiring all our users to memorize their IP addresses.
> - When we get an EOF or a timeout on a directory connection, note
> how many bytes of serverdesc we are dropping. This will help
> us determine whether it is smart to parse incomplete serverdesc
> responses.
> - Add a new function to "change pseudonyms" -- that is, to stop
> using any currently-dirty circuits for new streams, so we don't
> link new actions to old actions. Currently it's only called on
> HUP (or SIGNAL RELOAD).
> - On sighup, if UseHelperNodes changed to 1, use new circuits.
> - Start using RAND_bytes rather than RAND_pseudo_bytes from
> OpenSSL. Also, reseed our entropy every hour, not just at
> startup. And entropy in 512-bit chunks, not 160-bit chunks.
>
> o Fixes on 0.1.1.7-alpha:
> - Nobody ever implemented EVENT_ADDRMAP for control protocol
> version 0, so don't let version 0 controllers ask for it.
> - If you requested something with too many newlines via the
> v1 controller protocol, you could crash tor.
> - Fix a number of memory leaks, including some pretty serious ones.
> - Re-enable DirPort testing again, so Tor servers will be willing
> to advertise their DirPort if it's reachable.
> - On TLS handshake, only check the other router's nickname against
> its expected nickname if is_named is set.
>
> o Fixes forward-ported from 0.1.0.15:
> - Don't crash when we don't have any spare file descriptors and we
> try to spawn a dns or cpu worker.
> - Make the numbers in read-history and write-history into uint64s,
> so they don't overflow and publish negatives in the descriptor.
>
> o Fixes on 0.1.0.x:
> - For the OS X package's modified privoxy config file, comment
> out the "logfile" line so we don't log everything passed
> through privoxy.
> - We were whining about using socks4 or socks5-with-local-lookup
> even when it's an IP in the "virtual" range we designed exactly
> for this case.
> - We were leaking some memory every time the client changes IPs.
> - Never call free() on tor_malloc()d memory. This will help us
> use dmalloc to detect memory leaks.
> - Check for named servers when looking them up by nickname;
> warn when we'recalling a non-named server by its nickname;
> don't warn twice about the same name.
> - Try to list MyFamily elements by key, not by nickname, and warn
> if we've not heard of the server.
> - Make windows platform detection (uname equivalent) smarter.
> - It turns out sparc64 doesn't like unaligned access either.
>
>