diff options
Diffstat (limited to 'changes')
-rw-r--r-- | changes/4664 | 4 | ||||
-rw-r--r-- | changes/7304 | 7 | ||||
-rw-r--r-- | changes/bug5823 | 5 | ||||
-rw-r--r-- | changes/bug6826 | 5 | ||||
-rw-r--r-- | changes/bug7115 | 4 | ||||
-rw-r--r-- | changes/bug7157 | 26 | ||||
-rw-r--r-- | changes/bug7799.ratelim | 6 | ||||
-rw-r--r-- | changes/bug7814 | 4 | ||||
-rw-r--r-- | changes/bug7836 | 5 | ||||
-rw-r--r-- | changes/bug7889 | 8 | ||||
-rw-r--r-- | changes/bug7896 | 3 | ||||
-rw-r--r-- | changes/bug7972 | 5 | ||||
-rw-r--r-- | changes/build_with_msvc | 4 | ||||
-rw-r--r-- | changes/clang_enum_warnings | 3 | ||||
-rw-r--r-- | changes/dh_benchmarks | 3 | ||||
-rw-r--r-- | changes/dirguards | 8 | ||||
-rw-r--r-- | changes/enum_bitfield | 0 | ||||
-rw-r--r-- | changes/msvc | 6 | ||||
-rw-r--r-- | changes/ntor | 40 | ||||
-rw-r--r-- | changes/proposal204 | 5 | ||||
-rw-r--r-- | changes/rename5285 | 2 | ||||
-rw-r--r-- | changes/tls_ecdhe | 26 |
22 files changed, 58 insertions, 121 deletions
diff --git a/changes/4664 b/changes/4664 new file mode 100644 index 000000000..eb81da925 --- /dev/null +++ b/changes/4664 @@ -0,0 +1,4 @@ + o Minor features (build): + - Do not report status verbosely from autogen.sh unless the -v flag + is specified. Fixes issue 4664. Patch from Onizuka. + diff --git a/changes/7304 b/changes/7304 new file mode 100644 index 000000000..bfb797b10 --- /dev/null +++ b/changes/7304 @@ -0,0 +1,7 @@ + o Minor bugfixes: + - Replace all calls to snprintf outside of src/ext with tor_snprintf. + Fix for bug 7304. + o Code simplification and refactoring: + - Remove the #define to replace snprintf with _snprintf on windows; + they have different semantics, and all of our callers should be + using tor_snprintf anyway. Partial fix for bug 7304. diff --git a/changes/bug5823 b/changes/bug5823 new file mode 100644 index 000000000..d76b59088 --- /dev/null +++ b/changes/bug5823 @@ -0,0 +1,5 @@ + o Removed featurs: + - Stop exporting estimates of v2 and v3 directory traffic shares + in extrainfo documents. They were unneeded and sometimes inaccurate. + Also stop exporting any v2 directory request statistics. Resolves + ticket 5823. diff --git a/changes/bug6826 b/changes/bug6826 new file mode 100644 index 000000000..6eba19bce --- /dev/null +++ b/changes/bug6826 @@ -0,0 +1,5 @@ + o Removed features: + - Drop support for detecting and warning about versions of Libevent + before 1.3e. Nothing reasonable ships with them any longer; + warning the user about them shouldn't be needed. Resolves ticket + 6826. diff --git a/changes/bug7115 b/changes/bug7115 new file mode 100644 index 000000000..976b9a9e8 --- /dev/null +++ b/changes/bug7115 @@ -0,0 +1,4 @@ + o Minor bugfixes (portability) + - Remove a couple of extraneous semicolos that were upsetting the + cparser library. Patch by Christian Grothoff. Fixes bug 7115; + bugfix on 0.2.2.1-alpha. diff --git a/changes/bug7157 b/changes/bug7157 deleted file mode 100644 index 4f0e3b3fc..000000000 --- a/changes/bug7157 +++ /dev/null @@ -1,26 +0,0 @@ - - o Minor features: - - Alter the Path Bias log messages to be more descriptive in terms - of reporting timeouts and other statistics. - - Create three levels of Path Bias log messages, as opposed to just - two. These are configurable via consensus as well as via torrc - options PathBiasNoticeRate, PathBiasWarnRate, PathBiasExtremeRate. - The default values are 0.70, 0.50, and 0.30 respectively. - - Separate the log message levels from the decision to drop guards, - which also is available via torrc option PathBiasDropGuards. - PathBiasDropGuards defaults to 0 (off). - - Deprecate PathBiasDisableRate in favor of PathBiasDropGuards - in combination with PathBiasExtremeRate. - - Increase the default values for PathBiasScaleThreshold and - PathBiasCircThreshold from 200 and 20 to 300 and 150, respectively. - - Add in circuit usage accounting to path bias. If we try to use a - built circuit but fail for any reason, it counts as path bias. - Certain classes of circuits where the adversary gets to pick your - destination node are exempt from this accounting. Usage accounting - can be specifically disabled via consensus parameter or torrc. - - Convert all internal path bias state to double-precision floating - point, to avoid roundoff error and other issues. - - Only record path bias information for circuits that have completed - *two* hops. Assuming end-to-end tagging is the attack vector, this - makes us more resilient to ambient circuit failure without any - detection capability loss. diff --git a/changes/bug7799.ratelim b/changes/bug7799.ratelim deleted file mode 100644 index cb7742c5d..000000000 --- a/changes/bug7799.ratelim +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes: - - Rate-limit the "No circuits are opened. Relaxed timeout for a - circuit with channel state open..." message to once per hour to - keep it from filling the notice logs. Mitigates bug 7799 but does - not fix the underlying cause. Bugfix on 0.2.4.7-alpha. - diff --git a/changes/bug7814 b/changes/bug7814 deleted file mode 100644 index 7ecc2427a..000000000 --- a/changes/bug7814 +++ /dev/null @@ -1,4 +0,0 @@ - o Major bugfixes: - - Avoid crashing when, as a node without IPv6-exit support, a - client insists on getting an IPv6 address or nothing. Fixes bug - #7814; bugfix on 0.2.4.7-alpha. diff --git a/changes/bug7836 b/changes/bug7836 deleted file mode 100644 index 730d80745..000000000 --- a/changes/bug7836 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes: - - Avoid spurious warnings when configuring multiple client ports of - which only some are nonlocal. Previously, we had claimed that some - were nonlocal when in fact they weren't. Fixes bug 7836; bugfix on - 0.2.3.3-alpha. diff --git a/changes/bug7889 b/changes/bug7889 new file mode 100644 index 000000000..ce99a59ce --- /dev/null +++ b/changes/bug7889 @@ -0,0 +1,8 @@ + o Major bugfixes: + - Reject bogus create and relay cells with 0 circuit ID or 0 stream + ID: these could be used to create unexpected streams and circuits + which would count as "present" to some parts of Tor but "absent" + to others, leading to zombie circuits and streams or to a + bandwidth DOS. Fixes bug 7889; bugfix on every released version of + Tor. Reported by "oftc_must_be_destroyed". + diff --git a/changes/bug7896 b/changes/bug7896 new file mode 100644 index 000000000..9eecaa6ab --- /dev/null +++ b/changes/bug7896 @@ -0,0 +1,3 @@ + o Minor features: + - When learning a fingerprint for a bridge, log its corresponding + transport type. Implements ticket 7896. diff --git a/changes/bug7972 b/changes/bug7972 new file mode 100644 index 000000000..6e1fce69c --- /dev/null +++ b/changes/bug7972 @@ -0,0 +1,5 @@ + o Minor bugfixes: + - Detect nacl when its headers are in a nacl/ subdirectory. Fixes bug + 7972; bugfix on 0.2.4.8-alpha. + - Actually link against nacl when we're configured to use it. Fixes bug + 7972; bugfix on 0.2.4.8-alpha. diff --git a/changes/build_with_msvc b/changes/build_with_msvc new file mode 100644 index 000000000..8da0c92bc --- /dev/null +++ b/changes/build_with_msvc @@ -0,0 +1,4 @@ + o Features (portability): + - Build correctly with MSVC and Makefile.nmake. This resolves + numerous bugs and fixes reported by ultramage, including 7305, + 7308, 7309, 7310, 7312, 7313, 7315, 7316, and 7669. diff --git a/changes/clang_enum_warnings b/changes/clang_enum_warnings deleted file mode 100644 index 50de605fc..000000000 --- a/changes/clang_enum_warnings +++ /dev/null @@ -1,3 +0,0 @@ - o Code simplifications and refactoring: - - Get rid of a couple of harmless clang warnings, where we compared - enums to ints. These warnings are newly introduced in clang 3.2. diff --git a/changes/dh_benchmarks b/changes/dh_benchmarks deleted file mode 100644 index 2301995a7..000000000 --- a/changes/dh_benchmarks +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (testing): - - Add benchmarks for DH (1024-bit multiplicative group) and ECDH - (P-256) diffie-hellman handshakes to src/or/bench. diff --git a/changes/dirguards b/changes/dirguards deleted file mode 100644 index 942ae6c24..000000000 --- a/changes/dirguards +++ /dev/null @@ -1,8 +0,0 @@ - o Major features: - - Preliminary support for directory guards: when possible, - clients now use guards for non-anonymous directory requests. - This can help prevent client enumeration. Note that this - behavior only works when we have a usable consensus directory: - and when options about what to download are more or less - standard. Implements proposal 207; closes ticket 6526. - diff --git a/changes/enum_bitfield b/changes/enum_bitfield new file mode 100644 index 000000000..e69de29bb --- /dev/null +++ b/changes/enum_bitfield diff --git a/changes/msvc b/changes/msvc new file mode 100644 index 000000000..1ae92e3f2 --- /dev/null +++ b/changes/msvc @@ -0,0 +1,6 @@ + o Build fixes (MSVC): + - Correctly define HAVE_EVENT_BASE_LOOPEXIT, since we only build + with MSVC when using Libevent 2.0 or later. Fixes bug 7308. + Reported by "ultramage". + - Make the ntor and curve25519 code build correctly with MSVC. + Fix on 0.2.4.8-alpha. diff --git a/changes/ntor b/changes/ntor deleted file mode 100644 index 3aca82075..000000000 --- a/changes/ntor +++ /dev/null @@ -1,40 +0,0 @@ - o Major features: - - - Tor now supports a new circuit extension handshake designed by Ian - Goldberg, Douglas Stebila, and Berkant Ustaoglu. Our original - circuit extension handshake, later called "TAP", was a bit slow - (especially on the server side), had a fragile security proof, and - used weaker keys than we'd now prefer. The new circuit handshake - uses Dan Bernstein's "curve25519" elliptic-curve Diffie-Hellman - function, making it significantly more secure than the older - handshake, and significantly faster. Tor can either use one of two - built-in pure-C curve25519-donna implementations by Adam Langley, - or link against the "nacl" library for a tuned version if present. - - The built-in version is very fast for 64-bit systems building with - GCC. (About 10-14x faster on the server side, and about 7x faster - on the client side.) The built-in 32-bit version is still faster - than the old TAP protocol (about 3x), but using libnacl would be - better on most 32-bit x86 hosts. - - Clients don't currently use this protocol by default, since - comparatively few clients support it so far. To try it, set - UseNTorHandshake to 1. - - Implements proposal 216; closes ticket #7202. - - - Tor servers and clients now support a better CREATE/EXTEND cell - format, allowing the sender to specify multiple address, identity, - and handshake types. Implements Robert Ransom's proposal 200; - closes ticket #7199. - - o Code simplification and refactoring: - - Split the onion.c file into separate modules for the onion queue - and the different handshakes it supports. - - Remove the marshalling/unmarshalling code for sending requests to - cpuworkers over a socket, and instead just send structs. The - recipient will always be the same Tor binary as the sender, so - any encoding is overkill. - - o Testing: - - Add benchmark functions to test onion handshake performance. diff --git a/changes/proposal204 b/changes/proposal204 new file mode 100644 index 000000000..4c1854b1e --- /dev/null +++ b/changes/proposal204 @@ -0,0 +1,5 @@ + o Minor features: + - Ignore sub-domain components of a .onion address. This makes HTTP "virtual" + hosting possible: http://foo.aaaaaaaaaaaaaaaa.onion/ and + http//bar.aaaaaaaaaaaaaaaa.onion/ can be two different websites hosted at + the same location. Implements proposal 204. diff --git a/changes/rename5285 b/changes/rename5285 new file mode 100644 index 000000000..26ec976e2 --- /dev/null +++ b/changes/rename5285 @@ -0,0 +1,2 @@ + o Code simplifications and refactoring: + - Rename "isin" functions to "contains", for grammar. Fixes ticket 5285. diff --git a/changes/tls_ecdhe b/changes/tls_ecdhe deleted file mode 100644 index 48c6384da..000000000 --- a/changes/tls_ecdhe +++ /dev/null @@ -1,26 +0,0 @@ - o Major features: - - - Servers can now enable the ECDHE TLS ciphersuites when available - and appropriate. These ciphersuites let us negotiate forward- - secure TLS secret keys more safely and more efficiently than with - our previous use of Diffie Hellman modulo a 1024-bit prime. - By default, public servers prefer the (faster) P224 group, and - bridges prefer the (more common) P256 group; you can override this - with the TLSECGroup option. - - Enabling these ciphers was a little tricky, since for a long - time, clients had been claiming to support them without - actually doing so, in order to foil fingerprinting. But with - the client-side implementation of proposal 198 in - 0.2.3.17-beta, clients can now match the ciphers from recent - firefox versions *and* list the ciphers they actually mean, so - servers can believe such clients when they advertise ECDHE - support in their TLS ClientHello messages. - - This feature requires clients running 0.2.3.17-beta or later, - and requires both sides to be running OpenSSL 1.0.0 or later - with ECC support. OpenSSL 1.0.1, with the compile-time option - "enable-ec_nistp_64_gcc_128", is highly recommended. - Implements the server side of proposal 198; closes ticket - 7200. - |