diff options
Diffstat (limited to 'changes')
-rw-r--r-- | changes/bug7054 | 4 | ||||
-rw-r--r-- | changes/bug7157 | 26 | ||||
-rw-r--r-- | changes/bug7799.ratelim | 6 | ||||
-rw-r--r-- | changes/bug7816.024 | 8 | ||||
-rw-r--r-- | changes/bug7816_023 | 7 | ||||
-rw-r--r-- | changes/bug7816_023_small | 3 | ||||
-rw-r--r-- | changes/bug7902 | 7 | ||||
-rw-r--r-- | changes/bug8121 | 7 | ||||
-rw-r--r-- | changes/bug8151 | 5 | ||||
-rw-r--r-- | changes/bug8161 | 6 | ||||
-rw-r--r-- | changes/dh_benchmarks | 3 | ||||
-rw-r--r-- | changes/dirguards | 8 | ||||
-rw-r--r-- | changes/tls_ecdhe | 26 |
13 files changed, 47 insertions, 69 deletions
diff --git a/changes/bug7054 b/changes/bug7054 new file mode 100644 index 000000000..15680d72c --- /dev/null +++ b/changes/bug7054 @@ -0,0 +1,4 @@ + o Minor bugfixes (man page): + - Say "KBytes" rather than "KB" in the man page (for various values + of K), to further reduce confusion about whether Tor counts in + units of memory or fractions of units of memory. Fixes bug 7054. diff --git a/changes/bug7157 b/changes/bug7157 deleted file mode 100644 index 4f0e3b3fc..000000000 --- a/changes/bug7157 +++ /dev/null @@ -1,26 +0,0 @@ - - o Minor features: - - Alter the Path Bias log messages to be more descriptive in terms - of reporting timeouts and other statistics. - - Create three levels of Path Bias log messages, as opposed to just - two. These are configurable via consensus as well as via torrc - options PathBiasNoticeRate, PathBiasWarnRate, PathBiasExtremeRate. - The default values are 0.70, 0.50, and 0.30 respectively. - - Separate the log message levels from the decision to drop guards, - which also is available via torrc option PathBiasDropGuards. - PathBiasDropGuards defaults to 0 (off). - - Deprecate PathBiasDisableRate in favor of PathBiasDropGuards - in combination with PathBiasExtremeRate. - - Increase the default values for PathBiasScaleThreshold and - PathBiasCircThreshold from 200 and 20 to 300 and 150, respectively. - - Add in circuit usage accounting to path bias. If we try to use a - built circuit but fail for any reason, it counts as path bias. - Certain classes of circuits where the adversary gets to pick your - destination node are exempt from this accounting. Usage accounting - can be specifically disabled via consensus parameter or torrc. - - Convert all internal path bias state to double-precision floating - point, to avoid roundoff error and other issues. - - Only record path bias information for circuits that have completed - *two* hops. Assuming end-to-end tagging is the attack vector, this - makes us more resilient to ambient circuit failure without any - detection capability loss. diff --git a/changes/bug7799.ratelim b/changes/bug7799.ratelim deleted file mode 100644 index cb7742c5d..000000000 --- a/changes/bug7799.ratelim +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes: - - Rate-limit the "No circuits are opened. Relaxed timeout for a - circuit with channel state open..." message to once per hour to - keep it from filling the notice logs. Mitigates bug 7799 but does - not fix the underlying cause. Bugfix on 0.2.4.7-alpha. - diff --git a/changes/bug7816.024 b/changes/bug7816.024 new file mode 100644 index 000000000..b5d55f5d6 --- /dev/null +++ b/changes/bug7816.024 @@ -0,0 +1,8 @@ + o Minor bugfixes: + - Avoid leaking IPv6 policy content if we fail to format it into + a router descriptor. Spotted by Coverity. Fixes part of 7816; + bugfix on 0.2.4.7-alpha. + + - Avoid leaking memory if we fail to compute a consensus signature + or we generated a consensus we couldn't parse. Spotted by Coverity. + Fixes part of 7816; bugfix on 0.2.0.5-alpha. diff --git a/changes/bug7816_023 b/changes/bug7816_023 new file mode 100644 index 000000000..a4530292c --- /dev/null +++ b/changes/bug7816_023 @@ -0,0 +1,7 @@ + o Minor bugfixes (memory leak, controller): + - Fix a memory leak during safe-cookie controller authentication. + Spotted by Coverity. Fixes part of bug 7816; bugfix on 0.2.3.13-alpha. + + o Minor bugfixes (memory leak, HTTPS proxy support): + - Fix a memory leak when receiving headers from an HTTPS proxy. + Spotted by Coverity. Fixes part of bug 7816; bugfix on 0.2.1.1-alpha. diff --git a/changes/bug7816_023_small b/changes/bug7816_023_small new file mode 100644 index 000000000..cd90f035f --- /dev/null +++ b/changes/bug7816_023_small @@ -0,0 +1,3 @@ + o Minor bugfixes: + - Fix various places where we leak file descriptors or memory on + error cases. Spotted by coverity. Fixes parts of bug 7816. diff --git a/changes/bug7902 b/changes/bug7902 new file mode 100644 index 000000000..051759dc0 --- /dev/null +++ b/changes/bug7902 @@ -0,0 +1,7 @@ + o Minor bugfixes: + - When we receive a RELAY_END cell with the reason DONE, or with no + reason, before receiving a RELAY_CONNECTED cell, report the SOCKS + status as "connection refused." Previously we reporting these + cases as success but then immediately closing the connection. + Fixes bug 7902; bugfix on 0.1.0.1-rc. Reported by "oftc_must_ + be_destroyed." diff --git a/changes/bug8121 b/changes/bug8121 new file mode 100644 index 000000000..60cba7284 --- /dev/null +++ b/changes/bug8121 @@ -0,0 +1,7 @@ + o Minor features: + - Clear the high bit on curve25519 public keys before passing them to + our backend, in case we ever wind up using a backend that doesn't do + so itself. If we used such a backend, and *didn't* clear the high bit, + we could wind up in a situation where users with such backends would + be distinguishable from users without. Fix for bug 8121; bugfix on + 0.2.4.8-alpha. diff --git a/changes/bug8151 b/changes/bug8151 new file mode 100644 index 000000000..e20fa3c31 --- /dev/null +++ b/changes/bug8151 @@ -0,0 +1,5 @@ + o Minor features (directory authority): + - Include inside each vote a statement of the performance + thresholds that made the authority vote for its flags. Implements + ticket 8151. +
\ No newline at end of file diff --git a/changes/bug8161 b/changes/bug8161 new file mode 100644 index 000000000..ab7b9c0ca --- /dev/null +++ b/changes/bug8161 @@ -0,0 +1,6 @@ + o Minor changes: + - Lower path use bias thresholds to .80 for notice and .60 for warn. + Fixes bug #8161; bugfix on 0.2.4.10-alpa. + - Make the rate limiting flags for the path use bias log messages + independent from the original path bias flags. Fixes bug #8161; + bugfix on 0.2.4.10-alpha. diff --git a/changes/dh_benchmarks b/changes/dh_benchmarks deleted file mode 100644 index 2301995a7..000000000 --- a/changes/dh_benchmarks +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (testing): - - Add benchmarks for DH (1024-bit multiplicative group) and ECDH - (P-256) diffie-hellman handshakes to src/or/bench. diff --git a/changes/dirguards b/changes/dirguards deleted file mode 100644 index 942ae6c24..000000000 --- a/changes/dirguards +++ /dev/null @@ -1,8 +0,0 @@ - o Major features: - - Preliminary support for directory guards: when possible, - clients now use guards for non-anonymous directory requests. - This can help prevent client enumeration. Note that this - behavior only works when we have a usable consensus directory: - and when options about what to download are more or less - standard. Implements proposal 207; closes ticket 6526. - diff --git a/changes/tls_ecdhe b/changes/tls_ecdhe deleted file mode 100644 index 48c6384da..000000000 --- a/changes/tls_ecdhe +++ /dev/null @@ -1,26 +0,0 @@ - o Major features: - - - Servers can now enable the ECDHE TLS ciphersuites when available - and appropriate. These ciphersuites let us negotiate forward- - secure TLS secret keys more safely and more efficiently than with - our previous use of Diffie Hellman modulo a 1024-bit prime. - By default, public servers prefer the (faster) P224 group, and - bridges prefer the (more common) P256 group; you can override this - with the TLSECGroup option. - - Enabling these ciphers was a little tricky, since for a long - time, clients had been claiming to support them without - actually doing so, in order to foil fingerprinting. But with - the client-side implementation of proposal 198 in - 0.2.3.17-beta, clients can now match the ciphers from recent - firefox versions *and* list the ciphers they actually mean, so - servers can believe such clients when they advertise ECDHE - support in their TLS ClientHello messages. - - This feature requires clients running 0.2.3.17-beta or later, - and requires both sides to be running OpenSSL 1.0.0 or later - with ECC support. OpenSSL 1.0.1, with the compile-time option - "enable-ec_nistp_64_gcc_128", is highly recommended. - Implements the server side of proposal 198; closes ticket - 7200. - |