[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor 0.2.5.1-alpha is out
Congratulations to all participants. It looks fantastic.
On Wed, Oct 2, 2013 at 12:25 PM, Roger Dingledine <arma@xxxxxxx> wrote:
> Tor 0.2.5.1-alpha introduces experimental support for syscall sandboxing
> on Linux, allows bridges that offer pluggable transports to report usage
> statistics, fixes many issues to make testing easier, and provides
> a pile of minor features and bugfixes that have been waiting for a
> release of the new branch.
>
> This is the first alpha release in a new series, so expect there to
> be bugs. Users who would rather test out a more stable branch should
> stay with 0.2.4.x for now.
>
> I'm going to leave the download pages listing 0.2.3.x and 0.2.4.x,
> so we don't have the confusion of three branches at once. I'm also not
> sure yet how the packaging people plan to handle three branches.
>
> https://www.torproject.org/dist/
>
> Changes in version 0.2.5.1-alpha - 2013-10-02
> o Major features (security):
> - Use the seccomp2 syscall filtering facility on Linux to limit
> which system calls Tor can invoke. This is an experimental,
> Linux-only feature to provide defense-in-depth against unknown
> attacks. To try turning it on, set "Sandbox 1" in your torrc
> file. Please be ready to report bugs. We hope to add support
> for better sandboxing in the future, including more fine-grained
> filters, better division of responsibility, and support for more
> platforms. This work has been done by Cristian-Matei Toader for
> Google Summer of Code.
> - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
> Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
> 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
> renegotiation from working with TLS 1.1 or 1.2, so we had disabled
> them to solve bug 6033.)
>
> o Major features (other):
> - Add support for passing arguments to managed pluggable transport
> proxies. Implements ticket 3594.
> - Bridges now track GeoIP information and the number of their users
> even when pluggable transports are in use, and report usage
> statistics in their extra-info descriptors. Resolves tickets 4773
> and 5040.
> - Make testing Tor networks bootstrap better: lower directory fetch
> retry schedules and maximum interval without directory requests,
> and raise maximum download tries. Implements ticket 6752.
> - Add make target 'test-network' to run tests on a Chutney network.
> Implements ticket 8530.
> - The ntor handshake is now on-by-default, no matter what the
> directory authorities recommend. Implements ticket 8561.
>
> o Major bugfixes:
> - Instead of writing destroy cells directly to outgoing connection
> buffers, queue them and intersperse them with other outgoing cells.
> This can prevent a set of resource starvation conditions where too
> many pending destroy cells prevent data cells from actually getting
> delivered. Reported by "oftc_must_be_destroyed". Fixes bug 7912;
> bugfix on 0.2.0.1-alpha.
> - If we are unable to save a microdescriptor to the journal, do not
> drop it from memory and then reattempt downloading it. Fixes bug
> 9645; bugfix on 0.2.2.6-alpha.
> - The new channel code sometimes lost track of in-progress circuits,
> causing long-running clients to stop building new circuits. The
> fix is to always call circuit_n_chan_done(chan, 0) from
> channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
>
> o Build features:
> - Tor now builds each source file in two modes: a mode that avoids
> exposing identifiers needlessly, and another mode that exposes
> more identifiers for testing. This lets the compiler do better at
> optimizing the production code, while enabling us to take more
> radical measures to let the unit tests test things.
> - The production builds no longer include functions used only in
> the unit tests; all functions exposed from a module only for
> unit-testing are now static in production builds.
> - Add an --enable-coverage configuration option to make the unit
> tests (and a new src/or/tor-cov target) to build with gcov test
> coverage support.
>
> o Testing:
> - We now have rudimentary function mocking support that our unit
> tests can use to test functions in isolation. Function mocking
> lets the tests temporarily replace a function's dependencies with
> stub functions, so that the tests can check the function without
> invoking the other functions it calls.
> - Add more unit tests for the <circid,channel>->circuit map, and
> the destroy-cell-tracking code to fix bug 7912.
> - Unit tests for failing cases of the TAP onion handshake.
> - More unit tests for address-manipulation functions.
>
> o Minor features (protecting client timestamps):
> - Clients no longer send timestamps in their NETINFO cells. These were
> not used for anything, and they provided one small way for clients
> to be distinguished from each other as they moved from network to
> network or behind NAT. Implements part of proposal 222.
> - Clients now round timestamps in INTRODUCE cells down to the nearest
> 10 minutes. If a new Support022HiddenServices option is set to 0, or
> if it's set to "auto" and the feature is disabled in the consensus,
> the timestamp is sent as 0 instead. Implements part of proposal 222.
> - Stop sending timestamps in AUTHENTICATE cells. This is not such
> a big deal from a security point of view, but it achieves no actual
> good purpose, and isn't needed. Implements part of proposal 222.
> - Reduce down accuracy of timestamps in hidden service descriptors.
> Implements part of proposal 222.
>
> o Minor features (config options):
> - Config (torrc) lines now handle fingerprints which are missing
> their initial '$'. Resolves ticket 4341; improvement over 0.0.9pre5.
> - Support a --dump-config option to print some or all of the
> configured options. Mainly useful for debugging the command-line
> option parsing code. Helps resolve ticket 4647.
> - Raise awareness of safer logging: notify user of potentially
> unsafe config options, like logging more verbosely than severity
> "notice" or setting SafeLogging to 0. Resolves ticket 5584.
> - Add a new configuration option TestingV3AuthVotingStartOffset
> that bootstraps a network faster by changing the timing for
> consensus votes. Addresses ticket 8532.
> - Add a new torrc option "ServerTransportOptions" that allows
> bridge operators to pass configuration parameters to their
> pluggable transports. Resolves ticket 8929.
> - The config (torrc) file now accepts bandwidth and space limits in
> bits as well as bytes. (Anywhere that you can say "2 Kilobytes",
> you can now say "16 kilobits", and so on.) Resolves ticket 9214.
> Patch by CharlieB.
>
> o Minor features (build):
> - Add support for `--library-versions` flag. Implements ticket 6384.
> - Return the "unexpected sendme" warnings to a warn severity, but make
> them rate limited, to help diagnose ticket 8093.
> - Detect a missing asciidoc, and warn the user about it, during
> configure rather than at build time. Fixes issue 6506. Patch from
> Arlo Breault.
>
> o Minor features (other):
> - Use the SOCK_NONBLOCK socket type, if supported, to open nonblocking
> sockets in a single system call. Implements ticket 5129.
> - Log current accounting state (bytes sent and received + remaining
> time for the current accounting period) in the relay's heartbeat
> message. Implements ticket 5526; patch from Peter Retzlaff.
> - Implement the TRANSPORT_LAUNCHED control port event that
> notifies controllers about new launched pluggable
> transports. Resolves ticket 5609.
> - If we're using the pure-C 32-bit curve25519_donna implementation
> of curve25519, build it with the -fomit-frame-pointer option to
> make it go faster on register-starved hosts. This improves our
> handshake performance by about 6% on i386 hosts without nacl.
> Closes ticket 8109.
> - Update to the September 4 2013 Maxmind GeoLite Country database.
>
> o Minor bugfixes:
> - Set the listen() backlog limit to the largest actually supported
> on the system, not to the value in a header file. Fixes bug 9716;
> bugfix on every released Tor.
> - No longer accept malformed http headers when parsing urls from
> headers. Now we reply with Bad Request ("400"). Fixes bug 2767;
> bugfix on 0.0.6pre1.
> - In munge_extrainfo_into_routerinfo(), check the return value of
> memchr(). This would have been a serious issue if we ever passed
> it a non-extrainfo. Fixes bug 8791; bugfix on 0.2.0.6-alpha. Patch
> from Arlo Breault.
> - On the chance that somebody manages to build Tor on a
> platform where time_t is unsigned, correct the way that
> microdesc_add_to_cache() handles negative time arguments.
> Fixes bug 8042; bugfix on 0.2.3.1-alpha.
> - Reject relative control socket paths and emit a warning. Previously,
> single-component control socket paths would be rejected, but Tor
> would not log why it could not validate the config. Fixes bug 9258;
> bugfix on 0.2.3.16-alpha.
>
> o Minor bugfixes (command line):
> - Use a single command-line parser for parsing torrc options on the
> command line and for finding special command-line options to avoid
> inconsistent behavior for torrc option arguments that have the same
> names as command-line options. Fixes bugs 4647 and 9578; bugfix on
> 0.0.9pre5.
> - No longer allow 'tor --hash-password' with no arguments. Fixes bug
> 9573; bugfix on 0.0.9pre5.
>
> o Minor fixes (build, auxiliary programs):
> - Stop preprocessing the "torify" script with autoconf, since
> it no longer refers to LOCALSTATEDIR. Fixes bug 5505; patch
> from Guilhem.
> - The tor-fw-helper program now follows the standard convention and
> exits with status code "0" on success. Fixes bug 9030; bugfix on
> 0.2.3.1-alpha. Patch by Arlo Breault.
> - Corrected ./configure advice for what openssl dev package you should
> install on Debian. Fixes bug 9207; bugfix on 0.2.0.1-alpha.
>
> o Minor code improvements:
> - Remove constants and tests for PKCS1 padding; it's insecure and
> shouldn't be used for anything new. Fixes bug 8792; patch
> from Arlo Breault.
> - Remove instances of strcpy() from the unit tests. They weren't
> hurting anything, since they were only in the unit tests, but it's
> embarassing to have strcpy() in the code at all, and some analysis
> tools don't like it. Fixes bug 8790; bugfix on 0.2.3.6-alpha and
> 0.2.3.8-alpha. Patch from Arlo Breault.
>
> o Removed features:
> - Remove migration code from when we renamed the "cached-routers"
> file to "cached-descriptors" back in 0.2.0.8-alpha. This
> incidentally resolves ticket 6502 by cleaning up the related code
> a bit. Patch from Akshay Hebbar.
>
> o Code simplification and refactoring:
> - Extract the common duplicated code for creating a subdirectory
> of the data directory and writing to a file in it. Fixes ticket
> 4282; patch from Peter Retzlaff.
> - Since OpenSSL 0.9.7, the i2d_*() functions support allocating output
> buffer. Avoid calling twice: i2d_RSAPublicKey(), i2d_DHparams(),
> i2d_X509(), and i2d_PublicKey(). Resolves ticket 5170.
> - Add a set of accessor functions for the circuit timeout data
> structure. Fixes ticket 6153; patch from "piet".
> - Clean up exit paths from connection_listener_new(). Closes ticket
> 8789. Patch from Arlo Breault.
> - Since we rely on OpenSSL 0.9.8 now, we can use EVP_PKEY_cmp()
> and drop our own custom pkey_eq() implementation. Fixes bug 9043.
> - Use a doubly-linked list to implement the global circuit list.
> Resolves ticket 9108. Patch from Marek Majkowski.
> - Remove contrib/id_to_fp.c since it wasn't used anywhere.
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
>
> iD8DBQFSTHMj61qJaiiYi/URAmBvAJ9iBT2dZW97RCWm6GAUVoiNjniXFgCaAyty
> bn+gpWVAhisVCUwn9Ub83rM=
> =Lmqy
> -----END PGP SIGNATURE-----
>
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk