[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] tor-talk Digest, Vol 83, Issue 9
So what's tor talk all about, could be a source of income or a platform of
getting money.
On 15 Dec 2017 13:00, <tor-talk-request@xxxxxxxxxxxxxxxxxxxx> wrote:
> Send tor-talk mailing list submissions to
> tor-talk@xxxxxxxxxxxxxxxxxxxx
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> or, via email, send a message with subject or body 'help' to
> tor-talk-request@xxxxxxxxxxxxxxxxxxxx
>
> You can reach the person managing the list at
> tor-talk-owner@xxxxxxxxxxxxxxxxxxxx
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-talk digest..."
>
>
> Today's Topics:
>
> 1. Tor 0.3.2.7-rc is released! (Nick Mathewson)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Thu, 14 Dec 2017 14:06:30 -0500
> From: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: [tor-talk] Tor 0.3.2.7-rc is released!
> Message-ID:
> <CAKDKvuya+P893dqZ5UeJbQktN2mzNHHp_uhtBPkaZyRz+x8J5w@mail.gmail.
> com>
> Content-Type: text/plain; charset="UTF-8"
>
> Hi, all!
>
> Tor 0.3.2.7-rc is released. If you build Tor from source code, why
> not fetch it from our download page and try it out? If you use
> precompiled packages, then there should be releases soon, including a
> Tor Browser alpha release likely next week.
>
> Here are the changes since 0.3.2.6-alpha:
>
>
> Changes in version 0.3.2.7-rc - 2017-12-14
> Tor 0.3.2.7-rc fixes various bugs in earlier versions of Tor,
> including some that could affect reliability or correctness.
>
> This is the first release candidate in the 0.3.2 series. If we find no
> new bugs or regression here, then the first stable 0.3.2. release will
> be nearly identical to this.
>
> o Major bugfixes (circuit prediction):
> - Fix circuit prediction logic so that a client doesn't treat a port
> as being "handled" by a circuit if that circuit already has
> isolation settings on it. This change should make Tor clients more
> responsive by improving their chances of having a pre-created
> circuit ready for use when a request arrives. Fixes bug 18859;
> bugfix on 0.2.3.3-alpha.
>
> o Minor features (logging):
> - Provide better warnings when the getrandom() syscall fails. Closes
> ticket 24500.
>
> o Minor features (portability):
> - Tor now compiles correctly on arm64 with libseccomp-dev installed.
> (It doesn't yet work with the sandbox enabled.) Closes
> ticket 24424.
>
> o Minor bugfixes (bridge clients, bootstrap):
> - Retry directory downloads when we get our first bridge descriptor
> during bootstrap or while reconnecting to the network. Keep
> retrying every time we get a bridge descriptor, until we have a
> reachable bridge. Fixes part of bug 24367; bugfix on 0.2.0.3-alpha.
> - Stop delaying bridge descriptor fetches when we have cached bridge
> descriptors. Instead, only delay bridge descriptor fetches when we
> have at least one reachable bridge. Fixes part of bug 24367;
> bugfix on 0.2.0.3-alpha.
> - Stop delaying directory fetches when we have cached bridge
> descriptors. Instead, only delay bridge descriptor fetches when
> all our bridges are definitely unreachable. Fixes part of bug
> 24367; bugfix on 0.2.0.3-alpha.
>
> o Minor bugfixes (compilation):
> - Fix a signed/unsigned comparison warning introduced by our fix to
> TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
>
> o Minor bugfixes (correctness):
> - Fix several places in our codebase where a C compiler would be
> likely to eliminate a check, based on assuming that undefined
> behavior had not happened elsewhere in the code. These cases are
> usually a sign of redundant checking or dubious arithmetic. Found
> by Georg Koppen using the "STACK" tool from Wang, Zeldovich,
> Kaashoek, and Solar-Lezama. Fixes bug 24423; bugfix on various
> Tor versions.
>
> o Minor bugfixes (onion service v3):
> - Fix a race where an onion service would launch a new intro circuit
> after closing an old one, but fail to register it before freeing
> the previously closed circuit. This bug was making the service
> unable to find the established intro circuit and thus not upload
> its descriptor, thus making a service unavailable for up to 24
> hours. Fixes bug 23603; bugfix on 0.3.2.1-alpha.
>
> o Minor bugfixes (scheduler, KIST):
> - Properly set the scheduler state of an unopened channel in the
> KIST scheduler main loop. This prevents a harmless but annoying
> log warning. Fixes bug 24502; bugfix on 0.3.2.4-alpha.
> - Avoid a possible integer overflow when computing the available
> space on the TCP buffer of a channel. This had no security
> implications; but could make KIST allow too many cells on a
> saturated connection. Fixes bug 24590; bugfix on 0.3.2.1-alpha.
> - Downgrade to "info" a harmless warning about the monotonic time
> moving backwards: This can happen on platform not supporting
> monotonic time. Fixes bug 23696; bugfix on 0.3.2.1-alpha.
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
> ------------------------------
>
> End of tor-talk Digest, Vol 83, Issue 9
> ***************************************
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk