ChangeLog 1.0 MB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038703970407041704270437044704570467047704870497050705170527053705470557056705770587059706070617062706370647065706670677068706970707071707270737074707570767077707870797080708170827083708470857086708770887089709070917092709370947095709670977098709971007101710271037104710571067107710871097110711171127113711471157116711771187119712071217122712371247125712671277128712971307131713271337134713571367137713871397140714171427143714471457146714771487149715071517152715371547155715671577158715971607161716271637164716571667167716871697170717171727173717471757176717771787179718071817182718371847185718671877188718971907191719271937194719571967197719871997200720172027203720472057206720772087209721072117212721372147215721672177218721972207221722272237224722572267227722872297230723172327233723472357236723772387239724072417242724372447245724672477248724972507251725272537254725572567257725872597260726172627263726472657266726772687269727072717272727372747275727672777278727972807281728272837284728572867287728872897290729172927293729472957296729772987299730073017302730373047305730673077308730973107311731273137314731573167317731873197320732173227323732473257326732773287329733073317332733373347335733673377338733973407341734273437344734573467347734873497350735173527353735473557356735773587359736073617362736373647365736673677368736973707371737273737374737573767377737873797380738173827383738473857386738773887389739073917392739373947395739673977398739974007401740274037404740574067407740874097410741174127413741474157416741774187419742074217422742374247425742674277428742974307431743274337434743574367437743874397440744174427443744474457446744774487449745074517452745374547455745674577458745974607461746274637464746574667467746874697470747174727473747474757476747774787479748074817482748374847485748674877488748974907491749274937494749574967497749874997500750175027503750475057506750775087509751075117512751375147515751675177518751975207521752275237524752575267527752875297530753175327533753475357536753775387539754075417542754375447545754675477548754975507551755275537554755575567557755875597560756175627563756475657566756775687569757075717572757375747575757675777578757975807581758275837584758575867587758875897590759175927593759475957596759775987599760076017602760376047605760676077608760976107611761276137614761576167617761876197620762176227623762476257626762776287629763076317632763376347635763676377638763976407641764276437644764576467647764876497650765176527653765476557656765776587659766076617662766376647665766676677668766976707671767276737674767576767677767876797680768176827683768476857686768776887689769076917692769376947695769676977698769977007701770277037704770577067707770877097710771177127713771477157716771777187719772077217722772377247725772677277728772977307731773277337734773577367737773877397740774177427743774477457746774777487749775077517752775377547755775677577758775977607761776277637764776577667767776877697770777177727773777477757776777777787779778077817782778377847785778677877788778977907791779277937794779577967797779877997800780178027803780478057806780778087809781078117812781378147815781678177818781978207821782278237824782578267827782878297830783178327833783478357836783778387839784078417842784378447845784678477848784978507851785278537854785578567857785878597860786178627863786478657866786778687869787078717872787378747875787678777878787978807881788278837884788578867887788878897890789178927893789478957896789778987899790079017902790379047905790679077908790979107911791279137914791579167917791879197920792179227923792479257926792779287929793079317932793379347935793679377938793979407941794279437944794579467947794879497950795179527953795479557956795779587959796079617962796379647965796679677968796979707971797279737974797579767977797879797980798179827983798479857986798779887989799079917992799379947995799679977998799980008001800280038004800580068007800880098010801180128013801480158016801780188019802080218022802380248025802680278028802980308031803280338034803580368037803880398040804180428043804480458046804780488049805080518052805380548055805680578058805980608061806280638064806580668067806880698070807180728073807480758076807780788079808080818082808380848085808680878088808980908091809280938094809580968097809880998100810181028103810481058106810781088109811081118112811381148115811681178118811981208121812281238124812581268127812881298130813181328133813481358136813781388139814081418142814381448145814681478148814981508151815281538154815581568157815881598160816181628163816481658166816781688169817081718172817381748175817681778178817981808181818281838184818581868187818881898190819181928193819481958196819781988199820082018202820382048205820682078208820982108211821282138214821582168217821882198220822182228223822482258226822782288229823082318232823382348235823682378238823982408241824282438244824582468247824882498250825182528253825482558256825782588259826082618262826382648265826682678268826982708271827282738274827582768277827882798280828182828283828482858286828782888289829082918292829382948295829682978298829983008301830283038304830583068307830883098310831183128313831483158316831783188319832083218322832383248325832683278328832983308331833283338334833583368337833883398340834183428343834483458346834783488349835083518352835383548355835683578358835983608361836283638364836583668367836883698370837183728373837483758376837783788379838083818382838383848385838683878388838983908391839283938394839583968397839883998400840184028403840484058406840784088409841084118412841384148415841684178418841984208421842284238424842584268427842884298430843184328433843484358436843784388439844084418442844384448445844684478448844984508451845284538454845584568457845884598460846184628463846484658466846784688469847084718472847384748475847684778478847984808481848284838484848584868487848884898490849184928493849484958496849784988499850085018502850385048505850685078508850985108511851285138514851585168517851885198520852185228523852485258526852785288529853085318532853385348535853685378538853985408541854285438544854585468547854885498550855185528553855485558556855785588559856085618562856385648565856685678568856985708571857285738574857585768577857885798580858185828583858485858586858785888589859085918592859385948595859685978598859986008601860286038604860586068607860886098610861186128613861486158616861786188619862086218622862386248625862686278628862986308631863286338634863586368637863886398640864186428643864486458646864786488649865086518652865386548655865686578658865986608661866286638664866586668667866886698670867186728673867486758676867786788679868086818682868386848685868686878688868986908691869286938694869586968697869886998700870187028703870487058706870787088709871087118712871387148715871687178718871987208721872287238724872587268727872887298730873187328733873487358736873787388739874087418742874387448745874687478748874987508751875287538754875587568757875887598760876187628763876487658766876787688769877087718772877387748775877687778778877987808781878287838784878587868787878887898790879187928793879487958796879787988799880088018802880388048805880688078808880988108811881288138814881588168817881888198820882188228823882488258826882788288829883088318832883388348835883688378838883988408841884288438844884588468847884888498850885188528853885488558856885788588859886088618862886388648865886688678868886988708871887288738874887588768877887888798880888188828883888488858886888788888889889088918892889388948895889688978898889989008901890289038904890589068907890889098910891189128913891489158916891789188919892089218922892389248925892689278928892989308931893289338934893589368937893889398940894189428943894489458946894789488949895089518952895389548955895689578958895989608961896289638964896589668967896889698970897189728973897489758976897789788979898089818982898389848985898689878988898989908991899289938994899589968997899889999000900190029003900490059006900790089009901090119012901390149015901690179018901990209021902290239024902590269027902890299030903190329033903490359036903790389039904090419042904390449045904690479048904990509051905290539054905590569057905890599060906190629063906490659066906790689069907090719072907390749075907690779078907990809081908290839084908590869087908890899090909190929093909490959096909790989099910091019102910391049105910691079108910991109111911291139114911591169117911891199120912191229123912491259126912791289129913091319132913391349135913691379138913991409141914291439144914591469147914891499150915191529153915491559156915791589159916091619162916391649165916691679168916991709171917291739174917591769177917891799180918191829183918491859186918791889189919091919192919391949195919691979198919992009201920292039204920592069207920892099210921192129213921492159216921792189219922092219222922392249225922692279228922992309231923292339234923592369237923892399240924192429243924492459246924792489249925092519252925392549255925692579258925992609261926292639264926592669267926892699270927192729273927492759276927792789279928092819282928392849285928692879288928992909291929292939294929592969297929892999300930193029303930493059306930793089309931093119312931393149315931693179318931993209321932293239324932593269327932893299330933193329333933493359336933793389339934093419342934393449345934693479348934993509351935293539354935593569357935893599360936193629363936493659366936793689369937093719372937393749375937693779378937993809381938293839384938593869387938893899390939193929393939493959396939793989399940094019402940394049405940694079408940994109411941294139414941594169417941894199420942194229423942494259426942794289429943094319432943394349435943694379438943994409441944294439444944594469447944894499450945194529453945494559456945794589459946094619462946394649465946694679468946994709471947294739474947594769477947894799480948194829483948494859486948794889489949094919492949394949495949694979498949995009501950295039504950595069507950895099510951195129513951495159516951795189519952095219522952395249525952695279528952995309531953295339534953595369537953895399540954195429543954495459546954795489549955095519552955395549555955695579558955995609561956295639564956595669567956895699570957195729573957495759576957795789579958095819582958395849585958695879588958995909591959295939594959595969597959895999600960196029603960496059606960796089609961096119612961396149615961696179618961996209621962296239624962596269627962896299630963196329633963496359636963796389639964096419642964396449645964696479648964996509651965296539654965596569657965896599660966196629663966496659666966796689669967096719672967396749675967696779678967996809681968296839684968596869687968896899690969196929693969496959696969796989699970097019702970397049705970697079708970997109711971297139714971597169717971897199720972197229723972497259726972797289729973097319732973397349735973697379738973997409741974297439744974597469747974897499750975197529753975497559756975797589759976097619762976397649765976697679768976997709771977297739774977597769777977897799780978197829783978497859786978797889789979097919792979397949795979697979798979998009801980298039804980598069807980898099810981198129813981498159816981798189819982098219822982398249825982698279828982998309831983298339834983598369837983898399840984198429843984498459846984798489849985098519852985398549855985698579858985998609861986298639864986598669867986898699870987198729873987498759876987798789879988098819882988398849885988698879888988998909891989298939894989598969897989898999900990199029903990499059906990799089909991099119912991399149915991699179918991999209921992299239924992599269927992899299930993199329933993499359936993799389939994099419942994399449945994699479948994999509951995299539954995599569957995899599960996199629963996499659966996799689969997099719972997399749975997699779978997999809981998299839984998599869987998899899990999199929993999499959996999799989999100001000110002100031000410005100061000710008100091001010011100121001310014100151001610017100181001910020100211002210023100241002510026100271002810029100301003110032100331003410035100361003710038100391004010041100421004310044100451004610047100481004910050100511005210053100541005510056100571005810059100601006110062100631006410065100661006710068100691007010071100721007310074100751007610077100781007910080100811008210083100841008510086100871008810089100901009110092100931009410095100961009710098100991010010101101021010310104101051010610107101081010910110101111011210113101141011510116101171011810119101201012110122101231012410125101261012710128101291013010131101321013310134101351013610137101381013910140101411014210143101441014510146101471014810149101501015110152101531015410155101561015710158101591016010161101621016310164101651016610167101681016910170101711017210173101741017510176101771017810179101801018110182101831018410185101861018710188101891019010191101921019310194101951019610197101981019910200102011020210203102041020510206102071020810209102101021110212102131021410215102161021710218102191022010221102221022310224102251022610227102281022910230102311023210233102341023510236102371023810239102401024110242102431024410245102461024710248102491025010251102521025310254102551025610257102581025910260102611026210263102641026510266102671026810269102701027110272102731027410275102761027710278102791028010281102821028310284102851028610287102881028910290102911029210293102941029510296102971029810299103001030110302103031030410305103061030710308103091031010311103121031310314103151031610317103181031910320103211032210323103241032510326103271032810329103301033110332103331033410335103361033710338103391034010341103421034310344103451034610347103481034910350103511035210353103541035510356103571035810359103601036110362103631036410365103661036710368103691037010371103721037310374103751037610377103781037910380103811038210383103841038510386103871038810389103901039110392103931039410395103961039710398103991040010401104021040310404104051040610407104081040910410104111041210413104141041510416104171041810419104201042110422104231042410425104261042710428104291043010431104321043310434104351043610437104381043910440104411044210443104441044510446104471044810449104501045110452104531045410455104561045710458104591046010461104621046310464104651046610467104681046910470104711047210473104741047510476104771047810479104801048110482104831048410485104861048710488104891049010491104921049310494104951049610497104981049910500105011050210503105041050510506105071050810509105101051110512105131051410515105161051710518105191052010521105221052310524105251052610527105281052910530105311053210533105341053510536105371053810539105401054110542105431054410545105461054710548105491055010551105521055310554105551055610557105581055910560105611056210563105641056510566105671056810569105701057110572105731057410575105761057710578105791058010581105821058310584105851058610587105881058910590105911059210593105941059510596105971059810599106001060110602106031060410605106061060710608106091061010611106121061310614106151061610617106181061910620106211062210623106241062510626106271062810629106301063110632106331063410635106361063710638106391064010641106421064310644106451064610647106481064910650106511065210653106541065510656106571065810659106601066110662106631066410665106661066710668106691067010671106721067310674106751067610677106781067910680106811068210683106841068510686106871068810689106901069110692106931069410695106961069710698106991070010701107021070310704107051070610707107081070910710107111071210713107141071510716107171071810719107201072110722107231072410725107261072710728107291073010731107321073310734107351073610737107381073910740107411074210743107441074510746107471074810749107501075110752107531075410755107561075710758107591076010761107621076310764107651076610767107681076910770107711077210773107741077510776107771077810779107801078110782107831078410785107861078710788107891079010791107921079310794107951079610797107981079910800108011080210803108041080510806108071080810809108101081110812108131081410815108161081710818108191082010821108221082310824108251082610827108281082910830108311083210833108341083510836108371083810839108401084110842108431084410845108461084710848108491085010851108521085310854108551085610857108581085910860108611086210863108641086510866108671086810869108701087110872108731087410875108761087710878108791088010881108821088310884108851088610887108881088910890108911089210893108941089510896108971089810899109001090110902109031090410905109061090710908109091091010911109121091310914109151091610917109181091910920109211092210923109241092510926109271092810929109301093110932109331093410935109361093710938109391094010941109421094310944109451094610947109481094910950109511095210953109541095510956109571095810959109601096110962109631096410965109661096710968109691097010971109721097310974109751097610977109781097910980109811098210983109841098510986109871098810989109901099110992109931099410995109961099710998109991100011001110021100311004110051100611007110081100911010110111101211013110141101511016110171101811019110201102111022110231102411025110261102711028110291103011031110321103311034110351103611037110381103911040110411104211043110441104511046110471104811049110501105111052110531105411055110561105711058110591106011061110621106311064110651106611067110681106911070110711107211073110741107511076110771107811079110801108111082110831108411085110861108711088110891109011091110921109311094110951109611097110981109911100111011110211103111041110511106111071110811109111101111111112111131111411115111161111711118111191112011121111221112311124111251112611127111281112911130111311113211133111341113511136111371113811139111401114111142111431114411145111461114711148111491115011151111521115311154111551115611157111581115911160111611116211163111641116511166111671116811169111701117111172111731117411175111761117711178111791118011181111821118311184111851118611187111881118911190111911119211193111941119511196111971119811199112001120111202112031120411205112061120711208112091121011211112121121311214112151121611217112181121911220112211122211223112241122511226112271122811229112301123111232112331123411235112361123711238112391124011241112421124311244112451124611247112481124911250112511125211253112541125511256112571125811259112601126111262112631126411265112661126711268112691127011271112721127311274112751127611277112781127911280112811128211283112841128511286112871128811289112901129111292112931129411295112961129711298112991130011301113021130311304113051130611307113081130911310113111131211313113141131511316113171131811319113201132111322113231132411325113261132711328113291133011331113321133311334113351133611337113381133911340113411134211343113441134511346113471134811349113501135111352113531135411355113561135711358113591136011361113621136311364113651136611367113681136911370113711137211373113741137511376113771137811379113801138111382113831138411385113861138711388113891139011391113921139311394113951139611397113981139911400114011140211403114041140511406114071140811409114101141111412114131141411415114161141711418114191142011421114221142311424114251142611427114281142911430114311143211433114341143511436114371143811439114401144111442114431144411445114461144711448114491145011451114521145311454114551145611457114581145911460114611146211463114641146511466114671146811469114701147111472114731147411475114761147711478114791148011481114821148311484114851148611487114881148911490114911149211493114941149511496114971149811499115001150111502115031150411505115061150711508115091151011511115121151311514115151151611517115181151911520115211152211523115241152511526115271152811529115301153111532115331153411535115361153711538115391154011541115421154311544115451154611547115481154911550115511155211553115541155511556115571155811559115601156111562115631156411565115661156711568115691157011571115721157311574115751157611577115781157911580115811158211583115841158511586115871158811589115901159111592115931159411595115961159711598115991160011601116021160311604116051160611607116081160911610116111161211613116141161511616116171161811619116201162111622116231162411625116261162711628116291163011631116321163311634116351163611637116381163911640116411164211643116441164511646116471164811649116501165111652116531165411655116561165711658116591166011661116621166311664116651166611667116681166911670116711167211673116741167511676116771167811679116801168111682116831168411685116861168711688116891169011691116921169311694116951169611697116981169911700117011170211703117041170511706117071170811709117101171111712117131171411715117161171711718117191172011721117221172311724117251172611727117281172911730117311173211733117341173511736117371173811739117401174111742117431174411745117461174711748117491175011751117521175311754117551175611757117581175911760117611176211763117641176511766117671176811769117701177111772117731177411775117761177711778117791178011781117821178311784117851178611787117881178911790117911179211793117941179511796117971179811799118001180111802118031180411805118061180711808118091181011811118121181311814118151181611817118181181911820118211182211823118241182511826118271182811829118301183111832118331183411835118361183711838118391184011841118421184311844118451184611847118481184911850118511185211853118541185511856118571185811859118601186111862118631186411865118661186711868118691187011871118721187311874118751187611877118781187911880118811188211883118841188511886118871188811889118901189111892118931189411895118961189711898118991190011901119021190311904119051190611907119081190911910119111191211913119141191511916119171191811919119201192111922119231192411925119261192711928119291193011931119321193311934119351193611937119381193911940119411194211943119441194511946119471194811949119501195111952119531195411955119561195711958119591196011961119621196311964119651196611967119681196911970119711197211973119741197511976119771197811979119801198111982119831198411985119861198711988119891199011991119921199311994119951199611997119981199912000120011200212003120041200512006120071200812009120101201112012120131201412015120161201712018120191202012021120221202312024120251202612027120281202912030120311203212033120341203512036120371203812039120401204112042120431204412045120461204712048120491205012051120521205312054120551205612057120581205912060120611206212063120641206512066120671206812069120701207112072120731207412075120761207712078120791208012081120821208312084120851208612087120881208912090120911209212093120941209512096120971209812099121001210112102121031210412105121061210712108121091211012111121121211312114121151211612117121181211912120121211212212123121241212512126121271212812129121301213112132121331213412135121361213712138121391214012141121421214312144121451214612147121481214912150121511215212153121541215512156121571215812159121601216112162121631216412165121661216712168121691217012171121721217312174121751217612177121781217912180121811218212183121841218512186121871218812189121901219112192121931219412195121961219712198121991220012201122021220312204122051220612207122081220912210122111221212213122141221512216122171221812219122201222112222122231222412225122261222712228122291223012231122321223312234122351223612237122381223912240122411224212243122441224512246122471224812249122501225112252122531225412255122561225712258122591226012261122621226312264122651226612267122681226912270122711227212273122741227512276122771227812279122801228112282122831228412285122861228712288122891229012291122921229312294122951229612297122981229912300123011230212303123041230512306123071230812309123101231112312123131231412315123161231712318123191232012321123221232312324123251232612327123281232912330123311233212333123341233512336123371233812339123401234112342123431234412345123461234712348123491235012351123521235312354123551235612357123581235912360123611236212363123641236512366123671236812369123701237112372123731237412375123761237712378123791238012381123821238312384123851238612387123881238912390123911239212393123941239512396123971239812399124001240112402124031240412405124061240712408124091241012411124121241312414124151241612417124181241912420124211242212423124241242512426124271242812429124301243112432124331243412435124361243712438124391244012441124421244312444124451244612447124481244912450124511245212453124541245512456124571245812459124601246112462124631246412465124661246712468124691247012471124721247312474124751247612477124781247912480124811248212483124841248512486124871248812489124901249112492124931249412495124961249712498124991250012501125021250312504125051250612507125081250912510125111251212513125141251512516125171251812519125201252112522125231252412525125261252712528125291253012531125321253312534125351253612537125381253912540125411254212543125441254512546125471254812549125501255112552125531255412555125561255712558125591256012561125621256312564125651256612567125681256912570125711257212573125741257512576125771257812579125801258112582125831258412585125861258712588125891259012591125921259312594125951259612597125981259912600126011260212603126041260512606126071260812609126101261112612126131261412615126161261712618126191262012621126221262312624126251262612627126281262912630126311263212633126341263512636126371263812639126401264112642126431264412645126461264712648126491265012651126521265312654126551265612657126581265912660126611266212663126641266512666126671266812669126701267112672126731267412675126761267712678126791268012681126821268312684126851268612687126881268912690126911269212693126941269512696126971269812699127001270112702127031270412705127061270712708127091271012711127121271312714127151271612717127181271912720127211272212723127241272512726127271272812729127301273112732127331273412735127361273712738127391274012741127421274312744127451274612747127481274912750127511275212753127541275512756127571275812759127601276112762127631276412765127661276712768127691277012771127721277312774127751277612777127781277912780127811278212783127841278512786127871278812789127901279112792127931279412795127961279712798127991280012801128021280312804128051280612807128081280912810128111281212813128141281512816128171281812819128201282112822128231282412825128261282712828128291283012831128321283312834128351283612837128381283912840128411284212843128441284512846128471284812849128501285112852128531285412855128561285712858128591286012861128621286312864128651286612867128681286912870128711287212873128741287512876128771287812879128801288112882128831288412885128861288712888128891289012891128921289312894128951289612897128981289912900129011290212903129041290512906129071290812909129101291112912129131291412915129161291712918129191292012921129221292312924129251292612927129281292912930129311293212933129341293512936129371293812939129401294112942129431294412945129461294712948129491295012951129521295312954129551295612957129581295912960129611296212963129641296512966129671296812969129701297112972129731297412975129761297712978129791298012981129821298312984129851298612987129881298912990129911299212993129941299512996129971299812999130001300113002130031300413005130061300713008130091301013011130121301313014130151301613017130181301913020130211302213023130241302513026130271302813029130301303113032130331303413035130361303713038130391304013041130421304313044130451304613047130481304913050130511305213053130541305513056130571305813059130601306113062130631306413065130661306713068130691307013071130721307313074130751307613077130781307913080130811308213083130841308513086130871308813089130901309113092130931309413095130961309713098130991310013101131021310313104131051310613107131081310913110131111311213113131141311513116131171311813119131201312113122131231312413125131261312713128131291313013131131321313313134131351313613137131381313913140131411314213143131441314513146131471314813149131501315113152131531315413155131561315713158131591316013161131621316313164131651316613167131681316913170131711317213173131741317513176131771317813179131801318113182131831318413185131861318713188131891319013191131921319313194131951319613197131981319913200132011320213203132041320513206132071320813209132101321113212132131321413215132161321713218132191322013221132221322313224132251322613227132281322913230132311323213233132341323513236132371323813239132401324113242132431324413245132461324713248132491325013251132521325313254132551325613257132581325913260132611326213263132641326513266132671326813269132701327113272132731327413275132761327713278132791328013281132821328313284132851328613287132881328913290132911329213293132941329513296132971329813299133001330113302133031330413305133061330713308133091331013311133121331313314133151331613317133181331913320133211332213323133241332513326133271332813329133301333113332133331333413335133361333713338133391334013341133421334313344133451334613347133481334913350133511335213353133541335513356133571335813359133601336113362133631336413365133661336713368133691337013371133721337313374133751337613377133781337913380133811338213383133841338513386133871338813389133901339113392133931339413395133961339713398133991340013401134021340313404134051340613407134081340913410134111341213413134141341513416134171341813419134201342113422134231342413425134261342713428134291343013431134321343313434134351343613437134381343913440134411344213443134441344513446134471344813449134501345113452134531345413455134561345713458134591346013461134621346313464134651346613467134681346913470134711347213473134741347513476134771347813479134801348113482134831348413485134861348713488134891349013491134921349313494134951349613497134981349913500135011350213503135041350513506135071350813509135101351113512135131351413515135161351713518135191352013521135221352313524135251352613527135281352913530135311353213533135341353513536135371353813539135401354113542135431354413545135461354713548135491355013551135521355313554135551355613557135581355913560135611356213563135641356513566135671356813569135701357113572135731357413575135761357713578135791358013581135821358313584135851358613587135881358913590135911359213593135941359513596135971359813599136001360113602136031360413605136061360713608136091361013611136121361313614136151361613617136181361913620136211362213623136241362513626136271362813629136301363113632136331363413635136361363713638136391364013641136421364313644136451364613647136481364913650136511365213653136541365513656136571365813659136601366113662136631366413665136661366713668136691367013671136721367313674136751367613677136781367913680136811368213683136841368513686136871368813689136901369113692136931369413695136961369713698136991370013701137021370313704137051370613707137081370913710137111371213713137141371513716137171371813719137201372113722137231372413725137261372713728137291373013731137321373313734137351373613737137381373913740137411374213743137441374513746137471374813749137501375113752137531375413755137561375713758137591376013761137621376313764137651376613767137681376913770137711377213773137741377513776137771377813779137801378113782137831378413785137861378713788137891379013791137921379313794137951379613797137981379913800138011380213803138041380513806138071380813809138101381113812138131381413815138161381713818138191382013821138221382313824138251382613827138281382913830138311383213833138341383513836138371383813839138401384113842138431384413845138461384713848138491385013851138521385313854138551385613857138581385913860138611386213863138641386513866138671386813869138701387113872138731387413875138761387713878138791388013881138821388313884138851388613887138881388913890138911389213893138941389513896138971389813899139001390113902139031390413905139061390713908139091391013911139121391313914139151391613917139181391913920139211392213923139241392513926139271392813929139301393113932139331393413935139361393713938139391394013941139421394313944139451394613947139481394913950139511395213953139541395513956139571395813959139601396113962139631396413965139661396713968139691397013971139721397313974139751397613977139781397913980139811398213983139841398513986139871398813989139901399113992139931399413995139961399713998139991400014001140021400314004140051400614007140081400914010140111401214013140141401514016140171401814019140201402114022140231402414025140261402714028140291403014031140321403314034140351403614037140381403914040140411404214043140441404514046140471404814049140501405114052140531405414055140561405714058140591406014061140621406314064140651406614067140681406914070140711407214073140741407514076140771407814079140801408114082140831408414085140861408714088140891409014091140921409314094140951409614097140981409914100141011410214103141041410514106141071410814109141101411114112141131411414115141161411714118141191412014121141221412314124141251412614127141281412914130141311413214133141341413514136141371413814139141401414114142141431414414145141461414714148141491415014151141521415314154141551415614157141581415914160141611416214163141641416514166141671416814169141701417114172141731417414175141761417714178141791418014181141821418314184141851418614187141881418914190141911419214193141941419514196141971419814199142001420114202142031420414205142061420714208142091421014211142121421314214142151421614217142181421914220142211422214223142241422514226142271422814229142301423114232142331423414235142361423714238142391424014241142421424314244142451424614247142481424914250142511425214253142541425514256142571425814259142601426114262142631426414265142661426714268142691427014271142721427314274142751427614277142781427914280142811428214283142841428514286142871428814289142901429114292142931429414295142961429714298142991430014301143021430314304143051430614307143081430914310143111431214313143141431514316143171431814319143201432114322143231432414325143261432714328143291433014331143321433314334143351433614337143381433914340143411434214343143441434514346143471434814349143501435114352143531435414355143561435714358143591436014361143621436314364143651436614367143681436914370143711437214373143741437514376143771437814379143801438114382143831438414385143861438714388143891439014391143921439314394143951439614397143981439914400144011440214403144041440514406144071440814409144101441114412144131441414415144161441714418144191442014421144221442314424144251442614427144281442914430144311443214433144341443514436144371443814439144401444114442144431444414445144461444714448144491445014451144521445314454144551445614457144581445914460144611446214463144641446514466144671446814469144701447114472144731447414475144761447714478144791448014481144821448314484144851448614487144881448914490144911449214493144941449514496144971449814499145001450114502145031450414505145061450714508145091451014511145121451314514145151451614517145181451914520145211452214523145241452514526145271452814529145301453114532145331453414535145361453714538145391454014541145421454314544145451454614547145481454914550145511455214553145541455514556145571455814559145601456114562145631456414565145661456714568145691457014571145721457314574145751457614577145781457914580145811458214583145841458514586145871458814589145901459114592145931459414595145961459714598145991460014601146021460314604146051460614607146081460914610146111461214613146141461514616146171461814619146201462114622146231462414625146261462714628146291463014631146321463314634146351463614637146381463914640146411464214643146441464514646146471464814649146501465114652146531465414655146561465714658146591466014661146621466314664146651466614667146681466914670146711467214673146741467514676146771467814679146801468114682146831468414685146861468714688146891469014691146921469314694146951469614697146981469914700147011470214703147041470514706147071470814709147101471114712147131471414715147161471714718147191472014721147221472314724147251472614727147281472914730147311473214733147341473514736147371473814739147401474114742147431474414745147461474714748147491475014751147521475314754147551475614757147581475914760147611476214763147641476514766147671476814769147701477114772147731477414775147761477714778147791478014781147821478314784147851478614787147881478914790147911479214793147941479514796147971479814799148001480114802148031480414805148061480714808148091481014811148121481314814148151481614817148181481914820148211482214823148241482514826148271482814829148301483114832148331483414835148361483714838148391484014841148421484314844148451484614847148481484914850148511485214853148541485514856148571485814859148601486114862148631486414865148661486714868148691487014871148721487314874148751487614877148781487914880148811488214883148841488514886148871488814889148901489114892148931489414895148961489714898148991490014901149021490314904149051490614907149081490914910149111491214913149141491514916149171491814919149201492114922149231492414925149261492714928149291493014931149321493314934149351493614937149381493914940149411494214943149441494514946149471494814949149501495114952149531495414955149561495714958149591496014961149621496314964149651496614967149681496914970149711497214973149741497514976149771497814979149801498114982149831498414985149861498714988149891499014991149921499314994149951499614997149981499915000150011500215003150041500515006150071500815009150101501115012150131501415015150161501715018150191502015021150221502315024150251502615027150281502915030150311503215033150341503515036150371503815039150401504115042150431504415045150461504715048150491505015051150521505315054150551505615057150581505915060150611506215063150641506515066150671506815069150701507115072150731507415075150761507715078150791508015081150821508315084150851508615087150881508915090150911509215093150941509515096150971509815099151001510115102151031510415105151061510715108151091511015111151121511315114151151511615117151181511915120151211512215123151241512515126151271512815129151301513115132151331513415135151361513715138151391514015141151421514315144151451514615147151481514915150151511515215153151541515515156151571515815159151601516115162151631516415165151661516715168151691517015171151721517315174151751517615177151781517915180151811518215183151841518515186151871518815189151901519115192151931519415195151961519715198151991520015201152021520315204152051520615207152081520915210152111521215213152141521515216152171521815219152201522115222152231522415225152261522715228152291523015231152321523315234152351523615237152381523915240152411524215243152441524515246152471524815249152501525115252152531525415255152561525715258152591526015261152621526315264152651526615267152681526915270152711527215273152741527515276152771527815279152801528115282152831528415285152861528715288152891529015291152921529315294152951529615297152981529915300153011530215303153041530515306153071530815309153101531115312153131531415315153161531715318153191532015321153221532315324153251532615327153281532915330153311533215333153341533515336153371533815339153401534115342153431534415345153461534715348153491535015351153521535315354153551535615357153581535915360153611536215363153641536515366153671536815369153701537115372153731537415375153761537715378153791538015381153821538315384153851538615387153881538915390153911539215393153941539515396153971539815399154001540115402154031540415405154061540715408154091541015411154121541315414154151541615417154181541915420154211542215423154241542515426154271542815429154301543115432154331543415435154361543715438154391544015441154421544315444154451544615447154481544915450154511545215453154541545515456154571545815459154601546115462154631546415465154661546715468154691547015471154721547315474154751547615477154781547915480154811548215483154841548515486154871548815489154901549115492154931549415495154961549715498154991550015501155021550315504155051550615507155081550915510155111551215513155141551515516155171551815519155201552115522155231552415525155261552715528155291553015531155321553315534155351553615537155381553915540155411554215543155441554515546155471554815549155501555115552155531555415555155561555715558155591556015561155621556315564155651556615567155681556915570155711557215573155741557515576155771557815579155801558115582155831558415585155861558715588155891559015591155921559315594155951559615597155981559915600156011560215603156041560515606156071560815609156101561115612156131561415615156161561715618156191562015621156221562315624156251562615627156281562915630156311563215633156341563515636156371563815639156401564115642156431564415645156461564715648156491565015651156521565315654156551565615657156581565915660156611566215663156641566515666156671566815669156701567115672156731567415675156761567715678156791568015681156821568315684156851568615687156881568915690156911569215693156941569515696156971569815699157001570115702157031570415705157061570715708157091571015711157121571315714157151571615717157181571915720157211572215723157241572515726157271572815729157301573115732157331573415735157361573715738157391574015741157421574315744157451574615747157481574915750157511575215753157541575515756157571575815759157601576115762157631576415765157661576715768157691577015771157721577315774157751577615777157781577915780157811578215783157841578515786157871578815789157901579115792157931579415795157961579715798157991580015801158021580315804158051580615807158081580915810158111581215813158141581515816158171581815819158201582115822158231582415825158261582715828158291583015831158321583315834158351583615837158381583915840158411584215843158441584515846158471584815849158501585115852158531585415855158561585715858158591586015861158621586315864158651586615867158681586915870158711587215873158741587515876158771587815879158801588115882158831588415885158861588715888158891589015891158921589315894158951589615897158981589915900159011590215903159041590515906159071590815909159101591115912159131591415915159161591715918159191592015921159221592315924159251592615927159281592915930159311593215933159341593515936159371593815939159401594115942159431594415945159461594715948159491595015951159521595315954159551595615957159581595915960159611596215963159641596515966159671596815969159701597115972159731597415975159761597715978159791598015981159821598315984159851598615987159881598915990159911599215993159941599515996159971599815999160001600116002160031600416005160061600716008160091601016011160121601316014160151601616017160181601916020160211602216023160241602516026160271602816029160301603116032160331603416035160361603716038160391604016041160421604316044160451604616047160481604916050160511605216053160541605516056160571605816059160601606116062160631606416065160661606716068160691607016071160721607316074160751607616077160781607916080160811608216083160841608516086160871608816089160901609116092160931609416095160961609716098160991610016101161021610316104161051610616107161081610916110161111611216113161141611516116161171611816119161201612116122161231612416125161261612716128161291613016131161321613316134161351613616137161381613916140161411614216143161441614516146161471614816149161501615116152161531615416155161561615716158161591616016161161621616316164161651616616167161681616916170161711617216173161741617516176161771617816179161801618116182161831618416185161861618716188161891619016191161921619316194161951619616197161981619916200162011620216203162041620516206162071620816209162101621116212162131621416215162161621716218162191622016221162221622316224162251622616227162281622916230162311623216233162341623516236162371623816239162401624116242162431624416245162461624716248162491625016251162521625316254162551625616257162581625916260162611626216263162641626516266162671626816269162701627116272162731627416275162761627716278162791628016281162821628316284162851628616287162881628916290162911629216293162941629516296162971629816299163001630116302163031630416305163061630716308163091631016311163121631316314163151631616317163181631916320163211632216323163241632516326163271632816329163301633116332163331633416335163361633716338163391634016341163421634316344163451634616347163481634916350163511635216353163541635516356163571635816359163601636116362163631636416365163661636716368163691637016371163721637316374163751637616377163781637916380163811638216383163841638516386163871638816389163901639116392163931639416395163961639716398163991640016401164021640316404164051640616407164081640916410164111641216413164141641516416164171641816419164201642116422164231642416425164261642716428164291643016431164321643316434164351643616437164381643916440164411644216443164441644516446164471644816449164501645116452164531645416455164561645716458164591646016461164621646316464164651646616467164681646916470164711647216473164741647516476164771647816479164801648116482164831648416485164861648716488164891649016491164921649316494164951649616497164981649916500165011650216503165041650516506165071650816509165101651116512165131651416515165161651716518165191652016521165221652316524165251652616527165281652916530165311653216533165341653516536165371653816539165401654116542165431654416545165461654716548165491655016551165521655316554165551655616557165581655916560165611656216563165641656516566165671656816569165701657116572165731657416575165761657716578165791658016581165821658316584165851658616587165881658916590165911659216593165941659516596165971659816599166001660116602166031660416605166061660716608166091661016611166121661316614166151661616617166181661916620166211662216623166241662516626166271662816629166301663116632166331663416635166361663716638166391664016641166421664316644166451664616647166481664916650166511665216653166541665516656166571665816659166601666116662166631666416665166661666716668166691667016671166721667316674166751667616677166781667916680166811668216683166841668516686166871668816689166901669116692166931669416695166961669716698166991670016701167021670316704167051670616707167081670916710167111671216713167141671516716167171671816719167201672116722167231672416725167261672716728167291673016731167321673316734167351673616737167381673916740167411674216743167441674516746167471674816749167501675116752167531675416755167561675716758167591676016761167621676316764167651676616767167681676916770167711677216773167741677516776167771677816779167801678116782167831678416785167861678716788167891679016791167921679316794167951679616797167981679916800168011680216803168041680516806168071680816809168101681116812168131681416815168161681716818168191682016821168221682316824168251682616827168281682916830168311683216833168341683516836168371683816839168401684116842168431684416845168461684716848168491685016851168521685316854168551685616857168581685916860168611686216863168641686516866168671686816869168701687116872168731687416875168761687716878168791688016881168821688316884168851688616887168881688916890168911689216893168941689516896168971689816899169001690116902169031690416905169061690716908169091691016911169121691316914169151691616917169181691916920169211692216923169241692516926169271692816929169301693116932169331693416935169361693716938169391694016941169421694316944169451694616947169481694916950169511695216953169541695516956169571695816959169601696116962169631696416965169661696716968169691697016971169721697316974169751697616977169781697916980169811698216983169841698516986169871698816989169901699116992169931699416995169961699716998169991700017001170021700317004170051700617007170081700917010170111701217013170141701517016170171701817019170201702117022170231702417025170261702717028170291703017031170321703317034170351703617037170381703917040170411704217043170441704517046170471704817049170501705117052170531705417055170561705717058170591706017061170621706317064170651706617067170681706917070170711707217073170741707517076170771707817079170801708117082170831708417085170861708717088170891709017091170921709317094170951709617097170981709917100171011710217103171041710517106171071710817109171101711117112171131711417115171161711717118171191712017121171221712317124171251712617127171281712917130171311713217133171341713517136171371713817139171401714117142171431714417145171461714717148171491715017151171521715317154171551715617157171581715917160171611716217163171641716517166171671716817169171701717117172171731717417175171761717717178171791718017181171821718317184171851718617187171881718917190171911719217193171941719517196171971719817199172001720117202172031720417205172061720717208172091721017211172121721317214172151721617217172181721917220172211722217223172241722517226172271722817229172301723117232172331723417235172361723717238172391724017241172421724317244172451724617247172481724917250172511725217253172541725517256172571725817259172601726117262172631726417265172661726717268172691727017271172721727317274172751727617277172781727917280172811728217283172841728517286172871728817289172901729117292172931729417295172961729717298172991730017301173021730317304173051730617307173081730917310173111731217313173141731517316173171731817319173201732117322173231732417325173261732717328173291733017331173321733317334173351733617337173381733917340173411734217343173441734517346173471734817349173501735117352173531735417355173561735717358173591736017361173621736317364173651736617367173681736917370173711737217373173741737517376173771737817379173801738117382173831738417385173861738717388173891739017391173921739317394173951739617397173981739917400174011740217403174041740517406174071740817409174101741117412174131741417415174161741717418174191742017421174221742317424174251742617427174281742917430174311743217433174341743517436174371743817439174401744117442174431744417445174461744717448174491745017451174521745317454174551745617457174581745917460174611746217463174641746517466174671746817469174701747117472174731747417475174761747717478174791748017481174821748317484174851748617487174881748917490174911749217493174941749517496174971749817499175001750117502175031750417505175061750717508175091751017511175121751317514175151751617517175181751917520175211752217523175241752517526175271752817529175301753117532175331753417535175361753717538175391754017541175421754317544175451754617547175481754917550175511755217553175541755517556175571755817559175601756117562175631756417565175661756717568175691757017571175721757317574175751757617577175781757917580175811758217583175841758517586175871758817589175901759117592175931759417595175961759717598175991760017601176021760317604176051760617607176081760917610176111761217613176141761517616176171761817619176201762117622176231762417625176261762717628176291763017631176321763317634176351763617637176381763917640176411764217643176441764517646176471764817649176501765117652176531765417655176561765717658176591766017661176621766317664176651766617667176681766917670176711767217673176741767517676176771767817679176801768117682176831768417685176861768717688176891769017691176921769317694176951769617697176981769917700177011770217703177041770517706177071770817709177101771117712177131771417715177161771717718177191772017721177221772317724177251772617727177281772917730177311773217733177341773517736177371773817739177401774117742177431774417745177461774717748177491775017751177521775317754177551775617757177581775917760177611776217763177641776517766177671776817769177701777117772177731777417775177761777717778177791778017781177821778317784177851778617787177881778917790177911779217793177941779517796177971779817799178001780117802178031780417805178061780717808178091781017811178121781317814178151781617817178181781917820178211782217823178241782517826178271782817829178301783117832178331783417835178361783717838178391784017841178421784317844178451784617847178481784917850178511785217853178541785517856178571785817859178601786117862178631786417865178661786717868178691787017871178721787317874178751787617877178781787917880178811788217883178841788517886178871788817889178901789117892178931789417895178961789717898178991790017901179021790317904179051790617907179081790917910179111791217913179141791517916179171791817919179201792117922179231792417925179261792717928179291793017931179321793317934179351793617937179381793917940179411794217943179441794517946179471794817949179501795117952179531795417955179561795717958179591796017961179621796317964179651796617967179681796917970179711797217973179741797517976179771797817979179801798117982179831798417985179861798717988179891799017991179921799317994179951799617997179981799918000180011800218003180041800518006180071800818009180101801118012180131801418015180161801718018180191802018021180221802318024180251802618027180281802918030180311803218033180341803518036180371803818039180401804118042180431804418045180461804718048180491805018051180521805318054180551805618057180581805918060180611806218063180641806518066180671806818069180701807118072180731807418075180761807718078180791808018081180821808318084180851808618087180881808918090180911809218093180941809518096180971809818099181001810118102181031810418105181061810718108181091811018111181121811318114181151811618117181181811918120181211812218123181241812518126181271812818129181301813118132181331813418135181361813718138181391814018141181421814318144181451814618147181481814918150181511815218153181541815518156181571815818159181601816118162181631816418165181661816718168181691817018171181721817318174181751817618177181781817918180181811818218183181841818518186181871818818189181901819118192181931819418195181961819718198181991820018201182021820318204182051820618207182081820918210182111821218213182141821518216182171821818219182201822118222182231822418225182261822718228182291823018231182321823318234182351823618237182381823918240182411824218243182441824518246182471824818249182501825118252182531825418255182561825718258182591826018261182621826318264182651826618267182681826918270182711827218273182741827518276182771827818279182801828118282182831828418285182861828718288182891829018291182921829318294182951829618297182981829918300183011830218303183041830518306183071830818309183101831118312183131831418315183161831718318183191832018321183221832318324183251832618327183281832918330183311833218333183341833518336183371833818339183401834118342183431834418345183461834718348183491835018351183521835318354183551835618357183581835918360183611836218363183641836518366183671836818369183701837118372183731837418375183761837718378183791838018381183821838318384183851838618387183881838918390183911839218393183941839518396183971839818399184001840118402184031840418405184061840718408184091841018411184121841318414184151841618417184181841918420184211842218423184241842518426184271842818429184301843118432184331843418435184361843718438184391844018441184421844318444184451844618447184481844918450184511845218453184541845518456184571845818459184601846118462184631846418465184661846718468184691847018471184721847318474184751847618477184781847918480184811848218483184841848518486184871848818489184901849118492184931849418495184961849718498184991850018501185021850318504185051850618507185081850918510185111851218513185141851518516185171851818519185201852118522185231852418525185261852718528185291853018531185321853318534185351853618537185381853918540185411854218543185441854518546185471854818549185501855118552185531855418555185561855718558185591856018561185621856318564185651856618567185681856918570185711857218573185741857518576185771857818579185801858118582185831858418585185861858718588185891859018591185921859318594185951859618597185981859918600186011860218603186041860518606186071860818609186101861118612186131861418615186161861718618186191862018621186221862318624186251862618627186281862918630186311863218633186341863518636186371863818639186401864118642186431864418645186461864718648186491865018651186521865318654186551865618657186581865918660186611866218663186641866518666186671866818669186701867118672186731867418675186761867718678186791868018681186821868318684186851868618687186881868918690186911869218693186941869518696186971869818699187001870118702187031870418705187061870718708187091871018711187121871318714187151871618717187181871918720187211872218723187241872518726187271872818729187301873118732187331873418735187361873718738187391874018741187421874318744187451874618747187481874918750187511875218753187541875518756187571875818759187601876118762187631876418765187661876718768187691877018771187721877318774187751877618777187781877918780187811878218783187841878518786187871878818789187901879118792187931879418795187961879718798187991880018801188021880318804188051880618807188081880918810188111881218813188141881518816188171881818819188201882118822188231882418825188261882718828188291883018831188321883318834188351883618837188381883918840188411884218843188441884518846188471884818849188501885118852188531885418855188561885718858188591886018861188621886318864188651886618867188681886918870188711887218873188741887518876188771887818879188801888118882188831888418885188861888718888188891889018891188921889318894188951889618897188981889918900189011890218903189041890518906189071890818909189101891118912189131891418915189161891718918189191892018921189221892318924189251892618927189281892918930189311893218933189341893518936189371893818939189401894118942189431894418945189461894718948189491895018951189521895318954189551895618957189581895918960189611896218963189641896518966189671896818969189701897118972189731897418975189761897718978189791898018981189821898318984189851898618987189881898918990189911899218993189941899518996189971899818999190001900119002190031900419005190061900719008190091901019011190121901319014190151901619017190181901919020190211902219023190241902519026190271902819029190301903119032190331903419035190361903719038190391904019041190421904319044190451904619047190481904919050190511905219053190541905519056190571905819059190601906119062190631906419065190661906719068190691907019071190721907319074190751907619077190781907919080190811908219083190841908519086190871908819089190901909119092190931909419095190961909719098190991910019101191021910319104191051910619107191081910919110191111911219113191141911519116191171911819119191201912119122191231912419125191261912719128191291913019131191321913319134191351913619137191381913919140191411914219143191441914519146191471914819149191501915119152191531915419155191561915719158191591916019161191621916319164191651916619167191681916919170191711917219173191741917519176191771917819179191801918119182191831918419185191861918719188191891919019191191921919319194191951919619197191981919919200192011920219203192041920519206192071920819209192101921119212192131921419215192161921719218192191922019221192221922319224192251922619227192281922919230192311923219233192341923519236192371923819239192401924119242192431924419245192461924719248192491925019251192521925319254192551925619257192581925919260192611926219263192641926519266192671926819269192701927119272192731927419275192761927719278192791928019281192821928319284192851928619287192881928919290192911929219293192941929519296192971929819299193001930119302193031930419305193061930719308193091931019311193121931319314193151931619317193181931919320193211932219323193241932519326193271932819329193301933119332193331933419335193361933719338193391934019341193421934319344193451934619347193481934919350193511935219353193541935519356193571935819359193601936119362193631936419365193661936719368193691937019371193721937319374193751937619377193781937919380193811938219383193841938519386193871938819389193901939119392193931939419395193961939719398193991940019401194021940319404194051940619407194081940919410194111941219413194141941519416194171941819419194201942119422194231942419425194261942719428194291943019431194321943319434194351943619437194381943919440194411944219443194441944519446194471944819449194501945119452194531945419455194561945719458194591946019461194621946319464194651946619467194681946919470194711947219473194741947519476194771947819479194801948119482194831948419485194861948719488194891949019491194921949319494194951949619497194981949919500195011950219503195041950519506195071950819509195101951119512195131951419515195161951719518195191952019521195221952319524195251952619527195281952919530195311953219533195341953519536195371953819539195401954119542195431954419545195461954719548195491955019551195521955319554195551955619557195581955919560195611956219563195641956519566195671956819569195701957119572195731957419575195761957719578195791958019581195821958319584195851958619587195881958919590195911959219593195941959519596195971959819599196001960119602196031960419605196061960719608196091961019611196121961319614196151961619617196181961919620196211962219623196241962519626196271962819629196301963119632196331963419635196361963719638196391964019641196421964319644196451964619647196481964919650196511965219653196541965519656196571965819659196601966119662196631966419665196661966719668196691967019671196721967319674196751967619677196781967919680196811968219683196841968519686196871968819689196901969119692196931969419695196961969719698196991970019701197021970319704197051970619707197081970919710197111971219713197141971519716197171971819719197201972119722197231972419725197261972719728197291973019731197321973319734197351973619737197381973919740197411974219743197441974519746197471974819749197501975119752197531975419755197561975719758197591976019761197621976319764197651976619767197681976919770197711977219773197741977519776197771977819779197801978119782197831978419785197861978719788197891979019791197921979319794197951979619797197981979919800198011980219803198041980519806198071980819809198101981119812198131981419815198161981719818198191982019821198221982319824198251982619827198281982919830198311983219833198341983519836198371983819839198401984119842198431984419845198461984719848198491985019851198521985319854198551985619857198581985919860198611986219863198641986519866198671986819869198701987119872198731987419875198761987719878198791988019881198821988319884198851988619887198881988919890198911989219893198941989519896198971989819899199001990119902199031990419905199061990719908199091991019911199121991319914199151991619917199181991919920199211992219923199241992519926199271992819929199301993119932199331993419935199361993719938199391994019941199421994319944199451994619947199481994919950199511995219953199541995519956199571995819959199601996119962199631996419965199661996719968199691997019971199721997319974199751997619977199781997919980199811998219983199841998519986199871998819989199901999119992199931999419995199961999719998199992000020001200022000320004200052000620007200082000920010200112001220013200142001520016200172001820019200202002120022200232002420025200262002720028200292003020031200322003320034200352003620037200382003920040200412004220043200442004520046200472004820049200502005120052200532005420055200562005720058200592006020061200622006320064200652006620067200682006920070200712007220073200742007520076200772007820079200802008120082200832008420085200862008720088200892009020091200922009320094200952009620097200982009920100201012010220103201042010520106201072010820109201102011120112201132011420115201162011720118201192012020121201222012320124201252012620127201282012920130201312013220133201342013520136201372013820139201402014120142201432014420145201462014720148201492015020151201522015320154201552015620157201582015920160201612016220163201642016520166201672016820169201702017120172201732017420175201762017720178201792018020181201822018320184201852018620187201882018920190201912019220193201942019520196201972019820199202002020120202202032020420205202062020720208202092021020211202122021320214202152021620217202182021920220202212022220223202242022520226202272022820229202302023120232202332023420235202362023720238202392024020241202422024320244202452024620247202482024920250202512025220253202542025520256202572025820259202602026120262202632026420265202662026720268202692027020271202722027320274202752027620277202782027920280202812028220283202842028520286202872028820289202902029120292202932029420295202962029720298202992030020301203022030320304203052030620307203082030920310203112031220313203142031520316203172031820319203202032120322203232032420325203262032720328203292033020331203322033320334203352033620337203382033920340203412034220343203442034520346203472034820349203502035120352203532035420355
  1. Changes in version 0.2.9.1-alpha - 2016-??-??
  2. Changes in version 0.2.8.2-alpha - 2016-03-28
  3. Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
  4. bugs in earlier versions of Tor, including some that prevented
  5. authorities using Tor 0.2.7.x from running correctly. IPv6 and
  6. directory support should also be much improved.
  7. o New system requirements:
  8. - Tor no longer supports versions of OpenSSL with a broken
  9. implementation of counter mode. (This bug was present in OpenSSL
  10. 1.0.0, and was fixed in OpenSSL 1.0.0a.) Tor still detects, but no
  11. longer runs with, these versions.
  12. - Tor no longer attempts to support platforms where the "time_t"
  13. type is unsigned. (To the best of our knowledge, only OpenVMS does
  14. this, and Tor has never actually built on OpenVMS.) Closes
  15. ticket 18184.
  16. - Tor now uses Autoconf version 2.63 or later, and Automake 1.11 or
  17. later (released in 2008 and 2009 respectively). If you are
  18. building Tor from the git repository instead of from the source
  19. distribution, and your tools are older than this, you will need to
  20. upgrade. Closes ticket 17732.
  21. o Major bugfixes (security, pointers):
  22. - Avoid a difficult-to-trigger heap corruption attack when extending
  23. a smartlist to contain over 16GB of pointers. Fixes bug 18162;
  24. bugfix on 0.1.1.11-alpha, which fixed a related bug incompletely.
  25. Reported by Guido Vranken.
  26. o Major bugfixes (bridges, pluggable transports):
  27. - Modify the check for OR connections to private addresses. Allow
  28. bridges on private addresses, including pluggable transports that
  29. ignore the (potentially private) address in the bridge line. Fixes
  30. bug 18517; bugfix on 0.2.8.1-alpha. Reported by gk, patch by teor.
  31. o Major bugfixes (compilation):
  32. - Repair hardened builds under the clang compiler. Previously, our
  33. use of _FORTIFY_SOURCE would conflict with clang's address
  34. sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
  35. o Major bugfixes (crash on shutdown):
  36. - Correctly handle detaching circuits from muxes when shutting down.
  37. Fixes bug 18116; bugfix on 0.2.8.1-alpha.
  38. - Fix an assert-on-exit bug related to counting memory usage in
  39. rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
  40. o Major bugfixes (crash on startup):
  41. - Fix a segfault during startup: If a Unix domain socket was
  42. configured as listener (such as a ControlSocket or a SocksPort
  43. "unix:" socket), and tor was started as root but not configured to
  44. switch to another user, tor would segfault while trying to string
  45. compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
  46. Patch by weasel.
  47. o Major bugfixes (dns proxy mode, crash):
  48. - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
  49. bugfix on 0.2.0.1-alpha. Patch from "cypherpunks".
  50. o Major bugfixes (relays, bridge clients):
  51. - Ensure relays always allow IPv4 OR and Dir connections. Ensure
  52. bridge clients use the address configured in the bridge line.
  53. Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
  54. patch by teor.
  55. o Major bugfixes (voting):
  56. - Actually enable support for authorities to match routers by their
  57. Ed25519 identities. Previously, the code had been written, but
  58. some debugging code that had accidentally been left in the
  59. codebase made it stay turned off. Fixes bug 17702; bugfix
  60. on 0.2.7.2-alpha.
  61. - When collating votes by Ed25519 identities, authorities now
  62. include a "NoEdConsensus" flag if the ed25519 value (or lack
  63. thereof) for a server does not reflect the majority consensus.
  64. Related to bug 17668; bugfix on 0.2.7.2-alpha.
  65. - When generating a vote with keypinning disabled, never include two
  66. entries for the same ed25519 identity. This bug was causing
  67. authorities to generate votes that they could not parse when a
  68. router violated key pinning by changing its RSA identity but
  69. keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
  70. 18318. Bugfix on 0.2.7.2-alpha.
  71. o Minor features (security, win32):
  72. - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
  73. attack. Fixes bug 18123; bugfix on all tor versions. Patch
  74. by teor.
  75. o Minor features (bug-resistance):
  76. - Make Tor survive errors involving connections without a
  77. corresponding event object. Previously we'd fail with an
  78. assertion; now we produce a log message. Related to bug 16248.
  79. o Minor features (build):
  80. - Detect systems with FreeBSD-derived kernels (such as GNU/kFreeBSD)
  81. as having possible IPFW support. Closes ticket 18448. Patch from
  82. Steven Chamberlain.
  83. o Minor features (code hardening):
  84. - Use tor_snprintf() and tor_vsnprintf() even in external and low-
  85. level code, to harden against accidental failures to NUL-
  86. terminate. Part of ticket 17852. Patch from jsturgix. Found
  87. with Flawfinder.
  88. o Minor features (crypto):
  89. - Validate the hard-coded Diffie-Hellman parameters and ensure that
  90. p is a safe prime, and g is a suitable generator. Closes
  91. ticket 18221.
  92. o Minor features (geoip):
  93. - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
  94. Country database.
  95. o Minor features (hidden service directory):
  96. - Streamline relay-side hsdir handling: when relays consider whether
  97. to accept an uploaded hidden service descriptor, they no longer
  98. check whether they are one of the relays in the network that is
  99. "supposed" to handle that descriptor. Implements ticket 18332.
  100. o Minor features (IPv6):
  101. - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
  102. to 1, tor prefers IPv6 directory addresses.
  103. - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
  104. avoids using IPv4 for client OR and directory connections.
  105. - Try harder to obey the IP version restrictions "ClientUseIPv4 0",
  106. "ClientUseIPv6 0", "ClientPreferIPv6ORPort", and
  107. "ClientPreferIPv6DirPort". Closes ticket 17840; patch by teor.
  108. o Minor features (linux seccomp2 sandbox):
  109. - Reject attempts to change our Address with "Sandbox 1" enabled.
  110. Changing Address with Sandbox turned on would never actually work,
  111. but previously it would fail in strange and confusing ways. Found
  112. while fixing 18548.
  113. o Minor features (robustness):
  114. - Exit immediately with an error message if the code attempts to use
  115. Libevent without having initialized it. This should resolve some
  116. frequently-made mistakes in our unit tests. Closes ticket 18241.
  117. o Minor features (unix domain sockets):
  118. - Add a new per-socket option, RelaxDirModeCheck, to allow creating
  119. Unix domain sockets without checking the permissions on the parent
  120. directory. (Tor checks permissions by default because some
  121. operating systems only check permissions on the parent directory.
  122. However, some operating systems do look at permissions on the
  123. socket, and tor's default check is unneeded.) Closes ticket 18458.
  124. Patch by weasel.
  125. o Minor bugfixes (exit policies, security):
  126. - Refresh an exit relay's exit policy when interface addresses
  127. change. Previously, tor only refreshed the exit policy when the
  128. configured external address changed. Fixes bug 18208; bugfix on
  129. 0.2.7.3-rc. Patch by teor.
  130. o Minor bugfixes (security, hidden services):
  131. - Prevent hidden services connecting to client-supplied rendezvous
  132. addresses that are reserved as internal or multicast. Fixes bug
  133. 8976; bugfix on 0.2.3.21-rc. Patch by dgoulet and teor.
  134. o Minor bugfixes (build):
  135. - Do not link the unit tests against both the testing and non-
  136. testing versions of the static libraries. Fixes bug 18490; bugfix
  137. on 0.2.7.1-alpha.
  138. - Avoid spurious failures from configure files related to calling
  139. exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
  140. 0.2.0.1-alpha. Patch from "cypherpunks".
  141. - Silence spurious clang-scan warnings in the ed25519_donna code by
  142. explicitly initializing some objects. Fixes bug 18384; bugfix on
  143. 0.2.7.2-alpha. Patch by teor.
  144. o Minor bugfixes (client, bootstrap):
  145. - Count receipt of new microdescriptors as progress towards
  146. bootstrapping. Previously, with EntryNodes set, Tor might not
  147. successfully repopulate the guard set on bootstrapping. Fixes bug
  148. 16825; bugfix on 0.2.3.1-alpha.
  149. o Minor bugfixes (code correctness):
  150. - Update to the latest version of Trunnel, which tries harder to
  151. avoid generating code that can invoke memcpy(p,NULL,0). Bug found
  152. by clang address sanitizer. Fixes bug 18373; bugfix
  153. on 0.2.7.2-alpha.
  154. o Minor bugfixes (configuration):
  155. - Fix a tiny memory leak when parsing a port configuration ending in
  156. ":auto". Fixes bug 18374; bugfix on 0.2.3.3-alpha.
  157. o Minor bugfixes (containers):
  158. - If we somehow attempt to construct a heap with more than
  159. 1073741822 elements, avoid an integer overflow when maintaining
  160. the heap property. Fixes bug 18296; bugfix on 0.1.2.1-alpha.
  161. o Minor bugfixes (correctness):
  162. - Fix a bad memory handling bug that would occur if we had queued a
  163. cell on a channel's incoming queue. Fortunately, we can't actually
  164. queue a cell like that as our code is constructed today, but it's
  165. best to avoid this kind of error, even if there isn't any code
  166. that triggers it today. Fixes bug 18570; bugfix on 0.2.4.4-alpha.
  167. o Minor bugfixes (directory):
  168. - When generating a URL for a directory server on an IPv6 address,
  169. wrap the IPv6 address in square brackets. Fixes bug 18051; bugfix
  170. on 0.2.3.9-alpha. Patch from Malek.
  171. o Minor bugfixes (fallback directory mirrors):
  172. - When requesting extrainfo descriptors from a trusted directory
  173. server, check whether it is an authority or a fallback directory
  174. which supports extrainfo descriptors. Fixes bug 18489; bugfix on
  175. 0.2.4.7-alpha. Reported by atagar, patch by teor.
  176. o Minor bugfixes (hidden service, client):
  177. - Handle the case where the user makes several fast consecutive
  178. requests to the same .onion address. Previously, the first six
  179. requests would each trigger a descriptor fetch, each picking a
  180. directory (there are 6 overall) and the seventh one would fail
  181. because no directories were left, thereby triggering a close on
  182. all current directory connections asking for the hidden service.
  183. The solution here is to not close the connections if we have
  184. pending directory fetches. Fixes bug 15937; bugfix
  185. on 0.2.7.1-alpha.
  186. o Minor bugfixes (hidden service, control port):
  187. - Add the onion address to the HS_DESC event for the UPLOADED action
  188. both on success or failure. It was previously hardcoded with
  189. UNKNOWN. Fixes bug 16023; bugfix on 0.2.7.2-alpha.
  190. o Minor bugfixes (hidden service, directory):
  191. - Bridges now refuse "rendezvous2" (hidden service descriptor)
  192. publish attempts. Suggested by ticket 18332.
  193. o Minor bugfixes (linux seccomp2 sandbox):
  194. - Allow the setrlimit syscall, and the prlimit and prlimit64
  195. syscalls, which some libc implementations use under the hood.
  196. Fixes bug 15221; bugfix on 0.2.5.1-alpha.
  197. - Avoid a 10-second delay when starting as a client with "Sandbox 1"
  198. enabled and no DNS resolvers configured. This should help TAILS
  199. start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
  200. - Fix the sandbox's interoperability with unix domain sockets under
  201. setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
  202. o Minor bugfixes (logging):
  203. - When logging information about an unparsable networkstatus vote or
  204. consensus, do not say "vote" when we mean consensus. Fixes bug
  205. 18368; bugfix on 0.2.0.8-alpha.
  206. - Scrub service name in "unrecognized service ID" log messages.
  207. Fixes bug 18600; bugfix on 0.2.4.11-alpha.
  208. - Downgrade logs and backtraces about IP versions to info-level.
  209. Only log backtraces once each time tor runs. Assists in diagnosing
  210. bug 18351; bugfix on 0.2.8.1-alpha. Reported by sysrqb and
  211. Christian, patch by teor.
  212. o Minor bugfixes (memory safety):
  213. - Avoid freeing an uninitialized pointer when opening a socket fails
  214. in get_interface_addresses_ioctl(). Fixes bug 18454; bugfix on
  215. 0.2.3.11-alpha. Reported by toralf and "cypherpunks", patch
  216. by teor.
  217. - Correctly duplicate addresses in get_interface_address6_list().
  218. Fixes bug 18454; bugfix on 0.2.8.1-alpha. Reported by toralf,
  219. patch by "cypherpunks".
  220. - Fix a memory leak in tor-gencert. Fixes part of bug 18672; bugfix
  221. on 0.2.0.1-alpha.
  222. - Fix a memory leak in "tor --list-fingerprint". Fixes part of bug
  223. 18672; bugfix on 0.2.5.1-alpha.
  224. o Minor bugfixes (private directory):
  225. - Prevent a race condition when creating private directories. Fixes
  226. part of bug 17852; bugfix on 0.0.2pre13. Part of ticket 17852.
  227. Patch from jsturgix. Found with Flawfinder.
  228. o Minor bugfixes (test networks, IPv6):
  229. - Allow internal IPv6 addresses in descriptors in test networks.
  230. Fixes bug 17153; bugfix on 0.2.3.16-alpha. Patch by teor, reported
  231. by karsten.
  232. o Minor bugfixes (testing):
  233. - We no longer disable assertions in the unit tests when coverage is
  234. enabled. Instead, we require you to say --disable-asserts-in-tests
  235. to the configure script if you need assertions disabled in the
  236. unit tests (for example, if you want to perform branch coverage).
  237. Fixes bug 18242; bugfix on 0.2.7.1-alpha.
  238. o Minor bugfixes (time parsing):
  239. - Avoid overflow in tor_timegm when parsing dates in and after 2038
  240. on platforms with 32-bit time_t. Fixes bug 18479; bugfix on
  241. 0.0.2pre14. Patch by teor.
  242. o Minor bugfixes (tor-gencert):
  243. - Correctly handle the case where an authority operator enters a
  244. passphrase but sends an EOF before sending a newline. Fixes bug
  245. 17443; bugfix on 0.2.0.20-rc. Found by junglefowl.
  246. o Code simplification and refactoring:
  247. - Quote all the string interpolations in configure.ac -- even those
  248. which we are pretty sure can't contain spaces. Closes ticket
  249. 17744. Patch from zerosion.
  250. - Remove specialized code for non-inplace AES_CTR. 99% of our AES is
  251. inplace, so there's no need to have a separate implementation for
  252. the non-inplace code. Closes ticket 18258. Patch from Malek.
  253. - Simplify return types for some crypto functions that can't
  254. actually fail. Patch from Hassan Alsibyani. Closes ticket 18259.
  255. o Documentation:
  256. - Change build messages to refer to "Fedora" instead of "Fedora
  257. Core", and "dnf" instead of "yum". Closes tickets 18459 and 18426.
  258. Patches from "icanhasaccount" and "cypherpunks".
  259. o Removed features:
  260. - We no longer maintain an internal freelist in memarea.c.
  261. Allocators should be good enough to make this code unnecessary,
  262. and it's doubtful that it ever had any performance benefit.
  263. o Testing:
  264. - Fix several warnings from clang's address sanitizer produced in
  265. the unit tests.
  266. - Treat backtrace test failures as expected on FreeBSD until we
  267. solve bug 17808. Closes ticket 18204.
  268. Changes in version 0.2.8.1-alpha - 2016-02-04
  269. Tor 0.2.8.1-alpha is the first alpha release in its series. It
  270. includes numerous small features and bugfixes against previous Tor
  271. versions, and numerous small infrastructure improvements. The most
  272. notable features are a set of improvements to the directory subsystem.
  273. o Major features (security, Linux):
  274. - When Tor starts as root on Linux and is told to switch user ID, it
  275. can now retain the capability to bind to low ports. By default,
  276. Tor will do this only when it's switching user ID and some low
  277. ports have been configured. You can change this behavior with the
  278. new option KeepBindCapabilities. Closes ticket 8195.
  279. o Major features (directory system):
  280. - When bootstrapping multiple consensus downloads at a time, use the
  281. first one that starts downloading, and close the rest. This
  282. reduces failures when authorities or fallback directories are slow
  283. or down. Together with the code for feature 15775, this feature
  284. should reduces failures due to fallback churn. Implements ticket
  285. 4483. Patch by "teor". Implements IPv4 portions of proposal 210 by
  286. "mikeperry" and "teor".
  287. - Include a trial list of default fallback directories, based on an
  288. opt-in survey of suitable relays. Doing this should make clients
  289. bootstrap more quickly and reliably, and reduce the load on the
  290. directory authorities. Closes ticket 15775. Patch by "teor".
  291. Candidates identified using an OnionOO script by "weasel", "teor",
  292. "gsathya", and "karsten".
  293. - Previously only relays that explicitly opened a directory port
  294. (DirPort) accepted directory requests from clients. Now all
  295. relays, with and without a DirPort, accept and serve tunneled
  296. directory requests that they receive through their ORPort. You can
  297. disable this behavior using the new DirCache option. Closes
  298. ticket 12538.
  299. o Major key updates:
  300. - Update the V3 identity key for the dannenberg directory authority:
  301. it was changed on 18 November 2015. Closes task 17906. Patch
  302. by "teor".
  303. o Minor features (security, clock):
  304. - Warn when the system clock appears to move back in time (when the
  305. state file was last written in the future). Tor doesn't know that
  306. consensuses have expired if the clock is in the past. Patch by
  307. "teor". Implements ticket 17188.
  308. o Minor features (security, exit policies):
  309. - ExitPolicyRejectPrivate now rejects more private addresses by
  310. default. Specifically, it now rejects the relay's outbound bind
  311. addresses (if configured), and the relay's configured port
  312. addresses (such as ORPort and DirPort). Fixes bug 17027; bugfix on
  313. 0.2.0.11-alpha. Patch by "teor".
  314. o Minor features (security, memory erasure):
  315. - Set the unused entries in a smartlist to NULL. This helped catch
  316. a (harmless) bug, and shouldn't affect performance too much.
  317. Implements ticket 17026.
  318. - Use SecureMemoryWipe() function to securely clean memory on
  319. Windows. Previously we'd use OpenSSL's OPENSSL_cleanse() function.
  320. Implements feature 17986.
  321. - Use explicit_bzero or memset_s when present. Previously, we'd use
  322. OpenSSL's OPENSSL_cleanse() function. Closes ticket 7419; patches
  323. from <logan@hackers.mu> and <selven@hackers.mu>.
  324. - Make memwipe() do nothing when passed a NULL pointer or buffer of
  325. zero size. Check size argument to memwipe() for underflow. Fixes
  326. bug 18089; bugfix on 0.2.3.25 and 0.2.4.6-alpha. Reported by "gk",
  327. patch by "teor".
  328. o Minor features (security, RNG):
  329. - Adjust Tor's use of OpenSSL's RNG APIs so that they absolutely,
  330. positively are not allowed to fail. Previously we depended on
  331. internal details of OpenSSL's behavior. Closes ticket 17686.
  332. - Never use the system entropy output directly for anything besides
  333. seeding the PRNG. When we want to generate important keys, instead
  334. of using system entropy directly, we now hash it with the PRNG
  335. stream. This may help resist certain attacks based on broken OS
  336. entropy implementations. Closes part of ticket 17694.
  337. - Use modern system calls (like getentropy() or getrandom()) to
  338. generate strong entropy on platforms that have them. Closes
  339. ticket 13696.
  340. o Minor features (accounting):
  341. - Added two modes to the AccountingRule option: One for limiting
  342. only the number of bytes sent ("AccountingRule out"), and one for
  343. limiting only the number of bytes received ("AccountingRule in").
  344. Closes ticket 15989; patch from "unixninja92".
  345. o Minor features (build):
  346. - Since our build process now uses "make distcheck", we no longer
  347. force "make dist" to depend on "make check". Closes ticket 17893;
  348. patch from "cypherpunks."
  349. - Tor now builds successfully with the recent OpenSSL 1.1
  350. development branch, and with the latest LibreSSL. Closes tickets
  351. 17549, 17921, and 17984.
  352. o Minor features (controller):
  353. - Adds the FallbackDir entries to 'GETINFO config/defaults'. Closes
  354. tickets 16774 and 17817. Patch by George Tankersley.
  355. - New 'GETINFO hs/service/desc/id/' command to retrieve a hidden
  356. service descriptor from a service's local hidden service
  357. descriptor cache. Closes ticket 14846.
  358. - Add 'GETINFO exit-policy/reject-private/[default,relay]', so
  359. controllers can examine the the reject rules added by
  360. ExitPolicyRejectPrivate. This makes it easier for stem to display
  361. exit policies.
  362. o Minor features (crypto):
  363. - Add SHA512 support to crypto.c. Closes ticket 17663; patch from
  364. George Tankersley.
  365. - Add SHA3 and SHAKE support to crypto.c. Closes ticket 17783.
  366. - When allocating a digest state object, allocate no more space than
  367. we actually need. Previously, we would allocate as much space as
  368. the state for the largest algorithm would need. This change saves
  369. up to 672 bytes per circuit. Closes ticket 17796.
  370. - Improve performance when hashing non-multiple of 8 sized buffers,
  371. based on Andrew Moon's public domain SipHash-2-4 implementation.
  372. Fixes bug 17544; bugfix on 0.2.5.3-alpha.
  373. o Minor features (directory downloads):
  374. - Wait for busy authorities and fallback directories to become non-
  375. busy when bootstrapping. (A similar change was made in 6c443e987d
  376. for directory caches chosen from the consensus.) Closes ticket
  377. 17864; patch by "teor".
  378. - Add UseDefaultFallbackDirs, which enables any hard-coded fallback
  379. directory mirrors. The default is 1; set it to 0 to disable
  380. fallbacks. Implements ticket 17576. Patch by "teor".
  381. o Minor features (geoip):
  382. - Update geoip and geoip6 to the January 5 2016 Maxmind GeoLite2
  383. Country database.
  384. o Minor features (IPv6):
  385. - Add an argument 'ipv6=address:orport' to the DirAuthority and
  386. FallbackDir torrc options, to specify an IPv6 address for an
  387. authority or fallback directory. Add hard-coded ipv6 addresses for
  388. directory authorities that have them. Closes ticket 17327; patch
  389. from Nick Mathewson and "teor".
  390. - Add address policy assume_action support for IPv6 addresses.
  391. - Limit IPv6 mask bits to 128.
  392. - Warn when comparing against an AF_UNSPEC address in a policy, it's
  393. almost always a bug. Closes ticket 17863; patch by "teor".
  394. - Allow users to configure directory authorities and fallback
  395. directory servers with IPv6 addresses and ORPorts. Resolves
  396. ticket 6027.
  397. - routerset_parse now accepts IPv6 literal addresses. Fixes bug
  398. 17060; bugfix on 0.2.1.3-alpha. Patch by "teor".
  399. - Make tor_ersatz_socketpair work on IPv6-only systems. Fixes bug
  400. 17638; bugfix on 0.0.2pre8. Patch by "teor".
  401. o Minor features (logging):
  402. - When logging to syslog, allow a tag to be added to the syslog
  403. identity (the string prepended to every log message). The tag can
  404. be configured with SyslogIdentityTag and defaults to none. Setting
  405. it to "foo" will cause logs to be tagged as "Tor-foo". Closes
  406. ticket 17194.
  407. o Minor features (portability):
  408. - Use timingsafe_memcmp() where available. Closes ticket 17944;
  409. patch from <logan@hackers.mu>.
  410. o Minor features (relay, address discovery):
  411. - Add a family argument to get_interface_addresses_raw() and
  412. subfunctions to make network interface address interogation more
  413. efficient. Now Tor can specifically ask for IPv4, IPv6 or both
  414. types of interfaces from the operating system. Resolves
  415. ticket 17950.
  416. - When get_interface_address6_list(.,AF_UNSPEC,.) is called and
  417. fails to enumerate interface addresses using the platform-specific
  418. API, have it rely on the UDP socket fallback technique to try and
  419. find out what IP addresses (both IPv4 and IPv6) our machine has.
  420. Resolves ticket 17951.
  421. o Minor features (replay cache):
  422. - The replay cache now uses SHA256 instead of SHA1. Implements
  423. feature 8961. Patch by "teor", issue reported by "rransom".
  424. o Minor features (unix file permissions):
  425. - Defer creation of Unix sockets until after setuid. This avoids
  426. needing CAP_CHOWN and CAP_FOWNER when using systemd's
  427. CapabilityBoundingSet, or chown and fowner when using SELinux.
  428. Implements part of ticket 17562. Patch from Jamie Nguyen.
  429. - If any directory created by Tor is marked as group readable, the
  430. filesystem group is allowed to be either the default GID or the
  431. root user. Allowing root to read the DataDirectory prevents the
  432. need for CAP_READ_SEARCH when using systemd's
  433. CapabilityBoundingSet, or dac_read_search when using SELinux.
  434. Implements part of ticket 17562. Patch from Jamie Nguyen.
  435. - Introduce a new DataDirectoryGroupReadable option. If it is set to
  436. 1, the DataDirectory will be made readable by the default GID.
  437. Implements part of ticket 17562. Patch from Jamie Nguyen.
  438. o Minor bugfixes (accounting):
  439. - The max bandwidth when using 'AccountRule sum' is now correctly
  440. logged. Fixes bug 18024; bugfix on 0.2.6.1-alpha. Patch
  441. from "unixninja92".
  442. o Minor bugfixes (code correctness):
  443. - When closing an entry connection, generate a warning if we should
  444. have sent an end cell for it but we haven't. Fixes bug 17876;
  445. bugfix on 0.2.3.2-alpha.
  446. - Assert that allocated memory held by the reputation code is freed
  447. according to its internal counters. Fixes bug 17753; bugfix
  448. on 0.1.1.1-alpha.
  449. - Assert when the TLS contexts fail to initialize. Fixes bug 17683;
  450. bugfix on 0.0.6.
  451. o Minor bugfixes (compilation):
  452. - Mark all object files that include micro-revision.i as depending
  453. on it, so as to make parallel builds more reliable. Fixes bug
  454. 17826; bugfix on 0.2.5.1-alpha.
  455. - Don't try to use the pthread_condattr_setclock() function unless
  456. it actually exists. Fixes compilation on NetBSD-6.x. Fixes bug
  457. 17819; bugfix on 0.2.6.3-alpha.
  458. - Fix backtrace compilation on FreeBSD. Fixes bug 17827; bugfix
  459. on 0.2.5.2-alpha.
  460. - Fix compilation of sandbox.c with musl-libc. Fixes bug 17347;
  461. bugfix on 0.2.5.1-alpha. Patch from 'jamestk'.
  462. - Fix search for libevent libraries on OpenBSD (and other systems
  463. that install libevent 1 and libevent 2 in parallel). Fixes bug
  464. 16651; bugfix on 0.1.0.7-rc. Patch from "rubiate".
  465. - Isolate environment variables meant for tests from the rest of the
  466. build system. Fixes bug 17818; bugfix on 0.2.7.3-rc.
  467. - Replace usage of 'INLINE' with 'inline'. Fixes bug 17804; bugfix
  468. on 0.0.2pre8.
  469. - Remove config.log only from make distclean, not from make clean.
  470. Fixes bug 17924; bugfix on 0.2.4.1-alpha.
  471. o Minor bugfixes (crypto):
  472. - Check the return value of HMAC() and assert on failure. Fixes bug
  473. 17658; bugfix on 0.2.3.6-alpha. Patch by "teor".
  474. o Minor bugfixes (fallback directories):
  475. - Mark fallbacks as "too busy" when they return a 503 response,
  476. rather than just marking authorities. Fixes bug 17572; bugfix on
  477. 0.2.4.7-alpha. Patch by "teor".
  478. o Minor bugfixes (IPv6):
  479. - Update the limits in max_dl_per_request for IPv6 address length.
  480. Fixes bug 17573; bugfix on 0.2.1.5-alpha.
  481. o Minor bugfixes (linux seccomp2 sandbox):
  482. - Fix a crash when using offline master ed25519 keys with the Linux
  483. seccomp2 sandbox enabled. Fixes bug 17675; bugfix on 0.2.7.3-rc.
  484. o Minor bugfixes (logging):
  485. - In log messages that include a function name, use __FUNCTION__
  486. instead of __PRETTY_FUNCTION__. In GCC, these are synonymous, but
  487. with clang __PRETTY_FUNCTION__ has extra information we don't
  488. need. Fixes bug 16563; bugfix on 0.0.2pre8. Fix by Tom van
  489. der Woerdt.
  490. - Remove needless quotes from a log message about unparseable
  491. addresses. Fixes bug 17843; bugfix on 0.2.3.3-alpha.
  492. o Minor bugfixes (portability):
  493. - Remove an #endif from configure.ac so that we correctly detect the
  494. presence of in6_addr.s6_addr32. Fixes bug 17923; bugfix
  495. on 0.2.0.13-alpha.
  496. o Minor bugfixes (relays):
  497. - Check that both the ORPort and DirPort (if present) are reachable
  498. before publishing a relay descriptor. Otherwise, relays publish a
  499. descriptor with DirPort 0 when the DirPort reachability test takes
  500. longer than the ORPort reachability test. Fixes bug 18050; bugfix
  501. on 0.1.0.1-rc. Reported by "starlight", patch by "teor".
  502. o Minor bugfixes (relays, hidden services):
  503. - Refuse connection requests to private OR addresses unless
  504. ExtendAllowPrivateAddresses is set. Previously, tor would connect,
  505. then refuse to send any cells to a private address. Fixes bugs
  506. 17674 and 8976; bugfix on 0.2.3.21-rc. Patch by "teor".
  507. o Minor bugfixes (safe logging):
  508. - When logging a malformed hostname received through socks4, scrub
  509. it if SafeLogging says we should. Fixes bug 17419; bugfix
  510. on 0.1.1.16-rc.
  511. o Minor bugfixes (statistics code):
  512. - Consistently check for overflow in round_*_to_next_multiple_of
  513. functions, and add unit tests with additional and maximal values.
  514. Fixes part of bug 13192; bugfix on 0.2.2.1-alpha.
  515. - Handle edge cases in the laplace functions: avoid division by
  516. zero, avoid taking the log of zero, and silence clang type
  517. conversion warnings using round and trunc. Add unit tests for edge
  518. cases with maximal values. Fixes part of bug 13192; bugfix
  519. on 0.2.6.2-alpha.
  520. o Minor bugfixes (testing):
  521. - The test for log_heartbeat was incorrectly failing in timezones
  522. with non-integer offsets. Instead of comparing the end of the time
  523. string against a constant, compare it to the output of
  524. format_local_iso_time when given the correct input. Fixes bug
  525. 18039; bugfix on 0.2.5.4-alpha.
  526. - Make unit tests pass on IPv6-only systems, and systems without
  527. localhost addresses (like some FreeBSD jails). Fixes bug 17632;
  528. bugfix on 0.2.7.3-rc. Patch by "teor".
  529. - Fix a memory leak in the ntor test. Fixes bug 17778; bugfix
  530. on 0.2.4.8-alpha.
  531. - Check the full results of SHA256 and SHA512 digests in the unit
  532. tests. Bugfix on 0.2.2.4-alpha. Patch by "teor".
  533. o Code simplification and refactoring:
  534. - Move logging of redundant policy entries in
  535. policies_parse_exit_policy_internal into its own function. Closes
  536. ticket 17608; patch from "juce".
  537. - Extract the more complicated parts of circuit_mark_for_close()
  538. into a new function that we run periodically before circuits are
  539. freed. This change removes more than half of the functions
  540. currently in the "blob". Closes ticket 17218.
  541. - Clean up a little duplicated code in
  542. crypto_expand_key_material_TAP(). Closes ticket 17587; patch
  543. from "pfrankw".
  544. - Decouple the list of streams waiting to be attached to circuits
  545. from the overall connection list. This change makes it possible to
  546. attach streams quickly while simplifying Tor's callgraph and
  547. avoiding O(N) scans of the entire connection list. Closes
  548. ticket 17590.
  549. - When a direct directory request fails immediately on launch,
  550. instead of relaunching that request from inside the code that
  551. launches it, instead mark the connection for teardown. This change
  552. simplifies Tor's callback and prevents the directory-request
  553. launching code from invoking itself recursively. Closes
  554. ticket 17589
  555. - Remove code for configuring OpenSSL dynamic locks; OpenSSL doesn't
  556. use them. Closes ticket 17926.
  557. o Documentation:
  558. - Add a description of the correct use of the '--keygen' command-
  559. line option. Closes ticket 17583; based on text by 's7r'.
  560. - Document the minimum HeartbeatPeriod value. Closes ticket 15638.
  561. - Explain actual minima for BandwidthRate. Closes ticket 16382.
  562. - Fix a minor formatting typo in the manpage. Closes ticket 17791.
  563. - Mention torspec URL in the manpage and point the reader to it
  564. whenever we mention a document that belongs in torspce. Fixes
  565. issue 17392.
  566. o Removed features:
  567. - Remove client-side support for connecting to Tor relays running
  568. versions of Tor before 0.2.3.6-alpha. These relays didn't support
  569. the v3 TLS handshake protocol, and are no longer allowed on the
  570. Tor network. Implements the client side of ticket 11150. Based on
  571. patches by Tom van der Woerdt.
  572. o Testing:
  573. - Add unit tests to check for common RNG failure modes, such as
  574. returning all zeroes, identical values, or incrementing values
  575. (OpenSSL's rand_predictable feature). Patch by "teor".
  576. - Log more information when the backtrace tests fail. Closes ticket
  577. 17892. Patch from "cypherpunks."
  578. - Always test both ed25519 backends, so that we can be sure that our
  579. batch-open replacement code works. Part of ticket 16794.
  580. - Cover dns_resolve_impl() in dns.c with unit tests. Implements a
  581. portion of ticket 16831.
  582. - More unit tests for compat_libevent.c, procmon.c, tortls.c,
  583. util_format.c, directory.c, and options_validate.c. Closes tickets
  584. 17075, 17082, 17084, 17003, and 17076 respectively. Patches from
  585. Ola Bini.
  586. - Unit tests for directory_handle_command_get. Closes ticket 17004.
  587. Patch from Reinaldo de Souza Jr.
  588. Changes in version 0.2.7.6 - 2015-12-10
  589. Tor version 0.2.7.6 fixes a major bug in entry guard selection, as
  590. well as a minor bug in hidden service reliability.
  591. o Major bugfixes (guard selection):
  592. - Actually look at the Guard flag when selecting a new directory
  593. guard. When we implemented the directory guard design, we
  594. accidentally started treating all relays as if they have the Guard
  595. flag during guard selection, leading to weaker anonymity and worse
  596. performance. Fixes bug 17772; bugfix on 0.2.4.8-alpha. Discovered
  597. by Mohsen Imani.
  598. o Minor features (geoip):
  599. - Update geoip and geoip6 to the December 1 2015 Maxmind GeoLite2
  600. Country database.
  601. o Minor bugfixes (compilation):
  602. - When checking for net/pfvar.h, include netinet/in.h if possible.
  603. This fixes transparent proxy detection on OpenBSD. Fixes bug
  604. 17551; bugfix on 0.1.2.1-alpha. Patch from "rubiate".
  605. - Fix a compilation warning with Clang 3.6: Do not check the
  606. presence of an address which can never be NULL. Fixes bug 17781.
  607. o Minor bugfixes (correctness):
  608. - When displaying an IPv6 exit policy, include the mask bits
  609. correctly even when the number is greater than 31. Fixes bug
  610. 16056; bugfix on 0.2.4.7-alpha. Patch from "gturner".
  611. - The wrong list was used when looking up expired intro points in a
  612. rend service object, causing what we think could be reachability
  613. issues for hidden services, and triggering a BUG log. Fixes bug
  614. 16702; bugfix on 0.2.7.2-alpha.
  615. - Fix undefined behavior in the tor_cert_checksig function. Fixes
  616. bug 17722; bugfix on 0.2.7.2-alpha.
  617. Changes in version 0.2.7.5 - 2015-11-20
  618. The Tor 0.2.7 release series is dedicated to the memory of Tor user
  619. and privacy advocate Caspar Bowden (1961-2015). Caspar worked
  620. tirelessly to advocate human rights regardless of national borders,
  621. and oppose the encroachments of mass surveillance. He opposed national
  622. exceptionalism, he brought clarity to legal and policy debates, he
  623. understood and predicted the impact of mass surveillance on the world,
  624. and he laid the groundwork for resisting it. While serving on the Tor
  625. Project's board of directors, he brought us his uncompromising focus
  626. on technical excellence in the service of humankind. Caspar was an
  627. inimitable force for good and a wonderful friend. He was kind,
  628. humorous, generous, gallant, and believed we should protect one
  629. another without exception. We honor him here for his ideals, his
  630. efforts, and his accomplishments. Please honor his memory with works
  631. that would make him proud.
  632. Tor 0.2.7.5 is the first stable release in the Tor 0.2.7 series.
  633. The 0.2.7 series adds a more secure identity key type for relays,
  634. improves cryptography performance, resolves several longstanding
  635. hidden-service performance issues, improves controller support for
  636. hidden services, and includes small bugfixes and performance
  637. improvements throughout the program. This release series also includes
  638. more tests than before, and significant simplifications to which parts
  639. of Tor invoke which others.
  640. (This release contains no code changes since 0.2.7.4-rc.)
  641. Changes in version 0.2.7.4-rc - 2015-10-21
  642. Tor 0.2.7.4-rc is the second release candidate in the 0.2.7 series. It
  643. fixes some important memory leaks, and a scary-looking (but mostly
  644. harmless in practice) invalid-read bug. It also has a few small
  645. bugfixes, notably fixes for compilation and portability on different
  646. platforms. If no further significant bounds are found, the next
  647. release will the the official stable release.
  648. o Major bugfixes (security, correctness):
  649. - Fix an error that could cause us to read 4 bytes before the
  650. beginning of an openssl string. This bug could be used to cause
  651. Tor to crash on systems with unusual malloc implementations, or
  652. systems with unusual hardening installed. Fixes bug 17404; bugfix
  653. on 0.2.3.6-alpha.
  654. o Major bugfixes (correctness):
  655. - Fix a use-after-free bug in validate_intro_point_failure(). Fixes
  656. bug 17401; bugfix on 0.2.7.3-rc.
  657. o Major bugfixes (memory leaks):
  658. - Fix a memory leak in ed25519 batch signature checking. Fixes bug
  659. 17398; bugfix on 0.2.6.1-alpha.
  660. - Fix a memory leak in rend_cache_failure_entry_free(). Fixes bug
  661. 17402; bugfix on 0.2.7.3-rc.
  662. - Fix a memory leak when reading an expired signing key from disk.
  663. Fixes bug 17403; bugfix on 0.2.7.2-rc.
  664. o Minor features (geoIP):
  665. - Update geoip and geoip6 to the October 9 2015 Maxmind GeoLite2
  666. Country database.
  667. o Minor bugfixes (compilation):
  668. - Repair compilation with the most recent (unreleased, alpha)
  669. vesions of OpenSSL 1.1. Fixes part of ticket 17237.
  670. - Fix an integer overflow warning in test_crypto_slow.c. Fixes bug
  671. 17251; bugfix on 0.2.7.2-alpha.
  672. - Fix compilation of sandbox.c with musl-libc. Fixes bug 17347;
  673. bugfix on 0.2.5.1-alpha. Patch from 'jamestk'.
  674. o Minor bugfixes (portability):
  675. - Use libexecinfo on FreeBSD to enable backtrace support. Fixes
  676. part of bug 17151; bugfix on 0.2.5.2-alpha. Patch from
  677. Marcin Cieślak.
  678. o Minor bugfixes (sandbox):
  679. - Add the "hidserv-stats" filename to our sandbox filter for the
  680. HiddenServiceStatistics option to work properly. Fixes bug 17354;
  681. bugfix on 0.2.6.2-alpha. Patch from David Goulet.
  682. o Minor bugfixes (testing):
  683. - Add unit tests for get_interface_address* failure cases. Fixes bug
  684. 17173; bugfix on 0.2.7.3-rc. Patch by fk/teor.
  685. - Fix breakage when running 'make check' with BSD make. Fixes bug
  686. 17154; bugfix on 0.2.7.3-rc. Patch by Marcin Cieślak.
  687. - Make the get_ifaddrs_* unit tests more tolerant of different
  688. network configurations. (Don't assume every test box has an IPv4
  689. address, and don't assume every test box has a non-localhost
  690. address.) Fixes bug 17255; bugfix on 0.2.7.3-rc. Patch by "teor".
  691. - Skip backtrace tests when backtrace support is not compiled in.
  692. Fixes part of bug 17151; bugfix on 0.2.7.1-alpha. Patch from
  693. Marcin Cieślak.
  694. o Documentation:
  695. - Fix capitalization of SOCKS in sample torrc. Closes ticket 15609.
  696. - Note that HiddenServicePorts can take a unix domain socket. Closes
  697. ticket 17364.
  698. Changes in version 0.2.7.3-rc - 2015-09-25
  699. Tor 0.2.7.3-rc is the first release candidate in the 0.2.7 series. It
  700. contains numerous usability fixes for Ed25519 keys, safeguards against
  701. several misconfiguration problems, significant simplifications to
  702. Tor's callgraph, and numerous bugfixes and small features.
  703. This is the most tested release of Tor to date. The unit tests cover
  704. 39.40% of the code, and the integration tests (accessible with "make
  705. test-full-online", requiring stem and chutney and a network
  706. connection) raise the coverage to 64.49%.
  707. o Major features (security, hidden services):
  708. - Hidden services, if using the EntryNodes option, are required to
  709. use more than one EntryNode, in order to avoid a guard discovery
  710. attack. (This would only affect people who had configured hidden
  711. services and manually specified the EntryNodes option with a
  712. single entry-node. The impact was that it would be easy to
  713. remotely identify the guard node used by such a hidden service.
  714. See ticket for more information.) Fixes ticket 14917.
  715. o Major features (Ed25519 keys, keypinning):
  716. - The key-pinning option on directory authorities is now advisory-
  717. only by default. In a future version, or when the AuthDirPinKeys
  718. option is set, pins are enforced again. Disabling key-pinning
  719. seemed like a good idea so that we can survive the fallout of any
  720. usability problems associated with Ed25519 keys. Closes
  721. ticket 17135.
  722. o Major features (Ed25519 performance):
  723. - Improve the speed of Ed25519 operations and Curve25519 keypair
  724. generation when built targeting 32 bit x86 platforms with SSE2
  725. available. Implements ticket 16535.
  726. - Improve the runtime speed of Ed25519 signature verification by
  727. using Ed25519-donna's batch verification support. Implements
  728. ticket 16533.
  729. o Major features (performance testing):
  730. - The test-network.sh script now supports performance testing.
  731. Requires corresponding chutney performance testing changes. Patch
  732. by "teor". Closes ticket 14175.
  733. o Major features (relay, Ed25519):
  734. - Significant usability improvements for Ed25519 key management. Log
  735. messages are better, and the code can recover from far more
  736. failure conditions. Thanks to "s7r" for reporting and diagnosing
  737. so many of these!
  738. - Add a new OfflineMasterKey option to tell Tor never to try loading
  739. or generating a secret Ed25519 identity key. You can use this in
  740. combination with tor --keygen to manage offline and/or encrypted
  741. Ed25519 keys. Implements ticket 16944.
  742. - Add a --newpass option to allow changing or removing the
  743. passphrase of an encrypted key with tor --keygen. Implements part
  744. of ticket 16769.
  745. - On receiving a HUP signal, check to see whether the Ed25519
  746. signing key has changed, and reload it if so. Closes ticket 16790.
  747. o Major bugfixes (relay, Ed25519):
  748. - Avoid crashing on 'tor --keygen'. Fixes bug 16679; bugfix on
  749. 0.2.7.2-alpha. Reported by "s7r".
  750. - Improve handling of expired signing keys with offline master keys.
  751. Fixes bug 16685; bugfix on 0.2.7.2-alpha. Reported by "s7r".
  752. o Minor features (client-side privacy):
  753. - New KeepAliveIsolateSOCKSAuth option to indefinitely extend circuit
  754. lifespan when IsolateSOCKSAuth and streams with SOCKS
  755. authentication are attached to the circuit. This allows
  756. applications like TorBrowser to manage circuit lifetime on their
  757. own. Implements feature 15482.
  758. - When logging malformed hostnames from SOCKS5 requests, respect
  759. SafeLogging configuration. Fixes bug 16891; bugfix on 0.1.1.16-rc.
  760. o Minor features (compilation):
  761. - Give a warning as early as possible when trying to build with an
  762. unsupported OpenSSL version. Closes ticket 16901.
  763. - Fail during configure if we're trying to build against an OpenSSL
  764. built without ECC support. Fixes bug 17109, bugfix on 0.2.7.1-alpha
  765. which started requiring ECC.
  766. o Minor features (geoip):
  767. - Update geoip and geoip6 to the September 3 2015 Maxmind GeoLite2
  768. Country database.
  769. o Minor features (hidden services):
  770. - Relays need to have the Fast flag to get the HSDir flag. As this
  771. is being written, we'll go from 2745 HSDirs down to 2342, a ~14%
  772. drop. This change should make some attacks against the hidden
  773. service directory system harder. Fixes ticket 15963.
  774. - Turn on hidden service statistics collection by setting the torrc
  775. option HiddenServiceStatistics to "1" by default. (This keeps
  776. track only of the fraction of traffic used by hidden services, and
  777. the total number of hidden services in existence.) Closes
  778. ticket 15254.
  779. - Client now uses an introduction point failure cache to know when
  780. to fetch or keep a descriptor in their cache. Previously, failures
  781. were recorded implicitly, but not explicitly remembered. Closes
  782. ticket 16389.
  783. o Minor features (testing, authorities, documentation):
  784. - New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags to
  785. explicitly manage consensus flags in testing networks. Patch by
  786. "robgjansen", modified by "teor". Implements part of ticket 14882.
  787. o Minor bugfixes (security, exit policies):
  788. - ExitPolicyRejectPrivate now also rejects the relay's published
  789. IPv6 address (if any), and any publicly routable IPv4 or IPv6
  790. addresses on any local interfaces. ticket 17027. Patch by "teor".
  791. Fixes bug 17027; bugfix on 0.2.0.11-alpha.
  792. o Minor bug fixes (torrc exit policies):
  793. - In torrc, "accept6 *" and "reject6 *" ExitPolicy lines now only
  794. produce IPv6 wildcard addresses. Previously they would produce
  795. both IPv4 and IPv6 wildcard addresses. Patch by "teor". Fixes part
  796. of bug 16069; bugfix on 0.2.4.7-alpha.
  797. - When parsing torrc ExitPolicies, we now warn for a number of cases
  798. where the user's intent is likely to differ from Tor's actual
  799. behavior. These include: using an IPv4 address with an accept6 or
  800. reject6 line; using "private" on an accept6 or reject6 line; and
  801. including any ExitPolicy lines after accept *:* or reject *:*.
  802. Related to ticket 16069.
  803. - When parsing torrc ExitPolicies, we now issue an info-level
  804. message when expanding an "accept/reject *" line to include both
  805. IPv4 and IPv6 wildcard addresses. Related to ticket 16069.
  806. - In each instance above, usage advice is provided to avoid the
  807. message. Resolves ticket 16069. Patch by "teor". Fixes part of bug
  808. 16069; bugfix on 0.2.4.7-alpha.
  809. o Minor bugfixes (authority):
  810. - Don't assign "HSDir" to a router if it isn't Valid and Running.
  811. Fixes bug 16524; bugfix on 0.2.7.2-alpha.
  812. - Downgrade log messages about Ed25519 key issues if they are in old
  813. cached router descriptors. Fixes part of bug 16286; bugfix
  814. on 0.2.7.2-alpha.
  815. - When we find an Ed25519 key issue in a cached descriptor, stop
  816. saying the descriptor was just "uploaded". Fixes another part of
  817. bug 16286; bugfix on 0.2.7.2-alpha.
  818. o Minor bugfixes (control port):
  819. - Repair a warning and a spurious result when getting the maximum
  820. number of file descriptors from the controller. Fixes bug 16697;
  821. bugfix on 0.2.7.2-alpha.
  822. o Minor bugfixes (correctness):
  823. - When calling channel_free_list(), avoid calling smartlist_remove()
  824. while inside a FOREACH loop. This partially reverts commit
  825. 17356fe7fd96af where the correct SMARTLIST_DEL_CURRENT was
  826. incorrectly removed. Fixes bug 16924; bugfix on 0.2.4.4-alpha.
  827. o Minor bugfixes (documentation):
  828. - Advise users on how to configure separate IPv4 and IPv6 exit
  829. policies in the manpage and sample torrcs. Related to ticket 16069.
  830. - Fix the usage message of tor-resolve(1) so that it no longer lists
  831. the removed -F option. Fixes bug 16913; bugfix on 0.2.2.28-beta.
  832. - Fix an error in the manual page and comments for
  833. TestingDirAuthVoteHSDir[IsStrict], which suggested that a HSDir
  834. required "ORPort connectivity". While this is true, it is in no
  835. way unique to the HSDir flag. Of all the flags, only HSDirs need a
  836. DirPort configured in order for the authorities to assign that
  837. particular flag. Patch by "teor". Fixed as part of 14882; bugfix
  838. on 0.2.6.3-alpha.
  839. o Minor bugfixes (Ed25519):
  840. - Fix a memory leak when reading router descriptors with expired
  841. Ed25519 certificates. Fixes bug 16539; bugfix on 0.2.7.2-alpha.
  842. o Minor bugfixes (linux seccomp2 sandbox):
  843. - Allow bridge authorities to run correctly under the seccomp2
  844. sandbox. Fixes bug 16964; bugfix on 0.2.5.1-alpha.
  845. - Allow routers with ed25519 keys to run correctly under the
  846. seccomp2 sandbox. Fixes bug 16965; bugfix on 0.2.7.2-alpha.
  847. o Minor bugfixes (open file limit):
  848. - Fix set_max_file_descriptors() to set by default the max open file
  849. limit to the current limit when setrlimit() fails. Fixes bug
  850. 16274; bugfix on 0.2.0.10-alpha. Patch by dgoulet.
  851. o Minor bugfixes (portability):
  852. - Try harder to normalize the exit status of the Tor process to the
  853. standard-provided range. Fixes bug 16975; bugfix on every version
  854. of Tor ever.
  855. - Check correctly for Windows socket errors in the workqueue
  856. backend. Fixes bug 16741; bugfix on 0.2.6.3-alpha.
  857. - Fix the behavior of crypto_rand_time_range() when told to consider
  858. times before 1970. (These times were possible when running in a
  859. simulated network environment where time()'s output starts at
  860. zero.) Fixes bug 16980; bugfix on 0.2.7.1-alpha.
  861. - Restore correct operation of TLS client-cipher detection on
  862. OpenSSL 1.1. Fixes bug 14047; bugfix on 0.2.7.2-alpha.
  863. o Minor bugfixes (relay):
  864. - Ensure that worker threads actually exit when a fatal error or
  865. shutdown is indicated. This fix doesn't currently affect the
  866. behavior of Tor, because Tor workers never indicates fatal error
  867. or shutdown except in the unit tests. Fixes bug 16868; bugfix
  868. on 0.2.6.3-alpha.
  869. - Unblock threads before releasing the work queue mutex to ensure
  870. predictable scheduling behavior. Fixes bug 16644; bugfix
  871. on 0.2.6.3-alpha.
  872. o Code simplification and refactoring:
  873. - Change the function that's called when we need to retry all
  874. downloads so that it only reschedules the downloads to happen
  875. immediately, rather than launching them all at once itself. This
  876. further simplifies Tor's callgraph.
  877. - Move some format-parsing functions out of crypto.c and
  878. crypto_curve25519.c into crypto_format.c and/or util_format.c.
  879. - Move the client-only parts of init_keys() into a separate
  880. function. Closes ticket 16763.
  881. - Simplify the microdesc_free() implementation so that it no longer
  882. appears (to code analysis tools) to potentially invoke a huge
  883. suite of other microdesc functions.
  884. - Simply the control graph further by deferring the inner body of
  885. directory_all_unreachable() into a callback. Closes ticket 16762.
  886. - Treat the loss of an owning controller as equivalent to a SIGTERM
  887. signal. This removes a tiny amount of duplicated code, and
  888. simplifies our callgraph. Closes ticket 16788.
  889. - When generating an event to send to the controller, we no longer
  890. put the event over the network immediately. Instead, we queue
  891. these events, and use a Libevent callback to deliver them. This
  892. change simplifies Tor's callgraph by reducing the number of
  893. functions from which all other Tor functions are reachable. Closes
  894. ticket 16695.
  895. - Wrap Windows-only C files inside '#ifdef _WIN32' so that tools
  896. that try to scan or compile every file on Unix won't decide that
  897. they are broken.
  898. - Remove the unused "nulterminate" argument from buf_pullup().
  899. o Documentation:
  900. - Recommend a 40 GB example AccountingMax in torrc.sample rather
  901. than a 4 GB max. Closes ticket 16742.
  902. - Include the TUNING document in our source tarball. It is referred
  903. to in the ChangeLog and an error message. Fixes bug 16929; bugfix
  904. on 0.2.6.1-alpha.
  905. o Removed code:
  906. - The internal pure-C tor-fw-helper tool is now removed from the Tor
  907. distribution, in favor of the pure-Go clone available from
  908. https://gitweb.torproject.org/tor-fw-helper.git/ . The libraries
  909. used by the C tor-fw-helper are not, in our opinion, very
  910. confidence- inspiring in their secure-programming techniques.
  911. Closes ticket 13338.
  912. - Remove the code that would try to aggressively flush controller
  913. connections while writing to them. This code was introduced in
  914. 0.1.2.7-alpha, in order to keep output buffers from exceeding
  915. their limits. But there is no longer a maximum output buffer size,
  916. and flushing data in this way caused some undesirable recursions
  917. in our call graph. Closes ticket 16480.
  918. o Testing:
  919. - Make "bridges+hs" the default test network. This tests almost all
  920. tor functionality during make test-network, while allowing tests
  921. to succeed on non-IPv6 systems. Requires chutney commit 396da92 in
  922. test-network-bridges-hs. Closes tickets 16945 (tor) and 16946
  923. (chutney). Patches by "teor".
  924. - Autodetect CHUTNEY_PATH if the chutney and Tor sources are side-
  925. by-side in the same parent directory. Closes ticket 16903. Patch
  926. by "teor".
  927. - Use environment variables rather than autoconf substitutions to
  928. send variables from the build system to the test scripts. This
  929. change should be easier to maintain, and cause 'make distcheck' to
  930. work better than before. Fixes bug 17148.
  931. - Add a new set of callgraph analysis scripts that use clang to
  932. produce a list of which Tor functions are reachable from which
  933. other Tor functions. We're planning to use these to help simplify
  934. our code structure by identifying illogical dependencies.
  935. - Add new 'test-full' and 'test-full-online' targets to run all
  936. tests, including integration tests with stem and chutney.
  937. - Make the test-workqueue test work on Windows by initializing the
  938. network before we begin.
  939. - New make target (make test-network-all) to run multiple applicable
  940. chutney test cases. Patch from Teor; closes 16953.
  941. - Unit test dns_resolve(), dns_clip_ttl() and dns_get_expiry_ttl()
  942. functions in dns.c. Implements a portion of ticket 16831.
  943. - When building Tor with testing coverage enabled, run Chutney tests
  944. (if any) using the 'tor-cov' coverage binary.
  945. - When running test-network or test-stem, check for the absence of
  946. stem/chutney before doing any build operations.
  947. Changes in version 0.2.7.2-alpha - 2015-07-27
  948. This, the second alpha in the Tor 0.2.7 series, has a number of new
  949. features, including a way to manually pick the number of introduction
  950. points for hidden services, and the much stronger Ed25519 signing key
  951. algorithm for regular Tor relays (including support for encrypted
  952. offline identity keys in the new algorithm).
  953. Support for Ed25519 on relays is currently limited to signing router
  954. descriptors; later alphas in this series will extend Ed25519 key
  955. support to more parts of the Tor protocol.
  956. o Major features (Ed25519 identity keys, Proposal 220):
  957. - All relays now maintain a stronger identity key, using the Ed25519
  958. elliptic curve signature format. This master key is designed so
  959. that it can be kept offline. Relays also generate an online
  960. signing key, and a set of other Ed25519 keys and certificates.
  961. These are all automatically regenerated and rotated as needed.
  962. Implements part of ticket 12498.
  963. - Directory authorities now vote on Ed25519 identity keys along with
  964. RSA1024 keys. Implements part of ticket 12498.
  965. - Directory authorities track which Ed25519 identity keys have been
  966. used with which RSA1024 identity keys, and do not allow them to
  967. vary freely. Implements part of ticket 12498.
  968. - Microdescriptors now include Ed25519 identity keys. Implements
  969. part of ticket 12498.
  970. - Add support for offline encrypted Ed25519 master keys. To use this
  971. feature on your tor relay, run "tor --keygen" to make a new master
  972. key (or to make a new signing key if you already have a master
  973. key). Closes ticket 13642.
  974. o Major features (Hidden services):
  975. - Add the torrc option HiddenServiceNumIntroductionPoints, to
  976. specify a fixed number of introduction points. Its maximum value
  977. is 10 and default is 3. Using this option can increase a hidden
  978. service's reliability under load, at the cost of making it more
  979. visible that the hidden service is facing extra load. Closes
  980. ticket 4862.
  981. - Remove the adaptive algorithm for choosing the number of
  982. introduction points, which used to change the number of
  983. introduction points (poorly) depending on the number of
  984. connections the HS sees. Closes ticket 4862.
  985. o Major features (onion key cross-certification):
  986. - Relay descriptors now include signatures of their own identity
  987. keys, made using the TAP and ntor onion keys. These signatures
  988. allow relays to prove ownership of their own onion keys. Because
  989. of this change, microdescriptors will no longer need to include
  990. RSA identity keys. Implements proposal 228; closes ticket 12499.
  991. o Major features (performance):
  992. - Improve the runtime speed of Ed25519 operations by using the
  993. public-domain Ed25519-donna by Andrew M. ("floodyberry").
  994. Implements ticket 16467.
  995. - Improve the runtime speed of the ntor handshake by using an
  996. optimized curve25519 basepoint scalarmult implementation from the
  997. public-domain Ed25519-donna by Andrew M. ("floodyberry"), based on
  998. ideas by Adam Langley. Implements ticket 9663.
  999. o Major bugfixes (client-side privacy, also in 0.2.6.9):
  1000. - Properly separate out each SOCKSPort when applying stream
  1001. isolation. The error occurred because each port's session group
  1002. was being overwritten by a default value when the listener
  1003. connection was initialized. Fixes bug 16247; bugfix on
  1004. 0.2.6.3-alpha. Patch by "jojelino".
  1005. o Major bugfixes (hidden service clients, stability, also in 0.2.6.10):
  1006. - Stop refusing to store updated hidden service descriptors on a
  1007. client. This reverts commit 9407040c59218 (which indeed fixed bug
  1008. 14219, but introduced a major hidden service reachability
  1009. regression detailed in bug 16381). This is a temporary fix since
  1010. we can live with the minor issue in bug 14219 (it just results in
  1011. some load on the network) but the regression of 16381 is too much
  1012. of a setback. First-round fix for bug 16381; bugfix
  1013. on 0.2.6.3-alpha.
  1014. o Major bugfixes (hidden services):
  1015. - When cannibalizing a circuit for an introduction point, always
  1016. extend to the chosen exit node (creating a 4 hop circuit).
  1017. Previously Tor would use the current circuit exit node, which
  1018. changed the original choice of introduction point, and could cause
  1019. the hidden service to skip excluded introduction points or
  1020. reconnect to a skipped introduction point. Fixes bug 16260; bugfix
  1021. on 0.1.0.1-rc.
  1022. o Major bugfixes (open file limit):
  1023. - The open file limit wasn't checked before calling
  1024. tor_accept_socket_nonblocking(), which would make Tor exceed the
  1025. limit. Now, before opening a new socket, Tor validates the open
  1026. file limit just before, and if the max has been reached, return an
  1027. error. Fixes bug 16288; bugfix on 0.1.1.1-alpha.
  1028. o Major bugfixes (stability, also in 0.2.6.10):
  1029. - Stop crashing with an assertion failure when parsing certain kinds
  1030. of malformed or truncated microdescriptors. Fixes bug 16400;
  1031. bugfix on 0.2.6.1-alpha. Found by "torkeln"; fix based on a patch
  1032. by "cypherpunks_backup".
  1033. - Stop random client-side assertion failures that could occur when
  1034. connecting to a busy hidden service, or connecting to a hidden
  1035. service while a NEWNYM is in progress. Fixes bug 16013; bugfix
  1036. on 0.1.0.1-rc.
  1037. o Minor features (directory authorities, security, also in 0.2.6.9):
  1038. - The HSDir flag given by authorities now requires the Stable flag.
  1039. For the current network, this results in going from 2887 to 2806
  1040. HSDirs. Also, it makes it harder for an attacker to launch a sybil
  1041. attack by raising the effort for a relay to become Stable to
  1042. require at the very least 7 days, while maintaining the 96 hours
  1043. uptime requirement for HSDir. Implements ticket 8243.
  1044. o Minor features (client):
  1045. - Relax the validation of hostnames in SOCKS5 requests, allowing the
  1046. character '_' to appear, in order to cope with domains observed in
  1047. the wild that are serving non-RFC compliant records. Resolves
  1048. ticket 16430.
  1049. - Relax the validation done to hostnames in SOCKS5 requests, and
  1050. allow a single trailing '.' to cope with clients that pass FQDNs
  1051. using that syntax to explicitly indicate that the domain name is
  1052. fully-qualified. Fixes bug 16674; bugfix on 0.2.6.2-alpha.
  1053. - Add GroupWritable and WorldWritable options to unix-socket based
  1054. SocksPort and ControlPort options. These options apply to a single
  1055. socket, and override {Control,Socks}SocketsGroupWritable. Closes
  1056. ticket 15220.
  1057. o Minor features (control protocol):
  1058. - Support network-liveness GETINFO key and NETWORK_LIVENESS event in
  1059. the control protocol. Resolves ticket 15358.
  1060. o Minor features (directory authorities):
  1061. - Directory authorities no longer vote against the "Fast", "Stable",
  1062. and "HSDir" flags just because they were going to vote against
  1063. "Running": if the consensus turns out to be that the router was
  1064. running, then the authority's vote should count. Patch from Peter
  1065. Retzlaff; closes issue 8712.
  1066. o Minor features (geoip, also in 0.2.6.10):
  1067. - Update geoip to the June 3 2015 Maxmind GeoLite2 Country database.
  1068. - Update geoip6 to the June 3 2015 Maxmind GeoLite2 Country database.
  1069. o Minor features (hidden services):
  1070. - Add the new options "HiddenServiceMaxStreams" and
  1071. "HiddenServiceMaxStreamsCloseCircuit" to allow hidden services to
  1072. limit the maximum number of simultaneous streams per circuit, and
  1073. optionally tear down the circuit when the limit is exceeded. Part
  1074. of ticket 16052.
  1075. o Minor features (portability):
  1076. - Use C99 variadic macros when the compiler is not GCC. This avoids
  1077. failing compilations on MSVC, and fixes a log-file-based race
  1078. condition in our old workarounds. Original patch from Gisle Vanem.
  1079. o Minor bugfixes (compilation, also in 0.2.6.9):
  1080. - Build with --enable-systemd correctly when libsystemd is
  1081. installed, but systemd is not. Fixes bug 16164; bugfix on
  1082. 0.2.6.3-alpha. Patch from Peter Palfrader.
  1083. o Minor bugfixes (controller):
  1084. - Add the descriptor ID in each HS_DESC control event. It was
  1085. missing, but specified in control-spec.txt. Fixes bug 15881;
  1086. bugfix on 0.2.5.2-alpha.
  1087. o Minor bugfixes (crypto error-handling, also in 0.2.6.10):
  1088. - Check for failures from crypto_early_init, and refuse to continue.
  1089. A previous typo meant that we could keep going with an
  1090. uninitialized crypto library, and would have OpenSSL initialize
  1091. its own PRNG. Fixes bug 16360; bugfix on 0.2.5.2-alpha, introduced
  1092. when implementing ticket 4900. Patch by "teor".
  1093. o Minor bugfixes (hidden services):
  1094. - Fix a crash when reloading configuration while at least one
  1095. configured and one ephemeral hidden service exists. Fixes bug
  1096. 16060; bugfix on 0.2.7.1-alpha.
  1097. - Avoid crashing with a double-free bug when we create an ephemeral
  1098. hidden service but adding it fails for some reason. Fixes bug
  1099. 16228; bugfix on 0.2.7.1-alpha.
  1100. o Minor bugfixes (Linux seccomp2 sandbox):
  1101. - Use the sandbox in tor_open_cloexec whether or not O_CLOEXEC is
  1102. defined. Patch by "teor". Fixes bug 16515; bugfix on 0.2.3.1-alpha.
  1103. o Minor bugfixes (Linux seccomp2 sandbox, also in 0.2.6.10):
  1104. - Allow pipe() and pipe2() syscalls in the seccomp2 sandbox: we need
  1105. these when eventfd2() support is missing. Fixes bug 16363; bugfix
  1106. on 0.2.6.3-alpha. Patch from "teor".
  1107. o Minor bugfixes (Linux seccomp2 sandbox, also in 0.2.6.9):
  1108. - Fix sandboxing to work when running as a relay, by allowing the
  1109. renaming of secret_id_key, and allowing the eventfd2 and futex
  1110. syscalls. Fixes bug 16244; bugfix on 0.2.6.1-alpha. Patch by
  1111. Peter Palfrader.
  1112. - Allow systemd connections to work with the Linux seccomp2 sandbox
  1113. code. Fixes bug 16212; bugfix on 0.2.6.2-alpha. Patch by
  1114. Peter Palfrader.
  1115. o Minor bugfixes (relay):
  1116. - Fix a rarely-encountered memory leak when failing to initialize
  1117. the thread pool. Fixes bug 16631; bugfix on 0.2.6.3-alpha. Patch
  1118. from "cypherpunks".
  1119. o Minor bugfixes (systemd):
  1120. - Fix an accidental formatting error that broke the systemd
  1121. configuration file. Fixes bug 16152; bugfix on 0.2.7.1-alpha.
  1122. - Tor's systemd unit file no longer contains extraneous spaces.
  1123. These spaces would sometimes confuse tools like deb-systemd-
  1124. helper. Fixes bug 16162; bugfix on 0.2.5.5-alpha.
  1125. o Minor bugfixes (tests):
  1126. - Use the configured Python executable when running test-stem-full.
  1127. Fixes bug 16470; bugfix on 0.2.7.1-alpha.
  1128. o Minor bugfixes (tests, also in 0.2.6.9):
  1129. - Fix a crash in the unit tests when built with MSVC2013. Fixes bug
  1130. 16030; bugfix on 0.2.6.2-alpha. Patch from "NewEraCracker".
  1131. o Minor bugfixes (threads, comments):
  1132. - Always initialize return value in compute_desc_id in rendcommon.c
  1133. Patch by "teor". Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1134. - Check for NULL values in getinfo_helper_onions(). Patch by "teor".
  1135. Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1136. - Remove undefined directive-in-macro in test_util_writepid clang
  1137. 3.7 complains that using a preprocessor directive inside a macro
  1138. invocation in test_util_writepid in test_util.c is undefined.
  1139. Patch by "teor". Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1140. o Code simplification and refactoring:
  1141. - Define WINVER and _WIN32_WINNT centrally, in orconfig.h, in order
  1142. to ensure they remain consistent and visible everywhere.
  1143. - Remove some vestigial workarounds for the MSVC6 compiler. We
  1144. haven't supported that in ages.
  1145. - The link authentication code has been refactored for better
  1146. testability and reliability. It now uses code generated with the
  1147. "trunnel" binary encoding generator, to reduce the risk of bugs
  1148. due to programmer error. Done as part of ticket 12498.
  1149. o Documentation:
  1150. - Include a specific and (hopefully) accurate documentation of the
  1151. torrc file's meta-format in doc/torrc_format.txt. This is mainly
  1152. of interest to people writing programs to parse or generate torrc
  1153. files. This document is not a commitment to long-term
  1154. compatibility; some aspects of the current format are a bit
  1155. ridiculous. Closes ticket 2325.
  1156. o Removed features:
  1157. - Tor no longer supports copies of OpenSSL that are missing support
  1158. for Elliptic Curve Cryptography. (We began using ECC when
  1159. available in 0.2.4.8-alpha, for more safe and efficient key
  1160. negotiation.) In particular, support for at least one of P256 or
  1161. P224 is now required, with manual configuration needed if only
  1162. P224 is available. Resolves ticket 16140.
  1163. - Tor no longer supports versions of OpenSSL before 1.0. (If you are
  1164. on an operating system that has not upgraded to OpenSSL 1.0 or
  1165. later, and you compile Tor from source, you will need to install a
  1166. more recent OpenSSL to link Tor against.) These versions of
  1167. OpenSSL are still supported by the OpenSSL, but the numerous
  1168. cryptographic improvements in later OpenSSL releases makes them a
  1169. clear choice. Resolves ticket 16034.
  1170. - Remove the HidServDirectoryV2 option. Now all relays offer to
  1171. store hidden service descriptors. Related to 16543.
  1172. - Remove the VoteOnHidServDirectoriesV2 option, since all
  1173. authorities have long set it to 1. Closes ticket 16543.
  1174. o Testing:
  1175. - Document use of coverity, clang static analyzer, and clang dynamic
  1176. undefined behavior and address sanitizers in doc/HACKING. Include
  1177. detailed usage instructions in the blacklist. Patch by "teor".
  1178. Closes ticket 15817.
  1179. - The link authentication protocol code now has extensive tests.
  1180. - The relay descriptor signature testing code now has
  1181. extensive tests.
  1182. - The test_workqueue program now runs faster, and is enabled by
  1183. default as a part of "make check".
  1184. - Now that OpenSSL has its own scrypt implementation, add an unit
  1185. test that checks for interoperability between libscrypt_scrypt()
  1186. and OpenSSL's EVP_PBE_scrypt() so that we could not use libscrypt
  1187. and rely on EVP_PBE_scrypt() whenever possible. Resolves
  1188. ticket 16189.
  1189. Changes in version 0.2.6.10 - 2015-07-12
  1190. Tor version 0.2.6.10 fixes some significant stability and hidden
  1191. service client bugs, bulletproofs the cryptography init process, and
  1192. fixes a bug when using the sandbox code with some older versions of
  1193. Linux. Everyone running an older version, especially an older version
  1194. of 0.2.6, should upgrade.
  1195. o Major bugfixes (hidden service clients, stability):
  1196. - Stop refusing to store updated hidden service descriptors on a
  1197. client. This reverts commit 9407040c59218 (which indeed fixed bug
  1198. 14219, but introduced a major hidden service reachability
  1199. regression detailed in bug 16381). This is a temporary fix since
  1200. we can live with the minor issue in bug 14219 (it just results in
  1201. some load on the network) but the regression of 16381 is too much
  1202. of a setback. First-round fix for bug 16381; bugfix
  1203. on 0.2.6.3-alpha.
  1204. o Major bugfixes (stability):
  1205. - Stop crashing with an assertion failure when parsing certain kinds
  1206. of malformed or truncated microdescriptors. Fixes bug 16400;
  1207. bugfix on 0.2.6.1-alpha. Found by "torkeln"; fix based on a patch
  1208. by "cypherpunks_backup".
  1209. - Stop random client-side assertion failures that could occur when
  1210. connecting to a busy hidden service, or connecting to a hidden
  1211. service while a NEWNYM is in progress. Fixes bug 16013; bugfix
  1212. on 0.1.0.1-rc.
  1213. o Minor features (geoip):
  1214. - Update geoip to the June 3 2015 Maxmind GeoLite2 Country database.
  1215. - Update geoip6 to the June 3 2015 Maxmind GeoLite2 Country database.
  1216. o Minor bugfixes (crypto error-handling):
  1217. - Check for failures from crypto_early_init, and refuse to continue.
  1218. A previous typo meant that we could keep going with an
  1219. uninitialized crypto library, and would have OpenSSL initialize
  1220. its own PRNG. Fixes bug 16360; bugfix on 0.2.5.2-alpha, introduced
  1221. when implementing ticket 4900. Patch by "teor".
  1222. o Minor bugfixes (Linux seccomp2 sandbox):
  1223. - Allow pipe() and pipe2() syscalls in the seccomp2 sandbox: we need
  1224. these when eventfd2() support is missing. Fixes bug 16363; bugfix
  1225. on 0.2.6.3-alpha. Patch from "teor".
  1226. Changes in version 0.2.6.9 - 2015-06-11
  1227. Tor 0.2.6.9 fixes a regression in the circuit isolation code, increases the
  1228. requirements for receiving an HSDir flag, and addresses some other small
  1229. bugs in the systemd and sandbox code. Clients using circuit isolation
  1230. should upgrade; all directory authorities should upgrade.
  1231. o Major bugfixes (client-side privacy):
  1232. - Properly separate out each SOCKSPort when applying stream
  1233. isolation. The error occurred because each port's session group was
  1234. being overwritten by a default value when the listener connection
  1235. was initialized. Fixes bug 16247; bugfix on 0.2.6.3-alpha. Patch
  1236. by "jojelino".
  1237. o Minor feature (directory authorities, security):
  1238. - The HSDir flag given by authorities now requires the Stable flag.
  1239. For the current network, this results in going from 2887 to 2806
  1240. HSDirs. Also, it makes it harder for an attacker to launch a sybil
  1241. attack by raising the effort for a relay to become Stable which
  1242. takes at the very least 7 days to do so and by keeping the 96
  1243. hours uptime requirement for HSDir. Implements ticket 8243.
  1244. o Minor bugfixes (compilation):
  1245. - Build with --enable-systemd correctly when libsystemd is
  1246. installed, but systemd is not. Fixes bug 16164; bugfix on
  1247. 0.2.6.3-alpha. Patch from Peter Palfrader.
  1248. o Minor bugfixes (Linux seccomp2 sandbox):
  1249. - Fix sandboxing to work when running as a relaymby renaming of
  1250. secret_id_key, and allowing the eventfd2 and futex syscalls. Fixes
  1251. bug 16244; bugfix on 0.2.6.1-alpha. Patch by Peter Palfrader.
  1252. - Allow systemd connections to work with the Linux seccomp2 sandbox
  1253. code. Fixes bug 16212; bugfix on 0.2.6.2-alpha. Patch by
  1254. Peter Palfrader.
  1255. o Minor bugfixes (tests):
  1256. - Fix a crash in the unit tests when built with MSVC2013. Fixes bug
  1257. 16030; bugfix on 0.2.6.2-alpha. Patch from "NewEraCracker".
  1258. Changes in version 0.2.6.8 - 2015-05-21
  1259. Tor 0.2.6.8 fixes a bit of dodgy code in parsing INTRODUCE2 cells, and
  1260. fixes an authority-side bug in assigning the HSDir flag. All directory
  1261. authorities should upgrade.
  1262. o Major bugfixes (hidden services, backport from 0.2.7.1-alpha):
  1263. - Revert commit that made directory authorities assign the HSDir
  1264. flag to relay without a DirPort; this was bad because such relays
  1265. can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix
  1266. on 0.2.6.3-alpha.
  1267. o Minor bugfixes (hidden service, backport from 0.2.7.1-alpha):
  1268. - Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on
  1269. a client authorized hidden service. Fixes bug 15823; bugfix
  1270. on 0.2.1.6-alpha.
  1271. o Minor features (geoip):
  1272. - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
  1273. - Update geoip6 to the April 8 2015 Maxmind GeoLite2
  1274. Country database.
  1275. Changes in version 0.2.7.1-alpha - 2015-05-12
  1276. Tor 0.2.7.1-alpha is the first alpha release in its series. It
  1277. includes numerous small features and bugfixes against previous Tor
  1278. versions, and numerous small infrastructure improvements. The most
  1279. notable features are several new ways for controllers to interact with
  1280. the hidden services subsystem.
  1281. o New system requirements:
  1282. - Tor no longer includes workarounds to support Libevent versions
  1283. before 1.3e. Libevent 2.0 or later is recommended. Closes
  1284. ticket 15248.
  1285. o Major features (controller):
  1286. - Add the ADD_ONION and DEL_ONION commands that allow the creation
  1287. and management of hidden services via the controller. Closes
  1288. ticket 6411.
  1289. - New "GETINFO onions/current" and "GETINFO onions/detached"
  1290. commands to get information about hidden services created via the
  1291. controller. Part of ticket 6411.
  1292. - New HSFETCH command to launch a request for a hidden service
  1293. descriptor. Closes ticket 14847.
  1294. - New HSPOST command to upload a hidden service descriptor. Closes
  1295. ticket 3523. Patch by "DonnchaC".
  1296. o Major bugfixes (hidden services):
  1297. - Revert commit that made directory authorities assign the HSDir
  1298. flag to relay without a DirPort; this was bad because such relays
  1299. can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix
  1300. on 0.2.6.3-alpha.
  1301. o Minor features (clock-jump tolerance):
  1302. - Recover better when our clock jumps back many hours, like might
  1303. happen for Tails or Whonix users who start with a very wrong
  1304. hardware clock, use Tor to discover a more accurate time, and then
  1305. fix their clock. Resolves part of ticket 8766.
  1306. o Minor features (command-line interface):
  1307. - Make --hash-password imply --hush to prevent unnecessary noise.
  1308. Closes ticket 15542. Patch from "cypherpunks".
  1309. - Print a warning whenever we find a relative file path being used
  1310. as torrc option. Resolves issue 14018.
  1311. o Minor features (controller):
  1312. - Add DirAuthority lines for default directory authorities to the
  1313. output of the "GETINFO config/defaults" command if not already
  1314. present. Implements ticket 14840.
  1315. - Controllers can now use "GETINFO hs/client/desc/id/..." to
  1316. retrieve items from the client's hidden service descriptor cache.
  1317. Closes ticket 14845.
  1318. - Implement a new controller command "GETINFO status/fresh-relay-
  1319. descs" to fetch a descriptor/extrainfo pair that was generated on
  1320. demand just for the controller's use. Implements ticket 14784.
  1321. o Minor features (DoS-resistance):
  1322. - Make it harder for attackers to overload hidden services with
  1323. introductions, by blocking multiple introduction requests on the
  1324. same circuit. Resolves ticket 15515.
  1325. o Minor features (geoip):
  1326. - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
  1327. - Update geoip6 to the April 8 2015 Maxmind GeoLite2
  1328. Country database.
  1329. o Minor features (HS popularity countermeasure):
  1330. - To avoid leaking HS popularity, don't cycle the introduction point
  1331. when we've handled a fixed number of INTRODUCE2 cells but instead
  1332. cycle it when a random number of introductions is reached, thus
  1333. making it more difficult for an attacker to find out the amount of
  1334. clients that have used the introduction point for a specific HS.
  1335. Closes ticket 15745.
  1336. o Minor features (logging):
  1337. - Include the Tor version in all LD_BUG log messages, since people
  1338. tend to cut and paste those into the bugtracker. Implements
  1339. ticket 15026.
  1340. o Minor features (pluggable transports):
  1341. - When launching managed pluggable transports on Linux systems,
  1342. attempt to have the kernel deliver a SIGTERM on tor exit if the
  1343. pluggable transport process is still running. Resolves
  1344. ticket 15471.
  1345. - When launching managed pluggable transports, setup a valid open
  1346. stdin in the child process that can be used to detect if tor has
  1347. terminated. The "TOR_PT_EXIT_ON_STDIN_CLOSE" environment variable
  1348. can be used by implementations to detect this new behavior.
  1349. Resolves ticket 15435.
  1350. o Minor features (testing):
  1351. - Add a test to verify that the compiler does not eliminate our
  1352. memwipe() implementation. Closes ticket 15377.
  1353. - Add make rule `check-changes` to verify the format of changes
  1354. files. Closes ticket 15180.
  1355. - Add unit tests for control_event_is_interesting(). Add a compile-
  1356. time check that the number of events doesn't exceed the capacity
  1357. of control_event_t.event_mask. Closes ticket 15431, checks for
  1358. bugs similar to 13085. Patch by "teor".
  1359. - Command-line argument tests moved to Stem. Resolves ticket 14806.
  1360. - Integrate the ntor, backtrace, and zero-length keys tests into the
  1361. automake test suite. Closes ticket 15344.
  1362. - Remove assertions during builds to determine Tor's test coverage.
  1363. We don't want to trigger these even in assertions, so including
  1364. them artificially makes our branch coverage look worse than it is.
  1365. This patch provides the new test-stem-full and coverage-html-full
  1366. configure options. Implements ticket 15400.
  1367. o Minor bugfixes (build):
  1368. - Improve out-of-tree builds by making non-standard rules work and
  1369. clean up additional files and directories. Fixes bug 15053; bugfix
  1370. on 0.2.7.0-alpha.
  1371. o Minor bugfixes (command-line interface):
  1372. - When "--quiet" is provided along with "--validate-config", do not
  1373. write anything to stdout on success. Fixes bug 14994; bugfix
  1374. on 0.2.3.3-alpha.
  1375. - When complaining about bad arguments to "--dump-config", use
  1376. stderr, not stdout.
  1377. o Minor bugfixes (configuration, unit tests):
  1378. - Only add the default fallback directories when the DirAuthorities,
  1379. AlternateDirAuthority, and FallbackDir directory config options
  1380. are set to their defaults. The default fallback directory list is
  1381. currently empty, this fix will only change tor's behavior when it
  1382. has default fallback directories. Includes unit tests for
  1383. consider_adding_dir_servers(). Fixes bug 15642; bugfix on
  1384. 90f6071d8dc0 in 0.2.4.7-alpha. Patch by "teor".
  1385. o Minor bugfixes (correctness):
  1386. - For correctness, avoid modifying a constant string in
  1387. handle_control_postdescriptor. Fixes bug 15546; bugfix
  1388. on 0.1.1.16-rc.
  1389. - Remove side-effects from tor_assert() calls. This was harmless,
  1390. because we never disable assertions, but it is bad style and
  1391. unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36,
  1392. and 0.2.0.10.
  1393. o Minor bugfixes (hidden service):
  1394. - Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on
  1395. a client authorized hidden service. Fixes bug 15823; bugfix
  1396. on 0.2.1.6-alpha.
  1397. - Remove an extraneous newline character from the end of hidden
  1398. service descriptors. Fixes bug 15296; bugfix on 0.2.0.10-alpha.
  1399. o Minor bugfixes (interface):
  1400. - Print usage information for --dump-config when it is used without
  1401. an argument. Also, fix the error message to use different wording
  1402. and add newline at the end. Fixes bug 15541; bugfix
  1403. on 0.2.5.1-alpha.
  1404. o Minor bugfixes (logs):
  1405. - When building Tor under Clang, do not include an extra set of
  1406. parentheses in log messages that include function names. Fixes bug
  1407. 15269; bugfix on every released version of Tor when compiled with
  1408. recent enough Clang.
  1409. o Minor bugfixes (network):
  1410. - When attempting to use fallback technique for network interface
  1411. lookup, disregard loopback and multicast addresses since they are
  1412. unsuitable for public communications.
  1413. o Minor bugfixes (statistics):
  1414. - Disregard the ConnDirectionStatistics torrc options when Tor is
  1415. not a relay since in that mode of operation no sensible data is
  1416. being collected and because Tor might run into measurement hiccups
  1417. when running as a client for some time, then becoming a relay.
  1418. Fixes bug 15604; bugfix on 0.2.2.35.
  1419. o Minor bugfixes (test networks):
  1420. - When self-testing reachability, use ExtendAllowPrivateAddresses to
  1421. determine if local/private addresses imply reachability. The
  1422. previous fix used TestingTorNetwork, which implies
  1423. ExtendAllowPrivateAddresses, but this excluded rare configurations
  1424. where ExtendAllowPrivateAddresses is set but TestingTorNetwork is
  1425. not. Fixes bug 15771; bugfix on 0.2.6.1-alpha. Patch by "teor",
  1426. issue discovered by CJ Ess.
  1427. o Minor bugfixes (testing):
  1428. - Check for matching value in server response in ntor_ref.py. Fixes
  1429. bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
  1430. by "joelanders".
  1431. - Set the severity correctly when testing
  1432. get_interface_addresses_ifaddrs() and
  1433. get_interface_addresses_win32(), so that the tests fail gracefully
  1434. instead of triggering an assertion. Fixes bug 15759; bugfix on
  1435. 0.2.6.3-alpha. Reported by Nicolas Derive.
  1436. o Code simplification and refactoring:
  1437. - Move the hacky fallback code out of get_interface_address6() into
  1438. separate function and get it covered with unit-tests. Resolves
  1439. ticket 14710.
  1440. - Refactor hidden service client-side cache lookup to intelligently
  1441. report its various failure cases, and disentangle failure cases
  1442. involving a lack of introduction points. Closes ticket 14391.
  1443. - Use our own Base64 encoder instead of OpenSSL's, to allow more
  1444. control over the output. Part of ticket 15652.
  1445. o Documentation:
  1446. - Improve the descriptions of statistics-related torrc options in
  1447. the manpage to describe rationale and possible uses cases. Fixes
  1448. issue 15550.
  1449. - Improve the layout and formatting of ./configure --help messages.
  1450. Closes ticket 15024. Patch from "cypherpunks".
  1451. - Standardize on the term "server descriptor" in the manual page.
  1452. Previously, we had used "router descriptor", "server descriptor",
  1453. and "relay descriptor" interchangeably. Part of ticket 14987.
  1454. o Removed code:
  1455. - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code
  1456. and always use the internal Base64 decoder. The internal decoder
  1457. has been part of tor since 0.2.0.10-alpha, and no one should
  1458. be using the OpenSSL one. Part of ticket 15652.
  1459. - Remove the 'tor_strclear()' function; use memwipe() instead.
  1460. Closes ticket 14922.
  1461. o Removed features:
  1462. - Remove the (seldom-used) DynamicDHGroups feature. For anti-
  1463. fingerprinting we now recommend pluggable transports; for forward-
  1464. secrecy in TLS, we now use the P-256 group. Closes ticket 13736.
  1465. - Remove the undocumented "--digests" command-line option. It
  1466. complicated our build process, caused subtle build issues on
  1467. multiple platforms, and is now redundant since we started
  1468. including git version identifiers. Closes ticket 14742.
  1469. - Tor no longer contains checks for ancient directory cache versions
  1470. that didn't know about microdescriptors.
  1471. - Tor no longer contains workarounds for stat files generated by
  1472. super-old versions of Tor that didn't choose guards sensibly.
  1473. Changes in version 0.2.4.27 - 2015-04-06
  1474. Tor 0.2.4.27 backports two fixes from 0.2.6.7 for security issues that
  1475. could be used by an attacker to crash hidden services, or crash clients
  1476. visiting hidden services. Hidden services should upgrade as soon as
  1477. possible; clients should upgrade whenever packages become available.
  1478. This release also backports a simple improvement to make hidden
  1479. services a bit less vulnerable to denial-of-service attacks.
  1480. o Major bugfixes (security, hidden service):
  1481. - Fix an issue that would allow a malicious client to trigger an
  1482. assertion failure and halt a hidden service. Fixes bug 15600;
  1483. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1484. - Fix a bug that could cause a client to crash with an assertion
  1485. failure when parsing a malformed hidden service descriptor. Fixes
  1486. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1487. o Minor features (DoS-resistance, hidden service):
  1488. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1489. arrive on the same circuit. This should make it more expensive for
  1490. attackers to overwhelm hidden services with introductions.
  1491. Resolves ticket 15515.
  1492. Changes in version 0.2.5.12 - 2015-04-06
  1493. Tor 0.2.5.12 backports two fixes from 0.2.6.7 for security issues that
  1494. could be used by an attacker to crash hidden services, or crash clients
  1495. visiting hidden services. Hidden services should upgrade as soon as
  1496. possible; clients should upgrade whenever packages become available.
  1497. This release also backports a simple improvement to make hidden
  1498. services a bit less vulnerable to denial-of-service attacks.
  1499. o Major bugfixes (security, hidden service):
  1500. - Fix an issue that would allow a malicious client to trigger an
  1501. assertion failure and halt a hidden service. Fixes bug 15600;
  1502. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1503. - Fix a bug that could cause a client to crash with an assertion
  1504. failure when parsing a malformed hidden service descriptor. Fixes
  1505. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1506. o Minor features (DoS-resistance, hidden service):
  1507. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1508. arrive on the same circuit. This should make it more expensive for
  1509. attackers to overwhelm hidden services with introductions.
  1510. Resolves ticket 15515.
  1511. Changes in version 0.2.6.7 - 2015-04-06
  1512. Tor 0.2.6.7 fixes two security issues that could be used by an
  1513. attacker to crash hidden services, or crash clients visiting hidden
  1514. services. Hidden services should upgrade as soon as possible; clients
  1515. should upgrade whenever packages become available.
  1516. This release also contains two simple improvements to make hidden
  1517. services a bit less vulnerable to denial-of-service attacks.
  1518. o Major bugfixes (security, hidden service):
  1519. - Fix an issue that would allow a malicious client to trigger an
  1520. assertion failure and halt a hidden service. Fixes bug 15600;
  1521. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1522. - Fix a bug that could cause a client to crash with an assertion
  1523. failure when parsing a malformed hidden service descriptor. Fixes
  1524. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1525. o Minor features (DoS-resistance, hidden service):
  1526. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1527. arrive on the same circuit. This should make it more expensive for
  1528. attackers to overwhelm hidden services with introductions.
  1529. Resolves ticket 15515.
  1530. - Decrease the amount of reattempts that a hidden service performs
  1531. when its rendezvous circuits fail. This reduces the computational
  1532. cost for running a hidden service under heavy load. Resolves
  1533. ticket 11447.
  1534. Changes in version 0.2.6.6 - 2015-03-24
  1535. Tor 0.2.6.6 is the first stable release in the 0.2.6 series.
  1536. It adds numerous safety, security, correctness, and performance
  1537. improvements. Client programs can be configured to use more kinds of
  1538. sockets, AutomapHosts works better, the multithreading backend is
  1539. improved, cell transmission is refactored, test coverage is much
  1540. higher, more denial-of-service attacks are handled, guard selection is
  1541. improved to handle long-term guards better, pluggable transports
  1542. should work a bit better, and some annoying hidden service performance
  1543. bugs should be addressed.
  1544. o Minor bugfixes (portability):
  1545. - Use the correct datatype in the SipHash-2-4 function to prevent
  1546. compilers from assuming any sort of alignment. Fixes bug 15436;
  1547. bugfix on 0.2.5.3-alpha.
  1548. Changes in version 0.2.6.5-rc - 2015-03-18
  1549. Tor 0.2.6.5-rc is the second and (hopefully) last release candidate in
  1550. the 0.2.6. It fixes a small number of bugs found in 0.2.6.4-rc.
  1551. o Major bugfixes (client):
  1552. - Avoid crashing when making certain configuration option changes on
  1553. clients. Fixes bug 15245; bugfix on 0.2.6.3-alpha. Reported
  1554. by "anonym".
  1555. o Major bugfixes (pluggable transports):
  1556. - Initialize the extended OR Port authentication cookie before
  1557. launching pluggable transports. This prevents a race condition
  1558. that occured when server-side pluggable transports would cache the
  1559. authentication cookie before it has been (re)generated. Fixes bug
  1560. 15240; bugfix on 0.2.5.1-alpha.
  1561. o Major bugfixes (portability):
  1562. - Do not crash on startup when running on Solaris. Fixes a bug
  1563. related to our fix for 9495; bugfix on 0.2.6.1-alpha. Reported
  1564. by "ruebezahl".
  1565. o Minor features (heartbeat):
  1566. - On relays, report how many connections we negotiated using each
  1567. version of the Tor link protocols. This information will let us
  1568. know if removing support for very old versions of the Tor
  1569. protocols is harming the network. Closes ticket 15212.
  1570. o Code simplification and refactoring:
  1571. - Refactor main loop to extract the 'loop' part. This makes it
  1572. easier to run Tor under Shadow. Closes ticket 15176.
  1573. Changes in version 0.2.5.11 - 2015-03-17
  1574. Tor 0.2.5.11 is the second stable release in the 0.2.5 series.
  1575. It backports several bugfixes from the 0.2.6 branch, including a
  1576. couple of medium-level security fixes for relays and exit nodes.
  1577. It also updates the list of directory authorities.
  1578. o Directory authority changes:
  1579. - Remove turtles as a directory authority.
  1580. - Add longclaw as a new (v3) directory authority. This implements
  1581. ticket 13296. This keeps the directory authority count at 9.
  1582. - The directory authority Faravahar has a new IP address. This
  1583. closes ticket 14487.
  1584. o Major bugfixes (crash, OSX, security):
  1585. - Fix a remote denial-of-service opportunity caused by a bug in
  1586. OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
  1587. in OSX 10.9.
  1588. o Major bugfixes (relay, stability, possible security):
  1589. - Fix a bug that could lead to a relay crashing with an assertion
  1590. failure if a buffer of exactly the wrong layout was passed to
  1591. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1592. 0.2.0.10-alpha. Patch from 'cypherpunks'.
  1593. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1594. very end of the buffer; log a BUG message instead. Only assert if
  1595. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1596. o Major bugfixes (exit node stability):
  1597. - Fix an assertion failure that could occur under high DNS load.
  1598. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1599. diagnosed and fixed by "cypherpunks".
  1600. o Major bugfixes (Linux seccomp2 sandbox):
  1601. - Upon receiving sighup with the seccomp2 sandbox enabled, do not
  1602. crash during attempts to call wait4. Fixes bug 15088; bugfix on
  1603. 0.2.5.1-alpha. Patch from "sanic".
  1604. o Minor features (controller):
  1605. - New "GETINFO bw-event-cache" to get information about recent
  1606. bandwidth events. Closes ticket 14128. Useful for controllers to
  1607. get recent bandwidth history after the fix for ticket 13988.
  1608. o Minor features (geoip):
  1609. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1610. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1611. Country database.
  1612. o Minor bugfixes (client, automapping):
  1613. - Avoid crashing on torrc lines for VirtualAddrNetworkIPv[4|6] when
  1614. no value follows the option. Fixes bug 14142; bugfix on
  1615. 0.2.4.7-alpha. Patch by "teor".
  1616. - Fix a memory leak when using AutomapHostsOnResolve. Fixes bug
  1617. 14195; bugfix on 0.1.0.1-rc.
  1618. o Minor bugfixes (compilation):
  1619. - Build without warnings with the stock OpenSSL srtp.h header, which
  1620. has a duplicate declaration of SSL_get_selected_srtp_profile().
  1621. Fixes bug 14220; this is OpenSSL's bug, not ours.
  1622. o Minor bugfixes (directory authority):
  1623. - Allow directory authorities to fetch more data from one another if
  1624. they find themselves missing lots of votes. Previously, they had
  1625. been bumping against the 10 MB queued data limit. Fixes bug 14261;
  1626. bugfix on 0.1.2.5-alpha.
  1627. - Enlarge the buffer to read bwauth generated files to avoid an
  1628. issue when parsing the file in dirserv_read_measured_bandwidths().
  1629. Fixes bug 14125; bugfix on 0.2.2.1-alpha.
  1630. o Minor bugfixes (statistics):
  1631. - Increase period over which bandwidth observations are aggregated
  1632. from 15 minutes to 4 hours. Fixes bug 13988; bugfix on 0.0.8pre1.
  1633. o Minor bugfixes (preventative security, C safety):
  1634. - When reading a hexadecimal, base-32, or base-64 encoded value from
  1635. a string, always overwrite the whole output buffer. This prevents
  1636. some bugs where we would look at (but fortunately, not reveal)
  1637. uninitialized memory on the stack. Fixes bug 14013; bugfix on all
  1638. versions of Tor.
  1639. Changes in version 0.2.4.26 - 2015-03-17
  1640. Tor 0.2.4.26 includes an updated list of directory authorities. It
  1641. also backports a couple of stability and security bugfixes from 0.2.5
  1642. and beyond.
  1643. o Directory authority changes:
  1644. - Remove turtles as a directory authority.
  1645. - Add longclaw as a new (v3) directory authority. This implements
  1646. ticket 13296. This keeps the directory authority count at 9.
  1647. - The directory authority Faravahar has a new IP address. This
  1648. closes ticket 14487.
  1649. o Major bugfixes (exit node stability, also in 0.2.6.3-alpha):
  1650. - Fix an assertion failure that could occur under high DNS load.
  1651. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1652. diagnosed and fixed by "cypherpunks".
  1653. o Major bugfixes (relay, stability, possible security, also in 0.2.6.4-rc):
  1654. - Fix a bug that could lead to a relay crashing with an assertion
  1655. failure if a buffer of exactly the wrong layout was passed to
  1656. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1657. 0.2.0.10-alpha. Patch from 'cypherpunks'.
  1658. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1659. very end of the buffer; log a BUG message instead. Only assert if
  1660. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1661. o Minor features (geoip):
  1662. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1663. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1664. Country database.
  1665. Changes in version 0.2.6.4-rc - 2015-03-09
  1666. Tor 0.2.6.4-alpha fixes an issue in the directory code that an
  1667. attacker might be able to use in order to crash certain Tor
  1668. directories. It also resolves some minor issues left over from, or
  1669. introduced in, Tor 0.2.6.3-alpha or earlier.
  1670. o Major bugfixes (crash, OSX, security):
  1671. - Fix a remote denial-of-service opportunity caused by a bug in
  1672. OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
  1673. in OSX 10.9.
  1674. o Major bugfixes (relay, stability, possible security):
  1675. - Fix a bug that could lead to a relay crashing with an assertion
  1676. failure if a buffer of exactly the wrong layout is passed to
  1677. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1678. 0.2.0.10-alpha. Patch from "cypherpunks".
  1679. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1680. very end of the buffer; log a BUG message instead. Only assert if
  1681. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1682. o Major bugfixes (FreeBSD IPFW transparent proxy):
  1683. - Fix address detection with FreeBSD transparent proxies, when
  1684. "TransProxyType ipfw" is in use. Fixes bug 15064; bugfix
  1685. on 0.2.5.4-alpha.
  1686. o Major bugfixes (Linux seccomp2 sandbox):
  1687. - Pass IPPROTO_TCP rather than 0 to socket(), so that the Linux
  1688. seccomp2 sandbox doesn't fail. Fixes bug 14989; bugfix
  1689. on 0.2.6.3-alpha.
  1690. - Allow AF_UNIX hidden services to be used with the seccomp2
  1691. sandbox. Fixes bug 15003; bugfix on 0.2.6.3-alpha.
  1692. - Upon receiving sighup with the seccomp2 sandbox enabled, do not
  1693. crash during attempts to call wait4. Fixes bug 15088; bugfix on
  1694. 0.2.5.1-alpha. Patch from "sanic".
  1695. o Minor features (controller):
  1696. - Messages about problems in the bootstrap process now include
  1697. information about the server we were trying to connect to when we
  1698. noticed the problem. Closes ticket 15006.
  1699. o Minor features (geoip):
  1700. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1701. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1702. Country database.
  1703. o Minor features (logs):
  1704. - Quiet some log messages in the heartbeat and at startup. Closes
  1705. ticket 14950.
  1706. o Minor bugfixes (certificate handling):
  1707. - If an authority operator accidentally makes a signing certificate
  1708. with a future publication time, do not discard its real signing
  1709. certificates. Fixes bug 11457; bugfix on 0.2.0.3-alpha.
  1710. - Remove any old authority certificates that have been superseded
  1711. for at least two days. Previously, we would keep superseded
  1712. certificates until they expired, if they were published close in
  1713. time to the certificate that superseded them. Fixes bug 11454;
  1714. bugfix on 0.2.1.8-alpha.
  1715. o Minor bugfixes (compilation):
  1716. - Fix a compilation warning on s390. Fixes bug 14988; bugfix
  1717. on 0.2.5.2-alpha.
  1718. - Fix a compilation warning on FreeBSD. Fixes bug 15151; bugfix
  1719. on 0.2.6.2-alpha.
  1720. o Minor bugfixes (testing):
  1721. - Fix endianness issues in unit test for resolve_my_address() to
  1722. have it pass on big endian systems. Fixes bug 14980; bugfix on
  1723. Tor 0.2.6.3-alpha.
  1724. - Avoid a side-effect in a tor_assert() in the unit tests. Fixes bug
  1725. 15188; bugfix on 0.1.2.3-alpha. Patch from Tom van der Woerdt.
  1726. - When running the new 'make test-stem' target, use the configured
  1727. python binary. Fixes bug 15037; bugfix on 0.2.6.3-alpha. Patch
  1728. from "cypherpunks".
  1729. - When running the zero-length-keys tests, do not use the default
  1730. torrc file. Fixes bug 15033; bugfix on 0.2.6.3-alpha. Reported
  1731. by "reezer".
  1732. o Directory authority IP change:
  1733. - The directory authority Faravahar has a new IP address. This
  1734. closes ticket 14487.
  1735. o Removed code:
  1736. - Remove some lingering dead code that once supported mempools.
  1737. Mempools were disabled by default in 0.2.5, and removed entirely
  1738. in 0.2.6.3-alpha. Closes more of ticket 14848; patch
  1739. by "cypherpunks".
  1740. Changes in version 0.2.6.3-alpha - 2015-02-19
  1741. Tor 0.2.6.3-alpha is the third (and hopefully final) alpha release in
  1742. the 0.2.6.x series. It introduces support for more kinds of sockets,
  1743. makes it harder to accidentally run an exit, improves our
  1744. multithreading backend, incorporates several fixes for the
  1745. AutomapHostsOnResolve option, and fixes numerous other bugs besides.
  1746. If no major regressions or security holes are found in this version,
  1747. the next version will be a release candidate.
  1748. o Deprecated versions:
  1749. - Tor relays older than 0.2.4.18-rc are no longer allowed to
  1750. advertise themselves on the network. Closes ticket 13555.
  1751. o Major features (security, unix domain sockets):
  1752. - Allow SocksPort to be an AF_UNIX Unix Domain Socket. Now high risk
  1753. applications can reach Tor without having to create AF_INET or
  1754. AF_INET6 sockets, meaning they can completely disable their
  1755. ability to make non-Tor network connections. To create a socket of
  1756. this type, use "SocksPort unix:/path/to/socket". Implements
  1757. ticket 12585.
  1758. - Support mapping hidden service virtual ports to AF_UNIX sockets.
  1759. The syntax is "HiddenServicePort 80 unix:/path/to/socket".
  1760. Implements ticket 11485.
  1761. o Major features (changed defaults):
  1762. - Prevent relay operators from unintentionally running exits: When a
  1763. relay is configured as an exit node, we now warn the user unless
  1764. the "ExitRelay" option is set to 1. We warn even more loudly if
  1765. the relay is configured with the default exit policy, since this
  1766. can indicate accidental misconfiguration. Setting "ExitRelay 0"
  1767. stops Tor from running as an exit relay. Closes ticket 10067.
  1768. o Major features (directory system):
  1769. - When downloading server- or microdescriptors from a directory
  1770. server, we no longer launch multiple simultaneous requests to the
  1771. same server. This reduces load on the directory servers,
  1772. especially when directory guards are in use. Closes ticket 9969.
  1773. - When downloading server- or microdescriptors over a tunneled
  1774. connection, do not limit the length of our requests to what the
  1775. Squid proxy is willing to handle. Part of ticket 9969.
  1776. - Authorities can now vote on the correct digests and latest
  1777. versions for different software packages. This allows packages
  1778. that include Tor to use the Tor authority system as a way to get
  1779. notified of updates and their correct digests. Implements proposal
  1780. 227. Closes ticket 10395.
  1781. o Major features (guards):
  1782. - Introduce the Guardfraction feature to improves load balancing on
  1783. guard nodes. Specifically, it aims to reduce the traffic gap that
  1784. guard nodes experience when they first get the Guard flag. This is
  1785. a required step if we want to increase the guard lifetime to 9
  1786. months or greater. Closes ticket 9321.
  1787. o Major features (performance):
  1788. - Make the CPU worker implementation more efficient by avoiding the
  1789. kernel and lengthening pipelines. The original implementation used
  1790. sockets to transfer data from the main thread to the workers, and
  1791. didn't allow any thread to be assigned more than a single piece of
  1792. work at once. The new implementation avoids communications
  1793. overhead by making requests in shared memory, avoiding kernel IO
  1794. where possible, and keeping more requests in flight at once.
  1795. Implements ticket 9682.
  1796. o Major features (relay):
  1797. - Raise the minimum acceptable configured bandwidth rate for bridges
  1798. to 50 KiB/sec and for relays to 75 KiB/sec. (The old values were
  1799. 20 KiB/sec.) Closes ticket 13822.
  1800. o Major bugfixes (exit node stability):
  1801. - Fix an assertion failure that could occur under high DNS load.
  1802. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1803. diagnosed and fixed by "cypherpunks".
  1804. o Major bugfixes (mixed relay-client operation):
  1805. - When running as a relay and client at the same time (not
  1806. recommended), if we decide not to use a new guard because we want
  1807. to retry older guards, only close the locally-originating circuits
  1808. passing through that guard. Previously we would close all the
  1809. circuits through that guard. Fixes bug 9819; bugfix on
  1810. 0.2.1.1-alpha. Reported by "skruffy".
  1811. o Minor features (build):
  1812. - New --disable-system-torrc compile-time option to prevent Tor from
  1813. looking for the system-wide torrc or torrc-defaults files.
  1814. Resolves ticket 13037.
  1815. o Minor features (controller):
  1816. - Include SOCKS_USERNAME and SOCKS_PASSWORD values in controller
  1817. events so controllers can observe circuit isolation inputs. Closes
  1818. ticket 8405.
  1819. - ControlPort now supports the unix:/path/to/socket syntax as an
  1820. alternative to the ControlSocket option, for consistency with
  1821. SocksPort and HiddenServicePort. Closes ticket 14451.
  1822. - New "GETINFO bw-event-cache" to get information about recent
  1823. bandwidth events. Closes ticket 14128. Useful for controllers to
  1824. get recent bandwidth history after the fix for ticket 13988.
  1825. o Minor features (Denial of service resistance):
  1826. - Count the total number of bytes used storing hidden service
  1827. descriptors against the value of MaxMemInQueues. If we're low on
  1828. memory, and more than 20% of our memory is used holding hidden
  1829. service descriptors, free them until no more than 10% of our
  1830. memory holds hidden service descriptors. Free the least recently
  1831. fetched descriptors first. Resolves ticket 13806.
  1832. - When we have recently been under memory pressure (over 3/4 of
  1833. MaxMemInQueues is allocated), then allocate smaller zlib objects
  1834. for small requests. Closes ticket 11791.
  1835. o Minor features (geoip):
  1836. - Update geoip and geoip6 files to the January 7 2015 Maxmind
  1837. GeoLite2 Country database.
  1838. o Minor features (guard nodes):
  1839. - Reduce the time delay before saving guard status to disk from 10
  1840. minutes to 30 seconds (or from one hour to 10 minutes if
  1841. AvoidDiskWrites is set). Closes ticket 12485.
  1842. o Minor features (hidden service):
  1843. - Make Sybil attacks against hidden services harder by changing the
  1844. minimum time required to get the HSDir flag from 25 hours up to 96
  1845. hours. Addresses ticket 14149.
  1846. - New option "HiddenServiceAllowUnknownPorts" to allow hidden
  1847. services to disable the anti-scanning feature introduced in
  1848. 0.2.6.2-alpha. With this option not set, a connection to an
  1849. unlisted port closes the circuit. With this option set, only a
  1850. RELAY_DONE cell is sent. Closes ticket 14084.
  1851. o Minor features (interface):
  1852. - Implement "-f -" command-line option to read torrc configuration
  1853. from standard input, if you don't want to store the torrc file in
  1854. the file system. Implements feature 13865.
  1855. o Minor features (logging):
  1856. - Add a count of unique clients to the bridge heartbeat message.
  1857. Resolves ticket 6852.
  1858. - Suppress "router info incompatible with extra info" message when
  1859. reading extrainfo documents from cache. (This message got loud
  1860. around when we closed bug 9812 in 0.2.6.2-alpha.) Closes
  1861. ticket 13762.
  1862. - Elevate hidden service authorized-client message from DEBUG to
  1863. INFO. Closes ticket 14015.
  1864. o Minor features (stability):
  1865. - Add assertions in our hash-table iteration code to check for
  1866. corrupted values that could cause infinite loops. Closes
  1867. ticket 11737.
  1868. o Minor features (systemd):
  1869. - Various improvements and modernizations in systemd hardening
  1870. support. Closes ticket 13805. Patch from Craig Andrews.
  1871. o Minor features (testing networks):
  1872. - Drop the minimum RendPostPeriod on a testing network to 5 seconds,
  1873. and the default on a testing network to 2 minutes. Drop the
  1874. MIN_REND_INITIAL_POST_DELAY on a testing network to 5 seconds, but
  1875. keep the default on a testing network at 30 seconds. This reduces
  1876. HS bootstrap time to around 25 seconds. Also, change the default
  1877. time in test-network.sh to match. Closes ticket 13401. Patch
  1878. by "teor".
  1879. - Create TestingDirAuthVoteHSDir to correspond to
  1880. TestingDirAuthVoteExit/Guard. Ensures that authorities vote the
  1881. HSDir flag for the listed relays regardless of uptime or ORPort
  1882. connectivity. Respects the value of VoteOnHidServDirectoriesV2.
  1883. Partial implementation for ticket 14067. Patch by "teor".
  1884. o Minor features (tor2web mode):
  1885. - Introduce the config option Tor2webRendezvousPoints, which allows
  1886. clients in Tor2webMode to select a specific Rendezvous Point to be
  1887. used in HS circuits. This might allow better performance for
  1888. Tor2Web nodes. Implements ticket 12844.
  1889. o Minor bugfixes (client DNS):
  1890. - Report the correct cached DNS expiration times on SOCKS port or in
  1891. DNS replies. Previously, we would report everything as "never
  1892. expires." Fixes bug 14193; bugfix on 0.2.3.17-beta.
  1893. - Avoid a small memory leak when we find a cached answer for a
  1894. reverse DNS lookup in a client-side DNS cache. (Remember, client-
  1895. side DNS caching is off by default, and is not recommended.) Fixes
  1896. bug 14259; bugfix on 0.2.0.1-alpha.
  1897. o Minor bugfixes (client, automapping):
  1898. - Avoid crashing on torrc lines for VirtualAddrNetworkIPv[4|6] when
  1899. no value follows the option. Fixes bug 14142; bugfix on
  1900. 0.2.4.7-alpha. Patch by "teor".
  1901. - Fix a memory leak when using AutomapHostsOnResolve. Fixes bug
  1902. 14195; bugfix on 0.1.0.1-rc.
  1903. - Prevent changes to other options from removing the wildcard value
  1904. "." from "AutomapHostsSuffixes". Fixes bug 12509; bugfix
  1905. on 0.2.0.1-alpha.
  1906. - Allow MapAddress and AutomapHostsOnResolve to work together when
  1907. an address is mapped into another address type (like .onion) that
  1908. must be automapped at resolve time. Fixes bug 7555; bugfix
  1909. on 0.2.0.1-alpha.
  1910. o Minor bugfixes (client, bridges):
  1911. - When we are using bridges and we had a network connectivity
  1912. problem, only retry connecting to our currently configured
  1913. bridges, not all bridges we know about and remember using. Fixes
  1914. bug 14216; bugfix on 0.2.2.17-alpha.
  1915. o Minor bugfixes (client, IPv6):
  1916. - Reject socks requests to literal IPv6 addresses when IPv6Traffic
  1917. flag is not set; and not because the NoIPv4Traffic flag was set.
  1918. Previously we'd looked at the NoIPv4Traffic flag for both types of
  1919. literal addresses. Fixes bug 14280; bugfix on 0.2.4.7-alpha.
  1920. o Minor bugfixes (compilation):
  1921. - The address of an array in the middle of a structure will always
  1922. be non-NULL. clang recognises this and complains. Disable the
  1923. tautologous and redundant check to silence this warning. Fixes bug
  1924. 14001; bugfix on 0.2.1.2-alpha.
  1925. - Avoid warnings when building with systemd 209 or later. Fixes bug
  1926. 14072; bugfix on 0.2.6.2-alpha. Patch from "h.venev".
  1927. - Compile correctly with (unreleased) OpenSSL 1.1.0 headers.
  1928. Addresses ticket 14188.
  1929. - Build without warnings with the stock OpenSSL srtp.h header, which
  1930. has a duplicate declaration of SSL_get_selected_srtp_profile().
  1931. Fixes bug 14220; this is OpenSSL's bug, not ours.
  1932. - Do not compile any code related to Tor2Web mode when Tor2Web mode
  1933. is not enabled at compile time. Previously, this code was included
  1934. in a disabled state. See discussion on ticket 12844.
  1935. - Remove the --disable-threads configure option again. It was
  1936. accidentally partially reintroduced in 29ac883606d6d. Fixes bug
  1937. 14819; bugfix on 0.2.6.2-alpha.
  1938. o Minor bugfixes (controller):
  1939. - Report "down" in response to the "GETINFO entry-guards" command
  1940. when relays are down with an unreachable_since value. Previously,
  1941. we would report "up". Fixes bug 14184; bugfix on 0.1.2.2-alpha.
  1942. - Avoid crashing on a malformed EXTENDCIRCUIT command. Fixes bug
  1943. 14116; bugfix on 0.2.2.9-alpha.
  1944. - Add a code for the END_CIRC_REASON_IP_NOW_REDUNDANT circuit close
  1945. reason. Fixes bug 14207; bugfix on 0.2.6.2-alpha.
  1946. o Minor bugfixes (directory authority):
  1947. - Allow directory authorities to fetch more data from one another if
  1948. they find themselves missing lots of votes. Previously, they had
  1949. been bumping against the 10 MB queued data limit. Fixes bug 14261;
  1950. bugfix on 0.1.2.5-alpha.
  1951. - Do not attempt to download extrainfo documents which we will be
  1952. unable to validate with a matching server descriptor. Fixes bug
  1953. 13762; bugfix on 0.2.0.1-alpha.
  1954. - Fix a bug that was truncating AUTHDIR_NEWDESC events sent to the
  1955. control port. Fixes bug 14953; bugfix on 0.2.0.1-alpha.
  1956. - Enlarge the buffer to read bwauth generated files to avoid an
  1957. issue when parsing the file in dirserv_read_measured_bandwidths().
  1958. Fixes bug 14125; bugfix on 0.2.2.1-alpha.
  1959. o Minor bugfixes (file handling):
  1960. - Stop failing when key files are zero-length. Instead, generate new
  1961. keys, and overwrite the empty key files. Fixes bug 13111; bugfix
  1962. on all versions of Tor. Patch by "teor".
  1963. - Stop generating a fresh .old RSA onion key file when the .old file
  1964. is missing. Fixes part of 13111; bugfix on 0.0.6rc1.
  1965. - Avoid overwriting .old key files with empty key files.
  1966. - Skip loading zero-length extrainfo store, router store, stats,
  1967. state, and key files.
  1968. - Avoid crashing when trying to reload a torrc specified as a
  1969. relative path with RunAsDaemon turned on. Fixes bug 13397; bugfix
  1970. on 0.2.3.11-alpha.
  1971. o Minor bugfixes (hidden services):
  1972. - Close the introduction circuit when we have no more usable intro
  1973. points, instead of waiting for it to time out. This also ensures
  1974. that no follow-up HS descriptor fetch is triggered when the
  1975. circuit eventually times out. Fixes bug 14224; bugfix on 0.0.6.
  1976. - When fetching a hidden service descriptor for a down service that
  1977. was recently up, do not keep refetching until we try the same
  1978. replica twice in a row. Fixes bug 14219; bugfix on 0.2.0.10-alpha.
  1979. - Successfully launch Tor with a nonexistent hidden service
  1980. directory. Our fix for bug 13942 didn't catch this case. Fixes bug
  1981. 14106; bugfix on 0.2.6.2-alpha.
  1982. o Minor bugfixes (logging):
  1983. - Avoid crashing when there are more log domains than entries in
  1984. domain_list. Bugfix on 0.2.3.1-alpha.
  1985. - Add a string representation for LD_SCHED. Fixes bug 14740; bugfix
  1986. on 0.2.6.1-alpha.
  1987. - Don't log messages to stdout twice when starting up. Fixes bug
  1988. 13993; bugfix on 0.2.6.1-alpha.
  1989. o Minor bugfixes (parsing):
  1990. - Stop accepting milliseconds (or other junk) at the end of
  1991. descriptor publication times. Fixes bug 9286; bugfix on 0.0.2pre25.
  1992. - Support two-number and three-number version numbers correctly, in
  1993. case we change the Tor versioning system in the future. Fixes bug
  1994. 13661; bugfix on 0.0.8pre1.
  1995. o Minor bugfixes (path counting):
  1996. - When deciding whether the consensus lists any exit nodes, count
  1997. the number listed in the consensus, not the number we have
  1998. descriptors for. Fixes part of bug 14918; bugfix on 0.2.6.2-alpha.
  1999. - When deciding whether we have any exit nodes, only examine
  2000. ExitNodes when the ExitNodes option is actually set. Fixes part of
  2001. bug 14918; bugfix on 0.2.6.2-alpha.
  2002. - Get rid of redundant and possibly scary warnings that we are
  2003. missing directory information while we bootstrap. Fixes part of
  2004. bug 14918; bugfix on 0.2.6.2-alpha.
  2005. o Minor bugfixes (portability):
  2006. - Fix the ioctl()-based network interface lookup code so that it
  2007. will work on systems that have variable-length struct ifreq, for
  2008. example Mac OS X.
  2009. - Fix scheduler compilation on targets where char is unsigned. Fixes
  2010. bug 14764; bugfix on 0.2.6.2-alpha. Reported by Christian Kujau.
  2011. o Minor bugfixes (sandbox):
  2012. - Allow glibc fatal errors to be sent to stderr before Tor exits.
  2013. Previously, glibc would try to write them to /dev/tty, and the
  2014. sandbox would trap the call and make Tor exit prematurely. Fixes
  2015. bug 14759; bugfix on 0.2.5.1-alpha.
  2016. o Minor bugfixes (shutdown):
  2017. - When shutting down, always call event_del() on lingering read or
  2018. write events before freeing them. Otherwise, we risk double-frees
  2019. or read-after-frees in event_base_free(). Fixes bug 12985; bugfix
  2020. on 0.1.0.2-rc.
  2021. o Minor bugfixes (small memory leaks):
  2022. - Avoid leaking memory when using IPv6 virtual address mappings.
  2023. Fixes bug 14123; bugfix on 0.2.4.7-alpha. Patch by Tom van
  2024. der Woerdt.
  2025. o Minor bugfixes (statistics):
  2026. - Increase period over which bandwidth observations are aggregated
  2027. from 15 minutes to 4 hours. Fixes bug 13988; bugfix on 0.0.8pre1.
  2028. o Minor bugfixes (systemd support):
  2029. - Fix detection and operation of systemd watchdog. Fixes part of bug
  2030. 14141; bugfix on 0.2.6.2-alpha. Patch from Tomasz Torcz.
  2031. - Run correctly under systemd with the RunAsDaemon option set. Fixes
  2032. part of bug 14141; bugfix on 0.2.5.7-rc. Patch from Tomasz Torcz.
  2033. - Inform the systemd supervisor about more changes in the Tor
  2034. process status. Implements part of ticket 14141. Patch from
  2035. Tomasz Torcz.
  2036. - Cause the "--disable-systemd" option to actually disable systemd
  2037. support. Fixes bug 14350; bugfix on 0.2.6.2-alpha. Patch
  2038. from "blueness".
  2039. o Minor bugfixes (TLS):
  2040. - Check more thoroughly throughout the TLS code for possible
  2041. unlogged TLS errors. Possible diagnostic or fix for bug 13319.
  2042. o Minor bugfixes (transparent proxy):
  2043. - Use getsockname, not getsockopt, to retrieve the address for a
  2044. TPROXY-redirected connection. Fixes bug 13796; bugfix
  2045. on 0.2.5.2-alpha.
  2046. o Code simplification and refactoring:
  2047. - Move fields related to isolating and configuring client ports into
  2048. a shared structure. Previously, they were duplicated across
  2049. port_cfg_t, listener_connection_t, and edge_connection_t. Failure
  2050. to copy them correctly had been the cause of at least one bug in
  2051. the past. Closes ticket 8546.
  2052. - Refactor the get_interface_addresses_raw() doom-function into
  2053. multiple smaller and simpler subfunctions. Cover the resulting
  2054. subfunctions with unit-tests. Fixes a significant portion of
  2055. issue 12376.
  2056. - Remove workaround in dirserv_thinks_router_is_hs_dir() that was
  2057. only for version <= 0.2.2.24 which is now deprecated. Closes
  2058. ticket 14202.
  2059. - Remove a test for a long-defunct broken version-one
  2060. directory server.
  2061. o Documentation:
  2062. - Adding section on OpenBSD to our TUNING document. Thanks to mmcc
  2063. for writing the OpenBSD-specific tips. Resolves ticket 13702.
  2064. - Make the tor-resolve documentation match its help string and its
  2065. options. Resolves part of ticket 14325.
  2066. - Log a more useful error message from tor-resolve when failing to
  2067. look up a hidden service address. Resolves part of ticket 14325.
  2068. o Downgraded warnings:
  2069. - Don't warn when we've attempted to contact a relay using the wrong
  2070. ntor onion key. Closes ticket 9635.
  2071. o Removed features:
  2072. - To avoid confusion with the "ExitRelay" option, "ExitNode" is no
  2073. longer silently accepted as an alias for "ExitNodes".
  2074. - The --enable-mempool and --enable-buf-freelists options, which
  2075. were originally created to work around bad malloc implementations,
  2076. no longer exist. They were off-by-default in 0.2.5. Closes
  2077. ticket 14848.
  2078. o Testing:
  2079. - Make the checkdir/perms test complete successfully even if the
  2080. global umask is not 022. Fixes bug 14215; bugfix on 0.2.6.2-alpha.
  2081. - Test that tor does not fail when key files are zero-length. Check
  2082. that tor generates new keys, and overwrites the empty key files.
  2083. - Test that tor generates new keys when keys are missing
  2084. (existing behavior).
  2085. - Test that tor does not overwrite key files that already contain
  2086. data (existing behavior). Tests bug 13111. Patch by "teor".
  2087. - New "make test-stem" target to run stem integration tests.
  2088. Requires that the "STEM_SOURCE_DIR" environment variable be set.
  2089. Closes ticket 14107.
  2090. - Make the test_cmdline_args.py script work correctly on Windows.
  2091. Patch from Gisle Vanem.
  2092. - Move the slower unit tests into a new "./src/test/test-slow"
  2093. binary that can be run independently of the other tests. Closes
  2094. ticket 13243.
  2095. - Avoid undefined behavior when sampling huge values from the
  2096. Laplace distribution. This made unittests fail on Raspberry Pi.
  2097. Bug found by Device. Fixes bug 14090; bugfix on 0.2.6.2-alpha.
  2098. Changes in version 0.2.6.2-alpha - 2014-12-31
  2099. Tor 0.2.6.2-alpha is the second alpha release in the 0.2.6.x series.
  2100. It introduces a major new backend for deciding when to send cells on
  2101. channels, which should lead down the road to big performance
  2102. increases. It contains security and statistics features for better
  2103. work on hidden services, and numerous bugfixes.
  2104. This release contains many new unit tests, along with major
  2105. performance improvements for running testing networks using Chutney.
  2106. Thanks to a series of patches contributed by "teor", testing networks
  2107. should now bootstrap in seconds, rather than minutes.
  2108. o Major features (relay, infrastructure):
  2109. - Complete revision of the code that relays use to decide which cell
  2110. to send next. Formerly, we selected the best circuit to write on
  2111. each channel, but we didn't select among channels in any
  2112. sophisticated way. Now, we choose the best circuits globally from
  2113. among those whose channels are ready to deliver traffic.
  2114. This patch implements a new inter-cmux comparison API, a global
  2115. high/low watermark mechanism and a global scheduler loop for
  2116. transmission prioritization across all channels as well as among
  2117. circuits on one channel. This schedule is currently tuned to
  2118. (tolerantly) avoid making changes in network performance, but it
  2119. should form the basis for major circuit performance increases in
  2120. the future. Code by Andrea; tuning by Rob Jansen; implements
  2121. ticket 9262.
  2122. o Major features (hidden services):
  2123. - Make HS port scanning more difficult by immediately closing the
  2124. circuit when a user attempts to connect to a nonexistent port.
  2125. Closes ticket 13667.
  2126. - Add a HiddenServiceStatistics option that allows Tor relays to
  2127. gather and publish statistics about the overall size and volume of
  2128. hidden service usage. Specifically, when this option is turned on,
  2129. an HSDir will publish an approximate number of hidden services
  2130. that have published descriptors to it the past 24 hours. Also, if
  2131. a relay has acted as a hidden service rendezvous point, it will
  2132. publish the approximate amount of rendezvous cells it has relayed
  2133. the past 24 hours. The statistics themselves are obfuscated so
  2134. that the exact values cannot be derived. For more details see
  2135. proposal 238, "Better hidden service stats from Tor relays". This
  2136. feature is currently disabled by default. Implements feature 13192.
  2137. o Major bugfixes (client, automap):
  2138. - Repair automapping with IPv6 addresses. This automapping should
  2139. have worked previously, but one piece of debugging code that we
  2140. inserted to detect a regression actually caused the regression to
  2141. manifest itself again. Fixes bug 13811 and bug 12831; bugfix on
  2142. 0.2.4.7-alpha. Diagnosed and fixed by Francisco Blas
  2143. Izquierdo Riera.
  2144. o Major bugfixes (hidden services):
  2145. - When closing an introduction circuit that was opened in parallel
  2146. with others, don't mark the introduction point as unreachable.
  2147. Previously, the first successful connection to an introduction
  2148. point would make the other introduction points get marked as
  2149. having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
  2150. o Directory authority changes:
  2151. - Remove turtles as a directory authority.
  2152. - Add longclaw as a new (v3) directory authority. This implements
  2153. ticket 13296. This keeps the directory authority count at 9.
  2154. o Major removed features:
  2155. - Tor clients no longer support connecting to hidden services
  2156. running on Tor 0.2.2.x and earlier; the Support022HiddenServices
  2157. option has been removed. (There shouldn't be any hidden services
  2158. running these versions on the network.) Closes ticket 7803.
  2159. o Minor features (client):
  2160. - Validate hostnames in SOCKS5 requests more strictly. If SafeSocks
  2161. is enabled, reject requests with IP addresses as hostnames.
  2162. Resolves ticket 13315.
  2163. o Minor features (controller):
  2164. - Add a "SIGNAL HEARTBEAT" controller command that tells Tor to
  2165. write an unscheduled heartbeat message to the log. Implements
  2166. feature 9503.
  2167. o Minor features (geoip):
  2168. - Update geoip and geoip6 to the November 15 2014 Maxmind GeoLite2
  2169. Country database.
  2170. o Minor features (hidden services):
  2171. - When re-enabling the network, don't try to build introduction
  2172. circuits until we have successfully built a circuit. This makes
  2173. hidden services come up faster when the network is re-enabled.
  2174. Patch from "akwizgran". Closes ticket 13447.
  2175. - When we fail to retrieve a hidden service descriptor, send the
  2176. controller an "HS_DESC FAILED" controller event. Implements
  2177. feature 13212.
  2178. - New HiddenServiceDirGroupReadable option to cause hidden service
  2179. directories and hostname files to be created group-readable. Patch
  2180. from "anon", David Stainton, and "meejah". Closes ticket 11291.
  2181. o Minor features (systemd):
  2182. - Where supported, when running with systemd, report successful
  2183. startup to systemd. Part of ticket 11016. Patch by Michael Scherer.
  2184. - When running with systemd, support systemd watchdog messages. Part
  2185. of ticket 11016. Patch by Michael Scherer.
  2186. o Minor features (transparent proxy):
  2187. - Update the transparent proxy option checks to allow for both ipfw
  2188. and pf on OS X. Closes ticket 14002.
  2189. - Use the correct option when using IPv6 with transparent proxy
  2190. support on Linux. Resolves 13808. Patch by Francisco Blas
  2191. Izquierdo Riera.
  2192. o Minor bugfixes (preventative security, C safety):
  2193. - When reading a hexadecimal, base-32, or base-64 encoded value from
  2194. a string, always overwrite the whole output buffer. This prevents
  2195. some bugs where we would look at (but fortunately, not reveal)
  2196. uninitialized memory on the stack. Fixes bug 14013; bugfix on all
  2197. versions of Tor.
  2198. - Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not
  2199. just the part that's used. This makes it harder for data leak bugs
  2200. to occur in the event of other programming failures. Resolves
  2201. ticket 14041.
  2202. o Minor bugfixes (client, microdescriptors):
  2203. - Use a full 256 bits of the SHA256 digest of a microdescriptor when
  2204. computing which microdescriptors to download. This keeps us from
  2205. erroneous download behavior if two microdescriptor digests ever
  2206. have the same first 160 bits. Fixes part of bug 13399; bugfix
  2207. on 0.2.3.1-alpha.
  2208. - Reset a router's status if its microdescriptor digest changes,
  2209. even if the first 160 bits remain the same. Fixes part of bug
  2210. 13399; bugfix on 0.2.3.1-alpha.
  2211. o Minor bugfixes (compilation):
  2212. - Silence clang warnings under --enable-expensive-hardening,
  2213. including implicit truncation of 64 bit values to 32 bit, const
  2214. char assignment to self, tautological compare, and additional
  2215. parentheses around equality tests. Fixes bug 13577; bugfix
  2216. on 0.2.5.4-alpha.
  2217. - Fix a clang warning about checking whether an address in the
  2218. middle of a structure is NULL. Fixes bug 14001; bugfix
  2219. on 0.2.1.2-alpha.
  2220. o Minor bugfixes (hidden services):
  2221. - Correctly send a controller event when we find that a rendezvous
  2222. circuit has finished. Fixes bug 13936; bugfix on 0.1.1.5-alpha.
  2223. - Pre-check directory permissions for new hidden-services to avoid
  2224. at least one case of "Bug: Acting on config options left us in a
  2225. broken state. Dying." Fixes bug 13942; bugfix on 0.0.6pre1.
  2226. - When adding a new hidden service (for example, via SETCONF), Tor
  2227. no longer congratulates the user for running a relay. Fixes bug
  2228. 13941; bugfix on 0.2.6.1-alpha.
  2229. - When fetching hidden service descriptors, we now check not only
  2230. for whether we got the hidden service we had in mind, but also
  2231. whether we got the particular descriptors we wanted. This prevents
  2232. a class of inefficient but annoying DoS attacks by hidden service
  2233. directories. Fixes bug 13214; bugfix on 0.2.1.6-alpha. Reported
  2234. by "special".
  2235. o Minor bugfixes (Linux seccomp2 sandbox):
  2236. - Make transparent proxy support work along with the seccomp2
  2237. sandbox. Fixes part of bug 13808; bugfix on 0.2.5.1-alpha. Patch
  2238. by Francisco Blas Izquierdo Riera.
  2239. - Fix a memory leak in tor-resolve when running with the sandbox
  2240. enabled. Fixes bug 14050; bugfix on 0.2.5.9-rc.
  2241. o Minor bugfixes (logging):
  2242. - Downgrade warnings about RSA signature failures to info log level.
  2243. Emit a warning when an extra info document is found incompatible
  2244. with a corresponding router descriptor. Fixes bug 9812; bugfix
  2245. on 0.0.6rc3.
  2246. - Make connection_ap_handshake_attach_circuit() log the circuit ID
  2247. correctly. Fixes bug 13701; bugfix on 0.0.6.
  2248. o Minor bugfixes (misc):
  2249. - Stop allowing invalid address patterns like "*/24" that contain
  2250. both a wildcard address and a bit prefix length. This affects all
  2251. our address-range parsing code. Fixes bug 7484; bugfix
  2252. on 0.0.2pre14.
  2253. o Minor bugfixes (testing networks, fast startup):
  2254. - Allow Tor to build circuits using a consensus with no exits. If
  2255. the consensus has no exits (typical of a bootstrapping test
  2256. network), allow Tor to build circuits once enough descriptors have
  2257. been downloaded. This assists in bootstrapping a testing Tor
  2258. network. Fixes bug 13718; bugfix on 0.2.4.10-alpha. Patch
  2259. by "teor".
  2260. - When V3AuthVotingInterval is low, give a lower If-Modified-Since
  2261. header to directory servers. This allows us to obtain consensuses
  2262. promptly when the consensus interval is very short. This assists
  2263. in bootstrapping a testing Tor network. Fixes parts of bugs 13718
  2264. and 13963; bugfix on 0.2.0.3-alpha. Patch by "teor".
  2265. - Stop assuming that private addresses are local when checking
  2266. reachability in a TestingTorNetwork. Instead, when testing, assume
  2267. all OR connections are remote. (This is necessary due to many test
  2268. scenarios running all relays on localhost.) This assists in
  2269. bootstrapping a testing Tor network. Fixes bug 13924; bugfix on
  2270. 0.1.0.1-rc. Patch by "teor".
  2271. - Avoid building exit circuits from a consensus with no exits. Now
  2272. thanks to our fix for 13718, we accept a no-exit network as not
  2273. wholly lost, but we need to remember not to try to build exit
  2274. circuits on it. Closes ticket 13814; patch by "teor".
  2275. - Stop requiring exits to have non-zero bandwithcapacity in a
  2276. TestingTorNetwork. Instead, when TestingMinExitFlagThreshold is 0,
  2277. ignore exit bandwidthcapacity. This assists in bootstrapping a
  2278. testing Tor network. Fixes parts of bugs 13718 and 13839; bugfix
  2279. on 0.2.0.3-alpha. Patch by "teor".
  2280. - Add "internal" to some bootstrap statuses when no exits are
  2281. available. If the consensus does not contain Exits, Tor will only
  2282. build internal circuits. In this case, relevant statuses will
  2283. contain the word "internal" as indicated in the Tor control-
  2284. spec.txt. When bootstrap completes, Tor will be ready to build
  2285. internal circuits. If a future consensus contains Exits, exit
  2286. circuits may become available. Fixes part of bug 13718; bugfix on
  2287. 0.2.4.10-alpha. Patch by "teor".
  2288. - Decrease minimum consensus interval to 10 seconds when
  2289. TestingTorNetwork is set, or 5 seconds for the first consensus.
  2290. Fix assumptions throughout the code that assume larger intervals.
  2291. Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. Patch
  2292. by "teor".
  2293. - Avoid excluding guards from path building in minimal test
  2294. networks, when we're in a test network and excluding guards would
  2295. exclude all relays. This typically occurs in incredibly small tor
  2296. networks, and those using "TestingAuthVoteGuard *". Fixes part of
  2297. bug 13718; bugfix on 0.1.1.11-alpha. Patch by "teor".
  2298. o Code simplification and refactoring:
  2299. - Stop using can_complete_circuits as a global variable; access it
  2300. with a function instead.
  2301. - Avoid using operators directly as macro arguments: this lets us
  2302. apply coccinelle transformations to our codebase more directly.
  2303. Closes ticket 13172.
  2304. - Combine the functions used to parse ClientTransportPlugin and
  2305. ServerTransportPlugin into a single function. Closes ticket 6456.
  2306. - Add inline functions and convenience macros for inspecting channel
  2307. state. Refactor the code to use convenience macros instead of
  2308. checking channel state directly. Fixes issue 7356.
  2309. - Document all members of was_router_added_t and rename
  2310. ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less
  2311. confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644.
  2312. - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL
  2313. constant instead of hardcoded value. Fixes issue 13840.
  2314. - Refactor our generic strmap and digestmap types into a single
  2315. implementation, so that we can add a new digest256map
  2316. type trivially.
  2317. o Documentation:
  2318. - Document the bridge-authority-only 'networkstatus-bridges' file.
  2319. Closes ticket 13713; patch from "tom".
  2320. - Fix typo in PredictedPortsRelevanceTime option description in
  2321. manpage. Resolves issue 13707.
  2322. - Stop suggesting that users specify relays by nickname: it isn't a
  2323. good idea. Also, properly cross-reference how to specify relays in
  2324. all parts of manual documenting options that take a list of
  2325. relays. Closes ticket 13381.
  2326. - Clarify the HiddenServiceDir option description in manpage to make
  2327. it clear that relative paths are taken with respect to the current
  2328. working directory. Also clarify that this behavior is not
  2329. guaranteed to remain indefinitely. Fixes issue 13913.
  2330. o Testing:
  2331. - New tests for many parts of channel, relay, and circuitmux
  2332. functionality. Code by Andrea; part of 9262.
  2333. - New tests for parse_transport_line(). Part of ticket 6456.
  2334. - In the unit tests, use chgrp() to change the group of the unit
  2335. test temporary directory to the current user, so that the sticky
  2336. bit doesn't interfere with tests that check directory groups.
  2337. Closes 13678.
  2338. - Add unit tests for resolve_my_addr(). Part of ticket 12376; patch
  2339. by 'rl1987'.
  2340. Changes in version 0.2.6.1-alpha - 2014-10-30
  2341. Tor 0.2.6.1-alpha is the first release in the Tor 0.2.6.x series. It
  2342. includes numerous code cleanups and new tests, and fixes a large
  2343. number of annoying bugs. Out-of-memory conditions are handled better
  2344. than in 0.2.5, pluggable transports have improved proxy support, and
  2345. clients now use optimistic data for contacting hidden services. Also,
  2346. we are now more robust to changes in what we consider a parseable
  2347. directory object, so that tightening restrictions does not have a risk
  2348. of introducing infinite download loops.
  2349. This is the first alpha release in a new series, so expect there to be
  2350. bugs. Users who would rather test out a more stable branch should stay
  2351. with 0.2.5.x for now.
  2352. o New compiler and system requirements:
  2353. - Tor 0.2.6.x requires that your compiler support more of the C99
  2354. language standard than before. The 'configure' script now detects
  2355. whether your compiler supports C99 mid-block declarations and
  2356. designated initializers. If it does not, Tor will not compile.
  2357. We may revisit this requirement if it turns out that a significant
  2358. number of people need to build Tor with compilers that don't
  2359. bother implementing a 15-year-old standard. Closes ticket 13233.
  2360. - Tor no longer supports systems without threading support. When we
  2361. began working on Tor, there were several systems that didn't have
  2362. threads, or where the thread support wasn't able to run the
  2363. threads of a single process on multiple CPUs. That no longer
  2364. holds: every system where Tor needs to run well now has threading
  2365. support. Resolves ticket 12439.
  2366. o Removed platform support:
  2367. - We no longer include special code to build on Windows CE; as far
  2368. as we know, nobody has used Tor on Windows CE in a very long time.
  2369. Closes ticket 11446.
  2370. o Major features (bridges):
  2371. - Expose the outgoing upstream HTTP/SOCKS proxy to pluggable
  2372. transports if they are configured via the "TOR_PT_PROXY"
  2373. environment variable. Implements proposal 232. Resolves
  2374. ticket 8402.
  2375. o Major features (client performance, hidden services):
  2376. - Allow clients to use optimistic data when connecting to a hidden
  2377. service, which should remove a round-trip from hidden service
  2378. initialization. See proposal 181 for details. Implements
  2379. ticket 13211.
  2380. o Major features (directory system):
  2381. - Upon receiving an unparseable directory object, if its digest
  2382. matches what we expected, then don't try to download it again.
  2383. Previously, when we got a descriptor we didn't like, we would keep
  2384. trying to download it over and over. Closes ticket 11243.
  2385. o Major features (sample torrc):
  2386. - Add a new, infrequently-changed "torrc.minimal". This file is
  2387. similar to torrc.sample, but it will change as infrequently as
  2388. possible, for the benefit of users whose systems prompt them for
  2389. intervention whenever a default configuration file is changed.
  2390. Making this change allows us to update torrc.sample to be a more
  2391. generally useful "sample torrc".
  2392. o Major bugfixes (directory authorities):
  2393. - Do not assign the HSDir flag to relays if they are not Valid, or
  2394. currently hibernating. Fixes 12573; bugfix on 0.2.0.10-alpha.
  2395. o Major bugfixes (directory bandwidth performance):
  2396. - Don't flush the zlib buffer aggressively when compressing
  2397. directory information for clients. This should save about 7% of
  2398. the bandwidth currently used for compressed descriptors and
  2399. microdescriptors. Fixes bug 11787; bugfix on 0.1.1.23.
  2400. o Minor features (security, memory wiping):
  2401. - Ensure we securely wipe keys from memory after
  2402. crypto_digest_get_digest and init_curve25519_keypair_from_file
  2403. have finished using them. Resolves ticket 13477.
  2404. o Minor features (security, out-of-memory handling):
  2405. - When handling an out-of-memory condition, allocate less memory for
  2406. temporary data structures. Fixes issue 10115.
  2407. - When handling an out-of-memory condition, consider more types of
  2408. buffers, including those on directory connections, and zlib
  2409. buffers. Resolves ticket 11792.
  2410. o Minor features:
  2411. - When identity keypair is generated for first time, log a
  2412. congratulatory message that links to the new relay lifecycle
  2413. document. Implements feature 10427.
  2414. o Minor features (client):
  2415. - Clients are now willing to send optimistic data (before they
  2416. receive a 'connected' cell) to relays of any version. (Relays
  2417. without support for optimistic data are no longer supported on the
  2418. Tor network.) Resolves ticket 13153.
  2419. o Minor features (directory authorities):
  2420. - Don't list relays with a bandwidth estimate of 0 in the consensus.
  2421. Implements a feature proposed during discussion of bug 13000.
  2422. - In tor-gencert, report an error if the user provides the same
  2423. argument more than once.
  2424. - If a directory authority can't find a best consensus method in the
  2425. votes that it holds, it now falls back to its favorite consensus
  2426. method. Previously, it fell back to method 1. Neither of these is
  2427. likely to get enough signatures, but "fall back to favorite"
  2428. doesn't require us to maintain support an obsolete consensus
  2429. method. Implements part of proposal 215.
  2430. o Minor features (logging):
  2431. - On Unix-like systems, you can now use named pipes as the target of
  2432. the Log option, and other options that try to append to files.
  2433. Closes ticket 12061. Patch from "carlo von lynX".
  2434. - When opening a log file at startup, send it every log message that
  2435. we generated between startup and opening it. Previously, log
  2436. messages that were generated before opening the log file were only
  2437. logged to stdout. Closes ticket 6938.
  2438. - Add a TruncateLogFile option to overwrite logs instead of
  2439. appending to them. Closes ticket 5583.
  2440. o Minor features (portability, Solaris):
  2441. - Threads are no longer disabled by default on Solaris; we believe
  2442. that the versions of Solaris with broken threading support are all
  2443. obsolete by now. Resolves ticket 9495.
  2444. o Minor features (relay):
  2445. - Re-check our address after we detect a changed IP address from
  2446. getsockname(). This ensures that the controller command "GETINFO
  2447. address" will report the correct value. Resolves ticket 11582.
  2448. Patch from "ra".
  2449. - A new AccountingRule option lets Relays set whether they'd like
  2450. AccountingMax to be applied separately to inbound and outbound
  2451. traffic, or applied to the sum of inbound and outbound traffic.
  2452. Resolves ticket 961. Patch by "chobe".
  2453. o Minor features (testing networks):
  2454. - Add the TestingDirAuthVoteExit option, which lists nodes to assign
  2455. the "Exit" flag regardless of their uptime, bandwidth, or exit
  2456. policy. TestingTorNetwork must be set for this option to have any
  2457. effect. Previously, authorities would take up to 35 minutes to
  2458. give nodes the Exit flag in a test network. Partially implements
  2459. ticket 13161.
  2460. o Minor features (validation):
  2461. - Check all date/time values passed to tor_timegm and
  2462. parse_rfc1123_time for validity, taking leap years into account.
  2463. Improves HTTP header validation. Implemented with bug 13476.
  2464. - In correct_tm(), limit the range of values returned by system
  2465. localtime(_r) and gmtime(_r) to be between the years 1 and 8099.
  2466. This means we don't have to deal with negative or too large dates,
  2467. even if a clock is wrong. Otherwise we might fail to read a file
  2468. written by us which includes such a date. Fixes bug 13476.
  2469. o Minor bugfixes (bridge clients):
  2470. - When configured to use a bridge without an identity digest (not
  2471. recommended), avoid launching an extra channel to it when
  2472. bootstrapping. Fixes bug 7733; bugfix on 0.2.4.4-alpha.
  2473. o Minor bugfixes (bridges):
  2474. - When DisableNetwork is set, do not launch pluggable transport
  2475. plugins, and if any are running, terminate them. Fixes bug 13213;
  2476. bugfix on 0.2.3.6-alpha.
  2477. o Minor bugfixes (C correctness):
  2478. - Fix several instances of possible integer overflow/underflow/NaN.
  2479. Fixes bug 13104; bugfix on 0.2.3.1-alpha and later. Patches
  2480. from "teor".
  2481. - In circuit_build_times_calculate_timeout() in circuitstats.c,
  2482. avoid dividing by zero in the pareto calculations. This traps
  2483. under clang's "undefined-trap" sanitizer. Fixes bug 13290; bugfix
  2484. on 0.2.2.2-alpha.
  2485. - Fix an integer overflow in format_time_interval(). Fixes bug
  2486. 13393; bugfix on 0.2.0.10-alpha.
  2487. - Set the correct day of year value when the system's localtime(_r)
  2488. or gmtime(_r) functions fail to set struct tm. Not externally
  2489. visible. Fixes bug 13476; bugfix on 0.0.2pre14.
  2490. - Avoid unlikely signed integer overflow in tor_timegm on systems
  2491. with 32-bit time_t. Fixes bug 13476; bugfix on 0.0.2pre14.
  2492. o Minor bugfixes (client):
  2493. - Fix smartlist_choose_node_by_bandwidth() so that relays with the
  2494. BadExit flag are not considered worthy candidates. Fixes bug
  2495. 13066; bugfix on 0.1.2.3-alpha.
  2496. - Use the consensus schedule for downloading consensuses, and not
  2497. the generic schedule. Fixes bug 11679; bugfix on 0.2.2.6-alpha.
  2498. - Handle unsupported or malformed SOCKS5 requests properly by
  2499. responding with the appropriate error message before closing the
  2500. connection. Fixes bugs 12971 and 13314; bugfix on 0.0.2pre13.
  2501. o Minor bugfixes (client, torrc):
  2502. - Stop modifying the value of our DirReqStatistics torrc option just
  2503. because we're not a bridge or relay. This bug was causing Tor
  2504. Browser users to write "DirReqStatistics 0" in their torrc files
  2505. as if they had chosen to change the config. Fixes bug 4244; bugfix
  2506. on 0.2.3.1-alpha.
  2507. - When GeoIPExcludeUnknown is enabled, do not incorrectly decide
  2508. that our options have changed every time we SIGHUP. Fixes bug
  2509. 9801; bugfix on 0.2.4.10-alpha. Patch from "qwerty1".
  2510. o Minor bugfixes (controller):
  2511. - Return an error when the second or later arguments of the
  2512. "setevents" controller command are invalid events. Previously we
  2513. would return success while silently skipping invalid events. Fixes
  2514. bug 13205; bugfix on 0.2.3.2-alpha. Reported by "fpxnns".
  2515. o Minor bugfixes (directory system):
  2516. - Always believe that v3 directory authorities serve extra-info
  2517. documents, whether they advertise "caches-extra-info" or not.
  2518. Fixes part of bug 11683; bugfix on 0.2.0.1-alpha.
  2519. - When running as a v3 directory authority, advertise that you serve
  2520. extra-info documents so that clients who want them can find them
  2521. from you too. Fixes part of bug 11683; bugfix on 0.2.0.1-alpha.
  2522. - Check the BRIDGE_DIRINFO flag bitwise rather than using equality.
  2523. Previously, directories offering BRIDGE_DIRINFO and some other
  2524. flag (i.e. microdescriptors or extrainfo) would be ignored when
  2525. looking for bridges. Partially fixes bug 13163; bugfix
  2526. on 0.2.0.7-alpha.
  2527. o Minor bugfixes (networking):
  2528. - Check for orconns and use connection_or_close_for_error() rather
  2529. than connection_mark_for_close() directly in the getsockopt()
  2530. failure case of connection_handle_write_impl(). Fixes bug 11302;
  2531. bugfix on 0.2.4.4-alpha.
  2532. o Minor bugfixes (relay):
  2533. - When generating our family list, remove spaces from around the
  2534. entries. Fixes bug 12728; bugfix on 0.2.1.7-alpha.
  2535. - If our previous bandwidth estimate was 0 bytes, allow publishing a
  2536. new relay descriptor immediately. Fixes bug 13000; bugfix
  2537. on 0.1.1.6-alpha.
  2538. o Minor bugfixes (testing networks):
  2539. - Fix TestingDirAuthVoteGuard to properly give out Guard flags in a
  2540. testing network. Fixes bug 13064; bugfix on 0.2.5.2-alpha.
  2541. - Stop using the default authorities in networks which provide both
  2542. AlternateDirAuthority and AlternateBridgeAuthority. Partially
  2543. fixes bug 13163; bugfix on 0.2.0.13-alpha.
  2544. o Minor bugfixes (testing):
  2545. - Stop spawn test failures due to a race condition between the
  2546. SIGCHLD handler updating the process status, and the test reading
  2547. it. Fixes bug 13291; bugfix on 0.2.3.3-alpha.
  2548. o Minor bugfixes (testing, Windows):
  2549. - Avoid passing an extra backslash when creating a temporary
  2550. directory for running the unit tests on Windows. Fixes bug 12392;
  2551. bugfix on 0.2.2.25-alpha. Patch from Gisle Vanem.
  2552. o Minor bugfixes (windows):
  2553. - Remove code to special-case handling of NTE_BAD_KEYSET when
  2554. acquiring windows CryptoAPI context. This error can't actually
  2555. occur for the parameters we're providing. Fixes bug 10816; bugfix
  2556. on 0.0.2pre26.
  2557. o Minor bugfixes (zlib):
  2558. - Avoid truncating a zlib stream when trying to finalize it with an
  2559. empty output buffer. Fixes bug 11824; bugfix on 0.1.1.23.
  2560. o Build fixes:
  2561. - Allow our configure script to build correctly with autoconf 2.62
  2562. again. Fixes bug 12693; bugfix on 0.2.5.2-alpha.
  2563. - Improve the error message from ./configure to make it clear that
  2564. when asciidoc has not been found, the user will have to either add
  2565. --disable-asciidoc argument or install asciidoc. Resolves
  2566. ticket 13228.
  2567. o Code simplification and refactoring:
  2568. - Change the entry_is_live() function to take named bitfield
  2569. elements instead of an unnamed list of booleans. Closes
  2570. ticket 12202.
  2571. - Refactor and unit-test entry_is_time_to_retry() in entrynodes.c.
  2572. Resolves ticket 12205.
  2573. - Use calloc and reallocarray functions instead of multiply-
  2574. then-malloc. This makes it less likely for us to fall victim to an
  2575. integer overflow attack when allocating. Resolves ticket 12855.
  2576. - Use the standard macro name SIZE_MAX, instead of our
  2577. own SIZE_T_MAX.
  2578. - Document usage of the NO_DIRINFO and ALL_DIRINFO flags clearly in
  2579. functions which take them as arguments. Replace 0 with NO_DIRINFO
  2580. in a function call for clarity. Seeks to prevent future issues
  2581. like 13163.
  2582. - Avoid 4 null pointer errors under clang static analysis by using
  2583. tor_assert() to prove that the pointers aren't null. Fixes
  2584. bug 13284.
  2585. - Rework the API of policies_parse_exit_policy() to use a bitmask to
  2586. represent parsing options, instead of a confusing mess of
  2587. booleans. Resolves ticket 8197.
  2588. - Introduce a helper function to parse ExitPolicy in
  2589. or_options_t structure.
  2590. o Documentation:
  2591. - Add a doc/TUNING document with tips for handling large numbers of
  2592. TCP connections when running busy Tor relay. Update the warning
  2593. message to point to this file when running out of sockets
  2594. operating system is allowing to use simultaneously. Resolves
  2595. ticket 9708.
  2596. o Removed features:
  2597. - We no longer remind the user about configuration options that have
  2598. been obsolete since 0.2.3.x or earlier. Patch by Adrien Bak.
  2599. - Remove our old, non-weighted bandwidth-based node selection code.
  2600. Previously, we used it as a fallback when we couldn't perform
  2601. weighted bandwidth-based node selection. But that would only
  2602. happen in the cases where we had no consensus, or when we had a
  2603. consensus generated by buggy or ancient directory authorities. In
  2604. either case, it's better to use the more modern, better maintained
  2605. algorithm, with reasonable defaults for the weights. Closes
  2606. ticket 13126.
  2607. - Remove the --disable-curve25519 configure option. Relays and
  2608. clients now are required to support curve25519 and the
  2609. ntor handshake.
  2610. - The old "StrictEntryNodes" and "StrictExitNodes" options, which
  2611. used to be deprecated synonyms for "StrictNodes", are now marked
  2612. obsolete. Resolves ticket 12226.
  2613. - Clients don't understand the BadDirectory flag in the consensus
  2614. anymore, and ignore it.
  2615. o Testing:
  2616. - Refactor the function that chooses guard nodes so that it can more
  2617. easily be tested; write some tests for it.
  2618. - Fix and re-enable the fgets_eagain unit test. Fixes bug 12503;
  2619. bugfix on 0.2.3.1-alpha. Patch from "cypherpunks."
  2620. - Create unit tests for format_time_interval(). With bug 13393.
  2621. - Add unit tests for tor_timegm signed overflow, tor_timegm and
  2622. parse_rfc1123_time validity checks, correct_tm year clamping. Unit
  2623. tests (visible) fixes in bug 13476.
  2624. - Add a "coverage-html" make target to generate HTML-visualized
  2625. coverage results when building with --enable-coverage. (Requires
  2626. lcov.) Patch from Kevin Murray.
  2627. - Enable the backtrace handler (where supported) when running the
  2628. unit tests.
  2629. - Revise all unit tests that used the legacy test_* macros to
  2630. instead use the recommended tt_* macros. This patch was generated
  2631. with coccinelle, to avoid manual errors. Closes ticket 13119.
  2632. o Distribution (systemd):
  2633. - systemd unit file: only allow tor to write to /var/lib/tor and
  2634. /var/log/tor. The rest of the filesystem is accessible for reading
  2635. only. Patch by intrigeri; resolves ticket 12751.
  2636. - systemd unit file: ensure that the process and all its children
  2637. can never gain new privileges. Patch by intrigeri; resolves
  2638. ticket 12939.
  2639. - systemd unit file: set up /var/run/tor as writable for the Tor
  2640. service. Patch by intrigeri; resolves ticket 13196.
  2641. o Removed features (directory authorities):
  2642. - Remove code that prevented authorities from listing Tor relays
  2643. affected by CVE-2011-2769 as guards. These relays are already
  2644. rejected altogether due to the minimum version requirement of
  2645. 0.2.3.16-alpha. Closes ticket 13152.
  2646. - The "AuthDirRejectUnlisted" option no longer has any effect, as
  2647. the fingerprints file (approved-routers) has been deprecated.
  2648. - Directory authorities do not support being Naming dirauths anymore.
  2649. The "NamingAuthoritativeDir" config option is now obsolete.
  2650. - Directory authorities do not support giving out the BadDirectory
  2651. flag anymore.
  2652. - Directory authorities no longer advertise or support consensus
  2653. methods 1 through 12 inclusive. These consensus methods were
  2654. obsolete and/or insecure: maintaining the ability to support them
  2655. served no good purpose. Implements part of proposal 215; closes
  2656. ticket 10163.
  2657. o Testing (test-network.sh):
  2658. - Stop using "echo -n", as some shells' built-in echo doesn't
  2659. support "-n". Instead, use "/bin/echo -n". Partially fixes
  2660. bug 13161.
  2661. - Stop an apparent test-network hang when used with make -j2. Fixes
  2662. bug 13331.
  2663. - Add a --delay option to test-network.sh, which configures the
  2664. delay before the chutney network tests for data transmission.
  2665. Partially implements ticket 13161.
  2666. Changes in version 0.2.5.10 - 2014-10-24
  2667. Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
  2668. It adds several new security features, including improved
  2669. denial-of-service resistance for relays, new compiler hardening
  2670. options, and a system-call sandbox for hardened installations on Linux
  2671. (requires seccomp2). The controller protocol has several new features,
  2672. resolving IPv6 addresses should work better than before, and relays
  2673. should be a little more CPU-efficient. We've added support for more
  2674. OpenBSD and FreeBSD transparent proxy types. We've improved the build
  2675. system and testing infrastructure to allow unit testing of more parts
  2676. of the Tor codebase. Finally, we've addressed several nagging pluggable
  2677. transport usability issues, and included numerous other small bugfixes
  2678. and features mentioned below.
  2679. This release marks end-of-life for Tor 0.2.3.x; those Tor versions
  2680. have accumulated many known flaws; everyone should upgrade.
  2681. o Deprecated versions:
  2682. - Tor 0.2.3.x has reached end-of-life; it has received no patches or
  2683. attention for some while.
  2684. Changes in version 0.2.5.9-rc - 2014-10-20
  2685. Tor 0.2.5.9-rc is the third release candidate for the Tor 0.2.5.x
  2686. series. It disables SSL3 in response to the recent "POODLE" attack
  2687. (even though POODLE does not affect Tor). It also works around a crash
  2688. bug caused by some operating systems' response to the "POODLE" attack
  2689. (which does affect Tor). It also contains a few miscellaneous fixes.
  2690. o Major security fixes:
  2691. - Disable support for SSLv3. All versions of OpenSSL in use with Tor
  2692. today support TLS 1.0 or later, so we can safely turn off support
  2693. for this old (and insecure) protocol. Fixes bug 13426.
  2694. o Major bugfixes (openssl bug workaround):
  2695. - Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
  2696. 1.0.1j, built with the 'no-ssl3' configuration option. Fixes bug
  2697. 13471. This is a workaround for an OpenSSL bug.
  2698. o Minor bugfixes:
  2699. - Disable the sandbox name resolver cache when running tor-resolve:
  2700. tor-resolve doesn't use the sandbox code, and turning it on was
  2701. breaking attempts to do tor-resolve on a non-default server on
  2702. Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
  2703. o Compilation fixes:
  2704. - Build and run correctly on systems like OpenBSD-current that have
  2705. patched OpenSSL to remove get_cipher_by_char and/or its
  2706. implementations. Fixes issue 13325.
  2707. o Downgraded warnings:
  2708. - Downgrade the severity of the 'unexpected sendme cell from client'
  2709. from 'warn' to 'protocol warning'. Closes ticket 8093.
  2710. Changes in version 0.2.4.25 - 2014-10-20
  2711. Tor 0.2.4.25 disables SSL3 in response to the recent "POODLE" attack
  2712. (even though POODLE does not affect Tor). It also works around a crash
  2713. bug caused by some operating systems' response to the "POODLE" attack
  2714. (which does affect Tor).
  2715. o Major security fixes (also in 0.2.5.9-rc):
  2716. - Disable support for SSLv3. All versions of OpenSSL in use with Tor
  2717. today support TLS 1.0 or later, so we can safely turn off support
  2718. for this old (and insecure) protocol. Fixes bug 13426.
  2719. o Major bugfixes (openssl bug workaround, also in 0.2.5.9-rc):
  2720. - Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
  2721. 1.0.1j, built with the 'no-ssl3' configuration option. Fixes bug
  2722. 13471. This is a workaround for an OpenSSL bug.
  2723. Changes in version 0.2.5.8-rc - 2014-09-22
  2724. Tor 0.2.5.8-rc is the second release candidate for the Tor 0.2.5.x
  2725. series. It fixes a bug that affects consistency and speed when
  2726. connecting to hidden services, and it updates the location of one of
  2727. the directory authorities.
  2728. o Major bugfixes:
  2729. - Clients now send the correct address for their chosen rendezvous
  2730. point when trying to access a hidden service. They used to send
  2731. the wrong address, which would still work some of the time because
  2732. they also sent the identity digest of the rendezvous point, and if
  2733. the hidden service happened to try connecting to the rendezvous
  2734. point from a relay that already had a connection open to it,
  2735. the relay would reuse that connection. Now connections to hidden
  2736. services should be more robust and faster. Also, this bug meant
  2737. that clients were leaking to the hidden service whether they were
  2738. on a little-endian (common) or big-endian (rare) system, which for
  2739. some users might have reduced their anonymity. Fixes bug 13151;
  2740. bugfix on 0.2.1.5-alpha.
  2741. o Directory authority changes:
  2742. - Change IP address for gabelmoo (v3 directory authority).
  2743. Changes in version 0.2.4.24 - 2014-09-22
  2744. Tor 0.2.4.24 fixes a bug that affects consistency and speed when
  2745. connecting to hidden services, and it updates the location of one of
  2746. the directory authorities.
  2747. o Major bugfixes:
  2748. - Clients now send the correct address for their chosen rendezvous
  2749. point when trying to access a hidden service. They used to send
  2750. the wrong address, which would still work some of the time because
  2751. they also sent the identity digest of the rendezvous point, and if
  2752. the hidden service happened to try connecting to the rendezvous
  2753. point from a relay that already had a connection open to it,
  2754. the relay would reuse that connection. Now connections to hidden
  2755. services should be more robust and faster. Also, this bug meant
  2756. that clients were leaking to the hidden service whether they were
  2757. on a little-endian (common) or big-endian (rare) system, which for
  2758. some users might have reduced their anonymity. Fixes bug 13151;
  2759. bugfix on 0.2.1.5-alpha.
  2760. o Directory authority changes:
  2761. - Change IP address for gabelmoo (v3 directory authority).
  2762. o Minor features (geoip):
  2763. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2
  2764. Country database.
  2765. Changes in version 0.2.5.7-rc - 2014-09-11
  2766. Tor 0.2.5.7-rc fixes several regressions from earlier in the 0.2.5.x
  2767. release series, and some long-standing bugs related to ORPort reachability
  2768. testing and failure to send CREATE cells. It is the first release
  2769. candidate for the Tor 0.2.5.x series.
  2770. o Major bugfixes (client, startup):
  2771. - Start making circuits as soon as DisabledNetwork is turned off.
  2772. When Tor started with DisabledNetwork set, it would correctly
  2773. conclude that it shouldn't build circuits, but it would mistakenly
  2774. cache this conclusion, and continue believing it even when
  2775. DisableNetwork is set to 0. Fixes the bug introduced by the fix
  2776. for bug 11200; bugfix on 0.2.5.4-alpha.
  2777. - Resume expanding abbreviations for command-line options. The fix
  2778. for bug 4647 accidentally removed our hack from bug 586 that
  2779. rewrote HashedControlPassword to __HashedControlSessionPassword
  2780. when it appears on the commandline (which allowed the user to set
  2781. her own HashedControlPassword in the torrc file while the
  2782. controller generates a fresh session password for each run). Fixes
  2783. bug 12948; bugfix on 0.2.5.1-alpha.
  2784. - Warn about attempts to run hidden services and relays in the same
  2785. process: that's probably not a good idea. Closes ticket 12908.
  2786. o Major bugfixes (relay):
  2787. - Avoid queuing or sending destroy cells for circuit ID zero when we
  2788. fail to send a CREATE cell. Fixes bug 12848; bugfix on 0.0.8pre1.
  2789. Found and fixed by "cypherpunks".
  2790. - Fix ORPort reachability detection on relays running behind a
  2791. proxy, by correctly updating the "local" mark on the controlling
  2792. channel when changing the address of an or_connection_t after the
  2793. handshake. Fixes bug 12160; bugfix on 0.2.4.4-alpha.
  2794. o Minor features (bridge):
  2795. - Add an ExtORPortCookieAuthFileGroupReadable option to make the
  2796. cookie file for the ExtORPort g+r by default.
  2797. o Minor features (geoip):
  2798. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2
  2799. Country database.
  2800. o Minor bugfixes (logging):
  2801. - Reduce the log severity of the "Pluggable transport proxy does not
  2802. provide any needed transports and will not be launched." message,
  2803. since Tor Browser includes several ClientTransportPlugin lines in
  2804. its torrc-defaults file, leading every Tor Browser user who looks
  2805. at her logs to see these notices and wonder if they're dangerous.
  2806. Resolves bug 13124; bugfix on 0.2.5.3-alpha.
  2807. - Downgrade "Unexpected onionskin length after decryption" warning
  2808. to a protocol-warn, since there's nothing relay operators can do
  2809. about a client that sends them a malformed create cell. Resolves
  2810. bug 12996; bugfix on 0.0.6rc1.
  2811. - Log more specific warnings when we get an ESTABLISH_RENDEZVOUS
  2812. cell on a cannibalized or non-OR circuit. Resolves ticket 12997.
  2813. - When logging information about an EXTEND2 or EXTENDED2 cell, log
  2814. their names correctly. Fixes part of bug 12700; bugfix
  2815. on 0.2.4.8-alpha.
  2816. - When logging information about a relay cell whose command we don't
  2817. recognize, log its command as an integer. Fixes part of bug 12700;
  2818. bugfix on 0.2.1.10-alpha.
  2819. - Escape all strings from the directory connection before logging
  2820. them. Fixes bug 13071; bugfix on 0.1.1.15. Patch from "teor".
  2821. o Minor bugfixes (controller):
  2822. - Restore the functionality of CookieAuthFileGroupReadable. Fixes
  2823. bug 12864; bugfix on 0.2.5.1-alpha.
  2824. - Actually send TRANSPORT_LAUNCHED and HS_DESC events to
  2825. controllers. Fixes bug 13085; bugfix on 0.2.5.1-alpha. Patch
  2826. by "teor".
  2827. o Minor bugfixes (compilation):
  2828. - Fix compilation of test.h with MSVC. Patch from Gisle Vanem;
  2829. bugfix on 0.2.5.5-alpha.
  2830. - Make the nmake make files work again. Fixes bug 13081. Bugfix on
  2831. 0.2.5.1-alpha. Patch from "NewEraCracker".
  2832. - In routerlist_assert_ok(), don't take the address of a
  2833. routerinfo's cache_info member unless that routerinfo is non-NULL.
  2834. Fixes bug 13096; bugfix on 0.1.1.9-alpha. Patch by "teor".
  2835. - Fix a large number of false positive warnings from the clang
  2836. analyzer static analysis tool. This should make real warnings
  2837. easier for clang analyzer to find. Patch from "teor". Closes
  2838. ticket 13036.
  2839. o Distribution (systemd):
  2840. - Verify configuration file via ExecStartPre in the systemd unit
  2841. file. Patch from intrigeri; resolves ticket 12730.
  2842. - Explicitly disable RunAsDaemon in the systemd unit file. Our
  2843. current systemd unit uses "Type = simple", so systemd does not
  2844. expect tor to fork. If the user has "RunAsDaemon 1" in their
  2845. torrc, then things won't work as expected. This is e.g. the case
  2846. on Debian (and derivatives), since there we pass "--defaults-torrc
  2847. /usr/share/tor/tor-service-defaults-torrc" (that contains
  2848. "RunAsDaemon 1") by default. Patch by intrigeri; resolves
  2849. ticket 12731.
  2850. o Documentation:
  2851. - Adjust the URLs in the README to refer to the new locations of
  2852. several documents on the website. Fixes bug 12830. Patch from
  2853. Matt Pagan.
  2854. - Document 'reject6' and 'accept6' ExitPolicy entries. Resolves
  2855. ticket 12878.
  2856. Changes in version 0.2.5.6-alpha - 2014-07-28
  2857. Tor 0.2.5.6-alpha brings us a big step closer to slowing down the
  2858. risk from guard rotation, and fixes a variety of other issues to get
  2859. us closer to a release candidate.
  2860. o Major features (also in 0.2.4.23):
  2861. - Make the number of entry guards configurable via a new
  2862. NumEntryGuards consensus parameter, and the number of directory
  2863. guards configurable via a new NumDirectoryGuards consensus
  2864. parameter. Implements ticket 12688.
  2865. o Major bugfixes (also in 0.2.4.23):
  2866. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
  2867. implementation that caused incorrect results on 32-bit
  2868. implementations when certain malformed inputs were used along with
  2869. a small class of private ntor keys. This bug does not currently
  2870. appear to allow an attacker to learn private keys or impersonate a
  2871. Tor server, but it could provide a means to distinguish 32-bit Tor
  2872. implementations from 64-bit Tor implementations. Fixes bug 12694;
  2873. bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
  2874. Adam Langley.
  2875. o Major bugfixes:
  2876. - Perform circuit cleanup operations even when circuit
  2877. construction operations are disabled (because the network is
  2878. disabled, or because there isn't enough directory information).
  2879. Previously, when we were not building predictive circuits, we
  2880. were not closing expired circuits either. Fixes bug 8387; bugfix on
  2881. 0.1.1.11-alpha. This bug became visible in 0.2.4.10-alpha when we
  2882. became more strict about when we have "enough directory information
  2883. to build circuits".
  2884. o Minor features:
  2885. - Authorities now assign the Guard flag to the fastest 25% of the
  2886. network (it used to be the fastest 50%). Also raise the consensus
  2887. weight that guarantees the Guard flag from 250 to 2000. For the
  2888. current network, this results in about 1100 guards, down from 2500.
  2889. This step paves the way for moving the number of entry guards
  2890. down to 1 (proposal 236) while still providing reasonable expected
  2891. performance for most users. Implements ticket 12690.
  2892. - Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
  2893. Country database.
  2894. - Slightly enhance the diagnostic message for bug 12184.
  2895. o Minor bugfixes (also in 0.2.4.23):
  2896. - Warn and drop the circuit if we receive an inbound 'relay early'
  2897. cell. Those used to be normal to receive on hidden service circuits
  2898. due to bug 1038, but the buggy Tor versions are long gone from
  2899. the network so we can afford to resume watching for them. Resolves
  2900. the rest of bug 1038; bugfix on 0.2.1.19.
  2901. - Correct a confusing error message when trying to extend a circuit
  2902. via the control protocol but we don't know a descriptor or
  2903. microdescriptor for one of the specified relays. Fixes bug 12718;
  2904. bugfix on 0.2.3.1-alpha.
  2905. o Minor bugfixes:
  2906. - Fix compilation when building with bufferevents enabled. (This
  2907. configuration is still not expected to work, however.)
  2908. Fixes bugs 12438, 12474, 11578; bugfixes on 0.2.5.1-alpha and
  2909. 0.2.5.3-alpha. Patches from Anthony G. Basile and Sathyanarayanan
  2910. Gunasekaran.
  2911. - Compile correctly with builds and forks of OpenSSL (such as
  2912. LibreSSL) that disable compression. Fixes bug 12602; bugfix on
  2913. 0.2.1.1-alpha. Patch from "dhill".
  2914. Changes in version 0.2.4.23 - 2014-07-28
  2915. Tor 0.2.4.23 brings us a big step closer to slowing down the risk from
  2916. guard rotation, and also backports several important fixes from the
  2917. Tor 0.2.5 alpha release series.
  2918. o Major features:
  2919. - Clients now look at the "usecreatefast" consensus parameter to
  2920. decide whether to use CREATE_FAST or CREATE cells for the first hop
  2921. of their circuit. This approach can improve security on connections
  2922. where Tor's circuit handshake is stronger than the available TLS
  2923. connection security levels, but the tradeoff is more computational
  2924. load on guard relays. Implements proposal 221. Resolves ticket 9386.
  2925. - Make the number of entry guards configurable via a new
  2926. NumEntryGuards consensus parameter, and the number of directory
  2927. guards configurable via a new NumDirectoryGuards consensus
  2928. parameter. Implements ticket 12688.
  2929. o Major bugfixes:
  2930. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
  2931. implementation that caused incorrect results on 32-bit
  2932. implementations when certain malformed inputs were used along with
  2933. a small class of private ntor keys. This bug does not currently
  2934. appear to allow an attacker to learn private keys or impersonate a
  2935. Tor server, but it could provide a means to distinguish 32-bit Tor
  2936. implementations from 64-bit Tor implementations. Fixes bug 12694;
  2937. bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
  2938. Adam Langley.
  2939. o Minor bugfixes:
  2940. - Warn and drop the circuit if we receive an inbound 'relay early'
  2941. cell. Those used to be normal to receive on hidden service circuits
  2942. due to bug 1038, but the buggy Tor versions are long gone from
  2943. the network so we can afford to resume watching for them. Resolves
  2944. the rest of bug 1038; bugfix on 0.2.1.19.
  2945. - Correct a confusing error message when trying to extend a circuit
  2946. via the control protocol but we don't know a descriptor or
  2947. microdescriptor for one of the specified relays. Fixes bug 12718;
  2948. bugfix on 0.2.3.1-alpha.
  2949. - Avoid an illegal read from stack when initializing the TLS
  2950. module using a version of OpenSSL without all of the ciphers
  2951. used by the v2 link handshake. Fixes bug 12227; bugfix on
  2952. 0.2.4.8-alpha. Found by "starlight".
  2953. o Minor features:
  2954. - Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
  2955. Country database.
  2956. Changes in version 0.2.5.5-alpha - 2014-06-18
  2957. Tor 0.2.5.5-alpha fixes a wide variety of remaining issues in the Tor
  2958. 0.2.5.x release series, including a couple of DoS issues, some
  2959. performance regressions, a large number of bugs affecting the Linux
  2960. seccomp2 sandbox code, and various other bugfixes. It also adds
  2961. diagnostic bugfixes for a few tricky issues that we're trying to
  2962. track down.
  2963. o Major features (security, traffic analysis resistance):
  2964. - Several major improvements to the algorithm used to decide when to
  2965. close TLS connections. Previous versions of Tor closed connections
  2966. at a fixed interval after the last time a non-padding cell was
  2967. sent over the connection, regardless of the target of the
  2968. connection. Now, we randomize the intervals by adding up to 50% of
  2969. their base value, we measure the length of time since connection
  2970. last had at least one circuit, and we allow connections to known
  2971. ORs to remain open a little longer (15 minutes instead of 3
  2972. minutes minimum). These changes should improve Tor's resistance
  2973. against some kinds of traffic analysis, and lower some overhead
  2974. from needlessly closed connections. Fixes ticket 6799.
  2975. Incidentally fixes ticket 12023; bugfix on 0.2.5.1-alpha.
  2976. o Major bugfixes (security, OOM, new since 0.2.5.4-alpha, also in 0.2.4.22):
  2977. - Fix a memory leak that could occur if a microdescriptor parse
  2978. fails during the tokenizing step. This bug could enable a memory
  2979. exhaustion attack by directory servers. Fixes bug 11649; bugfix
  2980. on 0.2.2.6-alpha.
  2981. o Major bugfixes (security, directory authorities):
  2982. - Directory authorities now include a digest of each relay's
  2983. identity key as a part of its microdescriptor.
  2984. This is a workaround for bug 11743 (reported by "cypherpunks"),
  2985. where Tor clients do not support receiving multiple
  2986. microdescriptors with the same SHA256 digest in the same
  2987. consensus. When clients receive a consensus like this, they only
  2988. use one of the relays. Without this fix, a hostile relay could
  2989. selectively disable some client use of target relays by
  2990. constructing a router descriptor with a different identity and the
  2991. same microdescriptor parameters and getting the authorities to
  2992. list it in a microdescriptor consensus. This fix prevents an
  2993. attacker from causing a microdescriptor collision, because the
  2994. router's identity is not forgeable.
  2995. o Major bugfixes (relay):
  2996. - Use a direct dirport connection when uploading non-anonymous
  2997. descriptors to the directory authorities. Previously, relays would
  2998. incorrectly use tunnel connections under a fairly wide variety of
  2999. circumstances. Fixes bug 11469; bugfix on 0.2.4.3-alpha.
  3000. - When a circuit accidentally has the same circuit ID for its
  3001. forward and reverse direction, correctly detect the direction of
  3002. cells using that circuit. Previously, this bug made roughly one
  3003. circuit in a million non-functional. Fixes bug 12195; this is a
  3004. bugfix on every version of Tor.
  3005. o Major bugfixes (client, pluggable transports):
  3006. - When managing pluggable transports, use OS notification facilities
  3007. to learn if they have crashed, and don't attempt to kill any
  3008. process that has already exited. Fixes bug 8746; bugfix
  3009. on 0.2.3.6-alpha.
  3010. o Minor features (diagnostic):
  3011. - When logging a warning because of bug 7164, additionally check the
  3012. hash table for consistency (as proposed on ticket 11737). This may
  3013. help diagnose bug 7164.
  3014. - When we log a heartbeat, log how many one-hop circuits we have
  3015. that are at least 30 minutes old, and log status information about
  3016. a few of them. This is an attempt to track down bug 8387.
  3017. - When encountering an unexpected CR while writing text to a file on
  3018. Windows, log the name of the file. Should help diagnosing
  3019. bug 11233.
  3020. - Give more specific warnings when a client notices that an onion
  3021. handshake has failed. Fixes ticket 9635.
  3022. - Add significant new logging code to attempt to diagnose bug 12184,
  3023. where relays seem to run out of available circuit IDs.
  3024. - Improve the diagnostic log message for bug 8387 even further to
  3025. try to improve our odds of figuring out why one-hop directory
  3026. circuits sometimes do not get closed.
  3027. o Minor features (security, memory management):
  3028. - Memory allocation tricks (mempools and buffer freelists) are now
  3029. disabled by default. You can turn them back on with
  3030. --enable-mempools and --enable-buf-freelists respectively. We're
  3031. disabling these features because malloc performance is good enough
  3032. on most platforms, and a similar feature in OpenSSL exacerbated
  3033. exploitation of the Heartbleed attack. Resolves ticket 11476.
  3034. o Minor features (security):
  3035. - Apply the secure SipHash-2-4 function to the hash table mapping
  3036. circuit IDs and channels to circuits. We missed this one when we
  3037. were converting all the other hash functions to use SipHash back
  3038. in 0.2.5.3-alpha. Resolves ticket 11750.
  3039. o Minor features (build):
  3040. - The configure script has a --disable-seccomp option to turn off
  3041. support for libseccomp on systems that have it, in case it (or
  3042. Tor's use of it) is broken. Resolves ticket 11628.
  3043. o Minor features (other):
  3044. - Update geoip and geoip6 to the June 4 2014 Maxmind GeoLite2
  3045. Country database.
  3046. o Minor bugfixes (security, new since 0.2.5.4-alpha, also in 0.2.4.22):
  3047. - When running a hidden service, do not allow TunneledDirConns 0;
  3048. this will keep the hidden service from running, and also
  3049. make it publish its descriptors directly over HTTP. Fixes bug 10849;
  3050. bugfix on 0.2.1.1-alpha.
  3051. o Minor bugfixes (performance):
  3052. - Avoid a bug where every successful connection made us recompute
  3053. the flag telling us whether we have sufficient information to
  3054. build circuits. Previously, we would forget our cached value
  3055. whenever we successfully opened a channel (or marked a router as
  3056. running or not running for any other reason), regardless of
  3057. whether we had previously believed the router to be running. This
  3058. forced us to run an expensive update operation far too often.
  3059. Fixes bug 12170; bugfix on 0.1.2.1-alpha.
  3060. - Avoid using tor_memeq() for checking relay cell integrity. This
  3061. removes a possible performance bottleneck. Fixes part of bug
  3062. 12169; bugfix on 0.2.1.31.
  3063. o Minor bugfixes (compilation):
  3064. - Fix compilation of test_status.c when building with MVSC. Bugfix
  3065. on 0.2.5.4-alpha. Patch from Gisle Vanem.
  3066. - Resolve GCC complaints on OpenBSD about discarding constness in
  3067. TO_{ORIGIN,OR}_CIRCUIT functions. Fixes part of bug 11633; bugfix
  3068. on 0.1.1.23. Patch from Dana Koch.
  3069. - Resolve clang complaints on OpenBSD with -Wshorten-64-to-32 due to
  3070. treatment of long and time_t as comparable types. Fixes part of
  3071. bug 11633. Patch from Dana Koch.
  3072. - Make Tor compile correctly with --disable-buf-freelists. Fixes bug
  3073. 11623; bugfix on 0.2.5.3-alpha.
  3074. - When deciding whether to build the 64-bit curve25519
  3075. implementation, detect platforms where we can compile 128-bit
  3076. arithmetic but cannot link it. Fixes bug 11729; bugfix on
  3077. 0.2.4.8-alpha. Patch from "conradev".
  3078. - Fix compilation when DNS_CACHE_DEBUG is enabled. Fixes bug 11761;
  3079. bugfix on 0.2.3.13-alpha. Found by "cypherpunks".
  3080. - Fix compilation with dmalloc. Fixes bug 11605; bugfix
  3081. on 0.2.4.10-alpha.
  3082. o Minor bugfixes (Directory server):
  3083. - When sending a compressed set of descriptors or microdescriptors,
  3084. make sure to finalize the zlib stream. Previously, we would write
  3085. all the compressed data, but if the last descriptor we wanted to
  3086. send was missing or too old, we would not mark the stream as
  3087. finished. This caused problems for decompression tools. Fixes bug
  3088. 11648; bugfix on 0.1.1.23.
  3089. o Minor bugfixes (Linux seccomp sandbox):
  3090. - Make the seccomp sandbox code compile under ARM Linux. Fixes bug
  3091. 11622; bugfix on 0.2.5.1-alpha.
  3092. - Avoid crashing when re-opening listener ports with the seccomp
  3093. sandbox active. Fixes bug 12115; bugfix on 0.2.5.1-alpha.
  3094. - Avoid crashing with the seccomp sandbox enabled along with
  3095. ConstrainedSockets. Fixes bug 12139; bugfix on 0.2.5.1-alpha.
  3096. - When we receive a SIGHUP with the sandbox enabled, correctly
  3097. support rotating our log files. Fixes bug 12032; bugfix
  3098. on 0.2.5.1-alpha.
  3099. - Avoid crash when running with sandboxing enabled and
  3100. DirReqStatistics not disabled. Fixes bug 12035; bugfix
  3101. on 0.2.5.1-alpha.
  3102. - Fix a "BUG" warning when trying to write bridge-stats files with
  3103. the Linux syscall sandbox filter enabled. Fixes bug 12041; bugfix
  3104. on 0.2.5.1-alpha.
  3105. - Prevent the sandbox from crashing on startup when run with the
  3106. --enable-expensive-hardening configuration option. Fixes bug
  3107. 11477; bugfix on 0.2.5.4-alpha.
  3108. - When running with DirPortFrontPage and sandboxing both enabled,
  3109. reload the DirPortFrontPage correctly when restarting. Fixes bug
  3110. 12028; bugfix on 0.2.5.1-alpha.
  3111. - Don't try to enable the sandbox when using the Tor binary to check
  3112. its configuration, hash a passphrase, or so on. Doing so was
  3113. crashing on startup for some users. Fixes bug 11609; bugfix
  3114. on 0.2.5.1-alpha.
  3115. - Avoid warnings when running with sandboxing and node statistics
  3116. enabled at the same time. Fixes part of 12064; bugfix on
  3117. 0.2.5.1-alpha. Patch from Michael Wolf.
  3118. - Avoid warnings when running with sandboxing enabled at the same
  3119. time as cookie authentication, hidden services, or directory
  3120. authority voting. Fixes part of 12064; bugfix on 0.2.5.1-alpha.
  3121. - Do not allow options that require calls to exec to be enabled
  3122. alongside the seccomp2 sandbox: they will inevitably crash. Fixes
  3123. bug 12043; bugfix on 0.2.5.1-alpha.
  3124. - Handle failures in getpwnam()/getpwuid() when running with the
  3125. User option set and the Linux syscall sandbox enabled. Fixes bug
  3126. 11946; bugfix on 0.2.5.1-alpha.
  3127. - Refactor the getaddrinfo workaround that the seccomp sandbox uses
  3128. to avoid calling getaddrinfo() after installing the sandbox
  3129. filters. Previously, it preloaded a cache with the IPv4 address
  3130. for our hostname, and nothing else. Now, it loads the cache with
  3131. every address that it used to initialize the Tor process. Fixes
  3132. bug 11970; bugfix on 0.2.5.1-alpha.
  3133. o Minor bugfixes (pluggable transports):
  3134. - Enable the ExtORPortCookieAuthFile option, to allow changing the
  3135. default location of the authentication token for the extended OR
  3136. Port as used by sever-side pluggable transports. We had
  3137. implemented this option before, but the code to make it settable
  3138. had been omitted. Fixes bug 11635; bugfix on 0.2.5.1-alpha.
  3139. - Avoid another 60-second delay when starting Tor in a pluggable-
  3140. transport-using configuration when we already have cached
  3141. descriptors for our bridges. Fixes bug 11965; bugfix
  3142. on 0.2.3.6-alpha.
  3143. o Minor bugfixes (client):
  3144. - Avoid "Tried to open a socket with DisableNetwork set" warnings
  3145. when starting a client with bridges configured and DisableNetwork
  3146. set. (Tor launcher starts Tor with DisableNetwork set the first
  3147. time it runs.) Fixes bug 10405; bugfix on 0.2.3.9-alpha.
  3148. o Minor bugfixes (testing):
  3149. - The Python parts of the test scripts now work on Python 3 as well
  3150. as Python 2, so systems where '/usr/bin/python' is Python 3 will
  3151. no longer have the tests break. Fixes bug 11608; bugfix
  3152. on 0.2.5.2-alpha.
  3153. - When looking for versions of python that we could run the tests
  3154. with, check for "python2.7" and "python3.3"; previously we were
  3155. only looking for "python", "python2", and "python3". Patch from
  3156. Dana Koch. Fixes bug 11632; bugfix on 0.2.5.2-alpha.
  3157. - Fix all valgrind warnings produced by the unit tests. There were
  3158. over a thousand memory leak warnings previously, mostly produced
  3159. by forgetting to free things in the unit test code. Fixes bug
  3160. 11618, bugfixes on many versions of Tor.
  3161. o Minor bugfixes (tor-fw-helper):
  3162. - Give a correct log message when tor-fw-helper fails to launch.
  3163. (Previously, we would say something like "tor-fw-helper sent us a
  3164. string we could not parse".) Fixes bug 9781; bugfix
  3165. on 0.2.4.2-alpha.
  3166. o Minor bugfixes (relay, threading):
  3167. - Check return code on spawn_func() in cpuworker code, so that we
  3168. don't think we've spawned a nonworking cpuworker and write junk to
  3169. it forever. Fix related to bug 4345; bugfix on all released Tor
  3170. versions. Found by "skruffy".
  3171. - Use a pthread_attr to make sure that spawn_func() cannot return an
  3172. error while at the same time launching a thread. Fix related to
  3173. bug 4345; bugfix on all released Tor versions. Reported
  3174. by "cypherpunks".
  3175. o Minor bugfixes (relay, oom prevention):
  3176. - Correctly detect the total available system memory. We tried to do
  3177. this in 0.2.5.4-alpha, but the code was set up to always return an
  3178. error value, even on success. Fixes bug 11805; bugfix
  3179. on 0.2.5.4-alpha.
  3180. o Minor bugfixes (relay, other):
  3181. - We now drop CREATE cells for already-existent circuit IDs and for
  3182. zero-valued circuit IDs, regardless of other factors that might
  3183. otherwise have called for DESTROY cells. Fixes bug 12191; bugfix
  3184. on 0.0.8pre1.
  3185. - Avoid an illegal read from stack when initializing the TLS module
  3186. using a version of OpenSSL without all of the ciphers used by the
  3187. v2 link handshake. Fixes bug 12227; bugfix on 0.2.4.8-alpha. Found
  3188. by "starlight".
  3189. - When rejecting DATA cells for stream_id zero, still count them
  3190. against the circuit's deliver window so that we don't fail to send
  3191. a SENDME. Fixes bug 11246; bugfix on 0.2.4.10-alpha.
  3192. o Minor bugfixes (logging):
  3193. - Fix a misformatted log message about delayed directory fetches.
  3194. Fixes bug 11654; bugfix on 0.2.5.3-alpha.
  3195. - Squelch a spurious LD_BUG message "No origin circuit for
  3196. successful SOCKS stream" in certain hidden service failure cases;
  3197. fixes bug 10616.
  3198. o Distribution:
  3199. - Include a tor.service file in contrib/dist for use with systemd.
  3200. Some distributions will be able to use this file unmodified;
  3201. others will need to tweak it, or write their own. Patch from Jamie
  3202. Nguyen; resolves ticket 8368.
  3203. o Documentation:
  3204. - Clean up several option names in the manpage to match their real
  3205. names, add the missing documentation for a couple of testing and
  3206. directory authority options, remove the documentation for a
  3207. V2-directory fetching option that no longer exists. Resolves
  3208. ticket 11634.
  3209. - Correct the documenation so that it lists the correct directory
  3210. for the stats files. (They are in a subdirectory called "stats",
  3211. not "status".)
  3212. - In the manpage, move more authority-only options into the
  3213. directory authority section so that operators of regular directory
  3214. caches don't get confused.
  3215. o Package cleanup:
  3216. - The contrib directory has been sorted and tidied. Before, it was
  3217. an unsorted dumping ground for useful and not-so-useful things.
  3218. Now, it is divided based on functionality, and the items which
  3219. seemed to be nonfunctional or useless have been removed. Resolves
  3220. ticket 8966; based on patches from "rl1987".
  3221. o Removed code:
  3222. - Remove /tor/dbg-stability.txt URL that was meant to help debug WFU
  3223. and MTBF calculations, but that nobody was using. Fixes ticket 11742.
  3224. - The TunnelDirConns and PreferTunnelledDirConns options no longer
  3225. exist; tunneled directory connections have been available since
  3226. 0.1.2.5-alpha, and turning them off is not a good idea. This is a
  3227. brute-force fix for 10849, where "TunnelDirConns 0" would break
  3228. hidden services.
  3229. Changes in version 0.2.4.22 - 2014-05-16
  3230. Tor 0.2.4.22 backports numerous high-priority fixes from the Tor 0.2.5
  3231. alpha release series. These include blocking all authority signing
  3232. keys that may have been affected by the OpenSSL "heartbleed" bug,
  3233. choosing a far more secure set of TLS ciphersuites by default, closing
  3234. a couple of memory leaks that could be used to run a target relay out
  3235. of RAM, and several others.
  3236. o Major features (security, backport from 0.2.5.4-alpha):
  3237. - Block authority signing keys that were used on authorities
  3238. vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). (We
  3239. don't have any evidence that these keys _were_ compromised; we're
  3240. doing this to be prudent.) Resolves ticket 11464.
  3241. o Major bugfixes (security, OOM):
  3242. - Fix a memory leak that could occur if a microdescriptor parse
  3243. fails during the tokenizing step. This bug could enable a memory
  3244. exhaustion attack by directory servers. Fixes bug 11649; bugfix
  3245. on 0.2.2.6-alpha.
  3246. o Major bugfixes (TLS cipher selection, backport from 0.2.5.4-alpha):
  3247. - The relay ciphersuite list is now generated automatically based on
  3248. uniform criteria, and includes all OpenSSL ciphersuites with
  3249. acceptable strength and forward secrecy. Previously, we had left
  3250. some perfectly fine ciphersuites unsupported due to omission or
  3251. typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
  3252. 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
  3253. - Relays now trust themselves to have a better view than clients of
  3254. which TLS ciphersuites are better than others. (Thanks to bug
  3255. 11513, the relay list is now well-considered, whereas the client
  3256. list has been chosen mainly for anti-fingerprinting purposes.)
  3257. Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
  3258. CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
  3259. AES128. Resolves ticket 11528.
  3260. - Clients now try to advertise the same list of ciphersuites as
  3261. Firefox 28. This change enables selection of (fast) GCM
  3262. ciphersuites, disables some strange old ciphers, and stops
  3263. advertising the ECDH (not to be confused with ECDHE) ciphersuites.
  3264. Resolves ticket 11438.
  3265. o Minor bugfixes (configuration, security):
  3266. - When running a hidden service, do not allow TunneledDirConns 0:
  3267. trying to set that option together with a hidden service would
  3268. otherwise prevent the hidden service from running, and also make
  3269. it publish its descriptors directly over HTTP. Fixes bug 10849;
  3270. bugfix on 0.2.1.1-alpha.
  3271. o Minor bugfixes (controller, backport from 0.2.5.4-alpha):
  3272. - Avoid sending a garbage value to the controller when a circuit is
  3273. cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.
  3274. o Minor bugfixes (exit relay, backport from 0.2.5.4-alpha):
  3275. - Stop leaking memory when we successfully resolve a PTR record.
  3276. Fixes bug 11437; bugfix on 0.2.4.7-alpha.
  3277. o Minor bugfixes (bridge client, backport from 0.2.5.4-alpha):
  3278. - Avoid 60-second delays in the bootstrapping process when Tor is
  3279. launching for a second time while using bridges. Fixes bug 9229;
  3280. bugfix on 0.2.0.3-alpha.
  3281. o Minor bugfixes (relays and bridges, backport from 0.2.5.4-alpha):
  3282. - Give the correct URL in the warning message when trying to run a
  3283. relay on an ancient version of Windows. Fixes bug 9393.
  3284. o Minor bugfixes (compilation):
  3285. - Fix a compilation error when compiling with --disable-curve25519.
  3286. Fixes bug 9700; bugfix on 0.2.4.17-rc.
  3287. o Minor bugfixes:
  3288. - Downgrade the warning severity for the the "md was still
  3289. referenced 1 node(s)" warning. Tor 0.2.5.4-alpha has better code
  3290. for trying to diagnose this bug, and the current warning in
  3291. earlier versions of tor achieves nothing useful. Addresses warning
  3292. from bug 7164.
  3293. o Minor features (log verbosity, backport from 0.2.5.4-alpha):
  3294. - When we run out of usable circuit IDs on a channel, log only one
  3295. warning for the whole channel, and describe how many circuits
  3296. there were on the channel. Fixes part of ticket 11553.
  3297. o Minor features (security, backport from 0.2.5.4-alpha):
  3298. - Decrease the lower limit of MaxMemInCellQueues to 256 MBytes (but
  3299. leave the default at 8GBytes), to better support Raspberry Pi
  3300. users. Fixes bug 9686; bugfix on 0.2.4.14-alpha.
  3301. o Documentation (backport from 0.2.5.4-alpha):
  3302. - Correctly document that we search for a system torrc file before
  3303. looking in ~/.torrc. Fixes documentation side of 9213; bugfix on
  3304. 0.2.3.18-rc.
  3305. Changes in version 0.2.5.4-alpha - 2014-04-25
  3306. Tor 0.2.5.4-alpha includes several security and performance
  3307. improvements for clients and relays, including blacklisting authority
  3308. signing keys that were used while susceptible to the OpenSSL
  3309. "heartbleed" bug, fixing two expensive functions on busy relays,
  3310. improved TLS ciphersuite preference lists, support for run-time
  3311. hardening on compilers that support AddressSanitizer, and more work on
  3312. the Linux sandbox code.
  3313. There are also several usability fixes for clients (especially clients
  3314. that use bridges), two new TransPort protocols supported (one on
  3315. OpenBSD, one on FreeBSD), and various other bugfixes.
  3316. This release marks end-of-life for Tor 0.2.2.x; those Tor versions
  3317. have accumulated many known flaws; everyone should upgrade.
  3318. o Major features (security):
  3319. - If you don't specify MaxMemInQueues yourself, Tor now tries to
  3320. pick a good value based on your total system memory. Previously,
  3321. the default was always 8 GB. You can still override the default by
  3322. setting MaxMemInQueues yourself. Resolves ticket 11396.
  3323. - Block authority signing keys that were used on authorities
  3324. vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). (We
  3325. don't have any evidence that these keys _were_ compromised; we're
  3326. doing this to be prudent.) Resolves ticket 11464.
  3327. o Major features (relay performance):
  3328. - Speed up server-side lookups of rendezvous and introduction point
  3329. circuits by using hashtables instead of linear searches. These
  3330. functions previously accounted between 3 and 7% of CPU usage on
  3331. some busy relays. Resolves ticket 9841.
  3332. - Avoid wasting CPU when extending a circuit over a channel that is
  3333. nearly out of circuit IDs. Previously, we would do a linear scan
  3334. over possible circuit IDs before finding one or deciding that we
  3335. had exhausted our possibilities. Now, we try at most 64 random
  3336. circuit IDs before deciding that we probably won't succeed. Fixes
  3337. a possible root cause of ticket 11553.
  3338. o Major features (seccomp2 sandbox, Linux only):
  3339. - The seccomp2 sandbox can now run a test network for multiple hours
  3340. without crashing. The sandbox is still experimental, and more bugs
  3341. will probably turn up. To try it, enable "Sandbox 1" on a Linux
  3342. host. Resolves ticket 11351.
  3343. - Strengthen sandbox code: the sandbox can now test the arguments
  3344. for rename(), and blocks _sysctl() entirely. Resolves another part
  3345. of ticket 11351.
  3346. - When the sandbox blocks a system call, it now tries to log a stack
  3347. trace before exiting. Resolves ticket 11465.
  3348. o Major bugfixes (TLS cipher selection):
  3349. - The relay ciphersuite list is now generated automatically based on
  3350. uniform criteria, and includes all OpenSSL ciphersuites with
  3351. acceptable strength and forward secrecy. Previously, we had left
  3352. some perfectly fine ciphersuites unsupported due to omission or
  3353. typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
  3354. 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
  3355. - Relays now trust themselves to have a better view than clients of
  3356. which TLS ciphersuites are better than others. (Thanks to bug
  3357. 11513, the relay list is now well-considered, whereas the client
  3358. list has been chosen mainly for anti-fingerprinting purposes.)
  3359. Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
  3360. CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
  3361. AES128. Resolves ticket 11528.
  3362. - Clients now try to advertise the same list of ciphersuites as
  3363. Firefox 28. This change enables selection of (fast) GCM
  3364. ciphersuites, disables some strange old ciphers, and stops
  3365. advertising the ECDH (not to be confused with ECDHE) ciphersuites.
  3366. Resolves ticket 11438.
  3367. o Major bugfixes (bridge client):
  3368. - Avoid 60-second delays in the bootstrapping process when Tor is
  3369. launching for a second time while using bridges. Fixes bug 9229;
  3370. bugfix on 0.2.0.3-alpha.
  3371. o Minor features (transparent proxy, *BSD):
  3372. - Support FreeBSD's ipfw firewall interface for TransPort ports on
  3373. FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
  3374. 10267; patch from "yurivict".
  3375. - Support OpenBSD's divert-to rules with the pf firewall for
  3376. transparent proxy ports. To enable it, set "TransProxyType
  3377. pf-divert". This allows Tor to run a TransPort transparent proxy
  3378. port on OpenBSD 4.4 or later without root privileges. See the
  3379. pf.conf(5) manual page for information on configuring pf to use
  3380. divert-to rules. Closes ticket 10896; patch from Dana Koch.
  3381. o Minor features (security):
  3382. - New --enable-expensive-hardening option to enable security
  3383. hardening options that consume nontrivial amounts of CPU and
  3384. memory. Right now, this includes AddressSanitizer and UbSan, which
  3385. are supported in newer versions of GCC and Clang. Closes ticket
  3386. 11477.
  3387. o Minor features (log verbosity):
  3388. - Demote the message that we give when a flushing connection times
  3389. out for too long from NOTICE to INFO. It was usually meaningless.
  3390. Resolves ticket 5286.
  3391. - Don't log so many notice-level bootstrapping messages at startup
  3392. about downloading descriptors. Previously, we'd log a notice
  3393. whenever we learned about more routers. Now, we only log a notice
  3394. at every 5% of progress. Fixes bug 9963.
  3395. - Warn less verbosely when receiving a malformed
  3396. ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
  3397. - When we run out of usable circuit IDs on a channel, log only one
  3398. warning for the whole channel, and describe how many circuits
  3399. there were on the channel. Fixes part of ticket 11553.
  3400. o Minor features (relay):
  3401. - If a circuit timed out for at least 3 minutes, check if we have a
  3402. new external IP address, and publish a new descriptor with the new
  3403. IP address if it changed. Resolves ticket 2454.
  3404. o Minor features (controller):
  3405. - Make the entire exit policy available from the control port via
  3406. GETINFO exit-policy/*. Implements enhancement 7952. Patch from
  3407. "rl1987".
  3408. - Because of the fix for ticket 11396, the real limit for memory
  3409. usage may no longer match the configured MaxMemInQueues value. The
  3410. real limit is now exposed via GETINFO limits/max-mem-in-queues.
  3411. o Minor features (bridge client):
  3412. - Report a more useful failure message when we can't connect to a
  3413. bridge because we don't have the right pluggable transport
  3414. configured. Resolves ticket 9665. Patch from Fábio J. Bertinatto.
  3415. o Minor features (diagnostic):
  3416. - Add more log messages to diagnose bug 7164, which causes
  3417. intermittent "microdesc_free() called but md was still referenced"
  3418. warnings. We now include more information, to figure out why we
  3419. might be cleaning a microdescriptor for being too old if it's
  3420. still referenced by a live node_t object.
  3421. o Minor bugfixes (client, DNSPort):
  3422. - When using DNSPort, try to respond to AAAA requests with AAAA
  3423. answers. Previously, we hadn't looked at the request type when
  3424. deciding which answer type to prefer. Fixes bug 10468; bugfix on
  3425. 0.2.4.7-alpha.
  3426. - When receiving a DNS query for an unsupported record type, reply
  3427. with no answer rather than with a NOTIMPL error. This behavior
  3428. isn't correct either, but it will break fewer client programs, we
  3429. hope. Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch
  3430. from "epoch".
  3431. o Minor bugfixes (exit relay):
  3432. - Stop leaking memory when we successfully resolve a PTR record.
  3433. Fixes bug 11437; bugfix on 0.2.4.7-alpha.
  3434. o Minor bugfixes (bridge client):
  3435. - Stop accepting bridge lines containing hostnames. Doing so would
  3436. cause clients to perform DNS requests on the hostnames, which was
  3437. not sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
  3438. - Avoid a 60-second delay in the bootstrapping process when a Tor
  3439. client with pluggable transports re-reads its configuration at
  3440. just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
  3441. o Minor bugfixes (client, logging during bootstrap):
  3442. - Warn only once if we start logging in an unsafe way. Previously,
  3443. we complain as many times as we had problems. Fixes bug 9870;
  3444. bugfix on 0.2.5.1-alpha.
  3445. - Only report the first fatal bootstrap error on a given OR
  3446. connection. This stops us from telling the controller bogus error
  3447. messages like "DONE". Fixes bug 10431; bugfix on 0.2.1.1-alpha.
  3448. - Be more helpful when trying to run sandboxed on Linux without
  3449. libseccomp. Instead of saying "Sandbox is not implemented on this
  3450. platform", we now explain that we need to be built with
  3451. libseccomp. Fixes bug 11543; bugfix on 0.2.5.1-alpha.
  3452. - Avoid generating spurious warnings when starting with
  3453. DisableNetwork enabled. Fixes bug 11200 and bug 10405; bugfix on
  3454. 0.2.3.9-alpha.
  3455. o Minor bugfixes (closing OR connections):
  3456. - If write_to_buf() in connection_write_to_buf_impl_() ever fails,
  3457. check if it's an or_connection_t and correctly call
  3458. connection_or_close_for_error() rather than
  3459. connection_mark_for_close() directly. Fixes bug 11304; bugfix on
  3460. 0.2.4.4-alpha.
  3461. - When closing all connections on setting DisableNetwork to 1, use
  3462. connection_or_close_normally() rather than closing OR connections
  3463. out from under the channel layer. Fixes bug 11306; bugfix on
  3464. 0.2.4.4-alpha.
  3465. o Minor bugfixes (controller):
  3466. - Avoid sending a garbage value to the controller when a circuit is
  3467. cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.
  3468. o Minor bugfixes (tor-fw-helper):
  3469. - Allow tor-fw-helper to build again by adding src/ext to its
  3470. CPPFLAGS. Fixes bug 11296; bugfix on 0.2.5.3-alpha.
  3471. o Minor bugfixes (bridges):
  3472. - Avoid potential crashes or bad behavior when launching a
  3473. server-side managed proxy with ORPort or ExtORPort temporarily
  3474. disabled. Fixes bug 9650; bugfix on 0.2.3.16-alpha.
  3475. o Minor bugfixes (platform-specific):
  3476. - Fix compilation on Solaris, which does not have <endian.h>. Fixes
  3477. bug 11426; bugfix on 0.2.5.3-alpha.
  3478. - When dumping a malformed directory object to disk, save it in
  3479. binary mode on Windows, not text mode. Fixes bug 11342; bugfix on
  3480. 0.2.2.1-alpha.
  3481. - Don't report failures from make_socket_reuseable() on incoming
  3482. sockets on OSX: this can happen when incoming connections close
  3483. early. Fixes bug 10081.
  3484. o Minor bugfixes (trivial memory leaks):
  3485. - Fix a small memory leak when signing a directory object. Fixes bug
  3486. 11275; bugfix on 0.2.4.13-alpha.
  3487. - Free placeholder entries in our circuit table at exit; fixes a
  3488. harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
  3489. - Don't re-initialize a second set of OpenSSL mutexes when starting
  3490. up. Previously, we'd make one set of mutexes, and then immediately
  3491. replace them with another. Fixes bug 11726; bugfix on
  3492. 0.2.5.3-alpha.
  3493. - Resolve some memory leaks found by coverity in the unit tests, on
  3494. exit in tor-gencert, and on a failure to compute digests for our
  3495. own keys when generating a v3 networkstatus vote. These leaks
  3496. should never have affected anyone in practice.
  3497. o Minor bugfixes (hidden service):
  3498. - Only retry attempts to connect to a chosen rendezvous point 8
  3499. times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
  3500. o Minor bugfixes (misc code correctness):
  3501. - Fix various instances of undefined behavior in channeltls.c,
  3502. tor_memmem(), and eventdns.c that would cause us to construct
  3503. pointers to memory outside an allocated object. (These invalid
  3504. pointers were not accessed, but C does not even allow them to
  3505. exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
  3506. 0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
  3507. - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
  3508. fix some miscellaneous errors in our tests and codebase. Fixes bug
  3509. 11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
  3510. - Always check return values for unlink, munmap, UnmapViewOfFile;
  3511. check strftime return values more often. In some cases all we can
  3512. do is report a warning, but this may help prevent deeper bugs from
  3513. going unnoticed. Closes ticket 8787; bugfixes on many, many tor
  3514. versions.
  3515. - Fix numerous warnings from the clang "scan-build" static analyzer.
  3516. Some of these are programming style issues; some of them are false
  3517. positives that indicated awkward code; some are undefined behavior
  3518. cases related to constructing (but not using) invalid pointers;
  3519. some are assumptions about API behavior; some are (harmlessly)
  3520. logging sizeof(ptr) bytes from a token when sizeof(*ptr) would be
  3521. correct; and one or two are genuine bugs that weren't reachable
  3522. from the rest of the program. Fixes bug 8793; bugfixes on many,
  3523. many tor versions.
  3524. o Documentation:
  3525. - Build the torify.1 manpage again. Previously, we were only trying
  3526. to build it when also building tor-fw-helper. That's why we didn't
  3527. notice that we'd broken the ability to build it. Fixes bug 11321;
  3528. bugfix on 0.2.5.1-alpha.
  3529. - Fix the layout of the SOCKSPort flags in the manpage. Fixes bug
  3530. 11061; bugfix on 0.2.4.7-alpha.
  3531. - Correctly document that we search for a system torrc file before
  3532. looking in ~/.torrc. Fixes documentation side of 9213; bugfix on
  3533. 0.2.3.18-rc.
  3534. - Resolve warnings from Doxygen.
  3535. o Code simplifications and refactoring:
  3536. - Remove is_internal_IP() function. Resolves ticket 4645.
  3537. - Remove unused function circuit_dump_by_chan from circuitlist.c.
  3538. Closes issue 9107; patch from "marek".
  3539. - Change our use of the ENUM_BF macro to avoid declarations that
  3540. confuse Doxygen.
  3541. o Deprecated versions:
  3542. - Tor 0.2.2.x has reached end-of-life; it has received no patches or
  3543. attention for some while. Directory authorities no longer accept
  3544. descriptors from relays running any version of Tor prior to Tor
  3545. 0.2.3.16-alpha. Resolves ticket 11149.
  3546. o Testing:
  3547. - New macros in test.h to simplify writing mock-functions for unit
  3548. tests. Part of ticket 11507. Patch from Dana Koch.
  3549. - Complete tests for the status.c module. Resolves ticket 11507.
  3550. Patch from Dana Koch.
  3551. o Removed code:
  3552. - Remove all code for the long unused v1 directory protocol.
  3553. Resolves ticket 11070.
  3554. Changes in version 0.2.5.3-alpha - 2014-03-22
  3555. Tor 0.2.5.3-alpha includes all the fixes from 0.2.4.21. It contains
  3556. two new anti-DoS features for Tor relays, resolves a bug that kept
  3557. SOCKS5 support for IPv6 from working, fixes several annoying usability
  3558. issues for bridge users, and removes more old code for unused
  3559. directory formats.
  3560. The Tor 0.2.5.x release series is now in patch-freeze: no feature
  3561. patches not already written will be considered for inclusion in 0.2.5.x.
  3562. o Major features (relay security, DoS-resistance):
  3563. - When deciding whether we have run out of memory and we need to
  3564. close circuits, also consider memory allocated in buffers for
  3565. streams attached to each circuit.
  3566. This change, which extends an anti-DoS feature introduced in
  3567. 0.2.4.13-alpha and improved in 0.2.4.14-alpha, lets Tor exit relays
  3568. better resist more memory-based DoS attacks than before. Since the
  3569. MaxMemInCellQueues option now applies to all queues, it is renamed
  3570. to MaxMemInQueues. This feature fixes bug 10169.
  3571. - Avoid hash-flooding denial-of-service attacks by using the secure
  3572. SipHash-2-4 hash function for our hashtables. Without this
  3573. feature, an attacker could degrade performance of a targeted
  3574. client or server by flooding their data structures with a large
  3575. number of entries to be stored at the same hash table position,
  3576. thereby slowing down the Tor instance. With this feature, hash
  3577. table positions are derived from a randomized cryptographic key,
  3578. and an attacker cannot predict which entries will collide. Closes
  3579. ticket 4900.
  3580. - Decrease the lower limit of MaxMemInQueues to 256 MBytes (but leave
  3581. the default at 8GBytes), to better support Raspberry Pi users. Fixes
  3582. bug 9686; bugfix on 0.2.4.14-alpha.
  3583. o Minor features (bridges, pluggable transports):
  3584. - Bridges now write the SHA1 digest of their identity key
  3585. fingerprint (that is, a hash of a hash of their public key) to
  3586. notice-level logs, and to a new hashed-fingerprint file. This
  3587. information will help bridge operators look up their bridge in
  3588. Globe and similar tools. Resolves ticket 10884.
  3589. - Improve the message that Tor displays when running as a bridge
  3590. using pluggable transports without an Extended ORPort listener.
  3591. Also, log the message in the log file too. Resolves ticket 11043.
  3592. o Minor features (other):
  3593. - Add a new option, PredictedPortsRelevanceTime, to control how long
  3594. after having received a request to connect to a given port Tor
  3595. will try to keep circuits ready in anticipation of future requests
  3596. for that port. Patch from "unixninja92"; implements ticket 9176.
  3597. - Generate a warning if any ports are listed in the SocksPolicy,
  3598. DirPolicy, AuthDirReject, AuthDirInvalid, AuthDirBadDir, or
  3599. AuthDirBadExit options. (These options only support address
  3600. ranges.) Fixes part of ticket 11108.
  3601. - Update geoip and geoip6 to the February 7 2014 Maxmind GeoLite2
  3602. Country database.
  3603. o Minor bugfixes (new since 0.2.5.2-alpha, also in 0.2.4.21):
  3604. - Build without warnings under clang 3.4. (We have some macros that
  3605. define static functions only some of which will get used later in
  3606. the module. Starting with clang 3.4, these give a warning unless the
  3607. unused attribute is set on them.) Resolves ticket 10904.
  3608. - Fix build warnings about missing "a2x" comment when building the
  3609. manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
  3610. Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
  3611. o Minor bugfixes (client):
  3612. - Improve the log message when we can't connect to a hidden service
  3613. because all of the hidden service directory nodes hosting its
  3614. descriptor are excluded. Improves on our fix for bug 10722, which
  3615. was a bugfix on 0.2.0.10-alpha.
  3616. - Raise a control port warning when we fail to connect to all of
  3617. our bridges. Previously, we didn't inform the controller, and
  3618. the bootstrap process would stall. Fixes bug 11069; bugfix on
  3619. 0.2.1.2-alpha.
  3620. - Exit immediately when a process-owning controller exits.
  3621. Previously, tor relays would wait for a little while after their
  3622. controller exited, as if they had gotten an INT signal -- but this
  3623. was problematic, since there was no feedback for the user. To do a
  3624. clean shutdown, controllers should send an INT signal and give Tor
  3625. a chance to clean up. Fixes bug 10449; bugfix on 0.2.2.28-beta.
  3626. - Stop attempting to connect to bridges before our pluggable
  3627. transports are configured (harmless but resulted in some erroneous
  3628. log messages). Fixes bug 11156; bugfix on 0.2.3.2-alpha.
  3629. - Fix connections to IPv6 addresses over SOCKS5. Previously, we were
  3630. generating incorrect SOCKS5 responses, and confusing client
  3631. applications. Fixes bug 10987; bugfix on 0.2.4.7-alpha.
  3632. o Minor bugfixes (relays and bridges):
  3633. - Avoid crashing on a malformed resolv.conf file when running a
  3634. relay using Libevent 1. Fixes bug 8788; bugfix on 0.1.1.23.
  3635. - Non-exit relays no longer launch mock DNS requests to check for
  3636. DNS hijacking. This has been unnecessary since 0.2.1.7-alpha, when
  3637. non-exit relays stopped servicing DNS requests. Fixes bug 965;
  3638. bugfix on 0.2.1.7-alpha. Patch from Matt Pagan.
  3639. - Bridges now report complete directory request statistics. Related
  3640. to bug 5824; bugfix on 0.2.2.1-alpha.
  3641. - Bridges now never collect statistics that were designed for
  3642. relays. Fixes bug 5824; bugfix on 0.2.3.8-alpha.
  3643. - Stop giving annoying warning messages when we decide not to launch
  3644. a pluggable transport proxy that we don't need (because there are
  3645. no bridges configured to use it). Resolves ticket 5018; bugfix
  3646. on 0.2.5.2-alpha.
  3647. - Give the correct URL in the warning message when trying to run a
  3648. relay on an ancient version of Windows. Fixes bug 9393.
  3649. o Minor bugfixes (backtrace support):
  3650. - Support automatic backtraces on more platforms by using the
  3651. "-fasynchronous-unwind-tables" compiler option. This option is
  3652. needed for platforms like 32-bit Intel where "-fomit-frame-pointer"
  3653. is on by default and table generation is not. This doesn't yet
  3654. add Windows support; only Linux, OSX, and some BSDs are affected.
  3655. Reported by 'cypherpunks'; fixes bug 11047; bugfix on 0.2.5.2-alpha.
  3656. - Avoid strange behavior if two threads hit failed assertions at the
  3657. same time and both try to log backtraces at once. (Previously, if
  3658. this had happened, both threads would have stored their intermediate
  3659. results in the same buffer, and generated junk outputs.) Reported by
  3660. "cypherpunks". Fixes bug 11048; bugfix on 0.2.5.2-alpha.
  3661. - Fix a compiler warning in format_number_sigsafe(). Bugfix on
  3662. 0.2.5.2-alpha; patch from Nick Hopper.
  3663. o Minor bugfixes (unit tests):
  3664. - Fix a small bug in the unit tests that might have made the tests
  3665. call 'chmod' with an uninitialized bitmask. Fixes bug 10928;
  3666. bugfix on 0.2.5.1-alpha. Patch from Dana Koch.
  3667. o Removed code:
  3668. - Remove all remaining code related to version-0 hidden service
  3669. descriptors: they have not been in use since 0.2.2.1-alpha. Fixes
  3670. the rest of bug 10841.
  3671. o Documentation:
  3672. - Document in the manpage that "KBytes" may also be written as
  3673. "kilobytes" or "KB", that "Kbits" may also be written as
  3674. "kilobits", and so forth. Closes ticket 9222.
  3675. - Document that the ClientOnly config option overrides ORPort.
  3676. Our old explanation made ClientOnly sound as though it did
  3677. nothing at all. Resolves bug 9059.
  3678. - Explain that SocksPolicy, DirPolicy, and similar options don't
  3679. take port arguments. Fixes the other part of ticket 11108.
  3680. - Fix a comment about the rend_server_descriptor_t.protocols field
  3681. to more accurately describe its range. Also, make that field
  3682. unsigned, to more accurately reflect its usage. Fixes bug 9099;
  3683. bugfix on 0.2.1.5-alpha.
  3684. - Fix the manpage's description of HiddenServiceAuthorizeClient:
  3685. the maximum client name length is 16, not 19. Fixes bug 11118;
  3686. bugfix on 0.2.1.6-alpha.
  3687. o Code simplifications and refactoring:
  3688. - Get rid of router->address, since in all cases it was just the
  3689. string representation of router->addr. Resolves ticket 5528.
  3690. o Test infrastructure:
  3691. - Update to the latest version of tinytest.
  3692. - Improve the tinytest implementation of string operation tests so
  3693. that comparisons with NULL strings no longer crash the tests; they
  3694. now just fail, normally. Fixes bug 9004; bugfix on 0.2.2.4-alpha.
  3695. Changes in version 0.2.4.21 - 2014-02-28
  3696. Tor 0.2.4.21 further improves security against potential adversaries who
  3697. find breaking 1024-bit crypto doable, and backports several stability
  3698. and robustness patches from the 0.2.5 branch.
  3699. o Major features (client security):
  3700. - When we choose a path for a 3-hop circuit, make sure it contains
  3701. at least one relay that supports the NTor circuit extension
  3702. handshake. Otherwise, there is a chance that we're building
  3703. a circuit that's worth attacking by an adversary who finds
  3704. breaking 1024-bit crypto doable, and that chance changes the game
  3705. theory. Implements ticket 9777.
  3706. o Major bugfixes:
  3707. - Do not treat streams that fail with reason
  3708. END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
  3709. since it could also indicate an ENETUNREACH connection error. Fixes
  3710. part of bug 10777; bugfix on 0.2.4.8-alpha.
  3711. o Code simplification and refactoring:
  3712. - Remove data structures which were introduced to implement the
  3713. CellStatistics option: they are now redundant with the new timestamp
  3714. field in the regular packed_cell_t data structure, which we did
  3715. in 0.2.4.18-rc in order to resolve bug 9093. Resolves ticket 10870.
  3716. o Minor features:
  3717. - Always clear OpenSSL bignums before freeing them -- even bignums
  3718. that don't contain secrets. Resolves ticket 10793. Patch by
  3719. Florent Daigniere.
  3720. - Build without warnings under clang 3.4. (We have some macros that
  3721. define static functions only some of which will get used later in
  3722. the module. Starting with clang 3.4, these give a warning unless the
  3723. unused attribute is set on them.) Resolves ticket 10904.
  3724. - Update geoip and geoip6 files to the February 7 2014 Maxmind
  3725. GeoLite2 Country database.
  3726. o Minor bugfixes:
  3727. - Set the listen() backlog limit to the largest actually supported
  3728. on the system, not to the value in a header file. Fixes bug 9716;
  3729. bugfix on every released Tor.
  3730. - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
  3731. exit node as a NOROUTE error, not an INTERNAL error, since they
  3732. can apparently happen when trying to connect to the wrong sort
  3733. of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
  3734. - Fix build warnings about missing "a2x" comment when building the
  3735. manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
  3736. Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
  3737. - Avoid a segfault on SIGUSR1, where we had freed a connection but did
  3738. not entirely remove it from the connection lists. Fixes bug 9602;
  3739. bugfix on 0.2.4.4-alpha.
  3740. - Fix a segmentation fault in our benchmark code when running with
  3741. Fedora's OpenSSL package, or any other OpenSSL that provides
  3742. ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.
  3743. - Turn "circuit handshake stats since last time" log messages into a
  3744. heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
  3745. o Documentation fixes:
  3746. - Document that all but one DirPort entry must have the NoAdvertise
  3747. flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
  3748. Changes in version 0.2.5.2-alpha - 2014-02-13
  3749. Tor 0.2.5.2-alpha includes all the fixes from 0.2.4.18-rc and 0.2.4.20,
  3750. like the "poor random number generation" fix and the "building too many
  3751. circuits" fix. It also further improves security against potential
  3752. adversaries who find breaking 1024-bit crypto doable, and launches
  3753. pluggable transports on demand (which gets us closer to integrating
  3754. pluggable transport support by default -- not to be confused with Tor
  3755. bundles enabling pluggable transports and bridges by default).
  3756. o Major features (client security):
  3757. - When we choose a path for a 3-hop circuit, make sure it contains
  3758. at least one relay that supports the NTor circuit extension
  3759. handshake. Otherwise, there is a chance that we're building
  3760. a circuit that's worth attacking by an adversary who finds
  3761. breaking 1024-bit crypto doable, and that chance changes the game
  3762. theory. Implements ticket 9777.
  3763. - Clients now look at the "usecreatefast" consensus parameter to
  3764. decide whether to use CREATE_FAST or CREATE cells for the first hop
  3765. of their circuit. This approach can improve security on connections
  3766. where Tor's circuit handshake is stronger than the available TLS
  3767. connection security levels, but the tradeoff is more computational
  3768. load on guard relays. Implements proposal 221. Resolves ticket 9386.
  3769. o Major features (bridges):
  3770. - Don't launch pluggable transport proxies if we don't have any
  3771. bridges configured that would use them. Now we can list many
  3772. pluggable transports, and Tor will dynamically start one when it
  3773. hears a bridge address that needs it. Resolves ticket 5018.
  3774. - The bridge directory authority now assigns status flags (Stable,
  3775. Guard, etc) to bridges based on thresholds calculated over all
  3776. Running bridges. Now bridgedb can finally make use of its features
  3777. to e.g. include at least one Stable bridge in its answers. Fixes
  3778. bug 9859.
  3779. o Major features (other):
  3780. - Extend ORCONN controller event to include an "ID" parameter,
  3781. and add four new controller event types CONN_BW, CIRC_BW,
  3782. CELL_STATS, and TB_EMPTY that show connection and circuit usage.
  3783. The new events are emitted in private Tor networks only, with the
  3784. goal of being able to better track performance and load during
  3785. full-network simulations. Implements proposal 218 and ticket 7359.
  3786. - On some platforms (currently: recent OSX versions, glibc-based
  3787. platforms that support the ELF format, and a few other
  3788. Unix-like operating systems), Tor can now dump stack traces
  3789. when a crash occurs or an assertion fails. By default, traces
  3790. are dumped to stderr (if possible) and to any logs that are
  3791. reporting errors. Implements ticket 9299.
  3792. o Major bugfixes:
  3793. - Avoid a segfault on SIGUSR1, where we had freed a connection but did
  3794. not entirely remove it from the connection lists. Fixes bug 9602;
  3795. bugfix on 0.2.4.4-alpha.
  3796. - Do not treat streams that fail with reason
  3797. END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
  3798. since it could also indicate an ENETUNREACH connection error. Fixes
  3799. part of bug 10777; bugfix on 0.2.4.8-alpha.
  3800. o Major bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.20):
  3801. - Do not allow OpenSSL engines to replace the PRNG, even when
  3802. HardwareAccel is set. The only default builtin PRNG engine uses
  3803. the Intel RDRAND instruction to replace the entire PRNG, and
  3804. ignores all attempts to seed it with more entropy. That's
  3805. cryptographically stupid: the right response to a new alleged
  3806. entropy source is never to discard all previously used entropy
  3807. sources. Fixes bug 10402; works around behavior introduced in
  3808. OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
  3809. and "rl1987".
  3810. - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
  3811. address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.
  3812. - Avoid launching spurious extra circuits when a stream is pending.
  3813. This fixes a bug where any circuit that _wasn't_ unusable for new
  3814. streams would be treated as if it were, causing extra circuits to
  3815. be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.
  3816. o Major bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3817. - No longer stop reading or writing on cpuworker connections when
  3818. our rate limiting buckets go empty. Now we should handle circuit
  3819. handshake requests more promptly. Resolves bug 9731.
  3820. - Stop trying to bootstrap all our directory information from
  3821. only our first guard. Discovered while fixing bug 9946; bugfix
  3822. on 0.2.4.8-alpha.
  3823. o Minor features (bridges, pluggable transports):
  3824. - Add threshold cutoffs to the networkstatus document created by
  3825. the Bridge Authority. Fixes bug 1117.
  3826. - On Windows, spawn background processes using the CREATE_NO_WINDOW
  3827. flag. Now Tor Browser Bundle 3.5 with pluggable transports enabled
  3828. doesn't pop up a blank console window. (In Tor Browser Bundle 2.x,
  3829. Vidalia set this option for us.) Implements ticket 10297.
  3830. o Minor features (security):
  3831. - Always clear OpenSSL bignums before freeing them -- even bignums
  3832. that don't contain secrets. Resolves ticket 10793. Patch by
  3833. Florent Daignière.
  3834. o Minor features (config options and command line):
  3835. - Add an --allow-missing-torrc commandline option that tells Tor to
  3836. run even if the configuration file specified by -f is not available.
  3837. Implements ticket 10060.
  3838. - Add support for the TPROXY transparent proxying facility on Linux.
  3839. See documentation for the new TransProxyType option for more
  3840. details. Implementation by "thomo". Closes ticket 10582.
  3841. o Minor features (controller):
  3842. - Add a new "HS_DESC" controller event that reports activities
  3843. related to hidden service descriptors. Resolves ticket 8510.
  3844. - New "DROPGUARDS" controller command to forget all current entry
  3845. guards. Not recommended for ordinary use, since replacing guards
  3846. too frequently makes several attacks easier. Resolves ticket 9934;
  3847. patch from "ra".
  3848. o Minor features (build):
  3849. - Assume that a user using ./configure --host wants to cross-compile,
  3850. and give an error if we cannot find a properly named
  3851. tool-chain. Add a --disable-tool-name-check option to proceed
  3852. nevertheless. Addresses ticket 9869. Patch by Benedikt Gollatz.
  3853. - If we run ./configure and the compiler recognizes -fstack-protector
  3854. but the linker rejects it, warn the user about a potentially missing
  3855. libssp package. Addresses ticket 9948. Patch from Benedikt Gollatz.
  3856. o Minor features (testing):
  3857. - If Python is installed, "make check" now runs extra tests beyond
  3858. the unit test scripts.
  3859. - When bootstrapping a test network, sometimes very few relays get
  3860. the Guard flag. Now a new option "TestingDirAuthVoteGuard" can
  3861. specify a set of relays which should be voted Guard regardless of
  3862. their uptime or bandwidth. Addresses ticket 9206.
  3863. o Minor features (log messages):
  3864. - When ServerTransportPlugin is set on a bridge, Tor can write more
  3865. useful statistics about bridge use in its extrainfo descriptors,
  3866. but only if the Extended ORPort ("ExtORPort") is set too. Add a
  3867. log message to inform the user in this case. Resolves ticket 9651.
  3868. - When receiving a new controller connection, log the origin address.
  3869. Resolves ticket 9698; patch from "sigpipe".
  3870. - When logging OpenSSL engine status at startup, log the status of
  3871. more engines. Fixes ticket 10043; patch from Joshua Datko.
  3872. - Turn "circuit handshake stats since last time" log messages into a
  3873. heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
  3874. o Minor features (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3875. - Improve the circuit queue out-of-memory handler. Previously, when
  3876. we ran low on memory, we'd close whichever circuits had the most
  3877. queued cells. Now, we close those that have the *oldest* queued
  3878. cells, on the theory that those are most responsible for us
  3879. running low on memory. Based on analysis from a forthcoming paper
  3880. by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
  3881. - Generate bootstrapping status update events correctly when fetching
  3882. microdescriptors. Fixes bug 9927.
  3883. - Update to the October 2 2013 Maxmind GeoLite Country database.
  3884. o Minor bugfixes (clients):
  3885. - When closing a channel that has already been open, do not close
  3886. pending circuits that were waiting to connect to the same relay.
  3887. Fixes bug 9880; bugfix on 0.2.5.1-alpha. Thanks to skruffy for
  3888. finding this bug.
  3889. o Minor bugfixes (relays):
  3890. - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
  3891. exit node as a NOROUTE error, not an INTERNAL error, since they
  3892. can apparently happen when trying to connect to the wrong sort
  3893. of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
  3894. o Minor bugfixes (bridges):
  3895. - Fix a bug where the first connection works to a bridge that uses a
  3896. pluggable transport with client-side parameters, but we don't send
  3897. the client-side parameters on subsequent connections. (We don't
  3898. use any pluggable transports with client-side parameters yet,
  3899. but ScrambleSuit will soon become the first one.) Fixes bug 9162;
  3900. bugfix on 0.2.0.3-alpha. Based on a patch from "rl1987".
  3901. o Minor bugfixes (node selection):
  3902. - If ExcludeNodes is set, consider non-excluded hidden service
  3903. directory servers before excluded ones. Do not consider excluded
  3904. hidden service directory servers at all if StrictNodes is
  3905. set. (Previously, we would sometimes decide to connect to those
  3906. servers, and then realize before we initiated a connection that
  3907. we had excluded them.) Fixes bug 10722; bugfix on 0.2.0.10-alpha.
  3908. Reported by "mr-4".
  3909. - If we set the ExitNodes option but it doesn't include any nodes
  3910. that have the Exit flag, we would choose not to bootstrap. Now we
  3911. bootstrap so long as ExitNodes includes nodes which can exit to
  3912. some port. Fixes bug 10543; bugfix on 0.2.4.10-alpha.
  3913. o Minor bugfixes (controller and command-line):
  3914. - If changing a config option via "setconf" fails in a recoverable
  3915. way, we used to nonetheless write our new control ports to the
  3916. file described by the "ControlPortWriteToFile" option. Now we only
  3917. write out that file if we successfully switch to the new config
  3918. option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
  3919. - When a command-line option such as --version or --help that
  3920. ordinarily implies --hush appears on the command line along with
  3921. --quiet, then actually obey --quiet. Previously, we obeyed --quiet
  3922. only if it appeared later on the command line. Fixes bug 9578;
  3923. bugfix on 0.2.5.1-alpha.
  3924. o Minor bugfixes (code correctness):
  3925. - Previously we used two temporary files when writing descriptors to
  3926. disk; now we only use one. Fixes bug 1376.
  3927. - Remove an erroneous (but impossible and thus harmless) pointer
  3928. comparison that would have allowed compilers to skip a bounds
  3929. check in channeltls.c. Fixes bugs 10313 and 9980; bugfix on
  3930. 0.2.0.10-alpha. Noticed by Jared L Wong and David Fifield.
  3931. - Fix an always-true assertion in pluggable transports code so it
  3932. actually checks what it was trying to check. Fixes bug 10046;
  3933. bugfix on 0.2.3.9-alpha. Found by "dcb".
  3934. o Minor bugfixes (protocol correctness):
  3935. - When receiving a VERSIONS cell with an odd number of bytes, close
  3936. the connection immediately since the cell is malformed. Fixes bug
  3937. 10365; bugfix on 0.2.0.10-alpha. Spotted by "bobnomnom"; fix by
  3938. "rl1987".
  3939. o Minor bugfixes (build):
  3940. - Restore the ability to compile Tor with V2_HANDSHAKE_SERVER
  3941. turned off (that is, without support for v2 link handshakes). Fixes
  3942. bug 4677; bugfix on 0.2.3.2-alpha. Patch from "piet".
  3943. - Fix compilation warnings and startup issues when running with
  3944. "Sandbox 1" and libseccomp-2.1.0. Fixes bug 10563; bugfix on
  3945. 0.2.5.1-alpha.
  3946. - Fix compilation on Solaris 9, which didn't like us having an
  3947. identifier named "sun". Fixes bug 10565; bugfix in 0.2.5.1-alpha.
  3948. o Minor bugfixes (testing):
  3949. - Fix a segmentation fault in our benchmark code when running with
  3950. Fedora's OpenSSL package, or any other OpenSSL that provides
  3951. ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.
  3952. o Minor bugfixes (log messages):
  3953. - Fix a bug where clients using bridges would report themselves
  3954. as 50% bootstrapped even without a live consensus document.
  3955. Fixes bug 9922; bugfix on 0.2.1.1-alpha.
  3956. - Suppress a warning where, if there's only one directory authority
  3957. in the network, we would complain that votes and signatures cannot
  3958. be uploaded to other directory authorities. Fixes bug 10842;
  3959. bugfix on 0.2.2.26-beta.
  3960. - Report bootstrapping progress correctly when we're downloading
  3961. microdescriptors. We had updated our "do we have enough microdescs
  3962. to begin building circuits?" logic most recently in 0.2.4.10-alpha
  3963. (see bug 5956), but we left the bootstrap status event logic at
  3964. "how far through getting 1/4 of them are we?" Fixes bug 9958;
  3965. bugfix on 0.2.2.36, which is where they diverged (see bug 5343).
  3966. o Minor bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.20):
  3967. - Avoid a crash bug when starting with a corrupted microdescriptor
  3968. cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha.
  3969. - If we fail to dump a previously cached microdescriptor to disk, avoid
  3970. freeing duplicate data later on. Fixes bug 10423; bugfix on
  3971. 0.2.4.13-alpha. Spotted by "bobnomnom".
  3972. o Minor bugfixes on 0.2.4.x (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3973. - Correctly log long IPv6 exit policies, instead of truncating them
  3974. or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
  3975. - Our default TLS ecdhe groups were backwards: we meant to be using
  3976. P224 for relays (for performance win) and P256 for bridges (since
  3977. it is more common in the wild). Instead we had it backwards. After
  3978. reconsideration, we decided that the default should be P256 on all
  3979. hosts, since its security is probably better, and since P224 is
  3980. reportedly used quite little in the wild. Found by "skruffy" on
  3981. IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
  3982. - Free directory authority certificate download statuses on exit
  3983. rather than leaking them. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
  3984. o Minor bugfixes on 0.2.3.x (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3985. - If the guard we choose first doesn't answer, we would try the
  3986. second guard, but once we connected to the second guard we would
  3987. abandon it and retry the first one, slowing down bootstrapping.
  3988. The fix is to treat all our initially chosen guards as acceptable
  3989. to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
  3990. - Fix an assertion failure that would occur when disabling the
  3991. ORPort setting on a running Tor process while accounting was
  3992. enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
  3993. - When examining the list of network interfaces to find our address,
  3994. do not consider non-running or disabled network interfaces. Fixes
  3995. bug 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
  3996. - Avoid an off-by-one error when checking buffer boundaries when
  3997. formatting the exit status of a pluggable transport helper.
  3998. This is probably not an exploitable bug, but better safe than
  3999. sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
  4000. Pedro Ribeiro.
  4001. o Removed code and features:
  4002. - Clients now reject any directory authority certificates lacking
  4003. a dir-key-crosscert element. These have been included since
  4004. 0.2.1.9-alpha, so there's no real reason for them to be optional
  4005. any longer. Completes proposal 157. Resolves ticket 10162.
  4006. - Remove all code that existed to support the v2 directory system,
  4007. since there are no longer any v2 directory authorities. Resolves
  4008. ticket 10758.
  4009. - Remove the HSAuthoritativeDir and AlternateHSAuthority torrc
  4010. options, which were used for designating authorities as "Hidden
  4011. service authorities". There has been no use of hidden service
  4012. authorities since 0.2.2.1-alpha, when we stopped uploading or
  4013. downloading v0 hidden service descriptors. Fixes bug 10881; also
  4014. part of a fix for bug 10841.
  4015. o Code simplification and refactoring:
  4016. - Remove some old fallback code designed to keep Tor clients working
  4017. in a network with only two working relays. Elsewhere in the code we
  4018. have long since stopped supporting such networks, so there wasn't
  4019. much point in keeping it around. Addresses ticket 9926.
  4020. - Reject 0-length EXTEND2 cells more explicitly. Fixes bug 10536;
  4021. bugfix on 0.2.4.8-alpha. Reported by "cypherpunks".
  4022. - Remove data structures which were introduced to implement the
  4023. CellStatistics option: they are now redundant with the addition
  4024. of a timestamp to the regular packed_cell_t data structure, which
  4025. we did in 0.2.4.18-rc in order to resolve ticket 9093. Implements
  4026. ticket 10870.
  4027. o Documentation (man page) fixes:
  4028. - Update manpage to describe some of the files you can expect to
  4029. find in Tor's DataDirectory. Addresses ticket 9839.
  4030. - Document that all but one DirPort entry must have the NoAdvertise
  4031. flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
  4032. o Documentation fixes (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4033. - Clarify the usage and risks of setting the ContactInfo torrc line
  4034. for your relay or bridge. Resolves ticket 9854.
  4035. - Add anchors to the manpage so we can link to the html version of
  4036. the documentation for specific options. Resolves ticket 9866.
  4037. - Replace remaining references to DirServer in man page and
  4038. log entries. Resolves ticket 10124.
  4039. o Tool changes:
  4040. - Make the "tor-gencert" tool used by directory authority operators
  4041. create 2048-bit signing keys by default (rather than 1024-bit, since
  4042. 1024-bit is uncomfortably small these days). Addresses ticket 10324.
  4043. Changes in version 0.2.4.20 - 2013-12-22
  4044. Tor 0.2.4.20 fixes potentially poor random number generation for users
  4045. who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their
  4046. torrc file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors,
  4047. and 4) have no state file in their DataDirectory (as would happen on
  4048. first start). Users who generated relay or hidden service identity
  4049. keys in such a situation should discard them and generate new ones.
  4050. This release also fixes a logic error that caused Tor clients to build
  4051. many more preemptive circuits than they actually need.
  4052. o Major bugfixes:
  4053. - Do not allow OpenSSL engines to replace the PRNG, even when
  4054. HardwareAccel is set. The only default builtin PRNG engine uses
  4055. the Intel RDRAND instruction to replace the entire PRNG, and
  4056. ignores all attempts to seed it with more entropy. That's
  4057. cryptographically stupid: the right response to a new alleged
  4058. entropy source is never to discard all previously used entropy
  4059. sources. Fixes bug 10402; works around behavior introduced in
  4060. OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
  4061. and "rl1987".
  4062. - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
  4063. address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.
  4064. - Avoid launching spurious extra circuits when a stream is pending.
  4065. This fixes a bug where any circuit that _wasn't_ unusable for new
  4066. streams would be treated as if it were, causing extra circuits to
  4067. be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.
  4068. o Minor bugfixes:
  4069. - Avoid a crash bug when starting with a corrupted microdescriptor
  4070. cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha.
  4071. - If we fail to dump a previously cached microdescriptor to disk, avoid
  4072. freeing duplicate data later on. Fixes bug 10423; bugfix on
  4073. 0.2.4.13-alpha. Spotted by "bobnomnom".
  4074. Changes in version 0.2.4.19 - 2013-12-11
  4075. The Tor 0.2.4 release series is dedicated to the memory of Aaron Swartz
  4076. (1986-2013). Aaron worked on diverse projects including helping to guide
  4077. Creative Commons, playing a key role in stopping SOPA/PIPA, bringing
  4078. transparency to the U.S government's PACER documents, and contributing
  4079. design and development for Tor and Tor2Web. Aaron was one of the latest
  4080. martyrs in our collective fight for civil liberties and human rights,
  4081. and his death is all the more painful because he was one of us.
  4082. Tor 0.2.4.19, the first stable release in the 0.2.4 branch, features
  4083. a new circuit handshake and link encryption that use ECC to provide
  4084. better security and efficiency; makes relays better manage circuit
  4085. creation requests; uses "directory guards" to reduce client enumeration
  4086. risks; makes bridges collect and report statistics about the pluggable
  4087. transports they support; cleans up and improves our geoip database;
  4088. gets much closer to IPv6 support for clients, bridges, and relays; makes
  4089. directory authorities use measured bandwidths rather than advertised
  4090. ones when computing flags and thresholds; disables client-side DNS
  4091. caching to reduce tracking risks; and fixes a big bug in bridge
  4092. reachability testing. This release introduces two new design
  4093. abstractions in the code: a new "channel" abstraction between circuits
  4094. and or_connections to allow for implementing alternate relay-to-relay
  4095. transports, and a new "circuitmux" abstraction storing the queue of
  4096. circuits for a channel. The release also includes many stability,
  4097. security, and privacy fixes.
  4098. Changes in version 0.2.4.18-rc - 2013-11-16
  4099. Tor 0.2.4.18-rc is the fourth release candidate for the Tor 0.2.4.x
  4100. series. It takes a variety of fixes from the 0.2.5.x branch to improve
  4101. stability, performance, and better handling of edge cases.
  4102. o Major features:
  4103. - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
  4104. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
  4105. 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
  4106. renegotiation from working with TLS 1.1 or 1.2, so we had disabled
  4107. them to solve bug 6033.)
  4108. o Major bugfixes:
  4109. - No longer stop reading or writing on cpuworker connections when
  4110. our rate limiting buckets go empty. Now we should handle circuit
  4111. handshake requests more promptly. Resolves bug 9731.
  4112. - If we are unable to save a microdescriptor to the journal, do not
  4113. drop it from memory and then reattempt downloading it. Fixes bug
  4114. 9645; bugfix on 0.2.2.6-alpha.
  4115. - Stop trying to bootstrap all our directory information from
  4116. only our first guard. Discovered while fixing bug 9946; bugfix
  4117. on 0.2.4.8-alpha.
  4118. - The new channel code sometimes lost track of in-progress circuits,
  4119. causing long-running clients to stop building new circuits. The
  4120. fix is to always call circuit_n_chan_done(chan, 0) from
  4121. channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
  4122. o Minor bugfixes (on 0.2.4.x):
  4123. - Correctly log long IPv6 exit policies, instead of truncating them
  4124. or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
  4125. - Our default TLS ecdhe groups were backwards: we meant to be using
  4126. P224 for relays (for performance win) and P256 for bridges (since
  4127. it is more common in the wild). Instead we had it backwards. After
  4128. reconsideration, we decided that the default should be P256 on all
  4129. hosts, since its security is probably better, and since P224 is
  4130. reportedly used quite little in the wild. Found by "skruffy" on
  4131. IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
  4132. - Free directory authority certificate download statuses on exit
  4133. rather than leaking them. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
  4134. o Minor bugfixes (on 0.2.3.x and earlier):
  4135. - If the guard we choose first doesn't answer, we would try the
  4136. second guard, but once we connected to the second guard we would
  4137. abandon it and retry the first one, slowing down bootstrapping.
  4138. The fix is to treat all our initially chosen guards as acceptable
  4139. to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
  4140. - Fix an assertion failure that would occur when disabling the
  4141. ORPort setting on a running Tor process while accounting was
  4142. enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
  4143. - When examining the list of network interfaces to find our address,
  4144. do not consider non-running or disabled network interfaces. Fixes
  4145. bug 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
  4146. - Avoid an off-by-one error when checking buffer boundaries when
  4147. formatting the exit status of a pluggable transport helper.
  4148. This is probably not an exploitable bug, but better safe than
  4149. sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
  4150. Pedro Ribeiro.
  4151. o Minor features (protecting client timestamps):
  4152. - Clients no longer send timestamps in their NETINFO cells. These were
  4153. not used for anything, and they provided one small way for clients
  4154. to be distinguished from each other as they moved from network to
  4155. network or behind NAT. Implements part of proposal 222.
  4156. - Clients now round timestamps in INTRODUCE cells down to the nearest
  4157. 10 minutes. If a new Support022HiddenServices option is set to 0, or
  4158. if it's set to "auto" and the feature is disabled in the consensus,
  4159. the timestamp is sent as 0 instead. Implements part of proposal 222.
  4160. - Stop sending timestamps in AUTHENTICATE cells. This is not such
  4161. a big deal from a security point of view, but it achieves no actual
  4162. good purpose, and isn't needed. Implements part of proposal 222.
  4163. - Reduce down accuracy of timestamps in hidden service descriptors.
  4164. Implements part of proposal 222.
  4165. o Minor features (other):
  4166. - Improve the circuit queue out-of-memory handler. Previously, when
  4167. we ran low on memory, we'd close whichever circuits had the most
  4168. queued cells. Now, we close those that have the *oldest* queued
  4169. cells, on the theory that those are most responsible for us
  4170. running low on memory. Based on analysis from a forthcoming paper
  4171. by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
  4172. - Generate bootstrapping status update events correctly when fetching
  4173. microdescriptors. Fixes bug 9927.
  4174. - Update to the October 2 2013 Maxmind GeoLite Country database.
  4175. o Documentation fixes:
  4176. - Clarify the usage and risks of setting the ContactInfo torrc line
  4177. for your relay or bridge. Resolves ticket 9854.
  4178. - Add anchors to the manpage so we can link to the html version of
  4179. the documentation for specific options. Resolves ticket 9866.
  4180. - Replace remaining references to DirServer in man page and
  4181. log entries. Resolves ticket 10124.
  4182. Changes in version 0.2.5.1-alpha - 2013-10-02
  4183. Tor 0.2.5.1-alpha introduces experimental support for syscall sandboxing
  4184. on Linux, allows bridges that offer pluggable transports to report usage
  4185. statistics, fixes many issues to make testing easier, and provides
  4186. a pile of minor features and bugfixes that have been waiting for a
  4187. release of the new branch.
  4188. This is the first alpha release in a new series, so expect there to
  4189. be bugs. Users who would rather test out a more stable branch should
  4190. stay with 0.2.4.x for now.
  4191. o Major features (security):
  4192. - Use the seccomp2 syscall filtering facility on Linux to limit
  4193. which system calls Tor can invoke. This is an experimental,
  4194. Linux-only feature to provide defense-in-depth against unknown
  4195. attacks. To try turning it on, set "Sandbox 1" in your torrc
  4196. file. Please be ready to report bugs. We hope to add support
  4197. for better sandboxing in the future, including more fine-grained
  4198. filters, better division of responsibility, and support for more
  4199. platforms. This work has been done by Cristian-Matei Toader for
  4200. Google Summer of Code.
  4201. - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
  4202. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
  4203. 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
  4204. renegotiation from working with TLS 1.1 or 1.2, so we had disabled
  4205. them to solve bug 6033.)
  4206. o Major features (other):
  4207. - Add support for passing arguments to managed pluggable transport
  4208. proxies. Implements ticket 3594.
  4209. - Bridges now track GeoIP information and the number of their users
  4210. even when pluggable transports are in use, and report usage
  4211. statistics in their extra-info descriptors. Resolves tickets 4773
  4212. and 5040.
  4213. - Make testing Tor networks bootstrap better: lower directory fetch
  4214. retry schedules and maximum interval without directory requests,
  4215. and raise maximum download tries. Implements ticket 6752.
  4216. - Add make target 'test-network' to run tests on a Chutney network.
  4217. Implements ticket 8530.
  4218. - The ntor handshake is now on-by-default, no matter what the
  4219. directory authorities recommend. Implements ticket 8561.
  4220. o Major bugfixes:
  4221. - Instead of writing destroy cells directly to outgoing connection
  4222. buffers, queue them and intersperse them with other outgoing cells.
  4223. This can prevent a set of resource starvation conditions where too
  4224. many pending destroy cells prevent data cells from actually getting
  4225. delivered. Reported by "oftc_must_be_destroyed". Fixes bug 7912;
  4226. bugfix on 0.2.0.1-alpha.
  4227. - If we are unable to save a microdescriptor to the journal, do not
  4228. drop it from memory and then reattempt downloading it. Fixes bug
  4229. 9645; bugfix on 0.2.2.6-alpha.
  4230. - The new channel code sometimes lost track of in-progress circuits,
  4231. causing long-running clients to stop building new circuits. The
  4232. fix is to always call circuit_n_chan_done(chan, 0) from
  4233. channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
  4234. o Build features:
  4235. - Tor now builds each source file in two modes: a mode that avoids
  4236. exposing identifiers needlessly, and another mode that exposes
  4237. more identifiers for testing. This lets the compiler do better at
  4238. optimizing the production code, while enabling us to take more
  4239. radical measures to let the unit tests test things.
  4240. - The production builds no longer include functions used only in
  4241. the unit tests; all functions exposed from a module only for
  4242. unit-testing are now static in production builds.
  4243. - Add an --enable-coverage configuration option to make the unit
  4244. tests (and a new src/or/tor-cov target) to build with gcov test
  4245. coverage support.
  4246. o Testing:
  4247. - We now have rudimentary function mocking support that our unit
  4248. tests can use to test functions in isolation. Function mocking
  4249. lets the tests temporarily replace a function's dependencies with
  4250. stub functions, so that the tests can check the function without
  4251. invoking the other functions it calls.
  4252. - Add more unit tests for the <circid,channel>->circuit map, and
  4253. the destroy-cell-tracking code to fix bug 7912.
  4254. - Unit tests for failing cases of the TAP onion handshake.
  4255. - More unit tests for address-manipulation functions.
  4256. o Minor features (protecting client timestamps):
  4257. - Clients no longer send timestamps in their NETINFO cells. These were
  4258. not used for anything, and they provided one small way for clients
  4259. to be distinguished from each other as they moved from network to
  4260. network or behind NAT. Implements part of proposal 222.
  4261. - Clients now round timestamps in INTRODUCE cells down to the nearest
  4262. 10 minutes. If a new Support022HiddenServices option is set to 0, or
  4263. if it's set to "auto" and the feature is disabled in the consensus,
  4264. the timestamp is sent as 0 instead. Implements part of proposal 222.
  4265. - Stop sending timestamps in AUTHENTICATE cells. This is not such
  4266. a big deal from a security point of view, but it achieves no actual
  4267. good purpose, and isn't needed. Implements part of proposal 222.
  4268. - Reduce down accuracy of timestamps in hidden service descriptors.
  4269. Implements part of proposal 222.
  4270. o Minor features (config options):
  4271. - Config (torrc) lines now handle fingerprints which are missing
  4272. their initial '$'. Resolves ticket 4341; improvement over 0.0.9pre5.
  4273. - Support a --dump-config option to print some or all of the
  4274. configured options. Mainly useful for debugging the command-line
  4275. option parsing code. Helps resolve ticket 4647.
  4276. - Raise awareness of safer logging: notify user of potentially
  4277. unsafe config options, like logging more verbosely than severity
  4278. "notice" or setting SafeLogging to 0. Resolves ticket 5584.
  4279. - Add a new configuration option TestingV3AuthVotingStartOffset
  4280. that bootstraps a network faster by changing the timing for
  4281. consensus votes. Addresses ticket 8532.
  4282. - Add a new torrc option "ServerTransportOptions" that allows
  4283. bridge operators to pass configuration parameters to their
  4284. pluggable transports. Resolves ticket 8929.
  4285. - The config (torrc) file now accepts bandwidth and space limits in
  4286. bits as well as bytes. (Anywhere that you can say "2 Kilobytes",
  4287. you can now say "16 kilobits", and so on.) Resolves ticket 9214.
  4288. Patch by CharlieB.
  4289. o Minor features (build):
  4290. - Add support for `--library-versions` flag. Implements ticket 6384.
  4291. - Return the "unexpected sendme" warnings to a warn severity, but make
  4292. them rate limited, to help diagnose ticket 8093.
  4293. - Detect a missing asciidoc, and warn the user about it, during
  4294. configure rather than at build time. Fixes issue 6506. Patch from
  4295. Arlo Breault.
  4296. o Minor features (other):
  4297. - Use the SOCK_NONBLOCK socket type, if supported, to open nonblocking
  4298. sockets in a single system call. Implements ticket 5129.
  4299. - Log current accounting state (bytes sent and received + remaining
  4300. time for the current accounting period) in the relay's heartbeat
  4301. message. Implements ticket 5526; patch from Peter Retzlaff.
  4302. - Implement the TRANSPORT_LAUNCHED control port event that
  4303. notifies controllers about new launched pluggable
  4304. transports. Resolves ticket 5609.
  4305. - If we're using the pure-C 32-bit curve25519_donna implementation
  4306. of curve25519, build it with the -fomit-frame-pointer option to
  4307. make it go faster on register-starved hosts. This improves our
  4308. handshake performance by about 6% on i386 hosts without nacl.
  4309. Closes ticket 8109.
  4310. - Update to the September 4 2013 Maxmind GeoLite Country database.
  4311. o Minor bugfixes:
  4312. - Set the listen() backlog limit to the largest actually supported
  4313. on the system, not to the value in a header file. Fixes bug 9716;
  4314. bugfix on every released Tor.
  4315. - No longer accept malformed http headers when parsing urls from
  4316. headers. Now we reply with Bad Request ("400"). Fixes bug 2767;
  4317. bugfix on 0.0.6pre1.
  4318. - In munge_extrainfo_into_routerinfo(), check the return value of
  4319. memchr(). This would have been a serious issue if we ever passed
  4320. it a non-extrainfo. Fixes bug 8791; bugfix on 0.2.0.6-alpha. Patch
  4321. from Arlo Breault.
  4322. - On the chance that somebody manages to build Tor on a
  4323. platform where time_t is unsigned, correct the way that
  4324. microdesc_add_to_cache() handles negative time arguments.
  4325. Fixes bug 8042; bugfix on 0.2.3.1-alpha.
  4326. - Reject relative control socket paths and emit a warning. Previously,
  4327. single-component control socket paths would be rejected, but Tor
  4328. would not log why it could not validate the config. Fixes bug 9258;
  4329. bugfix on 0.2.3.16-alpha.
  4330. o Minor bugfixes (command line):
  4331. - Use a single command-line parser for parsing torrc options on the
  4332. command line and for finding special command-line options to avoid
  4333. inconsistent behavior for torrc option arguments that have the same
  4334. names as command-line options. Fixes bugs 4647 and 9578; bugfix on
  4335. 0.0.9pre5.
  4336. - No longer allow 'tor --hash-password' with no arguments. Fixes bug
  4337. 9573; bugfix on 0.0.9pre5.
  4338. o Minor fixes (build, auxiliary programs):
  4339. - Stop preprocessing the "torify" script with autoconf, since
  4340. it no longer refers to LOCALSTATEDIR. Fixes bug 5505; patch
  4341. from Guilhem.
  4342. - The tor-fw-helper program now follows the standard convention and
  4343. exits with status code "0" on success. Fixes bug 9030; bugfix on
  4344. 0.2.3.1-alpha. Patch by Arlo Breault.
  4345. - Corrected ./configure advice for what openssl dev package you should
  4346. install on Debian. Fixes bug 9207; bugfix on 0.2.0.1-alpha.
  4347. o Minor code improvements:
  4348. - Remove constants and tests for PKCS1 padding; it's insecure and
  4349. shouldn't be used for anything new. Fixes bug 8792; patch
  4350. from Arlo Breault.
  4351. - Remove instances of strcpy() from the unit tests. They weren't
  4352. hurting anything, since they were only in the unit tests, but it's
  4353. embarassing to have strcpy() in the code at all, and some analysis
  4354. tools don't like it. Fixes bug 8790; bugfix on 0.2.3.6-alpha and
  4355. 0.2.3.8-alpha. Patch from Arlo Breault.
  4356. o Removed features:
  4357. - Remove migration code from when we renamed the "cached-routers"
  4358. file to "cached-descriptors" back in 0.2.0.8-alpha. This
  4359. incidentally resolves ticket 6502 by cleaning up the related code
  4360. a bit. Patch from Akshay Hebbar.
  4361. o Code simplification and refactoring:
  4362. - Extract the common duplicated code for creating a subdirectory
  4363. of the data directory and writing to a file in it. Fixes ticket
  4364. 4282; patch from Peter Retzlaff.
  4365. - Since OpenSSL 0.9.7, the i2d_*() functions support allocating output
  4366. buffer. Avoid calling twice: i2d_RSAPublicKey(), i2d_DHparams(),
  4367. i2d_X509(), and i2d_PublicKey(). Resolves ticket 5170.
  4368. - Add a set of accessor functions for the circuit timeout data
  4369. structure. Fixes ticket 6153; patch from "piet".
  4370. - Clean up exit paths from connection_listener_new(). Closes ticket
  4371. 8789. Patch from Arlo Breault.
  4372. - Since we rely on OpenSSL 0.9.8 now, we can use EVP_PKEY_cmp()
  4373. and drop our own custom pkey_eq() implementation. Fixes bug 9043.
  4374. - Use a doubly-linked list to implement the global circuit list.
  4375. Resolves ticket 9108. Patch from Marek Majkowski.
  4376. - Remove contrib/id_to_fp.c since it wasn't used anywhere.
  4377. Changes in version 0.2.4.17-rc - 2013-09-05
  4378. Tor 0.2.4.17-rc is the third release candidate for the Tor 0.2.4.x
  4379. series. It adds an emergency step to help us tolerate the massive
  4380. influx of users: 0.2.4 clients using the new (faster and safer) "NTor"
  4381. circuit-level handshakes now effectively jump the queue compared to
  4382. the 0.2.3 clients using "TAP" handshakes. This release also fixes a
  4383. big bug hindering bridge reachability tests.
  4384. o Major features:
  4385. - Relays now process the new "NTor" circuit-level handshake requests
  4386. with higher priority than the old "TAP" circuit-level handshake
  4387. requests. We still process some TAP requests to not totally starve
  4388. 0.2.3 clients when NTor becomes popular. A new consensus parameter
  4389. "NumNTorsPerTAP" lets us tune the balance later if we need to.
  4390. Implements ticket 9574.
  4391. o Major bugfixes:
  4392. - If the circuit build timeout logic is disabled (via the consensus,
  4393. or because we are an authority), then don't build testing circuits.
  4394. Fixes bug 9657; bugfix on 0.2.2.14-alpha.
  4395. - Bridges now send AUTH_CHALLENGE cells during their v3 handshakes;
  4396. previously they did not, which prevented them from receiving
  4397. successful connections from relays for self-test or bandwidth
  4398. testing. Also, when a relay is extending a circuit to a bridge,
  4399. it needs to send a NETINFO cell, even when the bridge hasn't sent
  4400. an AUTH_CHALLENGE cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
  4401. - If the time to download the next old-style networkstatus is in
  4402. the future, do not decline to consider whether to download the
  4403. next microdescriptor networkstatus. Fixes bug 9564; bugfix on
  4404. 0.2.3.14-alpha.
  4405. o Minor bugfixes:
  4406. - Avoid double-closing the listener socket in our socketpair()
  4407. replacement (used on Windows) in the case where the addresses on
  4408. our opened sockets don't match what we expected. Fixes bug 9400;
  4409. bugfix on 0.0.2pre7. Found by Coverity.
  4410. o Minor fixes (config options):
  4411. - Avoid overflows when the user sets MaxCircuitDirtiness to a
  4412. ridiculously high value, by imposing a (ridiculously high) 30-day
  4413. maximum on MaxCircuitDirtiness.
  4414. - Fix the documentation of HeartbeatPeriod to say that the heartbeat
  4415. message is logged at notice, not at info.
  4416. - Warn and fail if a server is configured not to advertise any
  4417. ORPorts at all. (We need *something* to put in our descriptor,
  4418. or we just won't work.)
  4419. o Minor features:
  4420. - Track how many "TAP" and "NTor" circuit handshake requests we get,
  4421. and how many we complete, and log it every hour to help relay
  4422. operators follow trends in network load. Addresses ticket 9658.
  4423. - Update to the August 7 2013 Maxmind GeoLite Country database.
  4424. Changes in version 0.2.4.16-rc - 2013-08-10
  4425. Tor 0.2.4.16-rc is the second release candidate for the Tor 0.2.4.x
  4426. series. It fixes several crash bugs in the 0.2.4 branch.
  4427. o Major bugfixes:
  4428. - Fix a bug in the voting algorithm that could yield incorrect results
  4429. when a non-naming authority declared too many flags. Fixes bug 9200;
  4430. bugfix on 0.2.0.3-alpha.
  4431. - Fix an uninitialized read that could in some cases lead to a remote
  4432. crash while parsing INTRODUCE2 cells. Bugfix on 0.2.4.1-alpha.
  4433. Anybody running a hidden service on the experimental 0.2.4.x
  4434. branch should upgrade. (This is, so far as we know, unrelated to
  4435. the recent news.)
  4436. - Avoid an assertion failure when processing DNS replies without the
  4437. answer types we expected. Fixes bug 9337; bugfix on 0.2.4.7-alpha.
  4438. - Avoid a crash when using --hash-password. Fixes bug 9295; bugfix on
  4439. 0.2.4.15-rc. Found by stem integration tests.
  4440. o Minor bugfixes:
  4441. - Fix an invalid memory read that occured when a pluggable
  4442. transport proxy failed its configuration protocol.
  4443. Fixes bug 9288; bugfix on 0.2.4.1-alpha.
  4444. - When evaluating whether to use a connection that we haven't
  4445. decided is canonical using a recent link protocol version,
  4446. decide that it's canonical only if it used address _does_
  4447. match the desired address. Fixes bug 9309; bugfix on
  4448. 0.2.4.4-alpha. Reported by skruffy.
  4449. - Make the default behavior of NumDirectoryGuards be to track
  4450. NumEntryGuards. Now a user who changes only NumEntryGuards will get
  4451. the behavior she expects. Fixes bug 9354; bugfix on 0.2.4.8-alpha.
  4452. - Fix a spurious compilation warning with some older versions of
  4453. GCC on FreeBSD. Fixes bug 9254; bugfix on 0.2.4.14-alpha.
  4454. o Minor features:
  4455. - Update to the July 3 2013 Maxmind GeoLite Country database.
  4456. Changes in version 0.2.4.15-rc - 2013-07-01
  4457. Tor 0.2.4.15-rc is the first release candidate for the Tor 0.2.4.x
  4458. series. It fixes a few smaller bugs, but generally appears stable.
  4459. Please test it and let us know whether it is!
  4460. o Major bugfixes:
  4461. - When receiving a new configuration file via the control port's
  4462. LOADCONF command, do not treat the defaults file as absent.
  4463. Fixes bug 9122; bugfix on 0.2.3.9-alpha.
  4464. o Minor features:
  4465. - Issue a warning when running with the bufferevents backend enabled.
  4466. It's still not stable, and people should know that they're likely
  4467. to hit unexpected problems. Closes ticket 9147.
  4468. Changes in version 0.2.4.14-alpha - 2013-06-18
  4469. Tor 0.2.4.14-alpha fixes a pair of client guard enumeration problems
  4470. present in 0.2.4.13-alpha.
  4471. o Major bugfixes:
  4472. - When we have too much memory queued in circuits (according to a new
  4473. MaxMemInCellQueues option), close the circuits consuming the most
  4474. memory. This prevents us from running out of memory as a relay if
  4475. circuits fill up faster than they can be drained. Fixes bug 9063;
  4476. bugfix on the 54th commit of Tor. This bug is a further fix beyond
  4477. bug 6252, whose fix was merged into 0.2.3.21-rc.
  4478. This change also fixes an earlier approach taken in 0.2.4.13-alpha,
  4479. where we tried to solve this issue simply by imposing an upper limit
  4480. on the number of queued cells for a single circuit. That approach
  4481. proved to be problematic, since there are ways to provoke clients to
  4482. send a number of cells in excess of any such reasonable limit. Fixes
  4483. bug 9072; bugfix on 0.2.4.13-alpha.
  4484. - Limit hidden service descriptors to at most ten introduction
  4485. points, to slow one kind of guard enumeration. Fixes bug 9002;
  4486. bugfix on 0.1.1.11-alpha.
  4487. Changes in version 0.2.4.13-alpha - 2013-06-14
  4488. Tor 0.2.4.13-alpha fixes a variety of potential remote crash
  4489. vulnerabilities, makes socks5 username/password circuit isolation
  4490. actually actually work (this time for sure!), and cleans up a bunch
  4491. of other issues in preparation for a release candidate.
  4492. o Major bugfixes (robustness):
  4493. - Close any circuit that has too many cells queued on it. Fixes
  4494. bug 9063; bugfix on the 54th commit of Tor. This bug is a further
  4495. fix beyond bug 6252, whose fix was merged into 0.2.3.21-rc.
  4496. - Prevent the get_freelists() function from running off the end of
  4497. the list of freelists if it somehow gets an unrecognized
  4498. allocation. Fixes bug 8844; bugfix on 0.2.0.16-alpha. Reported by
  4499. eugenis.
  4500. - Avoid an assertion failure on OpenBSD (and perhaps other BSDs)
  4501. when an exit connection with optimistic data succeeds immediately
  4502. rather than returning EINPROGRESS. Fixes bug 9017; bugfix on
  4503. 0.2.3.1-alpha.
  4504. - Fix a directory authority crash bug when building a consensus
  4505. using an older consensus as its basis. Fixes bug 8833. Bugfix
  4506. on 0.2.4.12-alpha.
  4507. o Major bugfixes:
  4508. - Avoid a memory leak where we would leak a consensus body when we
  4509. find that a consensus which we couldn't previously verify due to
  4510. missing certificates is now verifiable. Fixes bug 8719; bugfix
  4511. on 0.2.0.10-alpha.
  4512. - We used to always request authority certificates by identity digest,
  4513. meaning we'd get the newest one even when we wanted one with a
  4514. different signing key. Then we would complain about being given
  4515. a certificate we already had, and never get the one we really
  4516. wanted. Now we use the "fp-sk/" resource as well as the "fp/"
  4517. resource to request the one we want. Fixes bug 5595; bugfix on
  4518. 0.2.0.8-alpha.
  4519. - Follow the socks5 protocol when offering username/password
  4520. authentication. The fix for bug 8117 exposed this bug, and it
  4521. turns out real-world applications like Pidgin do care. Bugfix on
  4522. 0.2.3.2-alpha; fixes bug 8879.
  4523. - Prevent failures on Windows Vista and later when rebuilding the
  4524. microdescriptor cache. Diagnosed by Robert Ransom. Fixes bug 8822;
  4525. bugfix on 0.2.4.12-alpha.
  4526. o Minor bugfixes:
  4527. - Fix an impossible buffer overrun in the AES unit tests. Fixes
  4528. bug 8845; bugfix on 0.2.0.7-alpha. Found by eugenis.