From 03ce73327ce07499df563919764ea020f880da6b Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Fri, 25 Apr 2014 21:51:31 -0400 Subject: reflow changelog. --- ChangeLog | 53 +++++++++++++++++++++++++++-------------------------- 1 file changed, 27 insertions(+), 26 deletions(-) (limited to 'ChangeLog') diff --git a/ChangeLog b/ChangeLog index 0af644fcc..e4387e14a 100644 --- a/ChangeLog +++ b/ChangeLog @@ -3,9 +3,9 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 improvements for clients and relays, including blacklisting authority signing keys that were used while susceptible to the OpenSSL "heartbleed" bug, fixing two expensive functions on busy relays, - improved TLS ciphersuite preference lists, support for run-time hardening - on compilers that support AddressSanitizer, and more work on the Linux - sandbox code. + improved TLS ciphersuite preference lists, support for run-time + hardening on compilers that support AddressSanitizer, and more work on + the Linux sandbox code. There are also several usability fixes for clients (especially clients that use bridges), two new TransPort protocols supported (one on @@ -52,15 +52,15 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 uniform criteria, and includes all OpenSSL ciphersuites with acceptable strength and forward secrecy. Previously, we had left some perfectly fine ciphersuites unsupported due to omission or - typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported - by 'cypherpunks'. Bugfix on 0.2.4.8-alpha. + typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by + 'cypherpunks'. Bugfix on 0.2.4.8-alpha. - Relays now trust themselves to have a better view than clients of - which TLS ciphersuites are better than others. (Thanks to bug 11513, - the relay list is now well-considered, whereas the client list has - been chosen mainly for anti-fingerprinting purposes.) Relays - prefer: AES over 3DES; then ECDHE over DHE; then GCM over CBC; - then SHA384 over SHA256 over SHA1; and last, AES256 over AES128. - Resolves ticket 11528. + which TLS ciphersuites are better than others. (Thanks to bug + 11513, the relay list is now well-considered, whereas the client + list has been chosen mainly for anti-fingerprinting purposes.) + Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over + CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over + AES128. Resolves ticket 11528. - Clients now try to advertise the same list of ciphersuites as Firefox 28. This change enables selection of (fast) GCM ciphersuites, disables some strange old ciphers, and stops @@ -77,18 +77,18 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket 10267; patch from "yurivict". - Support OpenBSD's divert-to rules with the pf firewall for - transparent proxy ports. To enable it, set "TransProxyType - pf-divert". This allows Tor to run a TransPort transparent proxy - port on OpenBSD 4.4 or later without root privileges. See the + transparent proxy ports. To enable it, set "TransProxyType pf- + divert". This allows Tor to run a TransPort transparent proxy port + on OpenBSD 4.4 or later without root privileges. See the pf.conf(5) manual page for information on configuring pf to use divert-to rules. Closes ticket 10896; patch from Dana Koch. o Minor features (security): - New --enable-expensive-hardening option to enable security hardening options that consume nontrivial amounts of CPU and - memory. Right now, this includes AddressSanitizer and UbSan, - which are supported in newer versions of GCC and Clang. Closes - ticket 11477. + memory. Right now, this includes AddressSanitizer and UbSan, which + are supported in newer versions of GCC and Clang. Closes ticket + 11477. o Minor features (log verbosity): - Demote the message that we give when a flushing connection times @@ -98,8 +98,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 about downloading descriptors. Previously, we'd log a notice whenever we learned about more routers. Now, we only log a notice at every 5% of progress. Fixes bug 9963. - - Warn less verbosely when receiving a malformed ESTABLISH_RENDEZVOUS - cell. Fixes ticket 11279. + - Warn less verbosely when receiving a malformed + ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279. - When we run out of usable circuit IDs on a channel, log only one warning for the whole channel, and describe how many circuits there were on the channel. Fixes part of ticket 11553. @@ -153,8 +153,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha. o Minor bugfixes (client, logging during bootstrap): - - Warn only once if we start logging in an unsafe way. Previously, we - complain as many times as we had problems. Fixes bug 9870; + - Warn only once if we start logging in an unsafe way. Previously, + we complain as many times as we had problems. Fixes bug 9870; bugfix on 0.2.5.1-alpha. - Only report the first fatal bootstrap error on a given OR connection. This stops us from telling the controller bogus error @@ -208,15 +208,16 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha. - Don't re-initialize a second set of OpenSSL mutexes when starting up. Previously, we'd make one set of mutexes, and then immediately - replace them with another. Fixes bug 11726; bugfix on 0.2.5.3-alpha. + replace them with another. Fixes bug 11726; bugfix on + 0.2.5.3-alpha. - Resolve some memory leaks found by coverity in the unit tests, on exit in tor-gencert, and on a failure to compute digests for our own keys when generating a v3 networkstatus vote. These leaks should never have affected anyone in practice. o Minor bugfixes (hidden service): - - Only retry attempts to connect to a chosen rendezvous point 8 times, - not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc. + - Only retry attempts to connect to a chosen rendezvous point 8 + times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc. o Minor bugfixes (misc code correctness): - Fix various instances of undefined behavior in channeltls.c, @@ -226,8 +227,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha, 0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom". - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to - fix some miscellaneous errors in our tests and codebase. Fixes - bug 11232. Bugfixes on versions back as far as 0.2.1.11-alpha. + fix some miscellaneous errors in our tests and codebase. Fixes bug + 11232. Bugfixes on versions back as far as 0.2.1.11-alpha. - Always check return values for unlink, munmap, UnmapViewOfFile; check strftime return values more often. In some cases all we can do is report a warning, but this may help prevent deeper bugs from -- cgit v1.2.3