[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Tor 0.2.9.5-alpha is released
Hi, all! There is a new alpha release of the Tor source code, with
numerous bugfixes. We're getting closer to stable, but we still need
testing!
You can download the source from the usual place on the website.
Packages should be up within a few days.
Please remember to check the signature. Please also note that the
signature may be with a key you aren't familiar with. That's because
my PGP key changed a couple of months ago: see
https://people.torproject.org/~nickm/key-transition-statement-2.txt.asc
for more information.
====
Changes in version 0.2.9.5-alpha - 2016-11-08
Tor 0.2.9.5-alpha fixes numerous bugs discovered in the previous alpha
version. We believe one or two probably remain, and we encourage
everyone to test this release.
o Major bugfixes (client performance):
- Clients now respond to new application stream requests immediately
when they arrive, rather than waiting up to one second before
starting to handle them. Fixes part of bug 19969; bugfix
on 0.2.8.1-alpha.
o Major bugfixes (client reliability):
- When Tor leaves standby because of a new application request, open
circuits as needed to serve that request. Previously, we would
potentially wait a very long time. Fixes part of bug 19969; bugfix
on 0.2.8.1-alpha.
o Major bugfixes (download scheduling):
- When using an exponential backoff schedule, do not give up on
downloading just because we have failed a bunch of times. Since
each delay is longer than the last, retrying indefinitely won't
hurt. Fixes bug 20536; bugfix on 0.2.9.1-alpha.
- If a consensus expires while we are waiting for certificates to
download, stop waiting for certificates.
- If we stop waiting for certificates less than a minute after we
started downloading them, do not consider the certificate download
failure a separate failure. Fixes bug 20533; bugfix
on 0.2.0.9-alpha.
- Remove the maximum delay on exponential-backoff scheduling. Since
we now allow an infinite number of failures (see ticket 20536), we
must now allow the time to grow longer on each failure. Fixes part
of bug 20534; bugfix on 0.2.9.1-alpha.
- Make our initial download delays closer to those from 0.2.8. Fixes
another part of bug 20534; bugfix on 0.2.9.1-alpha.
- When determining when to download a directory object, handle times
after 2038 if the operating system supports them. (Someday this
will be important!) Fixes bug 20587; bugfix on 0.2.8.1-alpha.
- When using exponential backoff in test networks, use a lower
exponent, so the delays do not vary as much. This helps test
networks bootstrap consistently. Fixes bug 20597; bugfix on 20499.
o Minor features (geoip):
- Update geoip and geoip6 to the November 3 2016 Maxmind GeoLite2
Country database.
o Minor bugfixes (client directory scheduling):
- Treat "relay too busy to answer request" as a failed request and a
reason to back off on our retry frequency. This is safe now that
exponential backoffs retry indefinitely, and avoids a bug where we
would reset our download schedule erroneously. Fixes bug 20593;
bugfix on 0.2.9.1-alpha.
o Minor bugfixes (client, logging):
- Remove a BUG warning in circuit_pick_extend_handshake(). Instead,
assume all nodes support EXTEND2. Use ntor whenever a key is
available. Fixes bug 20472; bugfix on 0.2.9.3-alpha.
- On DNSPort, stop logging a BUG warning on a failed hostname
lookup. Fixes bug 19869; bugfix on 0.2.9.1-alpha.
o Minor bugfixes (hidden services):
- When configuring hidden services, check every hidden service
directory's permissions. Previously, we only checked the last
hidden service. Fixes bug 20529; bugfix the work to fix 13942
in 0.2.6.2-alpha.
o Minor bugfixes (portability):
- Fix compilation with OpenSSL 1.1 and less commonly-used CPU
architectures. Closes ticket 20588.
- Use ECDHE ciphers instead of ECDH in tortls tests. LibreSSL has
removed the ECDH ciphers which caused the tests to fail on
platforms which use it. Fixes bug 20460; bugfix on 0.2.8.1-alpha.
- Fix implicit conversion warnings under OpenSSL 1.1. Fixes bug
20551; bugfix on 0.2.1.1-alpha.
o Minor bugfixes (relay bootstrap):
- Ensure relays don't make multiple connections during bootstrap.
Fixes bug 20591; bugfix on 0.2.8.1-alpha.
o Minor bugfixes (relay):
- Work around a memory leak in OpenSSL 1.1 when encoding public
keys. Fixes bug 20553; bugfix on 0.0.2pre8.
- Avoid a small memory leak when informing worker threads about
rotated onion keys. Fixes bug 20401; bugfix on 0.2.6.3-alpha.
- Do not try to parallelize workers more than 16x without the user
explicitly configuring us to do so, even if we do detect more than
16 CPU cores. Fixes bug 19968; bugfix on 0.2.3.1-alpha.
o Minor bugfixes (single onion services):
- Start correctly when creating a single onion service in a
directory that did not previously exist. Fixes bug 20484; bugfix
on 0.2.9.3-alpha.
o Minor bugfixes (testing):
- Avoid a unit test failure on systems with over 16 detectable CPU
cores. Fixes bug 19968; bugfix on 0.2.3.1-alpha.
o Documentation:
- Clarify that setting HiddenServiceNonAnonymousMode requires you to
also set "SOCKSPort 0". Fixes bug 20487; bugfix on 0.2.9.3-alpha.
- Module-level documentation for several more modules. Closes
tickets 19287 and 19290.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk