ChangeLog 1.0 MB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941129421294312944129451294612947129481294912950129511295212953129541295512956129571295812959129601296112962129631296412965129661296712968129691297012971129721297312974129751297612977129781297912980129811298212983129841298512986129871298812989129901299112992129931299412995129961299712998129991300013001130021300313004130051300613007130081300913010130111301213013130141301513016130171301813019130201302113022130231302413025130261302713028130291303013031130321303313034130351303613037130381303913040130411304213043130441304513046130471304813049130501305113052130531305413055130561305713058130591306013061130621306313064130651306613067130681306913070130711307213073130741307513076130771307813079130801308113082130831308413085130861308713088130891309013091130921309313094130951309613097130981309913100131011310213103131041310513106131071310813109131101311113112131131311413115131161311713118131191312013121131221312313124131251312613127131281312913130131311313213133131341313513136131371313813139131401314113142131431314413145131461314713148131491315013151131521315313154131551315613157131581315913160131611316213163131641316513166131671316813169131701317113172131731317413175131761317713178131791318013181131821318313184131851318613187131881318913190131911319213193131941319513196131971319813199132001320113202132031320413205132061320713208132091321013211132121321313214132151321613217132181321913220132211322213223132241322513226132271322813229132301323113232132331323413235132361323713238132391324013241132421324313244132451324613247132481324913250132511325213253132541325513256132571325813259132601326113262132631326413265132661326713268132691327013271132721327313274132751327613277132781327913280132811328213283132841328513286132871328813289132901329113292132931329413295132961329713298132991330013301133021330313304133051330613307133081330913310133111331213313133141331513316133171331813319133201332113322133231332413325133261332713328133291333013331133321333313334133351333613337133381333913340133411334213343133441334513346133471334813349133501335113352133531335413355133561335713358133591336013361133621336313364133651336613367133681336913370133711337213373133741337513376133771337813379133801338113382133831338413385133861338713388133891339013391133921339313394133951339613397133981339913400134011340213403134041340513406134071340813409134101341113412134131341413415134161341713418134191342013421134221342313424134251342613427134281342913430134311343213433134341343513436134371343813439134401344113442134431344413445134461344713448134491345013451134521345313454134551345613457134581345913460134611346213463134641346513466134671346813469134701347113472134731347413475134761347713478134791348013481134821348313484134851348613487134881348913490134911349213493134941349513496134971349813499135001350113502135031350413505135061350713508135091351013511135121351313514135151351613517135181351913520135211352213523135241352513526135271352813529135301353113532135331353413535135361353713538135391354013541135421354313544135451354613547135481354913550135511355213553135541355513556135571355813559135601356113562135631356413565135661356713568135691357013571135721357313574135751357613577135781357913580135811358213583135841358513586135871358813589135901359113592135931359413595135961359713598135991360013601136021360313604136051360613607136081360913610136111361213613136141361513616136171361813619136201362113622136231362413625136261362713628136291363013631136321363313634136351363613637136381363913640136411364213643136441364513646136471364813649136501365113652136531365413655136561365713658136591366013661136621366313664136651366613667136681366913670136711367213673136741367513676136771367813679136801368113682136831368413685136861368713688136891369013691136921369313694136951369613697136981369913700137011370213703137041370513706137071370813709137101371113712137131371413715137161371713718137191372013721137221372313724137251372613727137281372913730137311373213733137341373513736137371373813739137401374113742137431374413745137461374713748137491375013751137521375313754137551375613757137581375913760137611376213763137641376513766137671376813769137701377113772137731377413775137761377713778137791378013781137821378313784137851378613787137881378913790137911379213793137941379513796137971379813799138001380113802138031380413805138061380713808138091381013811138121381313814138151381613817138181381913820138211382213823138241382513826138271382813829138301383113832138331383413835138361383713838138391384013841138421384313844138451384613847138481384913850138511385213853138541385513856138571385813859138601386113862138631386413865138661386713868138691387013871138721387313874138751387613877138781387913880138811388213883138841388513886138871388813889138901389113892138931389413895138961389713898138991390013901139021390313904139051390613907139081390913910139111391213913139141391513916139171391813919139201392113922139231392413925139261392713928139291393013931139321393313934139351393613937139381393913940139411394213943139441394513946139471394813949139501395113952139531395413955139561395713958139591396013961139621396313964139651396613967139681396913970139711397213973139741397513976139771397813979139801398113982139831398413985139861398713988139891399013991139921399313994139951399613997139981399914000140011400214003140041400514006140071400814009140101401114012140131401414015140161401714018140191402014021140221402314024140251402614027140281402914030140311403214033140341403514036140371403814039140401404114042140431404414045140461404714048140491405014051140521405314054140551405614057140581405914060140611406214063140641406514066140671406814069140701407114072140731407414075140761407714078140791408014081140821408314084140851408614087140881408914090140911409214093140941409514096140971409814099141001410114102141031410414105141061410714108141091411014111141121411314114141151411614117141181411914120141211412214123141241412514126141271412814129141301413114132141331413414135141361413714138141391414014141141421414314144141451414614147141481414914150141511415214153141541415514156141571415814159141601416114162141631416414165141661416714168141691417014171141721417314174141751417614177141781417914180141811418214183141841418514186141871418814189141901419114192141931419414195141961419714198141991420014201142021420314204142051420614207142081420914210142111421214213142141421514216142171421814219142201422114222142231422414225142261422714228142291423014231142321423314234142351423614237142381423914240142411424214243142441424514246142471424814249142501425114252142531425414255142561425714258142591426014261142621426314264142651426614267142681426914270142711427214273142741427514276142771427814279142801428114282142831428414285142861428714288142891429014291142921429314294142951429614297142981429914300143011430214303143041430514306143071430814309143101431114312143131431414315143161431714318143191432014321143221432314324143251432614327143281432914330143311433214333143341433514336143371433814339143401434114342143431434414345143461434714348143491435014351143521435314354143551435614357143581435914360143611436214363143641436514366143671436814369143701437114372143731437414375143761437714378143791438014381143821438314384143851438614387143881438914390143911439214393143941439514396143971439814399144001440114402144031440414405144061440714408144091441014411144121441314414144151441614417144181441914420144211442214423144241442514426144271442814429144301443114432144331443414435144361443714438144391444014441144421444314444144451444614447144481444914450144511445214453144541445514456144571445814459144601446114462144631446414465144661446714468144691447014471144721447314474144751447614477144781447914480144811448214483144841448514486144871448814489144901449114492144931449414495144961449714498144991450014501145021450314504145051450614507145081450914510145111451214513145141451514516145171451814519145201452114522145231452414525145261452714528145291453014531145321453314534145351453614537145381453914540145411454214543145441454514546145471454814549145501455114552145531455414555145561455714558145591456014561145621456314564145651456614567145681456914570145711457214573145741457514576145771457814579145801458114582145831458414585145861458714588145891459014591145921459314594145951459614597145981459914600146011460214603146041460514606146071460814609146101461114612146131461414615146161461714618146191462014621146221462314624146251462614627146281462914630146311463214633146341463514636146371463814639146401464114642146431464414645146461464714648146491465014651146521465314654146551465614657146581465914660146611466214663146641466514666146671466814669146701467114672146731467414675146761467714678146791468014681146821468314684146851468614687146881468914690146911469214693146941469514696146971469814699147001470114702147031470414705147061470714708147091471014711147121471314714147151471614717147181471914720147211472214723147241472514726147271472814729147301473114732147331473414735147361473714738147391474014741147421474314744147451474614747147481474914750147511475214753147541475514756147571475814759147601476114762147631476414765147661476714768147691477014771147721477314774147751477614777147781477914780147811478214783147841478514786147871478814789147901479114792147931479414795147961479714798147991480014801148021480314804148051480614807148081480914810148111481214813148141481514816148171481814819148201482114822148231482414825148261482714828148291483014831148321483314834148351483614837148381483914840148411484214843148441484514846148471484814849148501485114852148531485414855148561485714858148591486014861148621486314864148651486614867148681486914870148711487214873148741487514876148771487814879148801488114882148831488414885148861488714888148891489014891148921489314894148951489614897148981489914900149011490214903149041490514906149071490814909149101491114912149131491414915149161491714918149191492014921149221492314924149251492614927149281492914930149311493214933149341493514936149371493814939149401494114942149431494414945149461494714948149491495014951149521495314954149551495614957149581495914960149611496214963149641496514966149671496814969149701497114972149731497414975149761497714978149791498014981149821498314984149851498614987149881498914990149911499214993149941499514996149971499814999150001500115002150031500415005150061500715008150091501015011150121501315014150151501615017150181501915020150211502215023150241502515026150271502815029150301503115032150331503415035150361503715038150391504015041150421504315044150451504615047150481504915050150511505215053150541505515056150571505815059150601506115062150631506415065150661506715068150691507015071150721507315074150751507615077150781507915080150811508215083150841508515086150871508815089150901509115092150931509415095150961509715098150991510015101151021510315104151051510615107151081510915110151111511215113151141511515116151171511815119151201512115122151231512415125151261512715128151291513015131151321513315134151351513615137151381513915140151411514215143151441514515146151471514815149151501515115152151531515415155151561515715158151591516015161151621516315164151651516615167151681516915170151711517215173151741517515176151771517815179151801518115182151831518415185151861518715188151891519015191151921519315194151951519615197151981519915200152011520215203152041520515206152071520815209152101521115212152131521415215152161521715218152191522015221152221522315224152251522615227152281522915230152311523215233152341523515236152371523815239152401524115242152431524415245152461524715248152491525015251152521525315254152551525615257152581525915260152611526215263152641526515266152671526815269152701527115272152731527415275152761527715278152791528015281152821528315284152851528615287152881528915290152911529215293152941529515296152971529815299153001530115302153031530415305153061530715308153091531015311153121531315314153151531615317153181531915320153211532215323153241532515326153271532815329153301533115332153331533415335153361533715338153391534015341153421534315344153451534615347153481534915350153511535215353153541535515356153571535815359153601536115362153631536415365153661536715368153691537015371153721537315374153751537615377153781537915380153811538215383153841538515386153871538815389153901539115392153931539415395153961539715398153991540015401154021540315404154051540615407154081540915410154111541215413154141541515416154171541815419154201542115422154231542415425154261542715428154291543015431154321543315434154351543615437154381543915440154411544215443154441544515446154471544815449154501545115452154531545415455154561545715458154591546015461154621546315464154651546615467154681546915470154711547215473154741547515476154771547815479154801548115482154831548415485154861548715488154891549015491154921549315494154951549615497154981549915500155011550215503155041550515506155071550815509155101551115512155131551415515155161551715518155191552015521155221552315524155251552615527155281552915530155311553215533155341553515536155371553815539155401554115542155431554415545155461554715548155491555015551155521555315554155551555615557155581555915560155611556215563155641556515566155671556815569155701557115572155731557415575155761557715578155791558015581155821558315584155851558615587155881558915590155911559215593155941559515596155971559815599156001560115602156031560415605156061560715608156091561015611156121561315614156151561615617156181561915620156211562215623156241562515626156271562815629156301563115632156331563415635156361563715638156391564015641156421564315644156451564615647156481564915650156511565215653156541565515656156571565815659156601566115662156631566415665156661566715668156691567015671156721567315674156751567615677156781567915680156811568215683156841568515686156871568815689156901569115692156931569415695156961569715698156991570015701157021570315704157051570615707157081570915710157111571215713157141571515716157171571815719157201572115722157231572415725157261572715728157291573015731157321573315734157351573615737157381573915740157411574215743157441574515746157471574815749157501575115752157531575415755157561575715758157591576015761157621576315764157651576615767157681576915770157711577215773157741577515776157771577815779157801578115782157831578415785157861578715788157891579015791157921579315794157951579615797157981579915800158011580215803158041580515806158071580815809158101581115812158131581415815158161581715818158191582015821158221582315824158251582615827158281582915830158311583215833158341583515836158371583815839158401584115842158431584415845158461584715848158491585015851158521585315854158551585615857158581585915860158611586215863158641586515866158671586815869158701587115872158731587415875158761587715878158791588015881158821588315884158851588615887158881588915890158911589215893158941589515896158971589815899159001590115902159031590415905159061590715908159091591015911159121591315914159151591615917159181591915920159211592215923159241592515926159271592815929159301593115932159331593415935159361593715938159391594015941159421594315944159451594615947159481594915950159511595215953159541595515956159571595815959159601596115962159631596415965159661596715968159691597015971159721597315974159751597615977159781597915980159811598215983159841598515986159871598815989159901599115992159931599415995159961599715998159991600016001160021600316004160051600616007160081600916010160111601216013160141601516016160171601816019160201602116022160231602416025160261602716028160291603016031160321603316034160351603616037160381603916040160411604216043160441604516046160471604816049160501605116052160531605416055160561605716058160591606016061160621606316064160651606616067160681606916070160711607216073160741607516076160771607816079160801608116082160831608416085160861608716088160891609016091160921609316094160951609616097160981609916100161011610216103161041610516106161071610816109161101611116112161131611416115161161611716118161191612016121161221612316124161251612616127161281612916130161311613216133161341613516136161371613816139161401614116142161431614416145161461614716148161491615016151161521615316154161551615616157161581615916160161611616216163161641616516166161671616816169161701617116172161731617416175161761617716178161791618016181161821618316184161851618616187161881618916190161911619216193161941619516196161971619816199162001620116202162031620416205162061620716208162091621016211162121621316214162151621616217162181621916220162211622216223162241622516226162271622816229162301623116232162331623416235162361623716238162391624016241162421624316244162451624616247162481624916250162511625216253162541625516256162571625816259162601626116262162631626416265162661626716268162691627016271162721627316274162751627616277162781627916280162811628216283162841628516286162871628816289162901629116292162931629416295162961629716298162991630016301163021630316304163051630616307163081630916310163111631216313163141631516316163171631816319163201632116322163231632416325163261632716328163291633016331163321633316334163351633616337163381633916340163411634216343163441634516346163471634816349163501635116352163531635416355163561635716358163591636016361163621636316364163651636616367163681636916370163711637216373163741637516376163771637816379163801638116382163831638416385163861638716388163891639016391163921639316394163951639616397163981639916400164011640216403164041640516406164071640816409164101641116412164131641416415164161641716418164191642016421164221642316424164251642616427164281642916430164311643216433164341643516436164371643816439164401644116442164431644416445164461644716448164491645016451164521645316454164551645616457164581645916460164611646216463164641646516466164671646816469164701647116472164731647416475164761647716478164791648016481164821648316484164851648616487164881648916490164911649216493164941649516496164971649816499165001650116502165031650416505165061650716508165091651016511165121651316514165151651616517165181651916520165211652216523165241652516526165271652816529165301653116532165331653416535165361653716538165391654016541165421654316544165451654616547165481654916550165511655216553165541655516556165571655816559165601656116562165631656416565165661656716568165691657016571165721657316574165751657616577165781657916580165811658216583165841658516586165871658816589165901659116592165931659416595165961659716598165991660016601166021660316604166051660616607166081660916610166111661216613166141661516616166171661816619166201662116622166231662416625166261662716628166291663016631166321663316634166351663616637166381663916640166411664216643166441664516646166471664816649166501665116652166531665416655166561665716658166591666016661166621666316664166651666616667166681666916670166711667216673166741667516676166771667816679166801668116682166831668416685166861668716688166891669016691166921669316694166951669616697166981669916700167011670216703167041670516706167071670816709167101671116712167131671416715167161671716718167191672016721167221672316724167251672616727167281672916730167311673216733167341673516736167371673816739167401674116742167431674416745167461674716748167491675016751167521675316754167551675616757167581675916760167611676216763167641676516766167671676816769167701677116772167731677416775167761677716778167791678016781167821678316784167851678616787167881678916790167911679216793167941679516796167971679816799168001680116802168031680416805168061680716808168091681016811168121681316814168151681616817168181681916820168211682216823168241682516826168271682816829168301683116832168331683416835168361683716838168391684016841168421684316844168451684616847168481684916850168511685216853168541685516856168571685816859168601686116862168631686416865168661686716868168691687016871168721687316874168751687616877168781687916880168811688216883168841688516886168871688816889168901689116892168931689416895168961689716898168991690016901169021690316904169051690616907169081690916910169111691216913169141691516916169171691816919169201692116922169231692416925169261692716928169291693016931169321693316934169351693616937169381693916940169411694216943169441694516946169471694816949169501695116952169531695416955169561695716958169591696016961169621696316964169651696616967169681696916970169711697216973169741697516976169771697816979169801698116982169831698416985169861698716988169891699016991169921699316994169951699616997169981699917000170011700217003170041700517006170071700817009170101701117012170131701417015170161701717018170191702017021170221702317024170251702617027170281702917030170311703217033170341703517036170371703817039170401704117042170431704417045170461704717048170491705017051170521705317054170551705617057170581705917060170611706217063170641706517066170671706817069170701707117072170731707417075170761707717078170791708017081170821708317084170851708617087170881708917090170911709217093170941709517096170971709817099171001710117102171031710417105171061710717108171091711017111171121711317114171151711617117171181711917120171211712217123171241712517126171271712817129171301713117132171331713417135171361713717138171391714017141171421714317144171451714617147171481714917150171511715217153171541715517156171571715817159171601716117162171631716417165171661716717168171691717017171171721717317174171751717617177171781717917180171811718217183171841718517186171871718817189171901719117192171931719417195171961719717198171991720017201172021720317204172051720617207172081720917210172111721217213172141721517216172171721817219172201722117222172231722417225172261722717228172291723017231172321723317234172351723617237172381723917240172411724217243172441724517246172471724817249172501725117252172531725417255172561725717258172591726017261172621726317264172651726617267172681726917270172711727217273172741727517276172771727817279172801728117282172831728417285172861728717288172891729017291172921729317294172951729617297172981729917300173011730217303173041730517306173071730817309173101731117312173131731417315173161731717318173191732017321173221732317324173251732617327173281732917330173311733217333173341733517336173371733817339173401734117342173431734417345173461734717348173491735017351173521735317354173551735617357173581735917360173611736217363173641736517366173671736817369173701737117372173731737417375173761737717378173791738017381173821738317384173851738617387173881738917390173911739217393173941739517396173971739817399174001740117402174031740417405174061740717408174091741017411174121741317414174151741617417174181741917420174211742217423174241742517426174271742817429174301743117432174331743417435174361743717438174391744017441174421744317444174451744617447174481744917450174511745217453174541745517456174571745817459174601746117462174631746417465174661746717468174691747017471174721747317474174751747617477174781747917480174811748217483174841748517486174871748817489174901749117492174931749417495174961749717498174991750017501175021750317504175051750617507175081750917510175111751217513175141751517516175171751817519175201752117522175231752417525175261752717528175291753017531175321753317534175351753617537175381753917540175411754217543175441754517546175471754817549175501755117552175531755417555175561755717558175591756017561175621756317564175651756617567175681756917570175711757217573175741757517576175771757817579175801758117582175831758417585175861758717588175891759017591175921759317594175951759617597175981759917600176011760217603176041760517606176071760817609176101761117612176131761417615176161761717618176191762017621176221762317624176251762617627176281762917630176311763217633176341763517636176371763817639176401764117642176431764417645176461764717648176491765017651176521765317654176551765617657176581765917660176611766217663176641766517666176671766817669176701767117672176731767417675176761767717678176791768017681176821768317684176851768617687176881768917690176911769217693176941769517696176971769817699177001770117702177031770417705177061770717708177091771017711177121771317714177151771617717177181771917720177211772217723177241772517726177271772817729177301773117732177331773417735177361773717738177391774017741177421774317744177451774617747177481774917750177511775217753177541775517756177571775817759177601776117762177631776417765177661776717768177691777017771177721777317774177751777617777177781777917780177811778217783177841778517786177871778817789177901779117792177931779417795177961779717798177991780017801178021780317804178051780617807178081780917810178111781217813178141781517816178171781817819178201782117822178231782417825178261782717828178291783017831178321783317834178351783617837178381783917840178411784217843178441784517846178471784817849178501785117852178531785417855178561785717858178591786017861178621786317864178651786617867178681786917870178711787217873178741787517876178771787817879178801788117882178831788417885178861788717888178891789017891178921789317894178951789617897178981789917900179011790217903179041790517906179071790817909179101791117912179131791417915179161791717918179191792017921179221792317924179251792617927179281792917930179311793217933179341793517936179371793817939179401794117942179431794417945179461794717948179491795017951179521795317954179551795617957179581795917960179611796217963179641796517966179671796817969179701797117972179731797417975179761797717978179791798017981179821798317984179851798617987179881798917990179911799217993179941799517996179971799817999180001800118002180031800418005180061800718008180091801018011180121801318014180151801618017180181801918020180211802218023180241802518026180271802818029180301803118032180331803418035180361803718038180391804018041180421804318044180451804618047180481804918050180511805218053180541805518056180571805818059180601806118062180631806418065180661806718068180691807018071180721807318074180751807618077180781807918080180811808218083180841808518086180871808818089180901809118092180931809418095180961809718098180991810018101181021810318104181051810618107181081810918110181111811218113181141811518116181171811818119181201812118122181231812418125181261812718128181291813018131181321813318134181351813618137181381813918140181411814218143181441814518146181471814818149181501815118152181531815418155181561815718158181591816018161181621816318164181651816618167181681816918170181711817218173181741817518176181771817818179181801818118182181831818418185181861818718188181891819018191181921819318194181951819618197181981819918200182011820218203182041820518206182071820818209182101821118212182131821418215182161821718218182191822018221182221822318224182251822618227182281822918230182311823218233182341823518236182371823818239182401824118242182431824418245182461824718248182491825018251182521825318254182551825618257182581825918260182611826218263182641826518266182671826818269182701827118272182731827418275182761827718278182791828018281182821828318284182851828618287182881828918290182911829218293182941829518296182971829818299183001830118302183031830418305183061830718308183091831018311183121831318314183151831618317183181831918320183211832218323183241832518326183271832818329183301833118332183331833418335183361833718338183391834018341183421834318344183451834618347183481834918350183511835218353183541835518356183571835818359183601836118362183631836418365183661836718368183691837018371183721837318374183751837618377183781837918380183811838218383183841838518386183871838818389183901839118392183931839418395183961839718398183991840018401184021840318404184051840618407184081840918410184111841218413184141841518416184171841818419184201842118422184231842418425184261842718428184291843018431184321843318434184351843618437184381843918440184411844218443184441844518446184471844818449184501845118452184531845418455184561845718458184591846018461184621846318464184651846618467184681846918470184711847218473184741847518476184771847818479184801848118482184831848418485184861848718488184891849018491184921849318494184951849618497184981849918500185011850218503185041850518506185071850818509185101851118512185131851418515185161851718518185191852018521185221852318524185251852618527185281852918530185311853218533185341853518536185371853818539185401854118542185431854418545185461854718548185491855018551185521855318554185551855618557185581855918560185611856218563185641856518566185671856818569185701857118572185731857418575185761857718578185791858018581185821858318584185851858618587185881858918590185911859218593185941859518596185971859818599186001860118602186031860418605186061860718608186091861018611186121861318614186151861618617186181861918620186211862218623186241862518626186271862818629186301863118632186331863418635186361863718638186391864018641186421864318644186451864618647186481864918650186511865218653186541865518656186571865818659186601866118662186631866418665186661866718668186691867018671186721867318674186751867618677186781867918680186811868218683186841868518686186871868818689186901869118692186931869418695186961869718698186991870018701187021870318704187051870618707187081870918710187111871218713187141871518716187171871818719187201872118722187231872418725187261872718728187291873018731187321873318734187351873618737187381873918740187411874218743187441874518746187471874818749187501875118752187531875418755187561875718758187591876018761187621876318764187651876618767187681876918770187711877218773187741877518776187771877818779187801878118782187831878418785187861878718788187891879018791187921879318794187951879618797187981879918800188011880218803188041880518806188071880818809188101881118812188131881418815188161881718818188191882018821188221882318824188251882618827188281882918830188311883218833188341883518836188371883818839188401884118842188431884418845188461884718848188491885018851188521885318854188551885618857188581885918860188611886218863188641886518866188671886818869188701887118872188731887418875188761887718878188791888018881188821888318884188851888618887188881888918890188911889218893188941889518896188971889818899189001890118902189031890418905189061890718908189091891018911189121891318914189151891618917189181891918920189211892218923189241892518926189271892818929189301893118932189331893418935189361893718938189391894018941189421894318944189451894618947189481894918950189511895218953189541895518956189571895818959189601896118962189631896418965189661896718968189691897018971189721897318974189751897618977189781897918980189811898218983189841898518986189871898818989189901899118992189931899418995189961899718998189991900019001190021900319004190051900619007190081900919010190111901219013190141901519016190171901819019190201902119022190231902419025190261902719028190291903019031190321903319034190351903619037190381903919040190411904219043190441904519046190471904819049190501905119052190531905419055190561905719058190591906019061190621906319064190651906619067190681906919070190711907219073190741907519076190771907819079190801908119082190831908419085190861908719088190891909019091190921909319094190951909619097190981909919100191011910219103191041910519106191071910819109191101911119112191131911419115191161911719118191191912019121191221912319124191251912619127191281912919130191311913219133191341913519136191371913819139191401914119142191431914419145191461914719148191491915019151191521915319154191551915619157191581915919160191611916219163191641916519166191671916819169191701917119172191731917419175191761917719178191791918019181191821918319184191851918619187191881918919190191911919219193191941919519196191971919819199192001920119202192031920419205192061920719208192091921019211192121921319214192151921619217192181921919220192211922219223192241922519226192271922819229192301923119232192331923419235192361923719238192391924019241192421924319244192451924619247192481924919250192511925219253192541925519256192571925819259192601926119262192631926419265192661926719268192691927019271192721927319274192751927619277192781927919280192811928219283192841928519286192871928819289192901929119292192931929419295192961929719298192991930019301193021930319304193051930619307193081930919310193111931219313193141931519316193171931819319193201932119322193231932419325193261932719328193291933019331193321933319334193351933619337193381933919340193411934219343193441934519346193471934819349193501935119352193531935419355193561935719358193591936019361193621936319364193651936619367193681936919370193711937219373193741937519376193771937819379193801938119382193831938419385193861938719388193891939019391193921939319394193951939619397193981939919400194011940219403194041940519406194071940819409194101941119412194131941419415194161941719418194191942019421194221942319424194251942619427194281942919430194311943219433194341943519436194371943819439194401944119442194431944419445194461944719448194491945019451194521945319454194551945619457194581945919460194611946219463194641946519466194671946819469194701947119472194731947419475194761947719478194791948019481194821948319484194851948619487194881948919490194911949219493194941949519496194971949819499195001950119502195031950419505195061950719508195091951019511195121951319514195151951619517195181951919520195211952219523195241952519526195271952819529195301953119532195331953419535195361953719538195391954019541195421954319544195451954619547195481954919550195511955219553195541955519556195571955819559195601956119562195631956419565195661956719568195691957019571195721957319574195751957619577195781957919580195811958219583195841958519586195871958819589195901959119592195931959419595195961959719598195991960019601196021960319604196051960619607196081960919610196111961219613196141961519616196171961819619196201962119622196231962419625196261962719628196291963019631196321963319634196351963619637196381963919640196411964219643196441964519646196471964819649196501965119652196531965419655196561965719658196591966019661196621966319664196651966619667196681966919670196711967219673196741967519676196771967819679196801968119682196831968419685196861968719688196891969019691196921969319694196951969619697196981969919700197011970219703197041970519706197071970819709197101971119712197131971419715197161971719718197191972019721197221972319724197251972619727197281972919730197311973219733197341973519736197371973819739197401974119742197431974419745197461974719748197491975019751197521975319754197551975619757197581975919760197611976219763197641976519766197671976819769197701977119772197731977419775197761977719778197791978019781197821978319784197851978619787197881978919790197911979219793197941979519796197971979819799198001980119802198031980419805198061980719808198091981019811198121981319814198151981619817198181981919820198211982219823198241982519826198271982819829198301983119832198331983419835198361983719838198391984019841198421984319844198451984619847198481984919850198511985219853198541985519856198571985819859198601986119862198631986419865198661986719868198691987019871198721987319874198751987619877198781987919880198811988219883198841988519886198871988819889198901989119892198931989419895198961989719898198991990019901199021990319904199051990619907199081990919910199111991219913199141991519916199171991819919199201992119922199231992419925199261992719928199291993019931199321993319934199351993619937199381993919940199411994219943199441994519946199471994819949199501995119952199531995419955199561995719958199591996019961199621996319964199651996619967199681996919970199711997219973199741997519976199771997819979199801998119982199831998419985199861998719988199891999019991199921999319994199951999619997199981999920000200012000220003200042000520006200072000820009200102001120012200132001420015200162001720018200192002020021200222002320024200252002620027200282002920030200312003220033200342003520036200372003820039200402004120042200432004420045200462004720048200492005020051200522005320054200552005620057200582005920060200612006220063200642006520066200672006820069200702007120072200732007420075200762007720078200792008020081200822008320084200852008620087200882008920090200912009220093200942009520096200972009820099201002010120102201032010420105201062010720108201092011020111201122011320114201152011620117201182011920120201212012220123201242012520126201272012820129201302013120132201332013420135201362013720138201392014020141201422014320144201452014620147201482014920150201512015220153201542015520156201572015820159201602016120162201632016420165201662016720168201692017020171201722017320174201752017620177201782017920180201812018220183201842018520186201872018820189201902019120192201932019420195201962019720198201992020020201202022020320204202052020620207202082020920210202112021220213202142021520216202172021820219202202022120222202232022420225202262022720228202292023020231202322023320234202352023620237202382023920240202412024220243202442024520246202472024820249202502025120252202532025420255202562025720258202592026020261202622026320264202652026620267202682026920270202712027220273202742027520276202772027820279202802028120282202832028420285202862028720288202892029020291202922029320294202952029620297202982029920300203012030220303203042030520306203072030820309203102031120312203132031420315203162031720318203192032020321203222032320324203252032620327203282032920330203312033220333203342033520336203372033820339203402034120342203432034420345203462034720348
  1. Changes in version 0.2.8.2-alpha - 2016-03-28
  2. Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
  3. bugs in earlier versions of Tor, including some that prevented
  4. authorities using Tor 0.2.7.x from running correctly. IPv6 and
  5. directory support should also be much improved.
  6. o New system requirements:
  7. - Tor no longer supports versions of OpenSSL with a broken
  8. implementation of counter mode. (This bug was present in OpenSSL
  9. 1.0.0, and was fixed in OpenSSL 1.0.0a.) Tor still detects, but no
  10. longer runs with, these versions.
  11. - Tor no longer attempts to support platforms where the "time_t"
  12. type is unsigned. (To the best of our knowledge, only OpenVMS does
  13. this, and Tor has never actually built on OpenVMS.) Closes
  14. ticket 18184.
  15. - Tor now uses Autoconf version 2.63 or later, and Automake 1.11 or
  16. later (released in 2008 and 2009 respectively). If you are
  17. building Tor from the git repository instead of from the source
  18. distribution, and your tools are older than this, you will need to
  19. upgrade. Closes ticket 17732.
  20. o Major bugfixes (security, pointers):
  21. - Avoid a difficult-to-trigger heap corruption attack when extending
  22. a smartlist to contain over 16GB of pointers. Fixes bug 18162;
  23. bugfix on 0.1.1.11-alpha, which fixed a related bug incompletely.
  24. Reported by Guido Vranken.
  25. o Major bugfixes (bridges, pluggable transports):
  26. - Modify the check for OR connections to private addresses. Allow
  27. bridges on private addresses, including pluggable transports that
  28. ignore the (potentially private) address in the bridge line. Fixes
  29. bug 18517; bugfix on 0.2.8.1-alpha. Reported by gk, patch by teor.
  30. o Major bugfixes (compilation):
  31. - Repair hardened builds under the clang compiler. Previously, our
  32. use of _FORTIFY_SOURCE would conflict with clang's address
  33. sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.
  34. o Major bugfixes (crash on startup):
  35. - Fix a segfault during startup: If a Unix domain socket was
  36. configured as listener (such as a ControlSocket or a SocksPort
  37. "unix:" socket), and tor was started as root but not configured to
  38. switch to another user, tor would segfault while trying to string
  39. compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
  40. Patch by weasel.
  41. o Major bugfixes (crash on shutdown):
  42. - Correctly handle detaching circuits from muxes when shutting down.
  43. Fixes bug 18116; bugfix on 0.2.8.1-alpha.
  44. - Fix an assert-on-exit bug related to counting memory usage in
  45. rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.
  46. o Major bugfixes (dns proxy mode, crash):
  47. - Avoid crashing when running as a DNS proxy. Fixes bug 16248;
  48. bugfix on 0.2.0.1-alpha. Patch from "cypherpunks".
  49. o Major bugfixes (relays, bridge clients):
  50. - Ensure relays always allow IPv4 OR and Dir connections. Ensure
  51. bridge clients use the address configured in the bridge line.
  52. Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
  53. patch by teor.
  54. o Major bugfixes (voting):
  55. - Actually enable support for authorities to match routers by their
  56. Ed25519 identities. Previously, the
  57. code had been written, but some debugging code that had
  58. accidentally been left in the codebase made it stay turned off.
  59. Fixes bug 17702; bugfix on 0.2.7.2-alpha.
  60. - When collating votes by Ed25519 identities, authorities now
  61. include a "NoEdConsensus" flag if the ed25519 value (or lack
  62. thereof) for a server does not reflect the majority consensus.
  63. Related to bug 17668; bugfix on 0.2.7.2-alpha.
  64. - When generating a vote with keypinning disabled, never include two
  65. entries for the same ed25519 identity. This bug was causing
  66. authorities to generate votes that they could not parse when a
  67. router violated key pinning by changing its RSA identity but
  68. keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
  69. 18318. Bugfix on 0.2.7.2-alpha.
  70. o Minor features (security, win32):
  71. - Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
  72. attack. Fixes bug 18123; bugfix on all tor versions. Patch by teor.
  73. o Minor features (bug-resistance):
  74. - Make Tor survive errors involving connections without a
  75. corresponding event object. Previously we'd fail with an
  76. assertion; now we produce a log message. Related to bug 16248.
  77. o Minor features (build):
  78. - Detect systems with FreeBSD-derived kernels (such as GNU/kFreeBSD)
  79. as having possible IPFW support. Closes ticket 18448. Patch from
  80. Steven Chamberlain.
  81. o Minor features (code hardening):
  82. - Use tor_snprintf() and tor_vsnprintf() even in external and low-
  83. level code, to harden against accidental failures to NUL-terminate.
  84. Part of ticket 17852. Patch from jsturgix. Found with Flawfinder.
  85. o Minor features (crypto):
  86. - Validate the hard-coded Diffie-Hellman parameters and ensure that
  87. p is a safe prime, and g is a suitable generator. Closes
  88. ticket 18221.
  89. o Minor features (geoip):
  90. - Update geoip and geoip6 to the March 3 2016 Maxmind GeoLite2
  91. Country database.
  92. o Minor features (hidden service directory):
  93. - Streamline relay-side hsdir handling: when relays consider whether
  94. to accept an uploaded hidden service descriptor, they no longer
  95. check whether they are one of the relays in the network that is
  96. "supposed" to handle that descriptor. Implements ticket 18332.
  97. o Minor features (IPv6):
  98. - Add ClientPreferIPv6DirPort, which is set to 0 by default. If set
  99. to 1, tor prefers IPv6 directory addresses.
  100. - Add ClientUseIPv4, which is set to 1 by default. If set to 0, tor
  101. avoids using IPv4 for client OR and directory connections.
  102. - Try harder to obey the IP version restrictions "ClientUseIPv4 0",
  103. "ClientUseIPv6 0", "ClientPreferIPv6ORPort", and
  104. "ClientPreferIPv6DirPort". Closes ticket 17840; patch by teor.
  105. o Minor features (linux seccomp2 sandbox):
  106. - Reject attempts to change our Address with "Sandbox 1" enabled.
  107. Changing Address with Sandbox turned on would never actually work,
  108. but previously it would fail in strange and confusing ways. Found
  109. while fixing 18548.
  110. o Minor features (robustness):
  111. - Exit immediately with an error message if the code attempts to use
  112. Libevent without having initialized it. This should resolve some
  113. frequently-made mistakes in our unit tests. Closes ticket 18241.
  114. o Minor features (unix domain sockets):
  115. - Add a new per-socket option, RelaxDirModeCheck, to allow creating
  116. Unix domain sockets without checking the permissions on the parent
  117. directory. (Tor checks permissions by default because some
  118. operating systems only check permissions on the parent directory.
  119. However, some operating systems do look at permissions on the
  120. socket, and tor's default check is unneeded.) Closes ticket 18458.
  121. Patch by weasel.
  122. o Minor bugfixes (exit policies, security):
  123. - Refresh an exit relay's exit policy when interface addresses
  124. change. Previously, tor only refreshed the exit policy when the
  125. configured external address changed. Fixes bug 18208; bugfix on
  126. 0.2.7.3-rc. Patch by teor.
  127. o Minor bugfixes (security, hidden services):
  128. - Prevent hidden services connecting to client-supplied rendezvous
  129. addresses that are reserved as internal or multicast. Fixes bug
  130. 8976; bugfix on 0.2.3.21-rc. Patch by dgoulet and teor.
  131. o Minor bugfixes (build):
  132. - Do not link the unit tests against both the testing and non-testing
  133. versions of the static libraries. Fixes bug 18490; bugfix on
  134. 0.2.7.1-alpha.
  135. - Avoid spurious failures from configure files related to calling
  136. exit(0) in TOR_SEARCH_LIBRARY. Fixes bug 18625; bugfix on
  137. 0.2.0.1-alpha. Patch from "cypherpunks".
  138. - Silence spurious clang-scan warnings in the ed25519_donna code by
  139. explicitly initializing some objects. Fixes bug 18384; bugfix on
  140. 0.2.7.2-alpha. Patch by teor.
  141. o Minor bugfixes (client, bootstrap):
  142. - Count receipt of new microdescriptors as progress towards
  143. bootstrapping. Previously, with EntryNodes set, Tor might not
  144. successfully repopulate the guard set on bootstrapping. Fixes bug
  145. 16825; bugfix on 0.2.3.1-alpha.
  146. o Minor bugfixes (code correctness):
  147. - Update to the latest version of Trunnel, which tries harder to
  148. avoid generating code that can invoke memcpy(p,NULL,0). Bug found by
  149. clang address sanitizer. Fixes bug 18373; bugfix on 0.2.7.2-alpha.
  150. o Minor bugfixes (configuration):
  151. - Fix a tiny memory leak when parsing a port configuration ending in
  152. ":auto". Fixes bug 18374; bugfix on 0.2.3.3-alpha.
  153. o Minor bugfixes (containers):
  154. - If we somehow attempt to construct a heap with more than
  155. 1073741822 elements, avoid an integer overflow when maintaining
  156. the heap property. Fixes bug 18296; bugfix on 0.1.2.1-alpha.
  157. o Minor bugfixes (correctness):
  158. - Fix a bad memory handling bug that would occur if we had queued a
  159. cell on a channel's incoming queue. Fortunately, we can't actually
  160. queue a cell like that as our code is constructed today, but it's
  161. best to avoid this kind of error, even if there isn't any code
  162. that triggers it today. Fixes bug 18570; bugfix on 0.2.4.4-alpha.
  163. o Minor bugfixes (directory):
  164. - When generating a URL for a directory server on an IPv6 address,
  165. wrap the IPv6 address in square brackets. Fixes bug 18051; bugfix
  166. on 0.2.3.9-alpha. Patch from Malek.
  167. o Minor bugfixes (fallback directory mirrors):
  168. - When requesting extrainfo descriptors from a trusted directory
  169. server, check whether it is an authority or a fallback directory
  170. which supports extrainfo descriptors. Fixes bug 18489; bugfix on
  171. 0.2.4.7-alpha. Reported by atagar, patch by teor.
  172. o Minor bugfixes (hidden service, client):
  173. - Handle the case where the user makes several fast consecutive
  174. requests to the same .onion address. Previously, the first six
  175. requests would each trigger a descriptor fetch, each picking a
  176. directory (there are 6 overall) and the seventh one would fail
  177. because no directories were left, thereby triggering a close on
  178. all current directory connections asking for the hidden service.
  179. The solution here is to not close the connections if we have
  180. pending directory fetches. Fixes bug 15937; bugfix
  181. on 0.2.7.1-alpha.
  182. o Minor bugfixes (hidden service, control port):
  183. - Add the onion address to the HS_DESC event for the UPLOADED action
  184. both on success or failure. It was previously hardcoded with
  185. UNKNOWN. Fixes bug 16023; bugfix on 0.2.7.2-alpha.
  186. o Minor bugfixes (hidden service, directory):
  187. - Bridges now refuse "rendezvous2" (hidden service descriptor)
  188. publish attempts. Suggested by ticket 18332.
  189. o Minor bugfixes (linux seccomp2 sandbox):
  190. - Allow the setrlimit syscall, and the prlimit and prlimit64
  191. syscalls, which some libc implementations use under the hood.
  192. Fixes bug 15221; bugfix on 0.2.5.1-alpha.
  193. - Avoid a 10-second delay when starting as a client with "Sandbox 1"
  194. enabled and no DNS resolvers configured. This should help TAILS
  195. start up faster. Fixes bug 18548; bugfix on 0.2.5.1-alpha.
  196. - Fix the sandbox's interoperability with unix domain sockets under
  197. setuid. Fixes bug 18253; bugfix on 0.2.8.1-alpha.
  198. o Minor bugfixes (logging):
  199. - When logging information about an unparsable networkstatus vote or
  200. consensus, do not say "vote" when we mean consensus. Fixes bug
  201. 18368; bugfix on 0.2.0.8-alpha.
  202. - Scrub service name in "unrecognized service ID" log messages.
  203. Fixes bug 18600; bugfix on 0.2.4.11-alpha.
  204. - Downgrade logs and backtraces about IP versions to info-level.
  205. Only log backtraces once each time tor runs. Assists in diagnosing
  206. bug 18351; bugfix on 0.2.8.1-alpha. Reported by sysrqb and
  207. Christian, patch by teor.
  208. o Minor bugfixes (memory safety):
  209. - Avoid freeing an uninitialized pointer when opening a socket fails
  210. in get_interface_addresses_ioctl(). Fixes bug 18454; bugfix on
  211. 0.2.3.11-alpha. Reported by toralf and "cypherpunks", patch by teor.
  212. - Correctly duplicate addresses in get_interface_address6_list().
  213. Fixes bug 18454; bugfix on 0.2.8.1-alpha. Reported
  214. by toralf, patch by "cypherpunks".
  215. - Fix a memory leak in tor-gencert. Fixes part of bug 18672; bugfix
  216. on 0.2.0.1-alpha.
  217. - Fix a memory leak in "tor --list-fingerprint". Fixes part of bug
  218. 18672; bugfix on 0.2.5.1-alpha.
  219. o Minor bugfixes (private directory):
  220. - Prevent a race condition when creating private directories. Fixes
  221. part of bug 17852; bugfix on 0.0.2pre13. Part of ticket 17852. Patch
  222. from jsturgix. Found with Flawfinder.
  223. o Minor bugfixes (test networks, IPv6):
  224. - Allow internal IPv6 addresses in descriptors in test networks.
  225. Fixes bug 17153; bugfix on 0.2.3.16-alpha. Patch by
  226. teor, reported by karsten.
  227. o Minor bugfixes (testing):
  228. - We no longer disable assertions in the unit tests when coverage is
  229. enabled. Instead, we require you to say --disable-asserts-in-tests
  230. to the configure script if you need assertions disabled in the
  231. unit tests (for example, if you want to perform branch coverage).
  232. Fixes bug 18242; bugfix on 0.2.7.1-alpha.
  233. o Minor bugfixes (time parsing):
  234. - Avoid overflow in tor_timegm when parsing dates in and after 2038
  235. on platforms with 32-bit time_t. Fixes bug 18479; bugfix on
  236. 0.0.2pre14. Patch by teor.
  237. o Minor bugfixes (tor-gencert):
  238. - Correctly handle the case where an authority operator enters a
  239. passphrase but sends an EOF before sending a newline. Fixes bug
  240. 17443; bugfix on 0.2.0.20-rc. Found by junglefowl.
  241. o Code simplification and refactoring:
  242. - Quote all the string interpolations in configure.ac -- even those
  243. which we are pretty sure can't contain spaces. Closes ticket
  244. 17744. Patch from zerosion.
  245. - Remove specialized code for non-inplace AES_CTR. 99% of our AES is
  246. inplace, so there's no need to have a separate implementation for
  247. the non-inplace code. Closes ticket 18258. Patch from Malek.
  248. - Simplify return types for some crypto functions that can't
  249. actually fail. Patch from Hassan Alsibyani. Closes ticket 18259.
  250. o Documentation:
  251. - Change build messages to refer to "Fedora" instead of "Fedora
  252. Core", and "dnf" instead of "yum". Closes tickets 18459 and 18426.
  253. Patches from "icanhasaccount" and "cypherpunks".
  254. o Removed features:
  255. - We no longer maintain an internal freelist in memarea.c.
  256. Allocators should be good enough to make this code unnecessary,
  257. and it's doubtful that it ever had any performance benefit.
  258. o Testing:
  259. - Fix several warnings from clang's address sanitizer produced in
  260. the unit tests.
  261. - Treat backtrace test failures as expected on FreeBSD until we
  262. solve bug 17808. Closes ticket 18204.
  263. Changes in version 0.2.8.1-alpha - 2016-02-04
  264. Tor 0.2.8.1-alpha is the first alpha release in its series. It
  265. includes numerous small features and bugfixes against previous Tor
  266. versions, and numerous small infrastructure improvements. The most
  267. notable features are a set of improvements to the directory subsystem.
  268. o Major features (security, Linux):
  269. - When Tor starts as root on Linux and is told to switch user ID, it
  270. can now retain the capability to bind to low ports. By default,
  271. Tor will do this only when it's switching user ID and some low
  272. ports have been configured. You can change this behavior with the
  273. new option KeepBindCapabilities. Closes ticket 8195.
  274. o Major features (directory system):
  275. - When bootstrapping multiple consensus downloads at a time, use the
  276. first one that starts downloading, and close the rest. This
  277. reduces failures when authorities or fallback directories are slow
  278. or down. Together with the code for feature 15775, this feature
  279. should reduces failures due to fallback churn. Implements ticket
  280. 4483. Patch by "teor". Implements IPv4 portions of proposal 210 by
  281. "mikeperry" and "teor".
  282. - Include a trial list of default fallback directories, based on an
  283. opt-in survey of suitable relays. Doing this should make clients
  284. bootstrap more quickly and reliably, and reduce the load on the
  285. directory authorities. Closes ticket 15775. Patch by "teor".
  286. Candidates identified using an OnionOO script by "weasel", "teor",
  287. "gsathya", and "karsten".
  288. - Previously only relays that explicitly opened a directory port
  289. (DirPort) accepted directory requests from clients. Now all
  290. relays, with and without a DirPort, accept and serve tunneled
  291. directory requests that they receive through their ORPort. You can
  292. disable this behavior using the new DirCache option. Closes
  293. ticket 12538.
  294. o Major key updates:
  295. - Update the V3 identity key for the dannenberg directory authority:
  296. it was changed on 18 November 2015. Closes task 17906. Patch
  297. by "teor".
  298. o Minor features (security, clock):
  299. - Warn when the system clock appears to move back in time (when the
  300. state file was last written in the future). Tor doesn't know that
  301. consensuses have expired if the clock is in the past. Patch by
  302. "teor". Implements ticket 17188.
  303. o Minor features (security, exit policies):
  304. - ExitPolicyRejectPrivate now rejects more private addresses by
  305. default. Specifically, it now rejects the relay's outbound bind
  306. addresses (if configured), and the relay's configured port
  307. addresses (such as ORPort and DirPort). Fixes bug 17027; bugfix on
  308. 0.2.0.11-alpha. Patch by "teor".
  309. o Minor features (security, memory erasure):
  310. - Set the unused entries in a smartlist to NULL. This helped catch
  311. a (harmless) bug, and shouldn't affect performance too much.
  312. Implements ticket 17026.
  313. - Use SecureMemoryWipe() function to securely clean memory on
  314. Windows. Previously we'd use OpenSSL's OPENSSL_cleanse() function.
  315. Implements feature 17986.
  316. - Use explicit_bzero or memset_s when present. Previously, we'd use
  317. OpenSSL's OPENSSL_cleanse() function. Closes ticket 7419; patches
  318. from <logan@hackers.mu> and <selven@hackers.mu>.
  319. - Make memwipe() do nothing when passed a NULL pointer or buffer of
  320. zero size. Check size argument to memwipe() for underflow. Fixes
  321. bug 18089; bugfix on 0.2.3.25 and 0.2.4.6-alpha. Reported by "gk",
  322. patch by "teor".
  323. o Minor features (security, RNG):
  324. - Adjust Tor's use of OpenSSL's RNG APIs so that they absolutely,
  325. positively are not allowed to fail. Previously we depended on
  326. internal details of OpenSSL's behavior. Closes ticket 17686.
  327. - Never use the system entropy output directly for anything besides
  328. seeding the PRNG. When we want to generate important keys, instead
  329. of using system entropy directly, we now hash it with the PRNG
  330. stream. This may help resist certain attacks based on broken OS
  331. entropy implementations. Closes part of ticket 17694.
  332. - Use modern system calls (like getentropy() or getrandom()) to
  333. generate strong entropy on platforms that have them. Closes
  334. ticket 13696.
  335. o Minor features (accounting):
  336. - Added two modes to the AccountingRule option: One for limiting
  337. only the number of bytes sent ("AccountingRule out"), and one for
  338. limiting only the number of bytes received ("AccountingRule in").
  339. Closes ticket 15989; patch from "unixninja92".
  340. o Minor features (build):
  341. - Since our build process now uses "make distcheck", we no longer
  342. force "make dist" to depend on "make check". Closes ticket 17893;
  343. patch from "cypherpunks."
  344. - Tor now builds successfully with the recent OpenSSL 1.1
  345. development branch, and with the latest LibreSSL. Closes tickets
  346. 17549, 17921, and 17984.
  347. o Minor features (controller):
  348. - Adds the FallbackDir entries to 'GETINFO config/defaults'. Closes
  349. tickets 16774 and 17817. Patch by George Tankersley.
  350. - New 'GETINFO hs/service/desc/id/' command to retrieve a hidden
  351. service descriptor from a service's local hidden service
  352. descriptor cache. Closes ticket 14846.
  353. - Add 'GETINFO exit-policy/reject-private/[default,relay]', so
  354. controllers can examine the the reject rules added by
  355. ExitPolicyRejectPrivate. This makes it easier for stem to display
  356. exit policies.
  357. o Minor features (crypto):
  358. - Add SHA512 support to crypto.c. Closes ticket 17663; patch from
  359. George Tankersley.
  360. - Add SHA3 and SHAKE support to crypto.c. Closes ticket 17783.
  361. - When allocating a digest state object, allocate no more space than
  362. we actually need. Previously, we would allocate as much space as
  363. the state for the largest algorithm would need. This change saves
  364. up to 672 bytes per circuit. Closes ticket 17796.
  365. - Improve performance when hashing non-multiple of 8 sized buffers,
  366. based on Andrew Moon's public domain SipHash-2-4 implementation.
  367. Fixes bug 17544; bugfix on 0.2.5.3-alpha.
  368. o Minor features (directory downloads):
  369. - Wait for busy authorities and fallback directories to become non-
  370. busy when bootstrapping. (A similar change was made in 6c443e987d
  371. for directory caches chosen from the consensus.) Closes ticket
  372. 17864; patch by "teor".
  373. - Add UseDefaultFallbackDirs, which enables any hard-coded fallback
  374. directory mirrors. The default is 1; set it to 0 to disable
  375. fallbacks. Implements ticket 17576. Patch by "teor".
  376. o Minor features (geoip):
  377. - Update geoip and geoip6 to the January 5 2016 Maxmind GeoLite2
  378. Country database.
  379. o Minor features (IPv6):
  380. - Add an argument 'ipv6=address:orport' to the DirAuthority and
  381. FallbackDir torrc options, to specify an IPv6 address for an
  382. authority or fallback directory. Add hard-coded ipv6 addresses for
  383. directory authorities that have them. Closes ticket 17327; patch
  384. from Nick Mathewson and "teor".
  385. - Add address policy assume_action support for IPv6 addresses.
  386. - Limit IPv6 mask bits to 128.
  387. - Warn when comparing against an AF_UNSPEC address in a policy, it's
  388. almost always a bug. Closes ticket 17863; patch by "teor".
  389. - Allow users to configure directory authorities and fallback
  390. directory servers with IPv6 addresses and ORPorts. Resolves
  391. ticket 6027.
  392. - routerset_parse now accepts IPv6 literal addresses. Fixes bug
  393. 17060; bugfix on 0.2.1.3-alpha. Patch by "teor".
  394. - Make tor_ersatz_socketpair work on IPv6-only systems. Fixes bug
  395. 17638; bugfix on 0.0.2pre8. Patch by "teor".
  396. o Minor features (logging):
  397. - When logging to syslog, allow a tag to be added to the syslog
  398. identity (the string prepended to every log message). The tag can
  399. be configured with SyslogIdentityTag and defaults to none. Setting
  400. it to "foo" will cause logs to be tagged as "Tor-foo". Closes
  401. ticket 17194.
  402. o Minor features (portability):
  403. - Use timingsafe_memcmp() where available. Closes ticket 17944;
  404. patch from <logan@hackers.mu>.
  405. o Minor features (relay, address discovery):
  406. - Add a family argument to get_interface_addresses_raw() and
  407. subfunctions to make network interface address interogation more
  408. efficient. Now Tor can specifically ask for IPv4, IPv6 or both
  409. types of interfaces from the operating system. Resolves
  410. ticket 17950.
  411. - When get_interface_address6_list(.,AF_UNSPEC,.) is called and
  412. fails to enumerate interface addresses using the platform-specific
  413. API, have it rely on the UDP socket fallback technique to try and
  414. find out what IP addresses (both IPv4 and IPv6) our machine has.
  415. Resolves ticket 17951.
  416. o Minor features (replay cache):
  417. - The replay cache now uses SHA256 instead of SHA1. Implements
  418. feature 8961. Patch by "teor", issue reported by "rransom".
  419. o Minor features (unix file permissions):
  420. - Defer creation of Unix sockets until after setuid. This avoids
  421. needing CAP_CHOWN and CAP_FOWNER when using systemd's
  422. CapabilityBoundingSet, or chown and fowner when using SELinux.
  423. Implements part of ticket 17562. Patch from Jamie Nguyen.
  424. - If any directory created by Tor is marked as group readable, the
  425. filesystem group is allowed to be either the default GID or the
  426. root user. Allowing root to read the DataDirectory prevents the
  427. need for CAP_READ_SEARCH when using systemd's
  428. CapabilityBoundingSet, or dac_read_search when using SELinux.
  429. Implements part of ticket 17562. Patch from Jamie Nguyen.
  430. - Introduce a new DataDirectoryGroupReadable option. If it is set to
  431. 1, the DataDirectory will be made readable by the default GID.
  432. Implements part of ticket 17562. Patch from Jamie Nguyen.
  433. o Minor bugfixes (accounting):
  434. - The max bandwidth when using 'AccountRule sum' is now correctly
  435. logged. Fixes bug 18024; bugfix on 0.2.6.1-alpha. Patch
  436. from "unixninja92".
  437. o Minor bugfixes (code correctness):
  438. - When closing an entry connection, generate a warning if we should
  439. have sent an end cell for it but we haven't. Fixes bug 17876;
  440. bugfix on 0.2.3.2-alpha.
  441. - Assert that allocated memory held by the reputation code is freed
  442. according to its internal counters. Fixes bug 17753; bugfix
  443. on 0.1.1.1-alpha.
  444. - Assert when the TLS contexts fail to initialize. Fixes bug 17683;
  445. bugfix on 0.0.6.
  446. o Minor bugfixes (compilation):
  447. - Mark all object files that include micro-revision.i as depending
  448. on it, so as to make parallel builds more reliable. Fixes bug
  449. 17826; bugfix on 0.2.5.1-alpha.
  450. - Don't try to use the pthread_condattr_setclock() function unless
  451. it actually exists. Fixes compilation on NetBSD-6.x. Fixes bug
  452. 17819; bugfix on 0.2.6.3-alpha.
  453. - Fix backtrace compilation on FreeBSD. Fixes bug 17827; bugfix
  454. on 0.2.5.2-alpha.
  455. - Fix compilation of sandbox.c with musl-libc. Fixes bug 17347;
  456. bugfix on 0.2.5.1-alpha. Patch from 'jamestk'.
  457. - Fix search for libevent libraries on OpenBSD (and other systems
  458. that install libevent 1 and libevent 2 in parallel). Fixes bug
  459. 16651; bugfix on 0.1.0.7-rc. Patch from "rubiate".
  460. - Isolate environment variables meant for tests from the rest of the
  461. build system. Fixes bug 17818; bugfix on 0.2.7.3-rc.
  462. - Replace usage of 'INLINE' with 'inline'. Fixes bug 17804; bugfix
  463. on 0.0.2pre8.
  464. - Remove config.log only from make distclean, not from make clean.
  465. Fixes bug 17924; bugfix on 0.2.4.1-alpha.
  466. o Minor bugfixes (crypto):
  467. - Check the return value of HMAC() and assert on failure. Fixes bug
  468. 17658; bugfix on 0.2.3.6-alpha. Patch by "teor".
  469. o Minor bugfixes (fallback directories):
  470. - Mark fallbacks as "too busy" when they return a 503 response,
  471. rather than just marking authorities. Fixes bug 17572; bugfix on
  472. 0.2.4.7-alpha. Patch by "teor".
  473. o Minor bugfixes (IPv6):
  474. - Update the limits in max_dl_per_request for IPv6 address length.
  475. Fixes bug 17573; bugfix on 0.2.1.5-alpha.
  476. o Minor bugfixes (linux seccomp2 sandbox):
  477. - Fix a crash when using offline master ed25519 keys with the Linux
  478. seccomp2 sandbox enabled. Fixes bug 17675; bugfix on 0.2.7.3-rc.
  479. o Minor bugfixes (logging):
  480. - In log messages that include a function name, use __FUNCTION__
  481. instead of __PRETTY_FUNCTION__. In GCC, these are synonymous, but
  482. with clang __PRETTY_FUNCTION__ has extra information we don't
  483. need. Fixes bug 16563; bugfix on 0.0.2pre8. Fix by Tom van
  484. der Woerdt.
  485. - Remove needless quotes from a log message about unparseable
  486. addresses. Fixes bug 17843; bugfix on 0.2.3.3-alpha.
  487. o Minor bugfixes (portability):
  488. - Remove an #endif from configure.ac so that we correctly detect the
  489. presence of in6_addr.s6_addr32. Fixes bug 17923; bugfix
  490. on 0.2.0.13-alpha.
  491. o Minor bugfixes (relays):
  492. - Check that both the ORPort and DirPort (if present) are reachable
  493. before publishing a relay descriptor. Otherwise, relays publish a
  494. descriptor with DirPort 0 when the DirPort reachability test takes
  495. longer than the ORPort reachability test. Fixes bug 18050; bugfix
  496. on 0.1.0.1-rc. Reported by "starlight", patch by "teor".
  497. o Minor bugfixes (relays, hidden services):
  498. - Refuse connection requests to private OR addresses unless
  499. ExtendAllowPrivateAddresses is set. Previously, tor would connect,
  500. then refuse to send any cells to a private address. Fixes bugs
  501. 17674 and 8976; bugfix on 0.2.3.21-rc. Patch by "teor".
  502. o Minor bugfixes (safe logging):
  503. - When logging a malformed hostname received through socks4, scrub
  504. it if SafeLogging says we should. Fixes bug 17419; bugfix
  505. on 0.1.1.16-rc.
  506. o Minor bugfixes (statistics code):
  507. - Consistently check for overflow in round_*_to_next_multiple_of
  508. functions, and add unit tests with additional and maximal values.
  509. Fixes part of bug 13192; bugfix on 0.2.2.1-alpha.
  510. - Handle edge cases in the laplace functions: avoid division by
  511. zero, avoid taking the log of zero, and silence clang type
  512. conversion warnings using round and trunc. Add unit tests for edge
  513. cases with maximal values. Fixes part of bug 13192; bugfix
  514. on 0.2.6.2-alpha.
  515. o Minor bugfixes (testing):
  516. - The test for log_heartbeat was incorrectly failing in timezones
  517. with non-integer offsets. Instead of comparing the end of the time
  518. string against a constant, compare it to the output of
  519. format_local_iso_time when given the correct input. Fixes bug
  520. 18039; bugfix on 0.2.5.4-alpha.
  521. - Make unit tests pass on IPv6-only systems, and systems without
  522. localhost addresses (like some FreeBSD jails). Fixes bug 17632;
  523. bugfix on 0.2.7.3-rc. Patch by "teor".
  524. - Fix a memory leak in the ntor test. Fixes bug 17778; bugfix
  525. on 0.2.4.8-alpha.
  526. - Check the full results of SHA256 and SHA512 digests in the unit
  527. tests. Bugfix on 0.2.2.4-alpha. Patch by "teor".
  528. o Code simplification and refactoring:
  529. - Move logging of redundant policy entries in
  530. policies_parse_exit_policy_internal into its own function. Closes
  531. ticket 17608; patch from "juce".
  532. - Extract the more complicated parts of circuit_mark_for_close()
  533. into a new function that we run periodically before circuits are
  534. freed. This change removes more than half of the functions
  535. currently in the "blob". Closes ticket 17218.
  536. - Clean up a little duplicated code in
  537. crypto_expand_key_material_TAP(). Closes ticket 17587; patch
  538. from "pfrankw".
  539. - Decouple the list of streams waiting to be attached to circuits
  540. from the overall connection list. This change makes it possible to
  541. attach streams quickly while simplifying Tor's callgraph and
  542. avoiding O(N) scans of the entire connection list. Closes
  543. ticket 17590.
  544. - When a direct directory request fails immediately on launch,
  545. instead of relaunching that request from inside the code that
  546. launches it, instead mark the connection for teardown. This change
  547. simplifies Tor's callback and prevents the directory-request
  548. launching code from invoking itself recursively. Closes
  549. ticket 17589
  550. - Remove code for configuring OpenSSL dynamic locks; OpenSSL doesn't
  551. use them. Closes ticket 17926.
  552. o Documentation:
  553. - Add a description of the correct use of the '--keygen' command-
  554. line option. Closes ticket 17583; based on text by 's7r'.
  555. - Document the minimum HeartbeatPeriod value. Closes ticket 15638.
  556. - Explain actual minima for BandwidthRate. Closes ticket 16382.
  557. - Fix a minor formatting typo in the manpage. Closes ticket 17791.
  558. - Mention torspec URL in the manpage and point the reader to it
  559. whenever we mention a document that belongs in torspce. Fixes
  560. issue 17392.
  561. o Removed features:
  562. - Remove client-side support for connecting to Tor relays running
  563. versions of Tor before 0.2.3.6-alpha. These relays didn't support
  564. the v3 TLS handshake protocol, and are no longer allowed on the
  565. Tor network. Implements the client side of ticket 11150. Based on
  566. patches by Tom van der Woerdt.
  567. o Testing:
  568. - Add unit tests to check for common RNG failure modes, such as
  569. returning all zeroes, identical values, or incrementing values
  570. (OpenSSL's rand_predictable feature). Patch by "teor".
  571. - Log more information when the backtrace tests fail. Closes ticket
  572. 17892. Patch from "cypherpunks."
  573. - Always test both ed25519 backends, so that we can be sure that our
  574. batch-open replacement code works. Part of ticket 16794.
  575. - Cover dns_resolve_impl() in dns.c with unit tests. Implements a
  576. portion of ticket 16831.
  577. - More unit tests for compat_libevent.c, procmon.c, tortls.c,
  578. util_format.c, directory.c, and options_validate.c. Closes tickets
  579. 17075, 17082, 17084, 17003, and 17076 respectively. Patches from
  580. Ola Bini.
  581. - Unit tests for directory_handle_command_get. Closes ticket 17004.
  582. Patch from Reinaldo de Souza Jr.
  583. Changes in version 0.2.7.6 - 2015-12-10
  584. Tor version 0.2.7.6 fixes a major bug in entry guard selection, as
  585. well as a minor bug in hidden service reliability.
  586. o Major bugfixes (guard selection):
  587. - Actually look at the Guard flag when selecting a new directory
  588. guard. When we implemented the directory guard design, we
  589. accidentally started treating all relays as if they have the Guard
  590. flag during guard selection, leading to weaker anonymity and worse
  591. performance. Fixes bug 17772; bugfix on 0.2.4.8-alpha. Discovered
  592. by Mohsen Imani.
  593. o Minor features (geoip):
  594. - Update geoip and geoip6 to the December 1 2015 Maxmind GeoLite2
  595. Country database.
  596. o Minor bugfixes (compilation):
  597. - When checking for net/pfvar.h, include netinet/in.h if possible.
  598. This fixes transparent proxy detection on OpenBSD. Fixes bug
  599. 17551; bugfix on 0.1.2.1-alpha. Patch from "rubiate".
  600. - Fix a compilation warning with Clang 3.6: Do not check the
  601. presence of an address which can never be NULL. Fixes bug 17781.
  602. o Minor bugfixes (correctness):
  603. - When displaying an IPv6 exit policy, include the mask bits
  604. correctly even when the number is greater than 31. Fixes bug
  605. 16056; bugfix on 0.2.4.7-alpha. Patch from "gturner".
  606. - The wrong list was used when looking up expired intro points in a
  607. rend service object, causing what we think could be reachability
  608. issues for hidden services, and triggering a BUG log. Fixes bug
  609. 16702; bugfix on 0.2.7.2-alpha.
  610. - Fix undefined behavior in the tor_cert_checksig function. Fixes
  611. bug 17722; bugfix on 0.2.7.2-alpha.
  612. Changes in version 0.2.7.5 - 2015-11-20
  613. The Tor 0.2.7 release series is dedicated to the memory of Tor user
  614. and privacy advocate Caspar Bowden (1961-2015). Caspar worked
  615. tirelessly to advocate human rights regardless of national borders,
  616. and oppose the encroachments of mass surveillance. He opposed national
  617. exceptionalism, he brought clarity to legal and policy debates, he
  618. understood and predicted the impact of mass surveillance on the world,
  619. and he laid the groundwork for resisting it. While serving on the Tor
  620. Project's board of directors, he brought us his uncompromising focus
  621. on technical excellence in the service of humankind. Caspar was an
  622. inimitable force for good and a wonderful friend. He was kind,
  623. humorous, generous, gallant, and believed we should protect one
  624. another without exception. We honor him here for his ideals, his
  625. efforts, and his accomplishments. Please honor his memory with works
  626. that would make him proud.
  627. Tor 0.2.7.5 is the first stable release in the Tor 0.2.7 series.
  628. The 0.2.7 series adds a more secure identity key type for relays,
  629. improves cryptography performance, resolves several longstanding
  630. hidden-service performance issues, improves controller support for
  631. hidden services, and includes small bugfixes and performance
  632. improvements throughout the program. This release series also includes
  633. more tests than before, and significant simplifications to which parts
  634. of Tor invoke which others.
  635. (This release contains no code changes since 0.2.7.4-rc.)
  636. Changes in version 0.2.7.4-rc - 2015-10-21
  637. Tor 0.2.7.4-rc is the second release candidate in the 0.2.7 series. It
  638. fixes some important memory leaks, and a scary-looking (but mostly
  639. harmless in practice) invalid-read bug. It also has a few small
  640. bugfixes, notably fixes for compilation and portability on different
  641. platforms. If no further significant bounds are found, the next
  642. release will the the official stable release.
  643. o Major bugfixes (security, correctness):
  644. - Fix an error that could cause us to read 4 bytes before the
  645. beginning of an openssl string. This bug could be used to cause
  646. Tor to crash on systems with unusual malloc implementations, or
  647. systems with unusual hardening installed. Fixes bug 17404; bugfix
  648. on 0.2.3.6-alpha.
  649. o Major bugfixes (correctness):
  650. - Fix a use-after-free bug in validate_intro_point_failure(). Fixes
  651. bug 17401; bugfix on 0.2.7.3-rc.
  652. o Major bugfixes (memory leaks):
  653. - Fix a memory leak in ed25519 batch signature checking. Fixes bug
  654. 17398; bugfix on 0.2.6.1-alpha.
  655. - Fix a memory leak in rend_cache_failure_entry_free(). Fixes bug
  656. 17402; bugfix on 0.2.7.3-rc.
  657. - Fix a memory leak when reading an expired signing key from disk.
  658. Fixes bug 17403; bugfix on 0.2.7.2-rc.
  659. o Minor features (geoIP):
  660. - Update geoip and geoip6 to the October 9 2015 Maxmind GeoLite2
  661. Country database.
  662. o Minor bugfixes (compilation):
  663. - Repair compilation with the most recent (unreleased, alpha)
  664. vesions of OpenSSL 1.1. Fixes part of ticket 17237.
  665. - Fix an integer overflow warning in test_crypto_slow.c. Fixes bug
  666. 17251; bugfix on 0.2.7.2-alpha.
  667. - Fix compilation of sandbox.c with musl-libc. Fixes bug 17347;
  668. bugfix on 0.2.5.1-alpha. Patch from 'jamestk'.
  669. o Minor bugfixes (portability):
  670. - Use libexecinfo on FreeBSD to enable backtrace support. Fixes
  671. part of bug 17151; bugfix on 0.2.5.2-alpha. Patch from
  672. Marcin Cieślak.
  673. o Minor bugfixes (sandbox):
  674. - Add the "hidserv-stats" filename to our sandbox filter for the
  675. HiddenServiceStatistics option to work properly. Fixes bug 17354;
  676. bugfix on 0.2.6.2-alpha. Patch from David Goulet.
  677. o Minor bugfixes (testing):
  678. - Add unit tests for get_interface_address* failure cases. Fixes bug
  679. 17173; bugfix on 0.2.7.3-rc. Patch by fk/teor.
  680. - Fix breakage when running 'make check' with BSD make. Fixes bug
  681. 17154; bugfix on 0.2.7.3-rc. Patch by Marcin Cieślak.
  682. - Make the get_ifaddrs_* unit tests more tolerant of different
  683. network configurations. (Don't assume every test box has an IPv4
  684. address, and don't assume every test box has a non-localhost
  685. address.) Fixes bug 17255; bugfix on 0.2.7.3-rc. Patch by "teor".
  686. - Skip backtrace tests when backtrace support is not compiled in.
  687. Fixes part of bug 17151; bugfix on 0.2.7.1-alpha. Patch from
  688. Marcin Cieślak.
  689. o Documentation:
  690. - Fix capitalization of SOCKS in sample torrc. Closes ticket 15609.
  691. - Note that HiddenServicePorts can take a unix domain socket. Closes
  692. ticket 17364.
  693. Changes in version 0.2.7.3-rc - 2015-09-25
  694. Tor 0.2.7.3-rc is the first release candidate in the 0.2.7 series. It
  695. contains numerous usability fixes for Ed25519 keys, safeguards against
  696. several misconfiguration problems, significant simplifications to
  697. Tor's callgraph, and numerous bugfixes and small features.
  698. This is the most tested release of Tor to date. The unit tests cover
  699. 39.40% of the code, and the integration tests (accessible with "make
  700. test-full-online", requiring stem and chutney and a network
  701. connection) raise the coverage to 64.49%.
  702. o Major features (security, hidden services):
  703. - Hidden services, if using the EntryNodes option, are required to
  704. use more than one EntryNode, in order to avoid a guard discovery
  705. attack. (This would only affect people who had configured hidden
  706. services and manually specified the EntryNodes option with a
  707. single entry-node. The impact was that it would be easy to
  708. remotely identify the guard node used by such a hidden service.
  709. See ticket for more information.) Fixes ticket 14917.
  710. o Major features (Ed25519 keys, keypinning):
  711. - The key-pinning option on directory authorities is now advisory-
  712. only by default. In a future version, or when the AuthDirPinKeys
  713. option is set, pins are enforced again. Disabling key-pinning
  714. seemed like a good idea so that we can survive the fallout of any
  715. usability problems associated with Ed25519 keys. Closes
  716. ticket 17135.
  717. o Major features (Ed25519 performance):
  718. - Improve the speed of Ed25519 operations and Curve25519 keypair
  719. generation when built targeting 32 bit x86 platforms with SSE2
  720. available. Implements ticket 16535.
  721. - Improve the runtime speed of Ed25519 signature verification by
  722. using Ed25519-donna's batch verification support. Implements
  723. ticket 16533.
  724. o Major features (performance testing):
  725. - The test-network.sh script now supports performance testing.
  726. Requires corresponding chutney performance testing changes. Patch
  727. by "teor". Closes ticket 14175.
  728. o Major features (relay, Ed25519):
  729. - Significant usability improvements for Ed25519 key management. Log
  730. messages are better, and the code can recover from far more
  731. failure conditions. Thanks to "s7r" for reporting and diagnosing
  732. so many of these!
  733. - Add a new OfflineMasterKey option to tell Tor never to try loading
  734. or generating a secret Ed25519 identity key. You can use this in
  735. combination with tor --keygen to manage offline and/or encrypted
  736. Ed25519 keys. Implements ticket 16944.
  737. - Add a --newpass option to allow changing or removing the
  738. passphrase of an encrypted key with tor --keygen. Implements part
  739. of ticket 16769.
  740. - On receiving a HUP signal, check to see whether the Ed25519
  741. signing key has changed, and reload it if so. Closes ticket 16790.
  742. o Major bugfixes (relay, Ed25519):
  743. - Avoid crashing on 'tor --keygen'. Fixes bug 16679; bugfix on
  744. 0.2.7.2-alpha. Reported by "s7r".
  745. - Improve handling of expired signing keys with offline master keys.
  746. Fixes bug 16685; bugfix on 0.2.7.2-alpha. Reported by "s7r".
  747. o Minor features (client-side privacy):
  748. - New KeepAliveIsolateSOCKSAuth option to indefinitely extend circuit
  749. lifespan when IsolateSOCKSAuth and streams with SOCKS
  750. authentication are attached to the circuit. This allows
  751. applications like TorBrowser to manage circuit lifetime on their
  752. own. Implements feature 15482.
  753. - When logging malformed hostnames from SOCKS5 requests, respect
  754. SafeLogging configuration. Fixes bug 16891; bugfix on 0.1.1.16-rc.
  755. o Minor features (compilation):
  756. - Give a warning as early as possible when trying to build with an
  757. unsupported OpenSSL version. Closes ticket 16901.
  758. - Fail during configure if we're trying to build against an OpenSSL
  759. built without ECC support. Fixes bug 17109, bugfix on 0.2.7.1-alpha
  760. which started requiring ECC.
  761. o Minor features (geoip):
  762. - Update geoip and geoip6 to the September 3 2015 Maxmind GeoLite2
  763. Country database.
  764. o Minor features (hidden services):
  765. - Relays need to have the Fast flag to get the HSDir flag. As this
  766. is being written, we'll go from 2745 HSDirs down to 2342, a ~14%
  767. drop. This change should make some attacks against the hidden
  768. service directory system harder. Fixes ticket 15963.
  769. - Turn on hidden service statistics collection by setting the torrc
  770. option HiddenServiceStatistics to "1" by default. (This keeps
  771. track only of the fraction of traffic used by hidden services, and
  772. the total number of hidden services in existence.) Closes
  773. ticket 15254.
  774. - Client now uses an introduction point failure cache to know when
  775. to fetch or keep a descriptor in their cache. Previously, failures
  776. were recorded implicitly, but not explicitly remembered. Closes
  777. ticket 16389.
  778. o Minor features (testing, authorities, documentation):
  779. - New TestingDirAuthVote{Exit,Guard,HSDir}IsStrict flags to
  780. explicitly manage consensus flags in testing networks. Patch by
  781. "robgjansen", modified by "teor". Implements part of ticket 14882.
  782. o Minor bugfixes (security, exit policies):
  783. - ExitPolicyRejectPrivate now also rejects the relay's published
  784. IPv6 address (if any), and any publicly routable IPv4 or IPv6
  785. addresses on any local interfaces. ticket 17027. Patch by "teor".
  786. Fixes bug 17027; bugfix on 0.2.0.11-alpha.
  787. o Minor bug fixes (torrc exit policies):
  788. - In torrc, "accept6 *" and "reject6 *" ExitPolicy lines now only
  789. produce IPv6 wildcard addresses. Previously they would produce
  790. both IPv4 and IPv6 wildcard addresses. Patch by "teor". Fixes part
  791. of bug 16069; bugfix on 0.2.4.7-alpha.
  792. - When parsing torrc ExitPolicies, we now warn for a number of cases
  793. where the user's intent is likely to differ from Tor's actual
  794. behavior. These include: using an IPv4 address with an accept6 or
  795. reject6 line; using "private" on an accept6 or reject6 line; and
  796. including any ExitPolicy lines after accept *:* or reject *:*.
  797. Related to ticket 16069.
  798. - When parsing torrc ExitPolicies, we now issue an info-level
  799. message when expanding an "accept/reject *" line to include both
  800. IPv4 and IPv6 wildcard addresses. Related to ticket 16069.
  801. - In each instance above, usage advice is provided to avoid the
  802. message. Resolves ticket 16069. Patch by "teor". Fixes part of bug
  803. 16069; bugfix on 0.2.4.7-alpha.
  804. o Minor bugfixes (authority):
  805. - Don't assign "HSDir" to a router if it isn't Valid and Running.
  806. Fixes bug 16524; bugfix on 0.2.7.2-alpha.
  807. - Downgrade log messages about Ed25519 key issues if they are in old
  808. cached router descriptors. Fixes part of bug 16286; bugfix
  809. on 0.2.7.2-alpha.
  810. - When we find an Ed25519 key issue in a cached descriptor, stop
  811. saying the descriptor was just "uploaded". Fixes another part of
  812. bug 16286; bugfix on 0.2.7.2-alpha.
  813. o Minor bugfixes (control port):
  814. - Repair a warning and a spurious result when getting the maximum
  815. number of file descriptors from the controller. Fixes bug 16697;
  816. bugfix on 0.2.7.2-alpha.
  817. o Minor bugfixes (correctness):
  818. - When calling channel_free_list(), avoid calling smartlist_remove()
  819. while inside a FOREACH loop. This partially reverts commit
  820. 17356fe7fd96af where the correct SMARTLIST_DEL_CURRENT was
  821. incorrectly removed. Fixes bug 16924; bugfix on 0.2.4.4-alpha.
  822. o Minor bugfixes (documentation):
  823. - Advise users on how to configure separate IPv4 and IPv6 exit
  824. policies in the manpage and sample torrcs. Related to ticket 16069.
  825. - Fix the usage message of tor-resolve(1) so that it no longer lists
  826. the removed -F option. Fixes bug 16913; bugfix on 0.2.2.28-beta.
  827. - Fix an error in the manual page and comments for
  828. TestingDirAuthVoteHSDir[IsStrict], which suggested that a HSDir
  829. required "ORPort connectivity". While this is true, it is in no
  830. way unique to the HSDir flag. Of all the flags, only HSDirs need a
  831. DirPort configured in order for the authorities to assign that
  832. particular flag. Patch by "teor". Fixed as part of 14882; bugfix
  833. on 0.2.6.3-alpha.
  834. o Minor bugfixes (Ed25519):
  835. - Fix a memory leak when reading router descriptors with expired
  836. Ed25519 certificates. Fixes bug 16539; bugfix on 0.2.7.2-alpha.
  837. o Minor bugfixes (linux seccomp2 sandbox):
  838. - Allow bridge authorities to run correctly under the seccomp2
  839. sandbox. Fixes bug 16964; bugfix on 0.2.5.1-alpha.
  840. - Allow routers with ed25519 keys to run correctly under the
  841. seccomp2 sandbox. Fixes bug 16965; bugfix on 0.2.7.2-alpha.
  842. o Minor bugfixes (open file limit):
  843. - Fix set_max_file_descriptors() to set by default the max open file
  844. limit to the current limit when setrlimit() fails. Fixes bug
  845. 16274; bugfix on 0.2.0.10-alpha. Patch by dgoulet.
  846. o Minor bugfixes (portability):
  847. - Try harder to normalize the exit status of the Tor process to the
  848. standard-provided range. Fixes bug 16975; bugfix on every version
  849. of Tor ever.
  850. - Check correctly for Windows socket errors in the workqueue
  851. backend. Fixes bug 16741; bugfix on 0.2.6.3-alpha.
  852. - Fix the behavior of crypto_rand_time_range() when told to consider
  853. times before 1970. (These times were possible when running in a
  854. simulated network environment where time()'s output starts at
  855. zero.) Fixes bug 16980; bugfix on 0.2.7.1-alpha.
  856. - Restore correct operation of TLS client-cipher detection on
  857. OpenSSL 1.1. Fixes bug 14047; bugfix on 0.2.7.2-alpha.
  858. o Minor bugfixes (relay):
  859. - Ensure that worker threads actually exit when a fatal error or
  860. shutdown is indicated. This fix doesn't currently affect the
  861. behavior of Tor, because Tor workers never indicates fatal error
  862. or shutdown except in the unit tests. Fixes bug 16868; bugfix
  863. on 0.2.6.3-alpha.
  864. - Unblock threads before releasing the work queue mutex to ensure
  865. predictable scheduling behavior. Fixes bug 16644; bugfix
  866. on 0.2.6.3-alpha.
  867. o Code simplification and refactoring:
  868. - Change the function that's called when we need to retry all
  869. downloads so that it only reschedules the downloads to happen
  870. immediately, rather than launching them all at once itself. This
  871. further simplifies Tor's callgraph.
  872. - Move some format-parsing functions out of crypto.c and
  873. crypto_curve25519.c into crypto_format.c and/or util_format.c.
  874. - Move the client-only parts of init_keys() into a separate
  875. function. Closes ticket 16763.
  876. - Simplify the microdesc_free() implementation so that it no longer
  877. appears (to code analysis tools) to potentially invoke a huge
  878. suite of other microdesc functions.
  879. - Simply the control graph further by deferring the inner body of
  880. directory_all_unreachable() into a callback. Closes ticket 16762.
  881. - Treat the loss of an owning controller as equivalent to a SIGTERM
  882. signal. This removes a tiny amount of duplicated code, and
  883. simplifies our callgraph. Closes ticket 16788.
  884. - When generating an event to send to the controller, we no longer
  885. put the event over the network immediately. Instead, we queue
  886. these events, and use a Libevent callback to deliver them. This
  887. change simplifies Tor's callgraph by reducing the number of
  888. functions from which all other Tor functions are reachable. Closes
  889. ticket 16695.
  890. - Wrap Windows-only C files inside '#ifdef _WIN32' so that tools
  891. that try to scan or compile every file on Unix won't decide that
  892. they are broken.
  893. - Remove the unused "nulterminate" argument from buf_pullup().
  894. o Documentation:
  895. - Recommend a 40 GB example AccountingMax in torrc.sample rather
  896. than a 4 GB max. Closes ticket 16742.
  897. - Include the TUNING document in our source tarball. It is referred
  898. to in the ChangeLog and an error message. Fixes bug 16929; bugfix
  899. on 0.2.6.1-alpha.
  900. o Removed code:
  901. - The internal pure-C tor-fw-helper tool is now removed from the Tor
  902. distribution, in favor of the pure-Go clone available from
  903. https://gitweb.torproject.org/tor-fw-helper.git/ . The libraries
  904. used by the C tor-fw-helper are not, in our opinion, very
  905. confidence- inspiring in their secure-programming techniques.
  906. Closes ticket 13338.
  907. - Remove the code that would try to aggressively flush controller
  908. connections while writing to them. This code was introduced in
  909. 0.1.2.7-alpha, in order to keep output buffers from exceeding
  910. their limits. But there is no longer a maximum output buffer size,
  911. and flushing data in this way caused some undesirable recursions
  912. in our call graph. Closes ticket 16480.
  913. o Testing:
  914. - Make "bridges+hs" the default test network. This tests almost all
  915. tor functionality during make test-network, while allowing tests
  916. to succeed on non-IPv6 systems. Requires chutney commit 396da92 in
  917. test-network-bridges-hs. Closes tickets 16945 (tor) and 16946
  918. (chutney). Patches by "teor".
  919. - Autodetect CHUTNEY_PATH if the chutney and Tor sources are side-
  920. by-side in the same parent directory. Closes ticket 16903. Patch
  921. by "teor".
  922. - Use environment variables rather than autoconf substitutions to
  923. send variables from the build system to the test scripts. This
  924. change should be easier to maintain, and cause 'make distcheck' to
  925. work better than before. Fixes bug 17148.
  926. - Add a new set of callgraph analysis scripts that use clang to
  927. produce a list of which Tor functions are reachable from which
  928. other Tor functions. We're planning to use these to help simplify
  929. our code structure by identifying illogical dependencies.
  930. - Add new 'test-full' and 'test-full-online' targets to run all
  931. tests, including integration tests with stem and chutney.
  932. - Make the test-workqueue test work on Windows by initializing the
  933. network before we begin.
  934. - New make target (make test-network-all) to run multiple applicable
  935. chutney test cases. Patch from Teor; closes 16953.
  936. - Unit test dns_resolve(), dns_clip_ttl() and dns_get_expiry_ttl()
  937. functions in dns.c. Implements a portion of ticket 16831.
  938. - When building Tor with testing coverage enabled, run Chutney tests
  939. (if any) using the 'tor-cov' coverage binary.
  940. - When running test-network or test-stem, check for the absence of
  941. stem/chutney before doing any build operations.
  942. Changes in version 0.2.7.2-alpha - 2015-07-27
  943. This, the second alpha in the Tor 0.2.7 series, has a number of new
  944. features, including a way to manually pick the number of introduction
  945. points for hidden services, and the much stronger Ed25519 signing key
  946. algorithm for regular Tor relays (including support for encrypted
  947. offline identity keys in the new algorithm).
  948. Support for Ed25519 on relays is currently limited to signing router
  949. descriptors; later alphas in this series will extend Ed25519 key
  950. support to more parts of the Tor protocol.
  951. o Major features (Ed25519 identity keys, Proposal 220):
  952. - All relays now maintain a stronger identity key, using the Ed25519
  953. elliptic curve signature format. This master key is designed so
  954. that it can be kept offline. Relays also generate an online
  955. signing key, and a set of other Ed25519 keys and certificates.
  956. These are all automatically regenerated and rotated as needed.
  957. Implements part of ticket 12498.
  958. - Directory authorities now vote on Ed25519 identity keys along with
  959. RSA1024 keys. Implements part of ticket 12498.
  960. - Directory authorities track which Ed25519 identity keys have been
  961. used with which RSA1024 identity keys, and do not allow them to
  962. vary freely. Implements part of ticket 12498.
  963. - Microdescriptors now include Ed25519 identity keys. Implements
  964. part of ticket 12498.
  965. - Add support for offline encrypted Ed25519 master keys. To use this
  966. feature on your tor relay, run "tor --keygen" to make a new master
  967. key (or to make a new signing key if you already have a master
  968. key). Closes ticket 13642.
  969. o Major features (Hidden services):
  970. - Add the torrc option HiddenServiceNumIntroductionPoints, to
  971. specify a fixed number of introduction points. Its maximum value
  972. is 10 and default is 3. Using this option can increase a hidden
  973. service's reliability under load, at the cost of making it more
  974. visible that the hidden service is facing extra load. Closes
  975. ticket 4862.
  976. - Remove the adaptive algorithm for choosing the number of
  977. introduction points, which used to change the number of
  978. introduction points (poorly) depending on the number of
  979. connections the HS sees. Closes ticket 4862.
  980. o Major features (onion key cross-certification):
  981. - Relay descriptors now include signatures of their own identity
  982. keys, made using the TAP and ntor onion keys. These signatures
  983. allow relays to prove ownership of their own onion keys. Because
  984. of this change, microdescriptors will no longer need to include
  985. RSA identity keys. Implements proposal 228; closes ticket 12499.
  986. o Major features (performance):
  987. - Improve the runtime speed of Ed25519 operations by using the
  988. public-domain Ed25519-donna by Andrew M. ("floodyberry").
  989. Implements ticket 16467.
  990. - Improve the runtime speed of the ntor handshake by using an
  991. optimized curve25519 basepoint scalarmult implementation from the
  992. public-domain Ed25519-donna by Andrew M. ("floodyberry"), based on
  993. ideas by Adam Langley. Implements ticket 9663.
  994. o Major bugfixes (client-side privacy, also in 0.2.6.9):
  995. - Properly separate out each SOCKSPort when applying stream
  996. isolation. The error occurred because each port's session group
  997. was being overwritten by a default value when the listener
  998. connection was initialized. Fixes bug 16247; bugfix on
  999. 0.2.6.3-alpha. Patch by "jojelino".
  1000. o Major bugfixes (hidden service clients, stability, also in 0.2.6.10):
  1001. - Stop refusing to store updated hidden service descriptors on a
  1002. client. This reverts commit 9407040c59218 (which indeed fixed bug
  1003. 14219, but introduced a major hidden service reachability
  1004. regression detailed in bug 16381). This is a temporary fix since
  1005. we can live with the minor issue in bug 14219 (it just results in
  1006. some load on the network) but the regression of 16381 is too much
  1007. of a setback. First-round fix for bug 16381; bugfix
  1008. on 0.2.6.3-alpha.
  1009. o Major bugfixes (hidden services):
  1010. - When cannibalizing a circuit for an introduction point, always
  1011. extend to the chosen exit node (creating a 4 hop circuit).
  1012. Previously Tor would use the current circuit exit node, which
  1013. changed the original choice of introduction point, and could cause
  1014. the hidden service to skip excluded introduction points or
  1015. reconnect to a skipped introduction point. Fixes bug 16260; bugfix
  1016. on 0.1.0.1-rc.
  1017. o Major bugfixes (open file limit):
  1018. - The open file limit wasn't checked before calling
  1019. tor_accept_socket_nonblocking(), which would make Tor exceed the
  1020. limit. Now, before opening a new socket, Tor validates the open
  1021. file limit just before, and if the max has been reached, return an
  1022. error. Fixes bug 16288; bugfix on 0.1.1.1-alpha.
  1023. o Major bugfixes (stability, also in 0.2.6.10):
  1024. - Stop crashing with an assertion failure when parsing certain kinds
  1025. of malformed or truncated microdescriptors. Fixes bug 16400;
  1026. bugfix on 0.2.6.1-alpha. Found by "torkeln"; fix based on a patch
  1027. by "cypherpunks_backup".
  1028. - Stop random client-side assertion failures that could occur when
  1029. connecting to a busy hidden service, or connecting to a hidden
  1030. service while a NEWNYM is in progress. Fixes bug 16013; bugfix
  1031. on 0.1.0.1-rc.
  1032. o Minor features (directory authorities, security, also in 0.2.6.9):
  1033. - The HSDir flag given by authorities now requires the Stable flag.
  1034. For the current network, this results in going from 2887 to 2806
  1035. HSDirs. Also, it makes it harder for an attacker to launch a sybil
  1036. attack by raising the effort for a relay to become Stable to
  1037. require at the very least 7 days, while maintaining the 96 hours
  1038. uptime requirement for HSDir. Implements ticket 8243.
  1039. o Minor features (client):
  1040. - Relax the validation of hostnames in SOCKS5 requests, allowing the
  1041. character '_' to appear, in order to cope with domains observed in
  1042. the wild that are serving non-RFC compliant records. Resolves
  1043. ticket 16430.
  1044. - Relax the validation done to hostnames in SOCKS5 requests, and
  1045. allow a single trailing '.' to cope with clients that pass FQDNs
  1046. using that syntax to explicitly indicate that the domain name is
  1047. fully-qualified. Fixes bug 16674; bugfix on 0.2.6.2-alpha.
  1048. - Add GroupWritable and WorldWritable options to unix-socket based
  1049. SocksPort and ControlPort options. These options apply to a single
  1050. socket, and override {Control,Socks}SocketsGroupWritable. Closes
  1051. ticket 15220.
  1052. o Minor features (control protocol):
  1053. - Support network-liveness GETINFO key and NETWORK_LIVENESS event in
  1054. the control protocol. Resolves ticket 15358.
  1055. o Minor features (directory authorities):
  1056. - Directory authorities no longer vote against the "Fast", "Stable",
  1057. and "HSDir" flags just because they were going to vote against
  1058. "Running": if the consensus turns out to be that the router was
  1059. running, then the authority's vote should count. Patch from Peter
  1060. Retzlaff; closes issue 8712.
  1061. o Minor features (geoip, also in 0.2.6.10):
  1062. - Update geoip to the June 3 2015 Maxmind GeoLite2 Country database.
  1063. - Update geoip6 to the June 3 2015 Maxmind GeoLite2 Country database.
  1064. o Minor features (hidden services):
  1065. - Add the new options "HiddenServiceMaxStreams" and
  1066. "HiddenServiceMaxStreamsCloseCircuit" to allow hidden services to
  1067. limit the maximum number of simultaneous streams per circuit, and
  1068. optionally tear down the circuit when the limit is exceeded. Part
  1069. of ticket 16052.
  1070. o Minor features (portability):
  1071. - Use C99 variadic macros when the compiler is not GCC. This avoids
  1072. failing compilations on MSVC, and fixes a log-file-based race
  1073. condition in our old workarounds. Original patch from Gisle Vanem.
  1074. o Minor bugfixes (compilation, also in 0.2.6.9):
  1075. - Build with --enable-systemd correctly when libsystemd is
  1076. installed, but systemd is not. Fixes bug 16164; bugfix on
  1077. 0.2.6.3-alpha. Patch from Peter Palfrader.
  1078. o Minor bugfixes (controller):
  1079. - Add the descriptor ID in each HS_DESC control event. It was
  1080. missing, but specified in control-spec.txt. Fixes bug 15881;
  1081. bugfix on 0.2.5.2-alpha.
  1082. o Minor bugfixes (crypto error-handling, also in 0.2.6.10):
  1083. - Check for failures from crypto_early_init, and refuse to continue.
  1084. A previous typo meant that we could keep going with an
  1085. uninitialized crypto library, and would have OpenSSL initialize
  1086. its own PRNG. Fixes bug 16360; bugfix on 0.2.5.2-alpha, introduced
  1087. when implementing ticket 4900. Patch by "teor".
  1088. o Minor bugfixes (hidden services):
  1089. - Fix a crash when reloading configuration while at least one
  1090. configured and one ephemeral hidden service exists. Fixes bug
  1091. 16060; bugfix on 0.2.7.1-alpha.
  1092. - Avoid crashing with a double-free bug when we create an ephemeral
  1093. hidden service but adding it fails for some reason. Fixes bug
  1094. 16228; bugfix on 0.2.7.1-alpha.
  1095. o Minor bugfixes (Linux seccomp2 sandbox):
  1096. - Use the sandbox in tor_open_cloexec whether or not O_CLOEXEC is
  1097. defined. Patch by "teor". Fixes bug 16515; bugfix on 0.2.3.1-alpha.
  1098. o Minor bugfixes (Linux seccomp2 sandbox, also in 0.2.6.10):
  1099. - Allow pipe() and pipe2() syscalls in the seccomp2 sandbox: we need
  1100. these when eventfd2() support is missing. Fixes bug 16363; bugfix
  1101. on 0.2.6.3-alpha. Patch from "teor".
  1102. o Minor bugfixes (Linux seccomp2 sandbox, also in 0.2.6.9):
  1103. - Fix sandboxing to work when running as a relay, by allowing the
  1104. renaming of secret_id_key, and allowing the eventfd2 and futex
  1105. syscalls. Fixes bug 16244; bugfix on 0.2.6.1-alpha. Patch by
  1106. Peter Palfrader.
  1107. - Allow systemd connections to work with the Linux seccomp2 sandbox
  1108. code. Fixes bug 16212; bugfix on 0.2.6.2-alpha. Patch by
  1109. Peter Palfrader.
  1110. o Minor bugfixes (relay):
  1111. - Fix a rarely-encountered memory leak when failing to initialize
  1112. the thread pool. Fixes bug 16631; bugfix on 0.2.6.3-alpha. Patch
  1113. from "cypherpunks".
  1114. o Minor bugfixes (systemd):
  1115. - Fix an accidental formatting error that broke the systemd
  1116. configuration file. Fixes bug 16152; bugfix on 0.2.7.1-alpha.
  1117. - Tor's systemd unit file no longer contains extraneous spaces.
  1118. These spaces would sometimes confuse tools like deb-systemd-
  1119. helper. Fixes bug 16162; bugfix on 0.2.5.5-alpha.
  1120. o Minor bugfixes (tests):
  1121. - Use the configured Python executable when running test-stem-full.
  1122. Fixes bug 16470; bugfix on 0.2.7.1-alpha.
  1123. o Minor bugfixes (tests, also in 0.2.6.9):
  1124. - Fix a crash in the unit tests when built with MSVC2013. Fixes bug
  1125. 16030; bugfix on 0.2.6.2-alpha. Patch from "NewEraCracker".
  1126. o Minor bugfixes (threads, comments):
  1127. - Always initialize return value in compute_desc_id in rendcommon.c
  1128. Patch by "teor". Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1129. - Check for NULL values in getinfo_helper_onions(). Patch by "teor".
  1130. Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1131. - Remove undefined directive-in-macro in test_util_writepid clang
  1132. 3.7 complains that using a preprocessor directive inside a macro
  1133. invocation in test_util_writepid in test_util.c is undefined.
  1134. Patch by "teor". Fixes part of bug 16115; bugfix on 0.2.7.1-alpha.
  1135. o Code simplification and refactoring:
  1136. - Define WINVER and _WIN32_WINNT centrally, in orconfig.h, in order
  1137. to ensure they remain consistent and visible everywhere.
  1138. - Remove some vestigial workarounds for the MSVC6 compiler. We
  1139. haven't supported that in ages.
  1140. - The link authentication code has been refactored for better
  1141. testability and reliability. It now uses code generated with the
  1142. "trunnel" binary encoding generator, to reduce the risk of bugs
  1143. due to programmer error. Done as part of ticket 12498.
  1144. o Documentation:
  1145. - Include a specific and (hopefully) accurate documentation of the
  1146. torrc file's meta-format in doc/torrc_format.txt. This is mainly
  1147. of interest to people writing programs to parse or generate torrc
  1148. files. This document is not a commitment to long-term
  1149. compatibility; some aspects of the current format are a bit
  1150. ridiculous. Closes ticket 2325.
  1151. o Removed features:
  1152. - Tor no longer supports copies of OpenSSL that are missing support
  1153. for Elliptic Curve Cryptography. (We began using ECC when
  1154. available in 0.2.4.8-alpha, for more safe and efficient key
  1155. negotiation.) In particular, support for at least one of P256 or
  1156. P224 is now required, with manual configuration needed if only
  1157. P224 is available. Resolves ticket 16140.
  1158. - Tor no longer supports versions of OpenSSL before 1.0. (If you are
  1159. on an operating system that has not upgraded to OpenSSL 1.0 or
  1160. later, and you compile Tor from source, you will need to install a
  1161. more recent OpenSSL to link Tor against.) These versions of
  1162. OpenSSL are still supported by the OpenSSL, but the numerous
  1163. cryptographic improvements in later OpenSSL releases makes them a
  1164. clear choice. Resolves ticket 16034.
  1165. - Remove the HidServDirectoryV2 option. Now all relays offer to
  1166. store hidden service descriptors. Related to 16543.
  1167. - Remove the VoteOnHidServDirectoriesV2 option, since all
  1168. authorities have long set it to 1. Closes ticket 16543.
  1169. o Testing:
  1170. - Document use of coverity, clang static analyzer, and clang dynamic
  1171. undefined behavior and address sanitizers in doc/HACKING. Include
  1172. detailed usage instructions in the blacklist. Patch by "teor".
  1173. Closes ticket 15817.
  1174. - The link authentication protocol code now has extensive tests.
  1175. - The relay descriptor signature testing code now has
  1176. extensive tests.
  1177. - The test_workqueue program now runs faster, and is enabled by
  1178. default as a part of "make check".
  1179. - Now that OpenSSL has its own scrypt implementation, add an unit
  1180. test that checks for interoperability between libscrypt_scrypt()
  1181. and OpenSSL's EVP_PBE_scrypt() so that we could not use libscrypt
  1182. and rely on EVP_PBE_scrypt() whenever possible. Resolves
  1183. ticket 16189.
  1184. Changes in version 0.2.6.10 - 2015-07-12
  1185. Tor version 0.2.6.10 fixes some significant stability and hidden
  1186. service client bugs, bulletproofs the cryptography init process, and
  1187. fixes a bug when using the sandbox code with some older versions of
  1188. Linux. Everyone running an older version, especially an older version
  1189. of 0.2.6, should upgrade.
  1190. o Major bugfixes (hidden service clients, stability):
  1191. - Stop refusing to store updated hidden service descriptors on a
  1192. client. This reverts commit 9407040c59218 (which indeed fixed bug
  1193. 14219, but introduced a major hidden service reachability
  1194. regression detailed in bug 16381). This is a temporary fix since
  1195. we can live with the minor issue in bug 14219 (it just results in
  1196. some load on the network) but the regression of 16381 is too much
  1197. of a setback. First-round fix for bug 16381; bugfix
  1198. on 0.2.6.3-alpha.
  1199. o Major bugfixes (stability):
  1200. - Stop crashing with an assertion failure when parsing certain kinds
  1201. of malformed or truncated microdescriptors. Fixes bug 16400;
  1202. bugfix on 0.2.6.1-alpha. Found by "torkeln"; fix based on a patch
  1203. by "cypherpunks_backup".
  1204. - Stop random client-side assertion failures that could occur when
  1205. connecting to a busy hidden service, or connecting to a hidden
  1206. service while a NEWNYM is in progress. Fixes bug 16013; bugfix
  1207. on 0.1.0.1-rc.
  1208. o Minor features (geoip):
  1209. - Update geoip to the June 3 2015 Maxmind GeoLite2 Country database.
  1210. - Update geoip6 to the June 3 2015 Maxmind GeoLite2 Country database.
  1211. o Minor bugfixes (crypto error-handling):
  1212. - Check for failures from crypto_early_init, and refuse to continue.
  1213. A previous typo meant that we could keep going with an
  1214. uninitialized crypto library, and would have OpenSSL initialize
  1215. its own PRNG. Fixes bug 16360; bugfix on 0.2.5.2-alpha, introduced
  1216. when implementing ticket 4900. Patch by "teor".
  1217. o Minor bugfixes (Linux seccomp2 sandbox):
  1218. - Allow pipe() and pipe2() syscalls in the seccomp2 sandbox: we need
  1219. these when eventfd2() support is missing. Fixes bug 16363; bugfix
  1220. on 0.2.6.3-alpha. Patch from "teor".
  1221. Changes in version 0.2.6.9 - 2015-06-11
  1222. Tor 0.2.6.9 fixes a regression in the circuit isolation code, increases the
  1223. requirements for receiving an HSDir flag, and addresses some other small
  1224. bugs in the systemd and sandbox code. Clients using circuit isolation
  1225. should upgrade; all directory authorities should upgrade.
  1226. o Major bugfixes (client-side privacy):
  1227. - Properly separate out each SOCKSPort when applying stream
  1228. isolation. The error occurred because each port's session group was
  1229. being overwritten by a default value when the listener connection
  1230. was initialized. Fixes bug 16247; bugfix on 0.2.6.3-alpha. Patch
  1231. by "jojelino".
  1232. o Minor feature (directory authorities, security):
  1233. - The HSDir flag given by authorities now requires the Stable flag.
  1234. For the current network, this results in going from 2887 to 2806
  1235. HSDirs. Also, it makes it harder for an attacker to launch a sybil
  1236. attack by raising the effort for a relay to become Stable which
  1237. takes at the very least 7 days to do so and by keeping the 96
  1238. hours uptime requirement for HSDir. Implements ticket 8243.
  1239. o Minor bugfixes (compilation):
  1240. - Build with --enable-systemd correctly when libsystemd is
  1241. installed, but systemd is not. Fixes bug 16164; bugfix on
  1242. 0.2.6.3-alpha. Patch from Peter Palfrader.
  1243. o Minor bugfixes (Linux seccomp2 sandbox):
  1244. - Fix sandboxing to work when running as a relaymby renaming of
  1245. secret_id_key, and allowing the eventfd2 and futex syscalls. Fixes
  1246. bug 16244; bugfix on 0.2.6.1-alpha. Patch by Peter Palfrader.
  1247. - Allow systemd connections to work with the Linux seccomp2 sandbox
  1248. code. Fixes bug 16212; bugfix on 0.2.6.2-alpha. Patch by
  1249. Peter Palfrader.
  1250. o Minor bugfixes (tests):
  1251. - Fix a crash in the unit tests when built with MSVC2013. Fixes bug
  1252. 16030; bugfix on 0.2.6.2-alpha. Patch from "NewEraCracker".
  1253. Changes in version 0.2.6.8 - 2015-05-21
  1254. Tor 0.2.6.8 fixes a bit of dodgy code in parsing INTRODUCE2 cells, and
  1255. fixes an authority-side bug in assigning the HSDir flag. All directory
  1256. authorities should upgrade.
  1257. o Major bugfixes (hidden services, backport from 0.2.7.1-alpha):
  1258. - Revert commit that made directory authorities assign the HSDir
  1259. flag to relay without a DirPort; this was bad because such relays
  1260. can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix
  1261. on 0.2.6.3-alpha.
  1262. o Minor bugfixes (hidden service, backport from 0.2.7.1-alpha):
  1263. - Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on
  1264. a client authorized hidden service. Fixes bug 15823; bugfix
  1265. on 0.2.1.6-alpha.
  1266. o Minor features (geoip):
  1267. - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
  1268. - Update geoip6 to the April 8 2015 Maxmind GeoLite2
  1269. Country database.
  1270. Changes in version 0.2.7.1-alpha - 2015-05-12
  1271. Tor 0.2.7.1-alpha is the first alpha release in its series. It
  1272. includes numerous small features and bugfixes against previous Tor
  1273. versions, and numerous small infrastructure improvements. The most
  1274. notable features are several new ways for controllers to interact with
  1275. the hidden services subsystem.
  1276. o New system requirements:
  1277. - Tor no longer includes workarounds to support Libevent versions
  1278. before 1.3e. Libevent 2.0 or later is recommended. Closes
  1279. ticket 15248.
  1280. o Major features (controller):
  1281. - Add the ADD_ONION and DEL_ONION commands that allow the creation
  1282. and management of hidden services via the controller. Closes
  1283. ticket 6411.
  1284. - New "GETINFO onions/current" and "GETINFO onions/detached"
  1285. commands to get information about hidden services created via the
  1286. controller. Part of ticket 6411.
  1287. - New HSFETCH command to launch a request for a hidden service
  1288. descriptor. Closes ticket 14847.
  1289. - New HSPOST command to upload a hidden service descriptor. Closes
  1290. ticket 3523. Patch by "DonnchaC".
  1291. o Major bugfixes (hidden services):
  1292. - Revert commit that made directory authorities assign the HSDir
  1293. flag to relay without a DirPort; this was bad because such relays
  1294. can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix
  1295. on 0.2.6.3-alpha.
  1296. o Minor features (clock-jump tolerance):
  1297. - Recover better when our clock jumps back many hours, like might
  1298. happen for Tails or Whonix users who start with a very wrong
  1299. hardware clock, use Tor to discover a more accurate time, and then
  1300. fix their clock. Resolves part of ticket 8766.
  1301. o Minor features (command-line interface):
  1302. - Make --hash-password imply --hush to prevent unnecessary noise.
  1303. Closes ticket 15542. Patch from "cypherpunks".
  1304. - Print a warning whenever we find a relative file path being used
  1305. as torrc option. Resolves issue 14018.
  1306. o Minor features (controller):
  1307. - Add DirAuthority lines for default directory authorities to the
  1308. output of the "GETINFO config/defaults" command if not already
  1309. present. Implements ticket 14840.
  1310. - Controllers can now use "GETINFO hs/client/desc/id/..." to
  1311. retrieve items from the client's hidden service descriptor cache.
  1312. Closes ticket 14845.
  1313. - Implement a new controller command "GETINFO status/fresh-relay-
  1314. descs" to fetch a descriptor/extrainfo pair that was generated on
  1315. demand just for the controller's use. Implements ticket 14784.
  1316. o Minor features (DoS-resistance):
  1317. - Make it harder for attackers to overload hidden services with
  1318. introductions, by blocking multiple introduction requests on the
  1319. same circuit. Resolves ticket 15515.
  1320. o Minor features (geoip):
  1321. - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
  1322. - Update geoip6 to the April 8 2015 Maxmind GeoLite2
  1323. Country database.
  1324. o Minor features (HS popularity countermeasure):
  1325. - To avoid leaking HS popularity, don't cycle the introduction point
  1326. when we've handled a fixed number of INTRODUCE2 cells but instead
  1327. cycle it when a random number of introductions is reached, thus
  1328. making it more difficult for an attacker to find out the amount of
  1329. clients that have used the introduction point for a specific HS.
  1330. Closes ticket 15745.
  1331. o Minor features (logging):
  1332. - Include the Tor version in all LD_BUG log messages, since people
  1333. tend to cut and paste those into the bugtracker. Implements
  1334. ticket 15026.
  1335. o Minor features (pluggable transports):
  1336. - When launching managed pluggable transports on Linux systems,
  1337. attempt to have the kernel deliver a SIGTERM on tor exit if the
  1338. pluggable transport process is still running. Resolves
  1339. ticket 15471.
  1340. - When launching managed pluggable transports, setup a valid open
  1341. stdin in the child process that can be used to detect if tor has
  1342. terminated. The "TOR_PT_EXIT_ON_STDIN_CLOSE" environment variable
  1343. can be used by implementations to detect this new behavior.
  1344. Resolves ticket 15435.
  1345. o Minor features (testing):
  1346. - Add a test to verify that the compiler does not eliminate our
  1347. memwipe() implementation. Closes ticket 15377.
  1348. - Add make rule `check-changes` to verify the format of changes
  1349. files. Closes ticket 15180.
  1350. - Add unit tests for control_event_is_interesting(). Add a compile-
  1351. time check that the number of events doesn't exceed the capacity
  1352. of control_event_t.event_mask. Closes ticket 15431, checks for
  1353. bugs similar to 13085. Patch by "teor".
  1354. - Command-line argument tests moved to Stem. Resolves ticket 14806.
  1355. - Integrate the ntor, backtrace, and zero-length keys tests into the
  1356. automake test suite. Closes ticket 15344.
  1357. - Remove assertions during builds to determine Tor's test coverage.
  1358. We don't want to trigger these even in assertions, so including
  1359. them artificially makes our branch coverage look worse than it is.
  1360. This patch provides the new test-stem-full and coverage-html-full
  1361. configure options. Implements ticket 15400.
  1362. o Minor bugfixes (build):
  1363. - Improve out-of-tree builds by making non-standard rules work and
  1364. clean up additional files and directories. Fixes bug 15053; bugfix
  1365. on 0.2.7.0-alpha.
  1366. o Minor bugfixes (command-line interface):
  1367. - When "--quiet" is provided along with "--validate-config", do not
  1368. write anything to stdout on success. Fixes bug 14994; bugfix
  1369. on 0.2.3.3-alpha.
  1370. - When complaining about bad arguments to "--dump-config", use
  1371. stderr, not stdout.
  1372. o Minor bugfixes (configuration, unit tests):
  1373. - Only add the default fallback directories when the DirAuthorities,
  1374. AlternateDirAuthority, and FallbackDir directory config options
  1375. are set to their defaults. The default fallback directory list is
  1376. currently empty, this fix will only change tor's behavior when it
  1377. has default fallback directories. Includes unit tests for
  1378. consider_adding_dir_servers(). Fixes bug 15642; bugfix on
  1379. 90f6071d8dc0 in 0.2.4.7-alpha. Patch by "teor".
  1380. o Minor bugfixes (correctness):
  1381. - For correctness, avoid modifying a constant string in
  1382. handle_control_postdescriptor. Fixes bug 15546; bugfix
  1383. on 0.1.1.16-rc.
  1384. - Remove side-effects from tor_assert() calls. This was harmless,
  1385. because we never disable assertions, but it is bad style and
  1386. unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36,
  1387. and 0.2.0.10.
  1388. o Minor bugfixes (hidden service):
  1389. - Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on
  1390. a client authorized hidden service. Fixes bug 15823; bugfix
  1391. on 0.2.1.6-alpha.
  1392. - Remove an extraneous newline character from the end of hidden
  1393. service descriptors. Fixes bug 15296; bugfix on 0.2.0.10-alpha.
  1394. o Minor bugfixes (interface):
  1395. - Print usage information for --dump-config when it is used without
  1396. an argument. Also, fix the error message to use different wording
  1397. and add newline at the end. Fixes bug 15541; bugfix
  1398. on 0.2.5.1-alpha.
  1399. o Minor bugfixes (logs):
  1400. - When building Tor under Clang, do not include an extra set of
  1401. parentheses in log messages that include function names. Fixes bug
  1402. 15269; bugfix on every released version of Tor when compiled with
  1403. recent enough Clang.
  1404. o Minor bugfixes (network):
  1405. - When attempting to use fallback technique for network interface
  1406. lookup, disregard loopback and multicast addresses since they are
  1407. unsuitable for public communications.
  1408. o Minor bugfixes (statistics):
  1409. - Disregard the ConnDirectionStatistics torrc options when Tor is
  1410. not a relay since in that mode of operation no sensible data is
  1411. being collected and because Tor might run into measurement hiccups
  1412. when running as a client for some time, then becoming a relay.
  1413. Fixes bug 15604; bugfix on 0.2.2.35.
  1414. o Minor bugfixes (test networks):
  1415. - When self-testing reachability, use ExtendAllowPrivateAddresses to
  1416. determine if local/private addresses imply reachability. The
  1417. previous fix used TestingTorNetwork, which implies
  1418. ExtendAllowPrivateAddresses, but this excluded rare configurations
  1419. where ExtendAllowPrivateAddresses is set but TestingTorNetwork is
  1420. not. Fixes bug 15771; bugfix on 0.2.6.1-alpha. Patch by "teor",
  1421. issue discovered by CJ Ess.
  1422. o Minor bugfixes (testing):
  1423. - Check for matching value in server response in ntor_ref.py. Fixes
  1424. bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
  1425. by "joelanders".
  1426. - Set the severity correctly when testing
  1427. get_interface_addresses_ifaddrs() and
  1428. get_interface_addresses_win32(), so that the tests fail gracefully
  1429. instead of triggering an assertion. Fixes bug 15759; bugfix on
  1430. 0.2.6.3-alpha. Reported by Nicolas Derive.
  1431. o Code simplification and refactoring:
  1432. - Move the hacky fallback code out of get_interface_address6() into
  1433. separate function and get it covered with unit-tests. Resolves
  1434. ticket 14710.
  1435. - Refactor hidden service client-side cache lookup to intelligently
  1436. report its various failure cases, and disentangle failure cases
  1437. involving a lack of introduction points. Closes ticket 14391.
  1438. - Use our own Base64 encoder instead of OpenSSL's, to allow more
  1439. control over the output. Part of ticket 15652.
  1440. o Documentation:
  1441. - Improve the descriptions of statistics-related torrc options in
  1442. the manpage to describe rationale and possible uses cases. Fixes
  1443. issue 15550.
  1444. - Improve the layout and formatting of ./configure --help messages.
  1445. Closes ticket 15024. Patch from "cypherpunks".
  1446. - Standardize on the term "server descriptor" in the manual page.
  1447. Previously, we had used "router descriptor", "server descriptor",
  1448. and "relay descriptor" interchangeably. Part of ticket 14987.
  1449. o Removed code:
  1450. - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code
  1451. and always use the internal Base64 decoder. The internal decoder
  1452. has been part of tor since 0.2.0.10-alpha, and no one should
  1453. be using the OpenSSL one. Part of ticket 15652.
  1454. - Remove the 'tor_strclear()' function; use memwipe() instead.
  1455. Closes ticket 14922.
  1456. o Removed features:
  1457. - Remove the (seldom-used) DynamicDHGroups feature. For anti-
  1458. fingerprinting we now recommend pluggable transports; for forward-
  1459. secrecy in TLS, we now use the P-256 group. Closes ticket 13736.
  1460. - Remove the undocumented "--digests" command-line option. It
  1461. complicated our build process, caused subtle build issues on
  1462. multiple platforms, and is now redundant since we started
  1463. including git version identifiers. Closes ticket 14742.
  1464. - Tor no longer contains checks for ancient directory cache versions
  1465. that didn't know about microdescriptors.
  1466. - Tor no longer contains workarounds for stat files generated by
  1467. super-old versions of Tor that didn't choose guards sensibly.
  1468. Changes in version 0.2.4.27 - 2015-04-06
  1469. Tor 0.2.4.27 backports two fixes from 0.2.6.7 for security issues that
  1470. could be used by an attacker to crash hidden services, or crash clients
  1471. visiting hidden services. Hidden services should upgrade as soon as
  1472. possible; clients should upgrade whenever packages become available.
  1473. This release also backports a simple improvement to make hidden
  1474. services a bit less vulnerable to denial-of-service attacks.
  1475. o Major bugfixes (security, hidden service):
  1476. - Fix an issue that would allow a malicious client to trigger an
  1477. assertion failure and halt a hidden service. Fixes bug 15600;
  1478. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1479. - Fix a bug that could cause a client to crash with an assertion
  1480. failure when parsing a malformed hidden service descriptor. Fixes
  1481. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1482. o Minor features (DoS-resistance, hidden service):
  1483. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1484. arrive on the same circuit. This should make it more expensive for
  1485. attackers to overwhelm hidden services with introductions.
  1486. Resolves ticket 15515.
  1487. Changes in version 0.2.5.12 - 2015-04-06
  1488. Tor 0.2.5.12 backports two fixes from 0.2.6.7 for security issues that
  1489. could be used by an attacker to crash hidden services, or crash clients
  1490. visiting hidden services. Hidden services should upgrade as soon as
  1491. possible; clients should upgrade whenever packages become available.
  1492. This release also backports a simple improvement to make hidden
  1493. services a bit less vulnerable to denial-of-service attacks.
  1494. o Major bugfixes (security, hidden service):
  1495. - Fix an issue that would allow a malicious client to trigger an
  1496. assertion failure and halt a hidden service. Fixes bug 15600;
  1497. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1498. - Fix a bug that could cause a client to crash with an assertion
  1499. failure when parsing a malformed hidden service descriptor. Fixes
  1500. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1501. o Minor features (DoS-resistance, hidden service):
  1502. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1503. arrive on the same circuit. This should make it more expensive for
  1504. attackers to overwhelm hidden services with introductions.
  1505. Resolves ticket 15515.
  1506. Changes in version 0.2.6.7 - 2015-04-06
  1507. Tor 0.2.6.7 fixes two security issues that could be used by an
  1508. attacker to crash hidden services, or crash clients visiting hidden
  1509. services. Hidden services should upgrade as soon as possible; clients
  1510. should upgrade whenever packages become available.
  1511. This release also contains two simple improvements to make hidden
  1512. services a bit less vulnerable to denial-of-service attacks.
  1513. o Major bugfixes (security, hidden service):
  1514. - Fix an issue that would allow a malicious client to trigger an
  1515. assertion failure and halt a hidden service. Fixes bug 15600;
  1516. bugfix on 0.2.1.6-alpha. Reported by "disgleirio".
  1517. - Fix a bug that could cause a client to crash with an assertion
  1518. failure when parsing a malformed hidden service descriptor. Fixes
  1519. bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnchaC".
  1520. o Minor features (DoS-resistance, hidden service):
  1521. - Introduction points no longer allow multiple INTRODUCE1 cells to
  1522. arrive on the same circuit. This should make it more expensive for
  1523. attackers to overwhelm hidden services with introductions.
  1524. Resolves ticket 15515.
  1525. - Decrease the amount of reattempts that a hidden service performs
  1526. when its rendezvous circuits fail. This reduces the computational
  1527. cost for running a hidden service under heavy load. Resolves
  1528. ticket 11447.
  1529. Changes in version 0.2.6.6 - 2015-03-24
  1530. Tor 0.2.6.6 is the first stable release in the 0.2.6 series.
  1531. It adds numerous safety, security, correctness, and performance
  1532. improvements. Client programs can be configured to use more kinds of
  1533. sockets, AutomapHosts works better, the multithreading backend is
  1534. improved, cell transmission is refactored, test coverage is much
  1535. higher, more denial-of-service attacks are handled, guard selection is
  1536. improved to handle long-term guards better, pluggable transports
  1537. should work a bit better, and some annoying hidden service performance
  1538. bugs should be addressed.
  1539. o Minor bugfixes (portability):
  1540. - Use the correct datatype in the SipHash-2-4 function to prevent
  1541. compilers from assuming any sort of alignment. Fixes bug 15436;
  1542. bugfix on 0.2.5.3-alpha.
  1543. Changes in version 0.2.6.5-rc - 2015-03-18
  1544. Tor 0.2.6.5-rc is the second and (hopefully) last release candidate in
  1545. the 0.2.6. It fixes a small number of bugs found in 0.2.6.4-rc.
  1546. o Major bugfixes (client):
  1547. - Avoid crashing when making certain configuration option changes on
  1548. clients. Fixes bug 15245; bugfix on 0.2.6.3-alpha. Reported
  1549. by "anonym".
  1550. o Major bugfixes (pluggable transports):
  1551. - Initialize the extended OR Port authentication cookie before
  1552. launching pluggable transports. This prevents a race condition
  1553. that occured when server-side pluggable transports would cache the
  1554. authentication cookie before it has been (re)generated. Fixes bug
  1555. 15240; bugfix on 0.2.5.1-alpha.
  1556. o Major bugfixes (portability):
  1557. - Do not crash on startup when running on Solaris. Fixes a bug
  1558. related to our fix for 9495; bugfix on 0.2.6.1-alpha. Reported
  1559. by "ruebezahl".
  1560. o Minor features (heartbeat):
  1561. - On relays, report how many connections we negotiated using each
  1562. version of the Tor link protocols. This information will let us
  1563. know if removing support for very old versions of the Tor
  1564. protocols is harming the network. Closes ticket 15212.
  1565. o Code simplification and refactoring:
  1566. - Refactor main loop to extract the 'loop' part. This makes it
  1567. easier to run Tor under Shadow. Closes ticket 15176.
  1568. Changes in version 0.2.5.11 - 2015-03-17
  1569. Tor 0.2.5.11 is the second stable release in the 0.2.5 series.
  1570. It backports several bugfixes from the 0.2.6 branch, including a
  1571. couple of medium-level security fixes for relays and exit nodes.
  1572. It also updates the list of directory authorities.
  1573. o Directory authority changes:
  1574. - Remove turtles as a directory authority.
  1575. - Add longclaw as a new (v3) directory authority. This implements
  1576. ticket 13296. This keeps the directory authority count at 9.
  1577. - The directory authority Faravahar has a new IP address. This
  1578. closes ticket 14487.
  1579. o Major bugfixes (crash, OSX, security):
  1580. - Fix a remote denial-of-service opportunity caused by a bug in
  1581. OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
  1582. in OSX 10.9.
  1583. o Major bugfixes (relay, stability, possible security):
  1584. - Fix a bug that could lead to a relay crashing with an assertion
  1585. failure if a buffer of exactly the wrong layout was passed to
  1586. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1587. 0.2.0.10-alpha. Patch from 'cypherpunks'.
  1588. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1589. very end of the buffer; log a BUG message instead. Only assert if
  1590. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1591. o Major bugfixes (exit node stability):
  1592. - Fix an assertion failure that could occur under high DNS load.
  1593. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1594. diagnosed and fixed by "cypherpunks".
  1595. o Major bugfixes (Linux seccomp2 sandbox):
  1596. - Upon receiving sighup with the seccomp2 sandbox enabled, do not
  1597. crash during attempts to call wait4. Fixes bug 15088; bugfix on
  1598. 0.2.5.1-alpha. Patch from "sanic".
  1599. o Minor features (controller):
  1600. - New "GETINFO bw-event-cache" to get information about recent
  1601. bandwidth events. Closes ticket 14128. Useful for controllers to
  1602. get recent bandwidth history after the fix for ticket 13988.
  1603. o Minor features (geoip):
  1604. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1605. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1606. Country database.
  1607. o Minor bugfixes (client, automapping):
  1608. - Avoid crashing on torrc lines for VirtualAddrNetworkIPv[4|6] when
  1609. no value follows the option. Fixes bug 14142; bugfix on
  1610. 0.2.4.7-alpha. Patch by "teor".
  1611. - Fix a memory leak when using AutomapHostsOnResolve. Fixes bug
  1612. 14195; bugfix on 0.1.0.1-rc.
  1613. o Minor bugfixes (compilation):
  1614. - Build without warnings with the stock OpenSSL srtp.h header, which
  1615. has a duplicate declaration of SSL_get_selected_srtp_profile().
  1616. Fixes bug 14220; this is OpenSSL's bug, not ours.
  1617. o Minor bugfixes (directory authority):
  1618. - Allow directory authorities to fetch more data from one another if
  1619. they find themselves missing lots of votes. Previously, they had
  1620. been bumping against the 10 MB queued data limit. Fixes bug 14261;
  1621. bugfix on 0.1.2.5-alpha.
  1622. - Enlarge the buffer to read bwauth generated files to avoid an
  1623. issue when parsing the file in dirserv_read_measured_bandwidths().
  1624. Fixes bug 14125; bugfix on 0.2.2.1-alpha.
  1625. o Minor bugfixes (statistics):
  1626. - Increase period over which bandwidth observations are aggregated
  1627. from 15 minutes to 4 hours. Fixes bug 13988; bugfix on 0.0.8pre1.
  1628. o Minor bugfixes (preventative security, C safety):
  1629. - When reading a hexadecimal, base-32, or base-64 encoded value from
  1630. a string, always overwrite the whole output buffer. This prevents
  1631. some bugs where we would look at (but fortunately, not reveal)
  1632. uninitialized memory on the stack. Fixes bug 14013; bugfix on all
  1633. versions of Tor.
  1634. Changes in version 0.2.4.26 - 2015-03-17
  1635. Tor 0.2.4.26 includes an updated list of directory authorities. It
  1636. also backports a couple of stability and security bugfixes from 0.2.5
  1637. and beyond.
  1638. o Directory authority changes:
  1639. - Remove turtles as a directory authority.
  1640. - Add longclaw as a new (v3) directory authority. This implements
  1641. ticket 13296. This keeps the directory authority count at 9.
  1642. - The directory authority Faravahar has a new IP address. This
  1643. closes ticket 14487.
  1644. o Major bugfixes (exit node stability, also in 0.2.6.3-alpha):
  1645. - Fix an assertion failure that could occur under high DNS load.
  1646. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1647. diagnosed and fixed by "cypherpunks".
  1648. o Major bugfixes (relay, stability, possible security, also in 0.2.6.4-rc):
  1649. - Fix a bug that could lead to a relay crashing with an assertion
  1650. failure if a buffer of exactly the wrong layout was passed to
  1651. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1652. 0.2.0.10-alpha. Patch from 'cypherpunks'.
  1653. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1654. very end of the buffer; log a BUG message instead. Only assert if
  1655. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1656. o Minor features (geoip):
  1657. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1658. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1659. Country database.
  1660. Changes in version 0.2.6.4-rc - 2015-03-09
  1661. Tor 0.2.6.4-alpha fixes an issue in the directory code that an
  1662. attacker might be able to use in order to crash certain Tor
  1663. directories. It also resolves some minor issues left over from, or
  1664. introduced in, Tor 0.2.6.3-alpha or earlier.
  1665. o Major bugfixes (crash, OSX, security):
  1666. - Fix a remote denial-of-service opportunity caused by a bug in
  1667. OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
  1668. in OSX 10.9.
  1669. o Major bugfixes (relay, stability, possible security):
  1670. - Fix a bug that could lead to a relay crashing with an assertion
  1671. failure if a buffer of exactly the wrong layout is passed to
  1672. buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
  1673. 0.2.0.10-alpha. Patch from "cypherpunks".
  1674. - Do not assert if the 'data' pointer on a buffer is advanced to the
  1675. very end of the buffer; log a BUG message instead. Only assert if
  1676. it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.
  1677. o Major bugfixes (FreeBSD IPFW transparent proxy):
  1678. - Fix address detection with FreeBSD transparent proxies, when
  1679. "TransProxyType ipfw" is in use. Fixes bug 15064; bugfix
  1680. on 0.2.5.4-alpha.
  1681. o Major bugfixes (Linux seccomp2 sandbox):
  1682. - Pass IPPROTO_TCP rather than 0 to socket(), so that the Linux
  1683. seccomp2 sandbox doesn't fail. Fixes bug 14989; bugfix
  1684. on 0.2.6.3-alpha.
  1685. - Allow AF_UNIX hidden services to be used with the seccomp2
  1686. sandbox. Fixes bug 15003; bugfix on 0.2.6.3-alpha.
  1687. - Upon receiving sighup with the seccomp2 sandbox enabled, do not
  1688. crash during attempts to call wait4. Fixes bug 15088; bugfix on
  1689. 0.2.5.1-alpha. Patch from "sanic".
  1690. o Minor features (controller):
  1691. - Messages about problems in the bootstrap process now include
  1692. information about the server we were trying to connect to when we
  1693. noticed the problem. Closes ticket 15006.
  1694. o Minor features (geoip):
  1695. - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
  1696. - Update geoip6 to the March 3 2015 Maxmind GeoLite2
  1697. Country database.
  1698. o Minor features (logs):
  1699. - Quiet some log messages in the heartbeat and at startup. Closes
  1700. ticket 14950.
  1701. o Minor bugfixes (certificate handling):
  1702. - If an authority operator accidentally makes a signing certificate
  1703. with a future publication time, do not discard its real signing
  1704. certificates. Fixes bug 11457; bugfix on 0.2.0.3-alpha.
  1705. - Remove any old authority certificates that have been superseded
  1706. for at least two days. Previously, we would keep superseded
  1707. certificates until they expired, if they were published close in
  1708. time to the certificate that superseded them. Fixes bug 11454;
  1709. bugfix on 0.2.1.8-alpha.
  1710. o Minor bugfixes (compilation):
  1711. - Fix a compilation warning on s390. Fixes bug 14988; bugfix
  1712. on 0.2.5.2-alpha.
  1713. - Fix a compilation warning on FreeBSD. Fixes bug 15151; bugfix
  1714. on 0.2.6.2-alpha.
  1715. o Minor bugfixes (testing):
  1716. - Fix endianness issues in unit test for resolve_my_address() to
  1717. have it pass on big endian systems. Fixes bug 14980; bugfix on
  1718. Tor 0.2.6.3-alpha.
  1719. - Avoid a side-effect in a tor_assert() in the unit tests. Fixes bug
  1720. 15188; bugfix on 0.1.2.3-alpha. Patch from Tom van der Woerdt.
  1721. - When running the new 'make test-stem' target, use the configured
  1722. python binary. Fixes bug 15037; bugfix on 0.2.6.3-alpha. Patch
  1723. from "cypherpunks".
  1724. - When running the zero-length-keys tests, do not use the default
  1725. torrc file. Fixes bug 15033; bugfix on 0.2.6.3-alpha. Reported
  1726. by "reezer".
  1727. o Directory authority IP change:
  1728. - The directory authority Faravahar has a new IP address. This
  1729. closes ticket 14487.
  1730. o Removed code:
  1731. - Remove some lingering dead code that once supported mempools.
  1732. Mempools were disabled by default in 0.2.5, and removed entirely
  1733. in 0.2.6.3-alpha. Closes more of ticket 14848; patch
  1734. by "cypherpunks".
  1735. Changes in version 0.2.6.3-alpha - 2015-02-19
  1736. Tor 0.2.6.3-alpha is the third (and hopefully final) alpha release in
  1737. the 0.2.6.x series. It introduces support for more kinds of sockets,
  1738. makes it harder to accidentally run an exit, improves our
  1739. multithreading backend, incorporates several fixes for the
  1740. AutomapHostsOnResolve option, and fixes numerous other bugs besides.
  1741. If no major regressions or security holes are found in this version,
  1742. the next version will be a release candidate.
  1743. o Deprecated versions:
  1744. - Tor relays older than 0.2.4.18-rc are no longer allowed to
  1745. advertise themselves on the network. Closes ticket 13555.
  1746. o Major features (security, unix domain sockets):
  1747. - Allow SocksPort to be an AF_UNIX Unix Domain Socket. Now high risk
  1748. applications can reach Tor without having to create AF_INET or
  1749. AF_INET6 sockets, meaning they can completely disable their
  1750. ability to make non-Tor network connections. To create a socket of
  1751. this type, use "SocksPort unix:/path/to/socket". Implements
  1752. ticket 12585.
  1753. - Support mapping hidden service virtual ports to AF_UNIX sockets.
  1754. The syntax is "HiddenServicePort 80 unix:/path/to/socket".
  1755. Implements ticket 11485.
  1756. o Major features (changed defaults):
  1757. - Prevent relay operators from unintentionally running exits: When a
  1758. relay is configured as an exit node, we now warn the user unless
  1759. the "ExitRelay" option is set to 1. We warn even more loudly if
  1760. the relay is configured with the default exit policy, since this
  1761. can indicate accidental misconfiguration. Setting "ExitRelay 0"
  1762. stops Tor from running as an exit relay. Closes ticket 10067.
  1763. o Major features (directory system):
  1764. - When downloading server- or microdescriptors from a directory
  1765. server, we no longer launch multiple simultaneous requests to the
  1766. same server. This reduces load on the directory servers,
  1767. especially when directory guards are in use. Closes ticket 9969.
  1768. - When downloading server- or microdescriptors over a tunneled
  1769. connection, do not limit the length of our requests to what the
  1770. Squid proxy is willing to handle. Part of ticket 9969.
  1771. - Authorities can now vote on the correct digests and latest
  1772. versions for different software packages. This allows packages
  1773. that include Tor to use the Tor authority system as a way to get
  1774. notified of updates and their correct digests. Implements proposal
  1775. 227. Closes ticket 10395.
  1776. o Major features (guards):
  1777. - Introduce the Guardfraction feature to improves load balancing on
  1778. guard nodes. Specifically, it aims to reduce the traffic gap that
  1779. guard nodes experience when they first get the Guard flag. This is
  1780. a required step if we want to increase the guard lifetime to 9
  1781. months or greater. Closes ticket 9321.
  1782. o Major features (performance):
  1783. - Make the CPU worker implementation more efficient by avoiding the
  1784. kernel and lengthening pipelines. The original implementation used
  1785. sockets to transfer data from the main thread to the workers, and
  1786. didn't allow any thread to be assigned more than a single piece of
  1787. work at once. The new implementation avoids communications
  1788. overhead by making requests in shared memory, avoiding kernel IO
  1789. where possible, and keeping more requests in flight at once.
  1790. Implements ticket 9682.
  1791. o Major features (relay):
  1792. - Raise the minimum acceptable configured bandwidth rate for bridges
  1793. to 50 KiB/sec and for relays to 75 KiB/sec. (The old values were
  1794. 20 KiB/sec.) Closes ticket 13822.
  1795. o Major bugfixes (exit node stability):
  1796. - Fix an assertion failure that could occur under high DNS load.
  1797. Fixes bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr";
  1798. diagnosed and fixed by "cypherpunks".
  1799. o Major bugfixes (mixed relay-client operation):
  1800. - When running as a relay and client at the same time (not
  1801. recommended), if we decide not to use a new guard because we want
  1802. to retry older guards, only close the locally-originating circuits
  1803. passing through that guard. Previously we would close all the
  1804. circuits through that guard. Fixes bug 9819; bugfix on
  1805. 0.2.1.1-alpha. Reported by "skruffy".
  1806. o Minor features (build):
  1807. - New --disable-system-torrc compile-time option to prevent Tor from
  1808. looking for the system-wide torrc or torrc-defaults files.
  1809. Resolves ticket 13037.
  1810. o Minor features (controller):
  1811. - Include SOCKS_USERNAME and SOCKS_PASSWORD values in controller
  1812. events so controllers can observe circuit isolation inputs. Closes
  1813. ticket 8405.
  1814. - ControlPort now supports the unix:/path/to/socket syntax as an
  1815. alternative to the ControlSocket option, for consistency with
  1816. SocksPort and HiddenServicePort. Closes ticket 14451.
  1817. - New "GETINFO bw-event-cache" to get information about recent
  1818. bandwidth events. Closes ticket 14128. Useful for controllers to
  1819. get recent bandwidth history after the fix for ticket 13988.
  1820. o Minor features (Denial of service resistance):
  1821. - Count the total number of bytes used storing hidden service
  1822. descriptors against the value of MaxMemInQueues. If we're low on
  1823. memory, and more than 20% of our memory is used holding hidden
  1824. service descriptors, free them until no more than 10% of our
  1825. memory holds hidden service descriptors. Free the least recently
  1826. fetched descriptors first. Resolves ticket 13806.
  1827. - When we have recently been under memory pressure (over 3/4 of
  1828. MaxMemInQueues is allocated), then allocate smaller zlib objects
  1829. for small requests. Closes ticket 11791.
  1830. o Minor features (geoip):
  1831. - Update geoip and geoip6 files to the January 7 2015 Maxmind
  1832. GeoLite2 Country database.
  1833. o Minor features (guard nodes):
  1834. - Reduce the time delay before saving guard status to disk from 10
  1835. minutes to 30 seconds (or from one hour to 10 minutes if
  1836. AvoidDiskWrites is set). Closes ticket 12485.
  1837. o Minor features (hidden service):
  1838. - Make Sybil attacks against hidden services harder by changing the
  1839. minimum time required to get the HSDir flag from 25 hours up to 96
  1840. hours. Addresses ticket 14149.
  1841. - New option "HiddenServiceAllowUnknownPorts" to allow hidden
  1842. services to disable the anti-scanning feature introduced in
  1843. 0.2.6.2-alpha. With this option not set, a connection to an
  1844. unlisted port closes the circuit. With this option set, only a
  1845. RELAY_DONE cell is sent. Closes ticket 14084.
  1846. o Minor features (interface):
  1847. - Implement "-f -" command-line option to read torrc configuration
  1848. from standard input, if you don't want to store the torrc file in
  1849. the file system. Implements feature 13865.
  1850. o Minor features (logging):
  1851. - Add a count of unique clients to the bridge heartbeat message.
  1852. Resolves ticket 6852.
  1853. - Suppress "router info incompatible with extra info" message when
  1854. reading extrainfo documents from cache. (This message got loud
  1855. around when we closed bug 9812 in 0.2.6.2-alpha.) Closes
  1856. ticket 13762.
  1857. - Elevate hidden service authorized-client message from DEBUG to
  1858. INFO. Closes ticket 14015.
  1859. o Minor features (stability):
  1860. - Add assertions in our hash-table iteration code to check for
  1861. corrupted values that could cause infinite loops. Closes
  1862. ticket 11737.
  1863. o Minor features (systemd):
  1864. - Various improvements and modernizations in systemd hardening
  1865. support. Closes ticket 13805. Patch from Craig Andrews.
  1866. o Minor features (testing networks):
  1867. - Drop the minimum RendPostPeriod on a testing network to 5 seconds,
  1868. and the default on a testing network to 2 minutes. Drop the
  1869. MIN_REND_INITIAL_POST_DELAY on a testing network to 5 seconds, but
  1870. keep the default on a testing network at 30 seconds. This reduces
  1871. HS bootstrap time to around 25 seconds. Also, change the default
  1872. time in test-network.sh to match. Closes ticket 13401. Patch
  1873. by "teor".
  1874. - Create TestingDirAuthVoteHSDir to correspond to
  1875. TestingDirAuthVoteExit/Guard. Ensures that authorities vote the
  1876. HSDir flag for the listed relays regardless of uptime or ORPort
  1877. connectivity. Respects the value of VoteOnHidServDirectoriesV2.
  1878. Partial implementation for ticket 14067. Patch by "teor".
  1879. o Minor features (tor2web mode):
  1880. - Introduce the config option Tor2webRendezvousPoints, which allows
  1881. clients in Tor2webMode to select a specific Rendezvous Point to be
  1882. used in HS circuits. This might allow better performance for
  1883. Tor2Web nodes. Implements ticket 12844.
  1884. o Minor bugfixes (client DNS):
  1885. - Report the correct cached DNS expiration times on SOCKS port or in
  1886. DNS replies. Previously, we would report everything as "never
  1887. expires." Fixes bug 14193; bugfix on 0.2.3.17-beta.
  1888. - Avoid a small memory leak when we find a cached answer for a
  1889. reverse DNS lookup in a client-side DNS cache. (Remember, client-
  1890. side DNS caching is off by default, and is not recommended.) Fixes
  1891. bug 14259; bugfix on 0.2.0.1-alpha.
  1892. o Minor bugfixes (client, automapping):
  1893. - Avoid crashing on torrc lines for VirtualAddrNetworkIPv[4|6] when
  1894. no value follows the option. Fixes bug 14142; bugfix on
  1895. 0.2.4.7-alpha. Patch by "teor".
  1896. - Fix a memory leak when using AutomapHostsOnResolve. Fixes bug
  1897. 14195; bugfix on 0.1.0.1-rc.
  1898. - Prevent changes to other options from removing the wildcard value
  1899. "." from "AutomapHostsSuffixes". Fixes bug 12509; bugfix
  1900. on 0.2.0.1-alpha.
  1901. - Allow MapAddress and AutomapHostsOnResolve to work together when
  1902. an address is mapped into another address type (like .onion) that
  1903. must be automapped at resolve time. Fixes bug 7555; bugfix
  1904. on 0.2.0.1-alpha.
  1905. o Minor bugfixes (client, bridges):
  1906. - When we are using bridges and we had a network connectivity
  1907. problem, only retry connecting to our currently configured
  1908. bridges, not all bridges we know about and remember using. Fixes
  1909. bug 14216; bugfix on 0.2.2.17-alpha.
  1910. o Minor bugfixes (client, IPv6):
  1911. - Reject socks requests to literal IPv6 addresses when IPv6Traffic
  1912. flag is not set; and not because the NoIPv4Traffic flag was set.
  1913. Previously we'd looked at the NoIPv4Traffic flag for both types of
  1914. literal addresses. Fixes bug 14280; bugfix on 0.2.4.7-alpha.
  1915. o Minor bugfixes (compilation):
  1916. - The address of an array in the middle of a structure will always
  1917. be non-NULL. clang recognises this and complains. Disable the
  1918. tautologous and redundant check to silence this warning. Fixes bug
  1919. 14001; bugfix on 0.2.1.2-alpha.
  1920. - Avoid warnings when building with systemd 209 or later. Fixes bug
  1921. 14072; bugfix on 0.2.6.2-alpha. Patch from "h.venev".
  1922. - Compile correctly with (unreleased) OpenSSL 1.1.0 headers.
  1923. Addresses ticket 14188.
  1924. - Build without warnings with the stock OpenSSL srtp.h header, which
  1925. has a duplicate declaration of SSL_get_selected_srtp_profile().
  1926. Fixes bug 14220; this is OpenSSL's bug, not ours.
  1927. - Do not compile any code related to Tor2Web mode when Tor2Web mode
  1928. is not enabled at compile time. Previously, this code was included
  1929. in a disabled state. See discussion on ticket 12844.
  1930. - Remove the --disable-threads configure option again. It was
  1931. accidentally partially reintroduced in 29ac883606d6d. Fixes bug
  1932. 14819; bugfix on 0.2.6.2-alpha.
  1933. o Minor bugfixes (controller):
  1934. - Report "down" in response to the "GETINFO entry-guards" command
  1935. when relays are down with an unreachable_since value. Previously,
  1936. we would report "up". Fixes bug 14184; bugfix on 0.1.2.2-alpha.
  1937. - Avoid crashing on a malformed EXTENDCIRCUIT command. Fixes bug
  1938. 14116; bugfix on 0.2.2.9-alpha.
  1939. - Add a code for the END_CIRC_REASON_IP_NOW_REDUNDANT circuit close
  1940. reason. Fixes bug 14207; bugfix on 0.2.6.2-alpha.
  1941. o Minor bugfixes (directory authority):
  1942. - Allow directory authorities to fetch more data from one another if
  1943. they find themselves missing lots of votes. Previously, they had
  1944. been bumping against the 10 MB queued data limit. Fixes bug 14261;
  1945. bugfix on 0.1.2.5-alpha.
  1946. - Do not attempt to download extrainfo documents which we will be
  1947. unable to validate with a matching server descriptor. Fixes bug
  1948. 13762; bugfix on 0.2.0.1-alpha.
  1949. - Fix a bug that was truncating AUTHDIR_NEWDESC events sent to the
  1950. control port. Fixes bug 14953; bugfix on 0.2.0.1-alpha.
  1951. - Enlarge the buffer to read bwauth generated files to avoid an
  1952. issue when parsing the file in dirserv_read_measured_bandwidths().
  1953. Fixes bug 14125; bugfix on 0.2.2.1-alpha.
  1954. o Minor bugfixes (file handling):
  1955. - Stop failing when key files are zero-length. Instead, generate new
  1956. keys, and overwrite the empty key files. Fixes bug 13111; bugfix
  1957. on all versions of Tor. Patch by "teor".
  1958. - Stop generating a fresh .old RSA onion key file when the .old file
  1959. is missing. Fixes part of 13111; bugfix on 0.0.6rc1.
  1960. - Avoid overwriting .old key files with empty key files.
  1961. - Skip loading zero-length extrainfo store, router store, stats,
  1962. state, and key files.
  1963. - Avoid crashing when trying to reload a torrc specified as a
  1964. relative path with RunAsDaemon turned on. Fixes bug 13397; bugfix
  1965. on 0.2.3.11-alpha.
  1966. o Minor bugfixes (hidden services):
  1967. - Close the introduction circuit when we have no more usable intro
  1968. points, instead of waiting for it to time out. This also ensures
  1969. that no follow-up HS descriptor fetch is triggered when the
  1970. circuit eventually times out. Fixes bug 14224; bugfix on 0.0.6.
  1971. - When fetching a hidden service descriptor for a down service that
  1972. was recently up, do not keep refetching until we try the same
  1973. replica twice in a row. Fixes bug 14219; bugfix on 0.2.0.10-alpha.
  1974. - Successfully launch Tor with a nonexistent hidden service
  1975. directory. Our fix for bug 13942 didn't catch this case. Fixes bug
  1976. 14106; bugfix on 0.2.6.2-alpha.
  1977. o Minor bugfixes (logging):
  1978. - Avoid crashing when there are more log domains than entries in
  1979. domain_list. Bugfix on 0.2.3.1-alpha.
  1980. - Add a string representation for LD_SCHED. Fixes bug 14740; bugfix
  1981. on 0.2.6.1-alpha.
  1982. - Don't log messages to stdout twice when starting up. Fixes bug
  1983. 13993; bugfix on 0.2.6.1-alpha.
  1984. o Minor bugfixes (parsing):
  1985. - Stop accepting milliseconds (or other junk) at the end of
  1986. descriptor publication times. Fixes bug 9286; bugfix on 0.0.2pre25.
  1987. - Support two-number and three-number version numbers correctly, in
  1988. case we change the Tor versioning system in the future. Fixes bug
  1989. 13661; bugfix on 0.0.8pre1.
  1990. o Minor bugfixes (path counting):
  1991. - When deciding whether the consensus lists any exit nodes, count
  1992. the number listed in the consensus, not the number we have
  1993. descriptors for. Fixes part of bug 14918; bugfix on 0.2.6.2-alpha.
  1994. - When deciding whether we have any exit nodes, only examine
  1995. ExitNodes when the ExitNodes option is actually set. Fixes part of
  1996. bug 14918; bugfix on 0.2.6.2-alpha.
  1997. - Get rid of redundant and possibly scary warnings that we are
  1998. missing directory information while we bootstrap. Fixes part of
  1999. bug 14918; bugfix on 0.2.6.2-alpha.
  2000. o Minor bugfixes (portability):
  2001. - Fix the ioctl()-based network interface lookup code so that it
  2002. will work on systems that have variable-length struct ifreq, for
  2003. example Mac OS X.
  2004. - Fix scheduler compilation on targets where char is unsigned. Fixes
  2005. bug 14764; bugfix on 0.2.6.2-alpha. Reported by Christian Kujau.
  2006. o Minor bugfixes (sandbox):
  2007. - Allow glibc fatal errors to be sent to stderr before Tor exits.
  2008. Previously, glibc would try to write them to /dev/tty, and the
  2009. sandbox would trap the call and make Tor exit prematurely. Fixes
  2010. bug 14759; bugfix on 0.2.5.1-alpha.
  2011. o Minor bugfixes (shutdown):
  2012. - When shutting down, always call event_del() on lingering read or
  2013. write events before freeing them. Otherwise, we risk double-frees
  2014. or read-after-frees in event_base_free(). Fixes bug 12985; bugfix
  2015. on 0.1.0.2-rc.
  2016. o Minor bugfixes (small memory leaks):
  2017. - Avoid leaking memory when using IPv6 virtual address mappings.
  2018. Fixes bug 14123; bugfix on 0.2.4.7-alpha. Patch by Tom van
  2019. der Woerdt.
  2020. o Minor bugfixes (statistics):
  2021. - Increase period over which bandwidth observations are aggregated
  2022. from 15 minutes to 4 hours. Fixes bug 13988; bugfix on 0.0.8pre1.
  2023. o Minor bugfixes (systemd support):
  2024. - Fix detection and operation of systemd watchdog. Fixes part of bug
  2025. 14141; bugfix on 0.2.6.2-alpha. Patch from Tomasz Torcz.
  2026. - Run correctly under systemd with the RunAsDaemon option set. Fixes
  2027. part of bug 14141; bugfix on 0.2.5.7-rc. Patch from Tomasz Torcz.
  2028. - Inform the systemd supervisor about more changes in the Tor
  2029. process status. Implements part of ticket 14141. Patch from
  2030. Tomasz Torcz.
  2031. - Cause the "--disable-systemd" option to actually disable systemd
  2032. support. Fixes bug 14350; bugfix on 0.2.6.2-alpha. Patch
  2033. from "blueness".
  2034. o Minor bugfixes (TLS):
  2035. - Check more thoroughly throughout the TLS code for possible
  2036. unlogged TLS errors. Possible diagnostic or fix for bug 13319.
  2037. o Minor bugfixes (transparent proxy):
  2038. - Use getsockname, not getsockopt, to retrieve the address for a
  2039. TPROXY-redirected connection. Fixes bug 13796; bugfix
  2040. on 0.2.5.2-alpha.
  2041. o Code simplification and refactoring:
  2042. - Move fields related to isolating and configuring client ports into
  2043. a shared structure. Previously, they were duplicated across
  2044. port_cfg_t, listener_connection_t, and edge_connection_t. Failure
  2045. to copy them correctly had been the cause of at least one bug in
  2046. the past. Closes ticket 8546.
  2047. - Refactor the get_interface_addresses_raw() doom-function into
  2048. multiple smaller and simpler subfunctions. Cover the resulting
  2049. subfunctions with unit-tests. Fixes a significant portion of
  2050. issue 12376.
  2051. - Remove workaround in dirserv_thinks_router_is_hs_dir() that was
  2052. only for version <= 0.2.2.24 which is now deprecated. Closes
  2053. ticket 14202.
  2054. - Remove a test for a long-defunct broken version-one
  2055. directory server.
  2056. o Documentation:
  2057. - Adding section on OpenBSD to our TUNING document. Thanks to mmcc
  2058. for writing the OpenBSD-specific tips. Resolves ticket 13702.
  2059. - Make the tor-resolve documentation match its help string and its
  2060. options. Resolves part of ticket 14325.
  2061. - Log a more useful error message from tor-resolve when failing to
  2062. look up a hidden service address. Resolves part of ticket 14325.
  2063. o Downgraded warnings:
  2064. - Don't warn when we've attempted to contact a relay using the wrong
  2065. ntor onion key. Closes ticket 9635.
  2066. o Removed features:
  2067. - To avoid confusion with the "ExitRelay" option, "ExitNode" is no
  2068. longer silently accepted as an alias for "ExitNodes".
  2069. - The --enable-mempool and --enable-buf-freelists options, which
  2070. were originally created to work around bad malloc implementations,
  2071. no longer exist. They were off-by-default in 0.2.5. Closes
  2072. ticket 14848.
  2073. o Testing:
  2074. - Make the checkdir/perms test complete successfully even if the
  2075. global umask is not 022. Fixes bug 14215; bugfix on 0.2.6.2-alpha.
  2076. - Test that tor does not fail when key files are zero-length. Check
  2077. that tor generates new keys, and overwrites the empty key files.
  2078. - Test that tor generates new keys when keys are missing
  2079. (existing behavior).
  2080. - Test that tor does not overwrite key files that already contain
  2081. data (existing behavior). Tests bug 13111. Patch by "teor".
  2082. - New "make test-stem" target to run stem integration tests.
  2083. Requires that the "STEM_SOURCE_DIR" environment variable be set.
  2084. Closes ticket 14107.
  2085. - Make the test_cmdline_args.py script work correctly on Windows.
  2086. Patch from Gisle Vanem.
  2087. - Move the slower unit tests into a new "./src/test/test-slow"
  2088. binary that can be run independently of the other tests. Closes
  2089. ticket 13243.
  2090. - Avoid undefined behavior when sampling huge values from the
  2091. Laplace distribution. This made unittests fail on Raspberry Pi.
  2092. Bug found by Device. Fixes bug 14090; bugfix on 0.2.6.2-alpha.
  2093. Changes in version 0.2.6.2-alpha - 2014-12-31
  2094. Tor 0.2.6.2-alpha is the second alpha release in the 0.2.6.x series.
  2095. It introduces a major new backend for deciding when to send cells on
  2096. channels, which should lead down the road to big performance
  2097. increases. It contains security and statistics features for better
  2098. work on hidden services, and numerous bugfixes.
  2099. This release contains many new unit tests, along with major
  2100. performance improvements for running testing networks using Chutney.
  2101. Thanks to a series of patches contributed by "teor", testing networks
  2102. should now bootstrap in seconds, rather than minutes.
  2103. o Major features (relay, infrastructure):
  2104. - Complete revision of the code that relays use to decide which cell
  2105. to send next. Formerly, we selected the best circuit to write on
  2106. each channel, but we didn't select among channels in any
  2107. sophisticated way. Now, we choose the best circuits globally from
  2108. among those whose channels are ready to deliver traffic.
  2109. This patch implements a new inter-cmux comparison API, a global
  2110. high/low watermark mechanism and a global scheduler loop for
  2111. transmission prioritization across all channels as well as among
  2112. circuits on one channel. This schedule is currently tuned to
  2113. (tolerantly) avoid making changes in network performance, but it
  2114. should form the basis for major circuit performance increases in
  2115. the future. Code by Andrea; tuning by Rob Jansen; implements
  2116. ticket 9262.
  2117. o Major features (hidden services):
  2118. - Make HS port scanning more difficult by immediately closing the
  2119. circuit when a user attempts to connect to a nonexistent port.
  2120. Closes ticket 13667.
  2121. - Add a HiddenServiceStatistics option that allows Tor relays to
  2122. gather and publish statistics about the overall size and volume of
  2123. hidden service usage. Specifically, when this option is turned on,
  2124. an HSDir will publish an approximate number of hidden services
  2125. that have published descriptors to it the past 24 hours. Also, if
  2126. a relay has acted as a hidden service rendezvous point, it will
  2127. publish the approximate amount of rendezvous cells it has relayed
  2128. the past 24 hours. The statistics themselves are obfuscated so
  2129. that the exact values cannot be derived. For more details see
  2130. proposal 238, "Better hidden service stats from Tor relays". This
  2131. feature is currently disabled by default. Implements feature 13192.
  2132. o Major bugfixes (client, automap):
  2133. - Repair automapping with IPv6 addresses. This automapping should
  2134. have worked previously, but one piece of debugging code that we
  2135. inserted to detect a regression actually caused the regression to
  2136. manifest itself again. Fixes bug 13811 and bug 12831; bugfix on
  2137. 0.2.4.7-alpha. Diagnosed and fixed by Francisco Blas
  2138. Izquierdo Riera.
  2139. o Major bugfixes (hidden services):
  2140. - When closing an introduction circuit that was opened in parallel
  2141. with others, don't mark the introduction point as unreachable.
  2142. Previously, the first successful connection to an introduction
  2143. point would make the other introduction points get marked as
  2144. having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
  2145. o Directory authority changes:
  2146. - Remove turtles as a directory authority.
  2147. - Add longclaw as a new (v3) directory authority. This implements
  2148. ticket 13296. This keeps the directory authority count at 9.
  2149. o Major removed features:
  2150. - Tor clients no longer support connecting to hidden services
  2151. running on Tor 0.2.2.x and earlier; the Support022HiddenServices
  2152. option has been removed. (There shouldn't be any hidden services
  2153. running these versions on the network.) Closes ticket 7803.
  2154. o Minor features (client):
  2155. - Validate hostnames in SOCKS5 requests more strictly. If SafeSocks
  2156. is enabled, reject requests with IP addresses as hostnames.
  2157. Resolves ticket 13315.
  2158. o Minor features (controller):
  2159. - Add a "SIGNAL HEARTBEAT" controller command that tells Tor to
  2160. write an unscheduled heartbeat message to the log. Implements
  2161. feature 9503.
  2162. o Minor features (geoip):
  2163. - Update geoip and geoip6 to the November 15 2014 Maxmind GeoLite2
  2164. Country database.
  2165. o Minor features (hidden services):
  2166. - When re-enabling the network, don't try to build introduction
  2167. circuits until we have successfully built a circuit. This makes
  2168. hidden services come up faster when the network is re-enabled.
  2169. Patch from "akwizgran". Closes ticket 13447.
  2170. - When we fail to retrieve a hidden service descriptor, send the
  2171. controller an "HS_DESC FAILED" controller event. Implements
  2172. feature 13212.
  2173. - New HiddenServiceDirGroupReadable option to cause hidden service
  2174. directories and hostname files to be created group-readable. Patch
  2175. from "anon", David Stainton, and "meejah". Closes ticket 11291.
  2176. o Minor features (systemd):
  2177. - Where supported, when running with systemd, report successful
  2178. startup to systemd. Part of ticket 11016. Patch by Michael Scherer.
  2179. - When running with systemd, support systemd watchdog messages. Part
  2180. of ticket 11016. Patch by Michael Scherer.
  2181. o Minor features (transparent proxy):
  2182. - Update the transparent proxy option checks to allow for both ipfw
  2183. and pf on OS X. Closes ticket 14002.
  2184. - Use the correct option when using IPv6 with transparent proxy
  2185. support on Linux. Resolves 13808. Patch by Francisco Blas
  2186. Izquierdo Riera.
  2187. o Minor bugfixes (preventative security, C safety):
  2188. - When reading a hexadecimal, base-32, or base-64 encoded value from
  2189. a string, always overwrite the whole output buffer. This prevents
  2190. some bugs where we would look at (but fortunately, not reveal)
  2191. uninitialized memory on the stack. Fixes bug 14013; bugfix on all
  2192. versions of Tor.
  2193. - Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not
  2194. just the part that's used. This makes it harder for data leak bugs
  2195. to occur in the event of other programming failures. Resolves
  2196. ticket 14041.
  2197. o Minor bugfixes (client, microdescriptors):
  2198. - Use a full 256 bits of the SHA256 digest of a microdescriptor when
  2199. computing which microdescriptors to download. This keeps us from
  2200. erroneous download behavior if two microdescriptor digests ever
  2201. have the same first 160 bits. Fixes part of bug 13399; bugfix
  2202. on 0.2.3.1-alpha.
  2203. - Reset a router's status if its microdescriptor digest changes,
  2204. even if the first 160 bits remain the same. Fixes part of bug
  2205. 13399; bugfix on 0.2.3.1-alpha.
  2206. o Minor bugfixes (compilation):
  2207. - Silence clang warnings under --enable-expensive-hardening,
  2208. including implicit truncation of 64 bit values to 32 bit, const
  2209. char assignment to self, tautological compare, and additional
  2210. parentheses around equality tests. Fixes bug 13577; bugfix
  2211. on 0.2.5.4-alpha.
  2212. - Fix a clang warning about checking whether an address in the
  2213. middle of a structure is NULL. Fixes bug 14001; bugfix
  2214. on 0.2.1.2-alpha.
  2215. o Minor bugfixes (hidden services):
  2216. - Correctly send a controller event when we find that a rendezvous
  2217. circuit has finished. Fixes bug 13936; bugfix on 0.1.1.5-alpha.
  2218. - Pre-check directory permissions for new hidden-services to avoid
  2219. at least one case of "Bug: Acting on config options left us in a
  2220. broken state. Dying." Fixes bug 13942; bugfix on 0.0.6pre1.
  2221. - When adding a new hidden service (for example, via SETCONF), Tor
  2222. no longer congratulates the user for running a relay. Fixes bug
  2223. 13941; bugfix on 0.2.6.1-alpha.
  2224. - When fetching hidden service descriptors, we now check not only
  2225. for whether we got the hidden service we had in mind, but also
  2226. whether we got the particular descriptors we wanted. This prevents
  2227. a class of inefficient but annoying DoS attacks by hidden service
  2228. directories. Fixes bug 13214; bugfix on 0.2.1.6-alpha. Reported
  2229. by "special".
  2230. o Minor bugfixes (Linux seccomp2 sandbox):
  2231. - Make transparent proxy support work along with the seccomp2
  2232. sandbox. Fixes part of bug 13808; bugfix on 0.2.5.1-alpha. Patch
  2233. by Francisco Blas Izquierdo Riera.
  2234. - Fix a memory leak in tor-resolve when running with the sandbox
  2235. enabled. Fixes bug 14050; bugfix on 0.2.5.9-rc.
  2236. o Minor bugfixes (logging):
  2237. - Downgrade warnings about RSA signature failures to info log level.
  2238. Emit a warning when an extra info document is found incompatible
  2239. with a corresponding router descriptor. Fixes bug 9812; bugfix
  2240. on 0.0.6rc3.
  2241. - Make connection_ap_handshake_attach_circuit() log the circuit ID
  2242. correctly. Fixes bug 13701; bugfix on 0.0.6.
  2243. o Minor bugfixes (misc):
  2244. - Stop allowing invalid address patterns like "*/24" that contain
  2245. both a wildcard address and a bit prefix length. This affects all
  2246. our address-range parsing code. Fixes bug 7484; bugfix
  2247. on 0.0.2pre14.
  2248. o Minor bugfixes (testing networks, fast startup):
  2249. - Allow Tor to build circuits using a consensus with no exits. If
  2250. the consensus has no exits (typical of a bootstrapping test
  2251. network), allow Tor to build circuits once enough descriptors have
  2252. been downloaded. This assists in bootstrapping a testing Tor
  2253. network. Fixes bug 13718; bugfix on 0.2.4.10-alpha. Patch
  2254. by "teor".
  2255. - When V3AuthVotingInterval is low, give a lower If-Modified-Since
  2256. header to directory servers. This allows us to obtain consensuses
  2257. promptly when the consensus interval is very short. This assists
  2258. in bootstrapping a testing Tor network. Fixes parts of bugs 13718
  2259. and 13963; bugfix on 0.2.0.3-alpha. Patch by "teor".
  2260. - Stop assuming that private addresses are local when checking
  2261. reachability in a TestingTorNetwork. Instead, when testing, assume
  2262. all OR connections are remote. (This is necessary due to many test
  2263. scenarios running all relays on localhost.) This assists in
  2264. bootstrapping a testing Tor network. Fixes bug 13924; bugfix on
  2265. 0.1.0.1-rc. Patch by "teor".
  2266. - Avoid building exit circuits from a consensus with no exits. Now
  2267. thanks to our fix for 13718, we accept a no-exit network as not
  2268. wholly lost, but we need to remember not to try to build exit
  2269. circuits on it. Closes ticket 13814; patch by "teor".
  2270. - Stop requiring exits to have non-zero bandwithcapacity in a
  2271. TestingTorNetwork. Instead, when TestingMinExitFlagThreshold is 0,
  2272. ignore exit bandwidthcapacity. This assists in bootstrapping a
  2273. testing Tor network. Fixes parts of bugs 13718 and 13839; bugfix
  2274. on 0.2.0.3-alpha. Patch by "teor".
  2275. - Add "internal" to some bootstrap statuses when no exits are
  2276. available. If the consensus does not contain Exits, Tor will only
  2277. build internal circuits. In this case, relevant statuses will
  2278. contain the word "internal" as indicated in the Tor control-
  2279. spec.txt. When bootstrap completes, Tor will be ready to build
  2280. internal circuits. If a future consensus contains Exits, exit
  2281. circuits may become available. Fixes part of bug 13718; bugfix on
  2282. 0.2.4.10-alpha. Patch by "teor".
  2283. - Decrease minimum consensus interval to 10 seconds when
  2284. TestingTorNetwork is set, or 5 seconds for the first consensus.
  2285. Fix assumptions throughout the code that assume larger intervals.
  2286. Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. Patch
  2287. by "teor".
  2288. - Avoid excluding guards from path building in minimal test
  2289. networks, when we're in a test network and excluding guards would
  2290. exclude all relays. This typically occurs in incredibly small tor
  2291. networks, and those using "TestingAuthVoteGuard *". Fixes part of
  2292. bug 13718; bugfix on 0.1.1.11-alpha. Patch by "teor".
  2293. o Code simplification and refactoring:
  2294. - Stop using can_complete_circuits as a global variable; access it
  2295. with a function instead.
  2296. - Avoid using operators directly as macro arguments: this lets us
  2297. apply coccinelle transformations to our codebase more directly.
  2298. Closes ticket 13172.
  2299. - Combine the functions used to parse ClientTransportPlugin and
  2300. ServerTransportPlugin into a single function. Closes ticket 6456.
  2301. - Add inline functions and convenience macros for inspecting channel
  2302. state. Refactor the code to use convenience macros instead of
  2303. checking channel state directly. Fixes issue 7356.
  2304. - Document all members of was_router_added_t and rename
  2305. ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less
  2306. confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644.
  2307. - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL
  2308. constant instead of hardcoded value. Fixes issue 13840.
  2309. - Refactor our generic strmap and digestmap types into a single
  2310. implementation, so that we can add a new digest256map
  2311. type trivially.
  2312. o Documentation:
  2313. - Document the bridge-authority-only 'networkstatus-bridges' file.
  2314. Closes ticket 13713; patch from "tom".
  2315. - Fix typo in PredictedPortsRelevanceTime option description in
  2316. manpage. Resolves issue 13707.
  2317. - Stop suggesting that users specify relays by nickname: it isn't a
  2318. good idea. Also, properly cross-reference how to specify relays in
  2319. all parts of manual documenting options that take a list of
  2320. relays. Closes ticket 13381.
  2321. - Clarify the HiddenServiceDir option description in manpage to make
  2322. it clear that relative paths are taken with respect to the current
  2323. working directory. Also clarify that this behavior is not
  2324. guaranteed to remain indefinitely. Fixes issue 13913.
  2325. o Testing:
  2326. - New tests for many parts of channel, relay, and circuitmux
  2327. functionality. Code by Andrea; part of 9262.
  2328. - New tests for parse_transport_line(). Part of ticket 6456.
  2329. - In the unit tests, use chgrp() to change the group of the unit
  2330. test temporary directory to the current user, so that the sticky
  2331. bit doesn't interfere with tests that check directory groups.
  2332. Closes 13678.
  2333. - Add unit tests for resolve_my_addr(). Part of ticket 12376; patch
  2334. by 'rl1987'.
  2335. Changes in version 0.2.6.1-alpha - 2014-10-30
  2336. Tor 0.2.6.1-alpha is the first release in the Tor 0.2.6.x series. It
  2337. includes numerous code cleanups and new tests, and fixes a large
  2338. number of annoying bugs. Out-of-memory conditions are handled better
  2339. than in 0.2.5, pluggable transports have improved proxy support, and
  2340. clients now use optimistic data for contacting hidden services. Also,
  2341. we are now more robust to changes in what we consider a parseable
  2342. directory object, so that tightening restrictions does not have a risk
  2343. of introducing infinite download loops.
  2344. This is the first alpha release in a new series, so expect there to be
  2345. bugs. Users who would rather test out a more stable branch should stay
  2346. with 0.2.5.x for now.
  2347. o New compiler and system requirements:
  2348. - Tor 0.2.6.x requires that your compiler support more of the C99
  2349. language standard than before. The 'configure' script now detects
  2350. whether your compiler supports C99 mid-block declarations and
  2351. designated initializers. If it does not, Tor will not compile.
  2352. We may revisit this requirement if it turns out that a significant
  2353. number of people need to build Tor with compilers that don't
  2354. bother implementing a 15-year-old standard. Closes ticket 13233.
  2355. - Tor no longer supports systems without threading support. When we
  2356. began working on Tor, there were several systems that didn't have
  2357. threads, or where the thread support wasn't able to run the
  2358. threads of a single process on multiple CPUs. That no longer
  2359. holds: every system where Tor needs to run well now has threading
  2360. support. Resolves ticket 12439.
  2361. o Removed platform support:
  2362. - We no longer include special code to build on Windows CE; as far
  2363. as we know, nobody has used Tor on Windows CE in a very long time.
  2364. Closes ticket 11446.
  2365. o Major features (bridges):
  2366. - Expose the outgoing upstream HTTP/SOCKS proxy to pluggable
  2367. transports if they are configured via the "TOR_PT_PROXY"
  2368. environment variable. Implements proposal 232. Resolves
  2369. ticket 8402.
  2370. o Major features (client performance, hidden services):
  2371. - Allow clients to use optimistic data when connecting to a hidden
  2372. service, which should remove a round-trip from hidden service
  2373. initialization. See proposal 181 for details. Implements
  2374. ticket 13211.
  2375. o Major features (directory system):
  2376. - Upon receiving an unparseable directory object, if its digest
  2377. matches what we expected, then don't try to download it again.
  2378. Previously, when we got a descriptor we didn't like, we would keep
  2379. trying to download it over and over. Closes ticket 11243.
  2380. o Major features (sample torrc):
  2381. - Add a new, infrequently-changed "torrc.minimal". This file is
  2382. similar to torrc.sample, but it will change as infrequently as
  2383. possible, for the benefit of users whose systems prompt them for
  2384. intervention whenever a default configuration file is changed.
  2385. Making this change allows us to update torrc.sample to be a more
  2386. generally useful "sample torrc".
  2387. o Major bugfixes (directory authorities):
  2388. - Do not assign the HSDir flag to relays if they are not Valid, or
  2389. currently hibernating. Fixes 12573; bugfix on 0.2.0.10-alpha.
  2390. o Major bugfixes (directory bandwidth performance):
  2391. - Don't flush the zlib buffer aggressively when compressing
  2392. directory information for clients. This should save about 7% of
  2393. the bandwidth currently used for compressed descriptors and
  2394. microdescriptors. Fixes bug 11787; bugfix on 0.1.1.23.
  2395. o Minor features (security, memory wiping):
  2396. - Ensure we securely wipe keys from memory after
  2397. crypto_digest_get_digest and init_curve25519_keypair_from_file
  2398. have finished using them. Resolves ticket 13477.
  2399. o Minor features (security, out-of-memory handling):
  2400. - When handling an out-of-memory condition, allocate less memory for
  2401. temporary data structures. Fixes issue 10115.
  2402. - When handling an out-of-memory condition, consider more types of
  2403. buffers, including those on directory connections, and zlib
  2404. buffers. Resolves ticket 11792.
  2405. o Minor features:
  2406. - When identity keypair is generated for first time, log a
  2407. congratulatory message that links to the new relay lifecycle
  2408. document. Implements feature 10427.
  2409. o Minor features (client):
  2410. - Clients are now willing to send optimistic data (before they
  2411. receive a 'connected' cell) to relays of any version. (Relays
  2412. without support for optimistic data are no longer supported on the
  2413. Tor network.) Resolves ticket 13153.
  2414. o Minor features (directory authorities):
  2415. - Don't list relays with a bandwidth estimate of 0 in the consensus.
  2416. Implements a feature proposed during discussion of bug 13000.
  2417. - In tor-gencert, report an error if the user provides the same
  2418. argument more than once.
  2419. - If a directory authority can't find a best consensus method in the
  2420. votes that it holds, it now falls back to its favorite consensus
  2421. method. Previously, it fell back to method 1. Neither of these is
  2422. likely to get enough signatures, but "fall back to favorite"
  2423. doesn't require us to maintain support an obsolete consensus
  2424. method. Implements part of proposal 215.
  2425. o Minor features (logging):
  2426. - On Unix-like systems, you can now use named pipes as the target of
  2427. the Log option, and other options that try to append to files.
  2428. Closes ticket 12061. Patch from "carlo von lynX".
  2429. - When opening a log file at startup, send it every log message that
  2430. we generated between startup and opening it. Previously, log
  2431. messages that were generated before opening the log file were only
  2432. logged to stdout. Closes ticket 6938.
  2433. - Add a TruncateLogFile option to overwrite logs instead of
  2434. appending to them. Closes ticket 5583.
  2435. o Minor features (portability, Solaris):
  2436. - Threads are no longer disabled by default on Solaris; we believe
  2437. that the versions of Solaris with broken threading support are all
  2438. obsolete by now. Resolves ticket 9495.
  2439. o Minor features (relay):
  2440. - Re-check our address after we detect a changed IP address from
  2441. getsockname(). This ensures that the controller command "GETINFO
  2442. address" will report the correct value. Resolves ticket 11582.
  2443. Patch from "ra".
  2444. - A new AccountingRule option lets Relays set whether they'd like
  2445. AccountingMax to be applied separately to inbound and outbound
  2446. traffic, or applied to the sum of inbound and outbound traffic.
  2447. Resolves ticket 961. Patch by "chobe".
  2448. o Minor features (testing networks):
  2449. - Add the TestingDirAuthVoteExit option, which lists nodes to assign
  2450. the "Exit" flag regardless of their uptime, bandwidth, or exit
  2451. policy. TestingTorNetwork must be set for this option to have any
  2452. effect. Previously, authorities would take up to 35 minutes to
  2453. give nodes the Exit flag in a test network. Partially implements
  2454. ticket 13161.
  2455. o Minor features (validation):
  2456. - Check all date/time values passed to tor_timegm and
  2457. parse_rfc1123_time for validity, taking leap years into account.
  2458. Improves HTTP header validation. Implemented with bug 13476.
  2459. - In correct_tm(), limit the range of values returned by system
  2460. localtime(_r) and gmtime(_r) to be between the years 1 and 8099.
  2461. This means we don't have to deal with negative or too large dates,
  2462. even if a clock is wrong. Otherwise we might fail to read a file
  2463. written by us which includes such a date. Fixes bug 13476.
  2464. o Minor bugfixes (bridge clients):
  2465. - When configured to use a bridge without an identity digest (not
  2466. recommended), avoid launching an extra channel to it when
  2467. bootstrapping. Fixes bug 7733; bugfix on 0.2.4.4-alpha.
  2468. o Minor bugfixes (bridges):
  2469. - When DisableNetwork is set, do not launch pluggable transport
  2470. plugins, and if any are running, terminate them. Fixes bug 13213;
  2471. bugfix on 0.2.3.6-alpha.
  2472. o Minor bugfixes (C correctness):
  2473. - Fix several instances of possible integer overflow/underflow/NaN.
  2474. Fixes bug 13104; bugfix on 0.2.3.1-alpha and later. Patches
  2475. from "teor".
  2476. - In circuit_build_times_calculate_timeout() in circuitstats.c,
  2477. avoid dividing by zero in the pareto calculations. This traps
  2478. under clang's "undefined-trap" sanitizer. Fixes bug 13290; bugfix
  2479. on 0.2.2.2-alpha.
  2480. - Fix an integer overflow in format_time_interval(). Fixes bug
  2481. 13393; bugfix on 0.2.0.10-alpha.
  2482. - Set the correct day of year value when the system's localtime(_r)
  2483. or gmtime(_r) functions fail to set struct tm. Not externally
  2484. visible. Fixes bug 13476; bugfix on 0.0.2pre14.
  2485. - Avoid unlikely signed integer overflow in tor_timegm on systems
  2486. with 32-bit time_t. Fixes bug 13476; bugfix on 0.0.2pre14.
  2487. o Minor bugfixes (client):
  2488. - Fix smartlist_choose_node_by_bandwidth() so that relays with the
  2489. BadExit flag are not considered worthy candidates. Fixes bug
  2490. 13066; bugfix on 0.1.2.3-alpha.
  2491. - Use the consensus schedule for downloading consensuses, and not
  2492. the generic schedule. Fixes bug 11679; bugfix on 0.2.2.6-alpha.
  2493. - Handle unsupported or malformed SOCKS5 requests properly by
  2494. responding with the appropriate error message before closing the
  2495. connection. Fixes bugs 12971 and 13314; bugfix on 0.0.2pre13.
  2496. o Minor bugfixes (client, torrc):
  2497. - Stop modifying the value of our DirReqStatistics torrc option just
  2498. because we're not a bridge or relay. This bug was causing Tor
  2499. Browser users to write "DirReqStatistics 0" in their torrc files
  2500. as if they had chosen to change the config. Fixes bug 4244; bugfix
  2501. on 0.2.3.1-alpha.
  2502. - When GeoIPExcludeUnknown is enabled, do not incorrectly decide
  2503. that our options have changed every time we SIGHUP. Fixes bug
  2504. 9801; bugfix on 0.2.4.10-alpha. Patch from "qwerty1".
  2505. o Minor bugfixes (controller):
  2506. - Return an error when the second or later arguments of the
  2507. "setevents" controller command are invalid events. Previously we
  2508. would return success while silently skipping invalid events. Fixes
  2509. bug 13205; bugfix on 0.2.3.2-alpha. Reported by "fpxnns".
  2510. o Minor bugfixes (directory system):
  2511. - Always believe that v3 directory authorities serve extra-info
  2512. documents, whether they advertise "caches-extra-info" or not.
  2513. Fixes part of bug 11683; bugfix on 0.2.0.1-alpha.
  2514. - When running as a v3 directory authority, advertise that you serve
  2515. extra-info documents so that clients who want them can find them
  2516. from you too. Fixes part of bug 11683; bugfix on 0.2.0.1-alpha.
  2517. - Check the BRIDGE_DIRINFO flag bitwise rather than using equality.
  2518. Previously, directories offering BRIDGE_DIRINFO and some other
  2519. flag (i.e. microdescriptors or extrainfo) would be ignored when
  2520. looking for bridges. Partially fixes bug 13163; bugfix
  2521. on 0.2.0.7-alpha.
  2522. o Minor bugfixes (networking):
  2523. - Check for orconns and use connection_or_close_for_error() rather
  2524. than connection_mark_for_close() directly in the getsockopt()
  2525. failure case of connection_handle_write_impl(). Fixes bug 11302;
  2526. bugfix on 0.2.4.4-alpha.
  2527. o Minor bugfixes (relay):
  2528. - When generating our family list, remove spaces from around the
  2529. entries. Fixes bug 12728; bugfix on 0.2.1.7-alpha.
  2530. - If our previous bandwidth estimate was 0 bytes, allow publishing a
  2531. new relay descriptor immediately. Fixes bug 13000; bugfix
  2532. on 0.1.1.6-alpha.
  2533. o Minor bugfixes (testing networks):
  2534. - Fix TestingDirAuthVoteGuard to properly give out Guard flags in a
  2535. testing network. Fixes bug 13064; bugfix on 0.2.5.2-alpha.
  2536. - Stop using the default authorities in networks which provide both
  2537. AlternateDirAuthority and AlternateBridgeAuthority. Partially
  2538. fixes bug 13163; bugfix on 0.2.0.13-alpha.
  2539. o Minor bugfixes (testing):
  2540. - Stop spawn test failures due to a race condition between the
  2541. SIGCHLD handler updating the process status, and the test reading
  2542. it. Fixes bug 13291; bugfix on 0.2.3.3-alpha.
  2543. o Minor bugfixes (testing, Windows):
  2544. - Avoid passing an extra backslash when creating a temporary
  2545. directory for running the unit tests on Windows. Fixes bug 12392;
  2546. bugfix on 0.2.2.25-alpha. Patch from Gisle Vanem.
  2547. o Minor bugfixes (windows):
  2548. - Remove code to special-case handling of NTE_BAD_KEYSET when
  2549. acquiring windows CryptoAPI context. This error can't actually
  2550. occur for the parameters we're providing. Fixes bug 10816; bugfix
  2551. on 0.0.2pre26.
  2552. o Minor bugfixes (zlib):
  2553. - Avoid truncating a zlib stream when trying to finalize it with an
  2554. empty output buffer. Fixes bug 11824; bugfix on 0.1.1.23.
  2555. o Build fixes:
  2556. - Allow our configure script to build correctly with autoconf 2.62
  2557. again. Fixes bug 12693; bugfix on 0.2.5.2-alpha.
  2558. - Improve the error message from ./configure to make it clear that
  2559. when asciidoc has not been found, the user will have to either add
  2560. --disable-asciidoc argument or install asciidoc. Resolves
  2561. ticket 13228.
  2562. o Code simplification and refactoring:
  2563. - Change the entry_is_live() function to take named bitfield
  2564. elements instead of an unnamed list of booleans. Closes
  2565. ticket 12202.
  2566. - Refactor and unit-test entry_is_time_to_retry() in entrynodes.c.
  2567. Resolves ticket 12205.
  2568. - Use calloc and reallocarray functions instead of multiply-
  2569. then-malloc. This makes it less likely for us to fall victim to an
  2570. integer overflow attack when allocating. Resolves ticket 12855.
  2571. - Use the standard macro name SIZE_MAX, instead of our
  2572. own SIZE_T_MAX.
  2573. - Document usage of the NO_DIRINFO and ALL_DIRINFO flags clearly in
  2574. functions which take them as arguments. Replace 0 with NO_DIRINFO
  2575. in a function call for clarity. Seeks to prevent future issues
  2576. like 13163.
  2577. - Avoid 4 null pointer errors under clang static analysis by using
  2578. tor_assert() to prove that the pointers aren't null. Fixes
  2579. bug 13284.
  2580. - Rework the API of policies_parse_exit_policy() to use a bitmask to
  2581. represent parsing options, instead of a confusing mess of
  2582. booleans. Resolves ticket 8197.
  2583. - Introduce a helper function to parse ExitPolicy in
  2584. or_options_t structure.
  2585. o Documentation:
  2586. - Add a doc/TUNING document with tips for handling large numbers of
  2587. TCP connections when running busy Tor relay. Update the warning
  2588. message to point to this file when running out of sockets
  2589. operating system is allowing to use simultaneously. Resolves
  2590. ticket 9708.
  2591. o Removed features:
  2592. - We no longer remind the user about configuration options that have
  2593. been obsolete since 0.2.3.x or earlier. Patch by Adrien Bak.
  2594. - Remove our old, non-weighted bandwidth-based node selection code.
  2595. Previously, we used it as a fallback when we couldn't perform
  2596. weighted bandwidth-based node selection. But that would only
  2597. happen in the cases where we had no consensus, or when we had a
  2598. consensus generated by buggy or ancient directory authorities. In
  2599. either case, it's better to use the more modern, better maintained
  2600. algorithm, with reasonable defaults for the weights. Closes
  2601. ticket 13126.
  2602. - Remove the --disable-curve25519 configure option. Relays and
  2603. clients now are required to support curve25519 and the
  2604. ntor handshake.
  2605. - The old "StrictEntryNodes" and "StrictExitNodes" options, which
  2606. used to be deprecated synonyms for "StrictNodes", are now marked
  2607. obsolete. Resolves ticket 12226.
  2608. - Clients don't understand the BadDirectory flag in the consensus
  2609. anymore, and ignore it.
  2610. o Testing:
  2611. - Refactor the function that chooses guard nodes so that it can more
  2612. easily be tested; write some tests for it.
  2613. - Fix and re-enable the fgets_eagain unit test. Fixes bug 12503;
  2614. bugfix on 0.2.3.1-alpha. Patch from "cypherpunks."
  2615. - Create unit tests for format_time_interval(). With bug 13393.
  2616. - Add unit tests for tor_timegm signed overflow, tor_timegm and
  2617. parse_rfc1123_time validity checks, correct_tm year clamping. Unit
  2618. tests (visible) fixes in bug 13476.
  2619. - Add a "coverage-html" make target to generate HTML-visualized
  2620. coverage results when building with --enable-coverage. (Requires
  2621. lcov.) Patch from Kevin Murray.
  2622. - Enable the backtrace handler (where supported) when running the
  2623. unit tests.
  2624. - Revise all unit tests that used the legacy test_* macros to
  2625. instead use the recommended tt_* macros. This patch was generated
  2626. with coccinelle, to avoid manual errors. Closes ticket 13119.
  2627. o Distribution (systemd):
  2628. - systemd unit file: only allow tor to write to /var/lib/tor and
  2629. /var/log/tor. The rest of the filesystem is accessible for reading
  2630. only. Patch by intrigeri; resolves ticket 12751.
  2631. - systemd unit file: ensure that the process and all its children
  2632. can never gain new privileges. Patch by intrigeri; resolves
  2633. ticket 12939.
  2634. - systemd unit file: set up /var/run/tor as writable for the Tor
  2635. service. Patch by intrigeri; resolves ticket 13196.
  2636. o Removed features (directory authorities):
  2637. - Remove code that prevented authorities from listing Tor relays
  2638. affected by CVE-2011-2769 as guards. These relays are already
  2639. rejected altogether due to the minimum version requirement of
  2640. 0.2.3.16-alpha. Closes ticket 13152.
  2641. - The "AuthDirRejectUnlisted" option no longer has any effect, as
  2642. the fingerprints file (approved-routers) has been deprecated.
  2643. - Directory authorities do not support being Naming dirauths anymore.
  2644. The "NamingAuthoritativeDir" config option is now obsolete.
  2645. - Directory authorities do not support giving out the BadDirectory
  2646. flag anymore.
  2647. - Directory authorities no longer advertise or support consensus
  2648. methods 1 through 12 inclusive. These consensus methods were
  2649. obsolete and/or insecure: maintaining the ability to support them
  2650. served no good purpose. Implements part of proposal 215; closes
  2651. ticket 10163.
  2652. o Testing (test-network.sh):
  2653. - Stop using "echo -n", as some shells' built-in echo doesn't
  2654. support "-n". Instead, use "/bin/echo -n". Partially fixes
  2655. bug 13161.
  2656. - Stop an apparent test-network hang when used with make -j2. Fixes
  2657. bug 13331.
  2658. - Add a --delay option to test-network.sh, which configures the
  2659. delay before the chutney network tests for data transmission.
  2660. Partially implements ticket 13161.
  2661. Changes in version 0.2.5.10 - 2014-10-24
  2662. Tor 0.2.5.10 is the first stable release in the 0.2.5 series.
  2663. It adds several new security features, including improved
  2664. denial-of-service resistance for relays, new compiler hardening
  2665. options, and a system-call sandbox for hardened installations on Linux
  2666. (requires seccomp2). The controller protocol has several new features,
  2667. resolving IPv6 addresses should work better than before, and relays
  2668. should be a little more CPU-efficient. We've added support for more
  2669. OpenBSD and FreeBSD transparent proxy types. We've improved the build
  2670. system and testing infrastructure to allow unit testing of more parts
  2671. of the Tor codebase. Finally, we've addressed several nagging pluggable
  2672. transport usability issues, and included numerous other small bugfixes
  2673. and features mentioned below.
  2674. This release marks end-of-life for Tor 0.2.3.x; those Tor versions
  2675. have accumulated many known flaws; everyone should upgrade.
  2676. o Deprecated versions:
  2677. - Tor 0.2.3.x has reached end-of-life; it has received no patches or
  2678. attention for some while.
  2679. Changes in version 0.2.5.9-rc - 2014-10-20
  2680. Tor 0.2.5.9-rc is the third release candidate for the Tor 0.2.5.x
  2681. series. It disables SSL3 in response to the recent "POODLE" attack
  2682. (even though POODLE does not affect Tor). It also works around a crash
  2683. bug caused by some operating systems' response to the "POODLE" attack
  2684. (which does affect Tor). It also contains a few miscellaneous fixes.
  2685. o Major security fixes:
  2686. - Disable support for SSLv3. All versions of OpenSSL in use with Tor
  2687. today support TLS 1.0 or later, so we can safely turn off support
  2688. for this old (and insecure) protocol. Fixes bug 13426.
  2689. o Major bugfixes (openssl bug workaround):
  2690. - Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
  2691. 1.0.1j, built with the 'no-ssl3' configuration option. Fixes bug
  2692. 13471. This is a workaround for an OpenSSL bug.
  2693. o Minor bugfixes:
  2694. - Disable the sandbox name resolver cache when running tor-resolve:
  2695. tor-resolve doesn't use the sandbox code, and turning it on was
  2696. breaking attempts to do tor-resolve on a non-default server on
  2697. Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
  2698. o Compilation fixes:
  2699. - Build and run correctly on systems like OpenBSD-current that have
  2700. patched OpenSSL to remove get_cipher_by_char and/or its
  2701. implementations. Fixes issue 13325.
  2702. o Downgraded warnings:
  2703. - Downgrade the severity of the 'unexpected sendme cell from client'
  2704. from 'warn' to 'protocol warning'. Closes ticket 8093.
  2705. Changes in version 0.2.4.25 - 2014-10-20
  2706. Tor 0.2.4.25 disables SSL3 in response to the recent "POODLE" attack
  2707. (even though POODLE does not affect Tor). It also works around a crash
  2708. bug caused by some operating systems' response to the "POODLE" attack
  2709. (which does affect Tor).
  2710. o Major security fixes (also in 0.2.5.9-rc):
  2711. - Disable support for SSLv3. All versions of OpenSSL in use with Tor
  2712. today support TLS 1.0 or later, so we can safely turn off support
  2713. for this old (and insecure) protocol. Fixes bug 13426.
  2714. o Major bugfixes (openssl bug workaround, also in 0.2.5.9-rc):
  2715. - Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
  2716. 1.0.1j, built with the 'no-ssl3' configuration option. Fixes bug
  2717. 13471. This is a workaround for an OpenSSL bug.
  2718. Changes in version 0.2.5.8-rc - 2014-09-22
  2719. Tor 0.2.5.8-rc is the second release candidate for the Tor 0.2.5.x
  2720. series. It fixes a bug that affects consistency and speed when
  2721. connecting to hidden services, and it updates the location of one of
  2722. the directory authorities.
  2723. o Major bugfixes:
  2724. - Clients now send the correct address for their chosen rendezvous
  2725. point when trying to access a hidden service. They used to send
  2726. the wrong address, which would still work some of the time because
  2727. they also sent the identity digest of the rendezvous point, and if
  2728. the hidden service happened to try connecting to the rendezvous
  2729. point from a relay that already had a connection open to it,
  2730. the relay would reuse that connection. Now connections to hidden
  2731. services should be more robust and faster. Also, this bug meant
  2732. that clients were leaking to the hidden service whether they were
  2733. on a little-endian (common) or big-endian (rare) system, which for
  2734. some users might have reduced their anonymity. Fixes bug 13151;
  2735. bugfix on 0.2.1.5-alpha.
  2736. o Directory authority changes:
  2737. - Change IP address for gabelmoo (v3 directory authority).
  2738. Changes in version 0.2.4.24 - 2014-09-22
  2739. Tor 0.2.4.24 fixes a bug that affects consistency and speed when
  2740. connecting to hidden services, and it updates the location of one of
  2741. the directory authorities.
  2742. o Major bugfixes:
  2743. - Clients now send the correct address for their chosen rendezvous
  2744. point when trying to access a hidden service. They used to send
  2745. the wrong address, which would still work some of the time because
  2746. they also sent the identity digest of the rendezvous point, and if
  2747. the hidden service happened to try connecting to the rendezvous
  2748. point from a relay that already had a connection open to it,
  2749. the relay would reuse that connection. Now connections to hidden
  2750. services should be more robust and faster. Also, this bug meant
  2751. that clients were leaking to the hidden service whether they were
  2752. on a little-endian (common) or big-endian (rare) system, which for
  2753. some users might have reduced their anonymity. Fixes bug 13151;
  2754. bugfix on 0.2.1.5-alpha.
  2755. o Directory authority changes:
  2756. - Change IP address for gabelmoo (v3 directory authority).
  2757. o Minor features (geoip):
  2758. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2
  2759. Country database.
  2760. Changes in version 0.2.5.7-rc - 2014-09-11
  2761. Tor 0.2.5.7-rc fixes several regressions from earlier in the 0.2.5.x
  2762. release series, and some long-standing bugs related to ORPort reachability
  2763. testing and failure to send CREATE cells. It is the first release
  2764. candidate for the Tor 0.2.5.x series.
  2765. o Major bugfixes (client, startup):
  2766. - Start making circuits as soon as DisabledNetwork is turned off.
  2767. When Tor started with DisabledNetwork set, it would correctly
  2768. conclude that it shouldn't build circuits, but it would mistakenly
  2769. cache this conclusion, and continue believing it even when
  2770. DisableNetwork is set to 0. Fixes the bug introduced by the fix
  2771. for bug 11200; bugfix on 0.2.5.4-alpha.
  2772. - Resume expanding abbreviations for command-line options. The fix
  2773. for bug 4647 accidentally removed our hack from bug 586 that
  2774. rewrote HashedControlPassword to __HashedControlSessionPassword
  2775. when it appears on the commandline (which allowed the user to set
  2776. her own HashedControlPassword in the torrc file while the
  2777. controller generates a fresh session password for each run). Fixes
  2778. bug 12948; bugfix on 0.2.5.1-alpha.
  2779. - Warn about attempts to run hidden services and relays in the same
  2780. process: that's probably not a good idea. Closes ticket 12908.
  2781. o Major bugfixes (relay):
  2782. - Avoid queuing or sending destroy cells for circuit ID zero when we
  2783. fail to send a CREATE cell. Fixes bug 12848; bugfix on 0.0.8pre1.
  2784. Found and fixed by "cypherpunks".
  2785. - Fix ORPort reachability detection on relays running behind a
  2786. proxy, by correctly updating the "local" mark on the controlling
  2787. channel when changing the address of an or_connection_t after the
  2788. handshake. Fixes bug 12160; bugfix on 0.2.4.4-alpha.
  2789. o Minor features (bridge):
  2790. - Add an ExtORPortCookieAuthFileGroupReadable option to make the
  2791. cookie file for the ExtORPort g+r by default.
  2792. o Minor features (geoip):
  2793. - Update geoip and geoip6 to the August 7 2014 Maxmind GeoLite2
  2794. Country database.
  2795. o Minor bugfixes (logging):
  2796. - Reduce the log severity of the "Pluggable transport proxy does not
  2797. provide any needed transports and will not be launched." message,
  2798. since Tor Browser includes several ClientTransportPlugin lines in
  2799. its torrc-defaults file, leading every Tor Browser user who looks
  2800. at her logs to see these notices and wonder if they're dangerous.
  2801. Resolves bug 13124; bugfix on 0.2.5.3-alpha.
  2802. - Downgrade "Unexpected onionskin length after decryption" warning
  2803. to a protocol-warn, since there's nothing relay operators can do
  2804. about a client that sends them a malformed create cell. Resolves
  2805. bug 12996; bugfix on 0.0.6rc1.
  2806. - Log more specific warnings when we get an ESTABLISH_RENDEZVOUS
  2807. cell on a cannibalized or non-OR circuit. Resolves ticket 12997.
  2808. - When logging information about an EXTEND2 or EXTENDED2 cell, log
  2809. their names correctly. Fixes part of bug 12700; bugfix
  2810. on 0.2.4.8-alpha.
  2811. - When logging information about a relay cell whose command we don't
  2812. recognize, log its command as an integer. Fixes part of bug 12700;
  2813. bugfix on 0.2.1.10-alpha.
  2814. - Escape all strings from the directory connection before logging
  2815. them. Fixes bug 13071; bugfix on 0.1.1.15. Patch from "teor".
  2816. o Minor bugfixes (controller):
  2817. - Restore the functionality of CookieAuthFileGroupReadable. Fixes
  2818. bug 12864; bugfix on 0.2.5.1-alpha.
  2819. - Actually send TRANSPORT_LAUNCHED and HS_DESC events to
  2820. controllers. Fixes bug 13085; bugfix on 0.2.5.1-alpha. Patch
  2821. by "teor".
  2822. o Minor bugfixes (compilation):
  2823. - Fix compilation of test.h with MSVC. Patch from Gisle Vanem;
  2824. bugfix on 0.2.5.5-alpha.
  2825. - Make the nmake make files work again. Fixes bug 13081. Bugfix on
  2826. 0.2.5.1-alpha. Patch from "NewEraCracker".
  2827. - In routerlist_assert_ok(), don't take the address of a
  2828. routerinfo's cache_info member unless that routerinfo is non-NULL.
  2829. Fixes bug 13096; bugfix on 0.1.1.9-alpha. Patch by "teor".
  2830. - Fix a large number of false positive warnings from the clang
  2831. analyzer static analysis tool. This should make real warnings
  2832. easier for clang analyzer to find. Patch from "teor". Closes
  2833. ticket 13036.
  2834. o Distribution (systemd):
  2835. - Verify configuration file via ExecStartPre in the systemd unit
  2836. file. Patch from intrigeri; resolves ticket 12730.
  2837. - Explicitly disable RunAsDaemon in the systemd unit file. Our
  2838. current systemd unit uses "Type = simple", so systemd does not
  2839. expect tor to fork. If the user has "RunAsDaemon 1" in their
  2840. torrc, then things won't work as expected. This is e.g. the case
  2841. on Debian (and derivatives), since there we pass "--defaults-torrc
  2842. /usr/share/tor/tor-service-defaults-torrc" (that contains
  2843. "RunAsDaemon 1") by default. Patch by intrigeri; resolves
  2844. ticket 12731.
  2845. o Documentation:
  2846. - Adjust the URLs in the README to refer to the new locations of
  2847. several documents on the website. Fixes bug 12830. Patch from
  2848. Matt Pagan.
  2849. - Document 'reject6' and 'accept6' ExitPolicy entries. Resolves
  2850. ticket 12878.
  2851. Changes in version 0.2.5.6-alpha - 2014-07-28
  2852. Tor 0.2.5.6-alpha brings us a big step closer to slowing down the
  2853. risk from guard rotation, and fixes a variety of other issues to get
  2854. us closer to a release candidate.
  2855. o Major features (also in 0.2.4.23):
  2856. - Make the number of entry guards configurable via a new
  2857. NumEntryGuards consensus parameter, and the number of directory
  2858. guards configurable via a new NumDirectoryGuards consensus
  2859. parameter. Implements ticket 12688.
  2860. o Major bugfixes (also in 0.2.4.23):
  2861. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
  2862. implementation that caused incorrect results on 32-bit
  2863. implementations when certain malformed inputs were used along with
  2864. a small class of private ntor keys. This bug does not currently
  2865. appear to allow an attacker to learn private keys or impersonate a
  2866. Tor server, but it could provide a means to distinguish 32-bit Tor
  2867. implementations from 64-bit Tor implementations. Fixes bug 12694;
  2868. bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
  2869. Adam Langley.
  2870. o Major bugfixes:
  2871. - Perform circuit cleanup operations even when circuit
  2872. construction operations are disabled (because the network is
  2873. disabled, or because there isn't enough directory information).
  2874. Previously, when we were not building predictive circuits, we
  2875. were not closing expired circuits either. Fixes bug 8387; bugfix on
  2876. 0.1.1.11-alpha. This bug became visible in 0.2.4.10-alpha when we
  2877. became more strict about when we have "enough directory information
  2878. to build circuits".
  2879. o Minor features:
  2880. - Authorities now assign the Guard flag to the fastest 25% of the
  2881. network (it used to be the fastest 50%). Also raise the consensus
  2882. weight that guarantees the Guard flag from 250 to 2000. For the
  2883. current network, this results in about 1100 guards, down from 2500.
  2884. This step paves the way for moving the number of entry guards
  2885. down to 1 (proposal 236) while still providing reasonable expected
  2886. performance for most users. Implements ticket 12690.
  2887. - Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
  2888. Country database.
  2889. - Slightly enhance the diagnostic message for bug 12184.
  2890. o Minor bugfixes (also in 0.2.4.23):
  2891. - Warn and drop the circuit if we receive an inbound 'relay early'
  2892. cell. Those used to be normal to receive on hidden service circuits
  2893. due to bug 1038, but the buggy Tor versions are long gone from
  2894. the network so we can afford to resume watching for them. Resolves
  2895. the rest of bug 1038; bugfix on 0.2.1.19.
  2896. - Correct a confusing error message when trying to extend a circuit
  2897. via the control protocol but we don't know a descriptor or
  2898. microdescriptor for one of the specified relays. Fixes bug 12718;
  2899. bugfix on 0.2.3.1-alpha.
  2900. o Minor bugfixes:
  2901. - Fix compilation when building with bufferevents enabled. (This
  2902. configuration is still not expected to work, however.)
  2903. Fixes bugs 12438, 12474, 11578; bugfixes on 0.2.5.1-alpha and
  2904. 0.2.5.3-alpha. Patches from Anthony G. Basile and Sathyanarayanan
  2905. Gunasekaran.
  2906. - Compile correctly with builds and forks of OpenSSL (such as
  2907. LibreSSL) that disable compression. Fixes bug 12602; bugfix on
  2908. 0.2.1.1-alpha. Patch from "dhill".
  2909. Changes in version 0.2.4.23 - 2014-07-28
  2910. Tor 0.2.4.23 brings us a big step closer to slowing down the risk from
  2911. guard rotation, and also backports several important fixes from the
  2912. Tor 0.2.5 alpha release series.
  2913. o Major features:
  2914. - Clients now look at the "usecreatefast" consensus parameter to
  2915. decide whether to use CREATE_FAST or CREATE cells for the first hop
  2916. of their circuit. This approach can improve security on connections
  2917. where Tor's circuit handshake is stronger than the available TLS
  2918. connection security levels, but the tradeoff is more computational
  2919. load on guard relays. Implements proposal 221. Resolves ticket 9386.
  2920. - Make the number of entry guards configurable via a new
  2921. NumEntryGuards consensus parameter, and the number of directory
  2922. guards configurable via a new NumDirectoryGuards consensus
  2923. parameter. Implements ticket 12688.
  2924. o Major bugfixes:
  2925. - Fix a bug in the bounds-checking in the 32-bit curve25519-donna
  2926. implementation that caused incorrect results on 32-bit
  2927. implementations when certain malformed inputs were used along with
  2928. a small class of private ntor keys. This bug does not currently
  2929. appear to allow an attacker to learn private keys or impersonate a
  2930. Tor server, but it could provide a means to distinguish 32-bit Tor
  2931. implementations from 64-bit Tor implementations. Fixes bug 12694;
  2932. bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
  2933. Adam Langley.
  2934. o Minor bugfixes:
  2935. - Warn and drop the circuit if we receive an inbound 'relay early'
  2936. cell. Those used to be normal to receive on hidden service circuits
  2937. due to bug 1038, but the buggy Tor versions are long gone from
  2938. the network so we can afford to resume watching for them. Resolves
  2939. the rest of bug 1038; bugfix on 0.2.1.19.
  2940. - Correct a confusing error message when trying to extend a circuit
  2941. via the control protocol but we don't know a descriptor or
  2942. microdescriptor for one of the specified relays. Fixes bug 12718;
  2943. bugfix on 0.2.3.1-alpha.
  2944. - Avoid an illegal read from stack when initializing the TLS
  2945. module using a version of OpenSSL without all of the ciphers
  2946. used by the v2 link handshake. Fixes bug 12227; bugfix on
  2947. 0.2.4.8-alpha. Found by "starlight".
  2948. o Minor features:
  2949. - Update geoip and geoip6 to the July 10 2014 Maxmind GeoLite2
  2950. Country database.
  2951. Changes in version 0.2.5.5-alpha - 2014-06-18
  2952. Tor 0.2.5.5-alpha fixes a wide variety of remaining issues in the Tor
  2953. 0.2.5.x release series, including a couple of DoS issues, some
  2954. performance regressions, a large number of bugs affecting the Linux
  2955. seccomp2 sandbox code, and various other bugfixes. It also adds
  2956. diagnostic bugfixes for a few tricky issues that we're trying to
  2957. track down.
  2958. o Major features (security, traffic analysis resistance):
  2959. - Several major improvements to the algorithm used to decide when to
  2960. close TLS connections. Previous versions of Tor closed connections
  2961. at a fixed interval after the last time a non-padding cell was
  2962. sent over the connection, regardless of the target of the
  2963. connection. Now, we randomize the intervals by adding up to 50% of
  2964. their base value, we measure the length of time since connection
  2965. last had at least one circuit, and we allow connections to known
  2966. ORs to remain open a little longer (15 minutes instead of 3
  2967. minutes minimum). These changes should improve Tor's resistance
  2968. against some kinds of traffic analysis, and lower some overhead
  2969. from needlessly closed connections. Fixes ticket 6799.
  2970. Incidentally fixes ticket 12023; bugfix on 0.2.5.1-alpha.
  2971. o Major bugfixes (security, OOM, new since 0.2.5.4-alpha, also in 0.2.4.22):
  2972. - Fix a memory leak that could occur if a microdescriptor parse
  2973. fails during the tokenizing step. This bug could enable a memory
  2974. exhaustion attack by directory servers. Fixes bug 11649; bugfix
  2975. on 0.2.2.6-alpha.
  2976. o Major bugfixes (security, directory authorities):
  2977. - Directory authorities now include a digest of each relay's
  2978. identity key as a part of its microdescriptor.
  2979. This is a workaround for bug 11743 (reported by "cypherpunks"),
  2980. where Tor clients do not support receiving multiple
  2981. microdescriptors with the same SHA256 digest in the same
  2982. consensus. When clients receive a consensus like this, they only
  2983. use one of the relays. Without this fix, a hostile relay could
  2984. selectively disable some client use of target relays by
  2985. constructing a router descriptor with a different identity and the
  2986. same microdescriptor parameters and getting the authorities to
  2987. list it in a microdescriptor consensus. This fix prevents an
  2988. attacker from causing a microdescriptor collision, because the
  2989. router's identity is not forgeable.
  2990. o Major bugfixes (relay):
  2991. - Use a direct dirport connection when uploading non-anonymous
  2992. descriptors to the directory authorities. Previously, relays would
  2993. incorrectly use tunnel connections under a fairly wide variety of
  2994. circumstances. Fixes bug 11469; bugfix on 0.2.4.3-alpha.
  2995. - When a circuit accidentally has the same circuit ID for its
  2996. forward and reverse direction, correctly detect the direction of
  2997. cells using that circuit. Previously, this bug made roughly one
  2998. circuit in a million non-functional. Fixes bug 12195; this is a
  2999. bugfix on every version of Tor.
  3000. o Major bugfixes (client, pluggable transports):
  3001. - When managing pluggable transports, use OS notification facilities
  3002. to learn if they have crashed, and don't attempt to kill any
  3003. process that has already exited. Fixes bug 8746; bugfix
  3004. on 0.2.3.6-alpha.
  3005. o Minor features (diagnostic):
  3006. - When logging a warning because of bug 7164, additionally check the
  3007. hash table for consistency (as proposed on ticket 11737). This may
  3008. help diagnose bug 7164.
  3009. - When we log a heartbeat, log how many one-hop circuits we have
  3010. that are at least 30 minutes old, and log status information about
  3011. a few of them. This is an attempt to track down bug 8387.
  3012. - When encountering an unexpected CR while writing text to a file on
  3013. Windows, log the name of the file. Should help diagnosing
  3014. bug 11233.
  3015. - Give more specific warnings when a client notices that an onion
  3016. handshake has failed. Fixes ticket 9635.
  3017. - Add significant new logging code to attempt to diagnose bug 12184,
  3018. where relays seem to run out of available circuit IDs.
  3019. - Improve the diagnostic log message for bug 8387 even further to
  3020. try to improve our odds of figuring out why one-hop directory
  3021. circuits sometimes do not get closed.
  3022. o Minor features (security, memory management):
  3023. - Memory allocation tricks (mempools and buffer freelists) are now
  3024. disabled by default. You can turn them back on with
  3025. --enable-mempools and --enable-buf-freelists respectively. We're
  3026. disabling these features because malloc performance is good enough
  3027. on most platforms, and a similar feature in OpenSSL exacerbated
  3028. exploitation of the Heartbleed attack. Resolves ticket 11476.
  3029. o Minor features (security):
  3030. - Apply the secure SipHash-2-4 function to the hash table mapping
  3031. circuit IDs and channels to circuits. We missed this one when we
  3032. were converting all the other hash functions to use SipHash back
  3033. in 0.2.5.3-alpha. Resolves ticket 11750.
  3034. o Minor features (build):
  3035. - The configure script has a --disable-seccomp option to turn off
  3036. support for libseccomp on systems that have it, in case it (or
  3037. Tor's use of it) is broken. Resolves ticket 11628.
  3038. o Minor features (other):
  3039. - Update geoip and geoip6 to the June 4 2014 Maxmind GeoLite2
  3040. Country database.
  3041. o Minor bugfixes (security, new since 0.2.5.4-alpha, also in 0.2.4.22):
  3042. - When running a hidden service, do not allow TunneledDirConns 0;
  3043. this will keep the hidden service from running, and also
  3044. make it publish its descriptors directly over HTTP. Fixes bug 10849;
  3045. bugfix on 0.2.1.1-alpha.
  3046. o Minor bugfixes (performance):
  3047. - Avoid a bug where every successful connection made us recompute
  3048. the flag telling us whether we have sufficient information to
  3049. build circuits. Previously, we would forget our cached value
  3050. whenever we successfully opened a channel (or marked a router as
  3051. running or not running for any other reason), regardless of
  3052. whether we had previously believed the router to be running. This
  3053. forced us to run an expensive update operation far too often.
  3054. Fixes bug 12170; bugfix on 0.1.2.1-alpha.
  3055. - Avoid using tor_memeq() for checking relay cell integrity. This
  3056. removes a possible performance bottleneck. Fixes part of bug
  3057. 12169; bugfix on 0.2.1.31.
  3058. o Minor bugfixes (compilation):
  3059. - Fix compilation of test_status.c when building with MVSC. Bugfix
  3060. on 0.2.5.4-alpha. Patch from Gisle Vanem.
  3061. - Resolve GCC complaints on OpenBSD about discarding constness in
  3062. TO_{ORIGIN,OR}_CIRCUIT functions. Fixes part of bug 11633; bugfix
  3063. on 0.1.1.23. Patch from Dana Koch.
  3064. - Resolve clang complaints on OpenBSD with -Wshorten-64-to-32 due to
  3065. treatment of long and time_t as comparable types. Fixes part of
  3066. bug 11633. Patch from Dana Koch.
  3067. - Make Tor compile correctly with --disable-buf-freelists. Fixes bug
  3068. 11623; bugfix on 0.2.5.3-alpha.
  3069. - When deciding whether to build the 64-bit curve25519
  3070. implementation, detect platforms where we can compile 128-bit
  3071. arithmetic but cannot link it. Fixes bug 11729; bugfix on
  3072. 0.2.4.8-alpha. Patch from "conradev".
  3073. - Fix compilation when DNS_CACHE_DEBUG is enabled. Fixes bug 11761;
  3074. bugfix on 0.2.3.13-alpha. Found by "cypherpunks".
  3075. - Fix compilation with dmalloc. Fixes bug 11605; bugfix
  3076. on 0.2.4.10-alpha.
  3077. o Minor bugfixes (Directory server):
  3078. - When sending a compressed set of descriptors or microdescriptors,
  3079. make sure to finalize the zlib stream. Previously, we would write
  3080. all the compressed data, but if the last descriptor we wanted to
  3081. send was missing or too old, we would not mark the stream as
  3082. finished. This caused problems for decompression tools. Fixes bug
  3083. 11648; bugfix on 0.1.1.23.
  3084. o Minor bugfixes (Linux seccomp sandbox):
  3085. - Make the seccomp sandbox code compile under ARM Linux. Fixes bug
  3086. 11622; bugfix on 0.2.5.1-alpha.
  3087. - Avoid crashing when re-opening listener ports with the seccomp
  3088. sandbox active. Fixes bug 12115; bugfix on 0.2.5.1-alpha.
  3089. - Avoid crashing with the seccomp sandbox enabled along with
  3090. ConstrainedSockets. Fixes bug 12139; bugfix on 0.2.5.1-alpha.
  3091. - When we receive a SIGHUP with the sandbox enabled, correctly
  3092. support rotating our log files. Fixes bug 12032; bugfix
  3093. on 0.2.5.1-alpha.
  3094. - Avoid crash when running with sandboxing enabled and
  3095. DirReqStatistics not disabled. Fixes bug 12035; bugfix
  3096. on 0.2.5.1-alpha.
  3097. - Fix a "BUG" warning when trying to write bridge-stats files with
  3098. the Linux syscall sandbox filter enabled. Fixes bug 12041; bugfix
  3099. on 0.2.5.1-alpha.
  3100. - Prevent the sandbox from crashing on startup when run with the
  3101. --enable-expensive-hardening configuration option. Fixes bug
  3102. 11477; bugfix on 0.2.5.4-alpha.
  3103. - When running with DirPortFrontPage and sandboxing both enabled,
  3104. reload the DirPortFrontPage correctly when restarting. Fixes bug
  3105. 12028; bugfix on 0.2.5.1-alpha.
  3106. - Don't try to enable the sandbox when using the Tor binary to check
  3107. its configuration, hash a passphrase, or so on. Doing so was
  3108. crashing on startup for some users. Fixes bug 11609; bugfix
  3109. on 0.2.5.1-alpha.
  3110. - Avoid warnings when running with sandboxing and node statistics
  3111. enabled at the same time. Fixes part of 12064; bugfix on
  3112. 0.2.5.1-alpha. Patch from Michael Wolf.
  3113. - Avoid warnings when running with sandboxing enabled at the same
  3114. time as cookie authentication, hidden services, or directory
  3115. authority voting. Fixes part of 12064; bugfix on 0.2.5.1-alpha.
  3116. - Do not allow options that require calls to exec to be enabled
  3117. alongside the seccomp2 sandbox: they will inevitably crash. Fixes
  3118. bug 12043; bugfix on 0.2.5.1-alpha.
  3119. - Handle failures in getpwnam()/getpwuid() when running with the
  3120. User option set and the Linux syscall sandbox enabled. Fixes bug
  3121. 11946; bugfix on 0.2.5.1-alpha.
  3122. - Refactor the getaddrinfo workaround that the seccomp sandbox uses
  3123. to avoid calling getaddrinfo() after installing the sandbox
  3124. filters. Previously, it preloaded a cache with the IPv4 address
  3125. for our hostname, and nothing else. Now, it loads the cache with
  3126. every address that it used to initialize the Tor process. Fixes
  3127. bug 11970; bugfix on 0.2.5.1-alpha.
  3128. o Minor bugfixes (pluggable transports):
  3129. - Enable the ExtORPortCookieAuthFile option, to allow changing the
  3130. default location of the authentication token for the extended OR
  3131. Port as used by sever-side pluggable transports. We had
  3132. implemented this option before, but the code to make it settable
  3133. had been omitted. Fixes bug 11635; bugfix on 0.2.5.1-alpha.
  3134. - Avoid another 60-second delay when starting Tor in a pluggable-
  3135. transport-using configuration when we already have cached
  3136. descriptors for our bridges. Fixes bug 11965; bugfix
  3137. on 0.2.3.6-alpha.
  3138. o Minor bugfixes (client):
  3139. - Avoid "Tried to open a socket with DisableNetwork set" warnings
  3140. when starting a client with bridges configured and DisableNetwork
  3141. set. (Tor launcher starts Tor with DisableNetwork set the first
  3142. time it runs.) Fixes bug 10405; bugfix on 0.2.3.9-alpha.
  3143. o Minor bugfixes (testing):
  3144. - The Python parts of the test scripts now work on Python 3 as well
  3145. as Python 2, so systems where '/usr/bin/python' is Python 3 will
  3146. no longer have the tests break. Fixes bug 11608; bugfix
  3147. on 0.2.5.2-alpha.
  3148. - When looking for versions of python that we could run the tests
  3149. with, check for "python2.7" and "python3.3"; previously we were
  3150. only looking for "python", "python2", and "python3". Patch from
  3151. Dana Koch. Fixes bug 11632; bugfix on 0.2.5.2-alpha.
  3152. - Fix all valgrind warnings produced by the unit tests. There were
  3153. over a thousand memory leak warnings previously, mostly produced
  3154. by forgetting to free things in the unit test code. Fixes bug
  3155. 11618, bugfixes on many versions of Tor.
  3156. o Minor bugfixes (tor-fw-helper):
  3157. - Give a correct log message when tor-fw-helper fails to launch.
  3158. (Previously, we would say something like "tor-fw-helper sent us a
  3159. string we could not parse".) Fixes bug 9781; bugfix
  3160. on 0.2.4.2-alpha.
  3161. o Minor bugfixes (relay, threading):
  3162. - Check return code on spawn_func() in cpuworker code, so that we
  3163. don't think we've spawned a nonworking cpuworker and write junk to
  3164. it forever. Fix related to bug 4345; bugfix on all released Tor
  3165. versions. Found by "skruffy".
  3166. - Use a pthread_attr to make sure that spawn_func() cannot return an
  3167. error while at the same time launching a thread. Fix related to
  3168. bug 4345; bugfix on all released Tor versions. Reported
  3169. by "cypherpunks".
  3170. o Minor bugfixes (relay, oom prevention):
  3171. - Correctly detect the total available system memory. We tried to do
  3172. this in 0.2.5.4-alpha, but the code was set up to always return an
  3173. error value, even on success. Fixes bug 11805; bugfix
  3174. on 0.2.5.4-alpha.
  3175. o Minor bugfixes (relay, other):
  3176. - We now drop CREATE cells for already-existent circuit IDs and for
  3177. zero-valued circuit IDs, regardless of other factors that might
  3178. otherwise have called for DESTROY cells. Fixes bug 12191; bugfix
  3179. on 0.0.8pre1.
  3180. - Avoid an illegal read from stack when initializing the TLS module
  3181. using a version of OpenSSL without all of the ciphers used by the
  3182. v2 link handshake. Fixes bug 12227; bugfix on 0.2.4.8-alpha. Found
  3183. by "starlight".
  3184. - When rejecting DATA cells for stream_id zero, still count them
  3185. against the circuit's deliver window so that we don't fail to send
  3186. a SENDME. Fixes bug 11246; bugfix on 0.2.4.10-alpha.
  3187. o Minor bugfixes (logging):
  3188. - Fix a misformatted log message about delayed directory fetches.
  3189. Fixes bug 11654; bugfix on 0.2.5.3-alpha.
  3190. - Squelch a spurious LD_BUG message "No origin circuit for
  3191. successful SOCKS stream" in certain hidden service failure cases;
  3192. fixes bug 10616.
  3193. o Distribution:
  3194. - Include a tor.service file in contrib/dist for use with systemd.
  3195. Some distributions will be able to use this file unmodified;
  3196. others will need to tweak it, or write their own. Patch from Jamie
  3197. Nguyen; resolves ticket 8368.
  3198. o Documentation:
  3199. - Clean up several option names in the manpage to match their real
  3200. names, add the missing documentation for a couple of testing and
  3201. directory authority options, remove the documentation for a
  3202. V2-directory fetching option that no longer exists. Resolves
  3203. ticket 11634.
  3204. - Correct the documenation so that it lists the correct directory
  3205. for the stats files. (They are in a subdirectory called "stats",
  3206. not "status".)
  3207. - In the manpage, move more authority-only options into the
  3208. directory authority section so that operators of regular directory
  3209. caches don't get confused.
  3210. o Package cleanup:
  3211. - The contrib directory has been sorted and tidied. Before, it was
  3212. an unsorted dumping ground for useful and not-so-useful things.
  3213. Now, it is divided based on functionality, and the items which
  3214. seemed to be nonfunctional or useless have been removed. Resolves
  3215. ticket 8966; based on patches from "rl1987".
  3216. o Removed code:
  3217. - Remove /tor/dbg-stability.txt URL that was meant to help debug WFU
  3218. and MTBF calculations, but that nobody was using. Fixes ticket 11742.
  3219. - The TunnelDirConns and PreferTunnelledDirConns options no longer
  3220. exist; tunneled directory connections have been available since
  3221. 0.1.2.5-alpha, and turning them off is not a good idea. This is a
  3222. brute-force fix for 10849, where "TunnelDirConns 0" would break
  3223. hidden services.
  3224. Changes in version 0.2.4.22 - 2014-05-16
  3225. Tor 0.2.4.22 backports numerous high-priority fixes from the Tor 0.2.5
  3226. alpha release series. These include blocking all authority signing
  3227. keys that may have been affected by the OpenSSL "heartbleed" bug,
  3228. choosing a far more secure set of TLS ciphersuites by default, closing
  3229. a couple of memory leaks that could be used to run a target relay out
  3230. of RAM, and several others.
  3231. o Major features (security, backport from 0.2.5.4-alpha):
  3232. - Block authority signing keys that were used on authorities
  3233. vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). (We
  3234. don't have any evidence that these keys _were_ compromised; we're
  3235. doing this to be prudent.) Resolves ticket 11464.
  3236. o Major bugfixes (security, OOM):
  3237. - Fix a memory leak that could occur if a microdescriptor parse
  3238. fails during the tokenizing step. This bug could enable a memory
  3239. exhaustion attack by directory servers. Fixes bug 11649; bugfix
  3240. on 0.2.2.6-alpha.
  3241. o Major bugfixes (TLS cipher selection, backport from 0.2.5.4-alpha):
  3242. - The relay ciphersuite list is now generated automatically based on
  3243. uniform criteria, and includes all OpenSSL ciphersuites with
  3244. acceptable strength and forward secrecy. Previously, we had left
  3245. some perfectly fine ciphersuites unsupported due to omission or
  3246. typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
  3247. 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
  3248. - Relays now trust themselves to have a better view than clients of
  3249. which TLS ciphersuites are better than others. (Thanks to bug
  3250. 11513, the relay list is now well-considered, whereas the client
  3251. list has been chosen mainly for anti-fingerprinting purposes.)
  3252. Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
  3253. CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
  3254. AES128. Resolves ticket 11528.
  3255. - Clients now try to advertise the same list of ciphersuites as
  3256. Firefox 28. This change enables selection of (fast) GCM
  3257. ciphersuites, disables some strange old ciphers, and stops
  3258. advertising the ECDH (not to be confused with ECDHE) ciphersuites.
  3259. Resolves ticket 11438.
  3260. o Minor bugfixes (configuration, security):
  3261. - When running a hidden service, do not allow TunneledDirConns 0:
  3262. trying to set that option together with a hidden service would
  3263. otherwise prevent the hidden service from running, and also make
  3264. it publish its descriptors directly over HTTP. Fixes bug 10849;
  3265. bugfix on 0.2.1.1-alpha.
  3266. o Minor bugfixes (controller, backport from 0.2.5.4-alpha):
  3267. - Avoid sending a garbage value to the controller when a circuit is
  3268. cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.
  3269. o Minor bugfixes (exit relay, backport from 0.2.5.4-alpha):
  3270. - Stop leaking memory when we successfully resolve a PTR record.
  3271. Fixes bug 11437; bugfix on 0.2.4.7-alpha.
  3272. o Minor bugfixes (bridge client, backport from 0.2.5.4-alpha):
  3273. - Avoid 60-second delays in the bootstrapping process when Tor is
  3274. launching for a second time while using bridges. Fixes bug 9229;
  3275. bugfix on 0.2.0.3-alpha.
  3276. o Minor bugfixes (relays and bridges, backport from 0.2.5.4-alpha):
  3277. - Give the correct URL in the warning message when trying to run a
  3278. relay on an ancient version of Windows. Fixes bug 9393.
  3279. o Minor bugfixes (compilation):
  3280. - Fix a compilation error when compiling with --disable-curve25519.
  3281. Fixes bug 9700; bugfix on 0.2.4.17-rc.
  3282. o Minor bugfixes:
  3283. - Downgrade the warning severity for the the "md was still
  3284. referenced 1 node(s)" warning. Tor 0.2.5.4-alpha has better code
  3285. for trying to diagnose this bug, and the current warning in
  3286. earlier versions of tor achieves nothing useful. Addresses warning
  3287. from bug 7164.
  3288. o Minor features (log verbosity, backport from 0.2.5.4-alpha):
  3289. - When we run out of usable circuit IDs on a channel, log only one
  3290. warning for the whole channel, and describe how many circuits
  3291. there were on the channel. Fixes part of ticket 11553.
  3292. o Minor features (security, backport from 0.2.5.4-alpha):
  3293. - Decrease the lower limit of MaxMemInCellQueues to 256 MBytes (but
  3294. leave the default at 8GBytes), to better support Raspberry Pi
  3295. users. Fixes bug 9686; bugfix on 0.2.4.14-alpha.
  3296. o Documentation (backport from 0.2.5.4-alpha):
  3297. - Correctly document that we search for a system torrc file before
  3298. looking in ~/.torrc. Fixes documentation side of 9213; bugfix on
  3299. 0.2.3.18-rc.
  3300. Changes in version 0.2.5.4-alpha - 2014-04-25
  3301. Tor 0.2.5.4-alpha includes several security and performance
  3302. improvements for clients and relays, including blacklisting authority
  3303. signing keys that were used while susceptible to the OpenSSL
  3304. "heartbleed" bug, fixing two expensive functions on busy relays,
  3305. improved TLS ciphersuite preference lists, support for run-time
  3306. hardening on compilers that support AddressSanitizer, and more work on
  3307. the Linux sandbox code.
  3308. There are also several usability fixes for clients (especially clients
  3309. that use bridges), two new TransPort protocols supported (one on
  3310. OpenBSD, one on FreeBSD), and various other bugfixes.
  3311. This release marks end-of-life for Tor 0.2.2.x; those Tor versions
  3312. have accumulated many known flaws; everyone should upgrade.
  3313. o Major features (security):
  3314. - If you don't specify MaxMemInQueues yourself, Tor now tries to
  3315. pick a good value based on your total system memory. Previously,
  3316. the default was always 8 GB. You can still override the default by
  3317. setting MaxMemInQueues yourself. Resolves ticket 11396.
  3318. - Block authority signing keys that were used on authorities
  3319. vulnerable to the "heartbleed" bug in OpenSSL (CVE-2014-0160). (We
  3320. don't have any evidence that these keys _were_ compromised; we're
  3321. doing this to be prudent.) Resolves ticket 11464.
  3322. o Major features (relay performance):
  3323. - Speed up server-side lookups of rendezvous and introduction point
  3324. circuits by using hashtables instead of linear searches. These
  3325. functions previously accounted between 3 and 7% of CPU usage on
  3326. some busy relays. Resolves ticket 9841.
  3327. - Avoid wasting CPU when extending a circuit over a channel that is
  3328. nearly out of circuit IDs. Previously, we would do a linear scan
  3329. over possible circuit IDs before finding one or deciding that we
  3330. had exhausted our possibilities. Now, we try at most 64 random
  3331. circuit IDs before deciding that we probably won't succeed. Fixes
  3332. a possible root cause of ticket 11553.
  3333. o Major features (seccomp2 sandbox, Linux only):
  3334. - The seccomp2 sandbox can now run a test network for multiple hours
  3335. without crashing. The sandbox is still experimental, and more bugs
  3336. will probably turn up. To try it, enable "Sandbox 1" on a Linux
  3337. host. Resolves ticket 11351.
  3338. - Strengthen sandbox code: the sandbox can now test the arguments
  3339. for rename(), and blocks _sysctl() entirely. Resolves another part
  3340. of ticket 11351.
  3341. - When the sandbox blocks a system call, it now tries to log a stack
  3342. trace before exiting. Resolves ticket 11465.
  3343. o Major bugfixes (TLS cipher selection):
  3344. - The relay ciphersuite list is now generated automatically based on
  3345. uniform criteria, and includes all OpenSSL ciphersuites with
  3346. acceptable strength and forward secrecy. Previously, we had left
  3347. some perfectly fine ciphersuites unsupported due to omission or
  3348. typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
  3349. 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
  3350. - Relays now trust themselves to have a better view than clients of
  3351. which TLS ciphersuites are better than others. (Thanks to bug
  3352. 11513, the relay list is now well-considered, whereas the client
  3353. list has been chosen mainly for anti-fingerprinting purposes.)
  3354. Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
  3355. CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
  3356. AES128. Resolves ticket 11528.
  3357. - Clients now try to advertise the same list of ciphersuites as
  3358. Firefox 28. This change enables selection of (fast) GCM
  3359. ciphersuites, disables some strange old ciphers, and stops
  3360. advertising the ECDH (not to be confused with ECDHE) ciphersuites.
  3361. Resolves ticket 11438.
  3362. o Major bugfixes (bridge client):
  3363. - Avoid 60-second delays in the bootstrapping process when Tor is
  3364. launching for a second time while using bridges. Fixes bug 9229;
  3365. bugfix on 0.2.0.3-alpha.
  3366. o Minor features (transparent proxy, *BSD):
  3367. - Support FreeBSD's ipfw firewall interface for TransPort ports on
  3368. FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
  3369. 10267; patch from "yurivict".
  3370. - Support OpenBSD's divert-to rules with the pf firewall for
  3371. transparent proxy ports. To enable it, set "TransProxyType
  3372. pf-divert". This allows Tor to run a TransPort transparent proxy
  3373. port on OpenBSD 4.4 or later without root privileges. See the
  3374. pf.conf(5) manual page for information on configuring pf to use
  3375. divert-to rules. Closes ticket 10896; patch from Dana Koch.
  3376. o Minor features (security):
  3377. - New --enable-expensive-hardening option to enable security
  3378. hardening options that consume nontrivial amounts of CPU and
  3379. memory. Right now, this includes AddressSanitizer and UbSan, which
  3380. are supported in newer versions of GCC and Clang. Closes ticket
  3381. 11477.
  3382. o Minor features (log verbosity):
  3383. - Demote the message that we give when a flushing connection times
  3384. out for too long from NOTICE to INFO. It was usually meaningless.
  3385. Resolves ticket 5286.
  3386. - Don't log so many notice-level bootstrapping messages at startup
  3387. about downloading descriptors. Previously, we'd log a notice
  3388. whenever we learned about more routers. Now, we only log a notice
  3389. at every 5% of progress. Fixes bug 9963.
  3390. - Warn less verbosely when receiving a malformed
  3391. ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
  3392. - When we run out of usable circuit IDs on a channel, log only one
  3393. warning for the whole channel, and describe how many circuits
  3394. there were on the channel. Fixes part of ticket 11553.
  3395. o Minor features (relay):
  3396. - If a circuit timed out for at least 3 minutes, check if we have a
  3397. new external IP address, and publish a new descriptor with the new
  3398. IP address if it changed. Resolves ticket 2454.
  3399. o Minor features (controller):
  3400. - Make the entire exit policy available from the control port via
  3401. GETINFO exit-policy/*. Implements enhancement 7952. Patch from
  3402. "rl1987".
  3403. - Because of the fix for ticket 11396, the real limit for memory
  3404. usage may no longer match the configured MaxMemInQueues value. The
  3405. real limit is now exposed via GETINFO limits/max-mem-in-queues.
  3406. o Minor features (bridge client):
  3407. - Report a more useful failure message when we can't connect to a
  3408. bridge because we don't have the right pluggable transport
  3409. configured. Resolves ticket 9665. Patch from Fábio J. Bertinatto.
  3410. o Minor features (diagnostic):
  3411. - Add more log messages to diagnose bug 7164, which causes
  3412. intermittent "microdesc_free() called but md was still referenced"
  3413. warnings. We now include more information, to figure out why we
  3414. might be cleaning a microdescriptor for being too old if it's
  3415. still referenced by a live node_t object.
  3416. o Minor bugfixes (client, DNSPort):
  3417. - When using DNSPort, try to respond to AAAA requests with AAAA
  3418. answers. Previously, we hadn't looked at the request type when
  3419. deciding which answer type to prefer. Fixes bug 10468; bugfix on
  3420. 0.2.4.7-alpha.
  3421. - When receiving a DNS query for an unsupported record type, reply
  3422. with no answer rather than with a NOTIMPL error. This behavior
  3423. isn't correct either, but it will break fewer client programs, we
  3424. hope. Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch
  3425. from "epoch".
  3426. o Minor bugfixes (exit relay):
  3427. - Stop leaking memory when we successfully resolve a PTR record.
  3428. Fixes bug 11437; bugfix on 0.2.4.7-alpha.
  3429. o Minor bugfixes (bridge client):
  3430. - Stop accepting bridge lines containing hostnames. Doing so would
  3431. cause clients to perform DNS requests on the hostnames, which was
  3432. not sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
  3433. - Avoid a 60-second delay in the bootstrapping process when a Tor
  3434. client with pluggable transports re-reads its configuration at
  3435. just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
  3436. o Minor bugfixes (client, logging during bootstrap):
  3437. - Warn only once if we start logging in an unsafe way. Previously,
  3438. we complain as many times as we had problems. Fixes bug 9870;
  3439. bugfix on 0.2.5.1-alpha.
  3440. - Only report the first fatal bootstrap error on a given OR
  3441. connection. This stops us from telling the controller bogus error
  3442. messages like "DONE". Fixes bug 10431; bugfix on 0.2.1.1-alpha.
  3443. - Be more helpful when trying to run sandboxed on Linux without
  3444. libseccomp. Instead of saying "Sandbox is not implemented on this
  3445. platform", we now explain that we need to be built with
  3446. libseccomp. Fixes bug 11543; bugfix on 0.2.5.1-alpha.
  3447. - Avoid generating spurious warnings when starting with
  3448. DisableNetwork enabled. Fixes bug 11200 and bug 10405; bugfix on
  3449. 0.2.3.9-alpha.
  3450. o Minor bugfixes (closing OR connections):
  3451. - If write_to_buf() in connection_write_to_buf_impl_() ever fails,
  3452. check if it's an or_connection_t and correctly call
  3453. connection_or_close_for_error() rather than
  3454. connection_mark_for_close() directly. Fixes bug 11304; bugfix on
  3455. 0.2.4.4-alpha.
  3456. - When closing all connections on setting DisableNetwork to 1, use
  3457. connection_or_close_normally() rather than closing OR connections
  3458. out from under the channel layer. Fixes bug 11306; bugfix on
  3459. 0.2.4.4-alpha.
  3460. o Minor bugfixes (controller):
  3461. - Avoid sending a garbage value to the controller when a circuit is
  3462. cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.
  3463. o Minor bugfixes (tor-fw-helper):
  3464. - Allow tor-fw-helper to build again by adding src/ext to its
  3465. CPPFLAGS. Fixes bug 11296; bugfix on 0.2.5.3-alpha.
  3466. o Minor bugfixes (bridges):
  3467. - Avoid potential crashes or bad behavior when launching a
  3468. server-side managed proxy with ORPort or ExtORPort temporarily
  3469. disabled. Fixes bug 9650; bugfix on 0.2.3.16-alpha.
  3470. o Minor bugfixes (platform-specific):
  3471. - Fix compilation on Solaris, which does not have <endian.h>. Fixes
  3472. bug 11426; bugfix on 0.2.5.3-alpha.
  3473. - When dumping a malformed directory object to disk, save it in
  3474. binary mode on Windows, not text mode. Fixes bug 11342; bugfix on
  3475. 0.2.2.1-alpha.
  3476. - Don't report failures from make_socket_reuseable() on incoming
  3477. sockets on OSX: this can happen when incoming connections close
  3478. early. Fixes bug 10081.
  3479. o Minor bugfixes (trivial memory leaks):
  3480. - Fix a small memory leak when signing a directory object. Fixes bug
  3481. 11275; bugfix on 0.2.4.13-alpha.
  3482. - Free placeholder entries in our circuit table at exit; fixes a
  3483. harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
  3484. - Don't re-initialize a second set of OpenSSL mutexes when starting
  3485. up. Previously, we'd make one set of mutexes, and then immediately
  3486. replace them with another. Fixes bug 11726; bugfix on
  3487. 0.2.5.3-alpha.
  3488. - Resolve some memory leaks found by coverity in the unit tests, on
  3489. exit in tor-gencert, and on a failure to compute digests for our
  3490. own keys when generating a v3 networkstatus vote. These leaks
  3491. should never have affected anyone in practice.
  3492. o Minor bugfixes (hidden service):
  3493. - Only retry attempts to connect to a chosen rendezvous point 8
  3494. times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
  3495. o Minor bugfixes (misc code correctness):
  3496. - Fix various instances of undefined behavior in channeltls.c,
  3497. tor_memmem(), and eventdns.c that would cause us to construct
  3498. pointers to memory outside an allocated object. (These invalid
  3499. pointers were not accessed, but C does not even allow them to
  3500. exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
  3501. 0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
  3502. - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
  3503. fix some miscellaneous errors in our tests and codebase. Fixes bug
  3504. 11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
  3505. - Always check return values for unlink, munmap, UnmapViewOfFile;
  3506. check strftime return values more often. In some cases all we can
  3507. do is report a warning, but this may help prevent deeper bugs from
  3508. going unnoticed. Closes ticket 8787; bugfixes on many, many tor
  3509. versions.
  3510. - Fix numerous warnings from the clang "scan-build" static analyzer.
  3511. Some of these are programming style issues; some of them are false
  3512. positives that indicated awkward code; some are undefined behavior
  3513. cases related to constructing (but not using) invalid pointers;
  3514. some are assumptions about API behavior; some are (harmlessly)
  3515. logging sizeof(ptr) bytes from a token when sizeof(*ptr) would be
  3516. correct; and one or two are genuine bugs that weren't reachable
  3517. from the rest of the program. Fixes bug 8793; bugfixes on many,
  3518. many tor versions.
  3519. o Documentation:
  3520. - Build the torify.1 manpage again. Previously, we were only trying
  3521. to build it when also building tor-fw-helper. That's why we didn't
  3522. notice that we'd broken the ability to build it. Fixes bug 11321;
  3523. bugfix on 0.2.5.1-alpha.
  3524. - Fix the layout of the SOCKSPort flags in the manpage. Fixes bug
  3525. 11061; bugfix on 0.2.4.7-alpha.
  3526. - Correctly document that we search for a system torrc file before
  3527. looking in ~/.torrc. Fixes documentation side of 9213; bugfix on
  3528. 0.2.3.18-rc.
  3529. - Resolve warnings from Doxygen.
  3530. o Code simplifications and refactoring:
  3531. - Remove is_internal_IP() function. Resolves ticket 4645.
  3532. - Remove unused function circuit_dump_by_chan from circuitlist.c.
  3533. Closes issue 9107; patch from "marek".
  3534. - Change our use of the ENUM_BF macro to avoid declarations that
  3535. confuse Doxygen.
  3536. o Deprecated versions:
  3537. - Tor 0.2.2.x has reached end-of-life; it has received no patches or
  3538. attention for some while. Directory authorities no longer accept
  3539. descriptors from relays running any version of Tor prior to Tor
  3540. 0.2.3.16-alpha. Resolves ticket 11149.
  3541. o Testing:
  3542. - New macros in test.h to simplify writing mock-functions for unit
  3543. tests. Part of ticket 11507. Patch from Dana Koch.
  3544. - Complete tests for the status.c module. Resolves ticket 11507.
  3545. Patch from Dana Koch.
  3546. o Removed code:
  3547. - Remove all code for the long unused v1 directory protocol.
  3548. Resolves ticket 11070.
  3549. Changes in version 0.2.5.3-alpha - 2014-03-22
  3550. Tor 0.2.5.3-alpha includes all the fixes from 0.2.4.21. It contains
  3551. two new anti-DoS features for Tor relays, resolves a bug that kept
  3552. SOCKS5 support for IPv6 from working, fixes several annoying usability
  3553. issues for bridge users, and removes more old code for unused
  3554. directory formats.
  3555. The Tor 0.2.5.x release series is now in patch-freeze: no feature
  3556. patches not already written will be considered for inclusion in 0.2.5.x.
  3557. o Major features (relay security, DoS-resistance):
  3558. - When deciding whether we have run out of memory and we need to
  3559. close circuits, also consider memory allocated in buffers for
  3560. streams attached to each circuit.
  3561. This change, which extends an anti-DoS feature introduced in
  3562. 0.2.4.13-alpha and improved in 0.2.4.14-alpha, lets Tor exit relays
  3563. better resist more memory-based DoS attacks than before. Since the
  3564. MaxMemInCellQueues option now applies to all queues, it is renamed
  3565. to MaxMemInQueues. This feature fixes bug 10169.
  3566. - Avoid hash-flooding denial-of-service attacks by using the secure
  3567. SipHash-2-4 hash function for our hashtables. Without this
  3568. feature, an attacker could degrade performance of a targeted
  3569. client or server by flooding their data structures with a large
  3570. number of entries to be stored at the same hash table position,
  3571. thereby slowing down the Tor instance. With this feature, hash
  3572. table positions are derived from a randomized cryptographic key,
  3573. and an attacker cannot predict which entries will collide. Closes
  3574. ticket 4900.
  3575. - Decrease the lower limit of MaxMemInQueues to 256 MBytes (but leave
  3576. the default at 8GBytes), to better support Raspberry Pi users. Fixes
  3577. bug 9686; bugfix on 0.2.4.14-alpha.
  3578. o Minor features (bridges, pluggable transports):
  3579. - Bridges now write the SHA1 digest of their identity key
  3580. fingerprint (that is, a hash of a hash of their public key) to
  3581. notice-level logs, and to a new hashed-fingerprint file. This
  3582. information will help bridge operators look up their bridge in
  3583. Globe and similar tools. Resolves ticket 10884.
  3584. - Improve the message that Tor displays when running as a bridge
  3585. using pluggable transports without an Extended ORPort listener.
  3586. Also, log the message in the log file too. Resolves ticket 11043.
  3587. o Minor features (other):
  3588. - Add a new option, PredictedPortsRelevanceTime, to control how long
  3589. after having received a request to connect to a given port Tor
  3590. will try to keep circuits ready in anticipation of future requests
  3591. for that port. Patch from "unixninja92"; implements ticket 9176.
  3592. - Generate a warning if any ports are listed in the SocksPolicy,
  3593. DirPolicy, AuthDirReject, AuthDirInvalid, AuthDirBadDir, or
  3594. AuthDirBadExit options. (These options only support address
  3595. ranges.) Fixes part of ticket 11108.
  3596. - Update geoip and geoip6 to the February 7 2014 Maxmind GeoLite2
  3597. Country database.
  3598. o Minor bugfixes (new since 0.2.5.2-alpha, also in 0.2.4.21):
  3599. - Build without warnings under clang 3.4. (We have some macros that
  3600. define static functions only some of which will get used later in
  3601. the module. Starting with clang 3.4, these give a warning unless the
  3602. unused attribute is set on them.) Resolves ticket 10904.
  3603. - Fix build warnings about missing "a2x" comment when building the
  3604. manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
  3605. Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
  3606. o Minor bugfixes (client):
  3607. - Improve the log message when we can't connect to a hidden service
  3608. because all of the hidden service directory nodes hosting its
  3609. descriptor are excluded. Improves on our fix for bug 10722, which
  3610. was a bugfix on 0.2.0.10-alpha.
  3611. - Raise a control port warning when we fail to connect to all of
  3612. our bridges. Previously, we didn't inform the controller, and
  3613. the bootstrap process would stall. Fixes bug 11069; bugfix on
  3614. 0.2.1.2-alpha.
  3615. - Exit immediately when a process-owning controller exits.
  3616. Previously, tor relays would wait for a little while after their
  3617. controller exited, as if they had gotten an INT signal -- but this
  3618. was problematic, since there was no feedback for the user. To do a
  3619. clean shutdown, controllers should send an INT signal and give Tor
  3620. a chance to clean up. Fixes bug 10449; bugfix on 0.2.2.28-beta.
  3621. - Stop attempting to connect to bridges before our pluggable
  3622. transports are configured (harmless but resulted in some erroneous
  3623. log messages). Fixes bug 11156; bugfix on 0.2.3.2-alpha.
  3624. - Fix connections to IPv6 addresses over SOCKS5. Previously, we were
  3625. generating incorrect SOCKS5 responses, and confusing client
  3626. applications. Fixes bug 10987; bugfix on 0.2.4.7-alpha.
  3627. o Minor bugfixes (relays and bridges):
  3628. - Avoid crashing on a malformed resolv.conf file when running a
  3629. relay using Libevent 1. Fixes bug 8788; bugfix on 0.1.1.23.
  3630. - Non-exit relays no longer launch mock DNS requests to check for
  3631. DNS hijacking. This has been unnecessary since 0.2.1.7-alpha, when
  3632. non-exit relays stopped servicing DNS requests. Fixes bug 965;
  3633. bugfix on 0.2.1.7-alpha. Patch from Matt Pagan.
  3634. - Bridges now report complete directory request statistics. Related
  3635. to bug 5824; bugfix on 0.2.2.1-alpha.
  3636. - Bridges now never collect statistics that were designed for
  3637. relays. Fixes bug 5824; bugfix on 0.2.3.8-alpha.
  3638. - Stop giving annoying warning messages when we decide not to launch
  3639. a pluggable transport proxy that we don't need (because there are
  3640. no bridges configured to use it). Resolves ticket 5018; bugfix
  3641. on 0.2.5.2-alpha.
  3642. - Give the correct URL in the warning message when trying to run a
  3643. relay on an ancient version of Windows. Fixes bug 9393.
  3644. o Minor bugfixes (backtrace support):
  3645. - Support automatic backtraces on more platforms by using the
  3646. "-fasynchronous-unwind-tables" compiler option. This option is
  3647. needed for platforms like 32-bit Intel where "-fomit-frame-pointer"
  3648. is on by default and table generation is not. This doesn't yet
  3649. add Windows support; only Linux, OSX, and some BSDs are affected.
  3650. Reported by 'cypherpunks'; fixes bug 11047; bugfix on 0.2.5.2-alpha.
  3651. - Avoid strange behavior if two threads hit failed assertions at the
  3652. same time and both try to log backtraces at once. (Previously, if
  3653. this had happened, both threads would have stored their intermediate
  3654. results in the same buffer, and generated junk outputs.) Reported by
  3655. "cypherpunks". Fixes bug 11048; bugfix on 0.2.5.2-alpha.
  3656. - Fix a compiler warning in format_number_sigsafe(). Bugfix on
  3657. 0.2.5.2-alpha; patch from Nick Hopper.
  3658. o Minor bugfixes (unit tests):
  3659. - Fix a small bug in the unit tests that might have made the tests
  3660. call 'chmod' with an uninitialized bitmask. Fixes bug 10928;
  3661. bugfix on 0.2.5.1-alpha. Patch from Dana Koch.
  3662. o Removed code:
  3663. - Remove all remaining code related to version-0 hidden service
  3664. descriptors: they have not been in use since 0.2.2.1-alpha. Fixes
  3665. the rest of bug 10841.
  3666. o Documentation:
  3667. - Document in the manpage that "KBytes" may also be written as
  3668. "kilobytes" or "KB", that "Kbits" may also be written as
  3669. "kilobits", and so forth. Closes ticket 9222.
  3670. - Document that the ClientOnly config option overrides ORPort.
  3671. Our old explanation made ClientOnly sound as though it did
  3672. nothing at all. Resolves bug 9059.
  3673. - Explain that SocksPolicy, DirPolicy, and similar options don't
  3674. take port arguments. Fixes the other part of ticket 11108.
  3675. - Fix a comment about the rend_server_descriptor_t.protocols field
  3676. to more accurately describe its range. Also, make that field
  3677. unsigned, to more accurately reflect its usage. Fixes bug 9099;
  3678. bugfix on 0.2.1.5-alpha.
  3679. - Fix the manpage's description of HiddenServiceAuthorizeClient:
  3680. the maximum client name length is 16, not 19. Fixes bug 11118;
  3681. bugfix on 0.2.1.6-alpha.
  3682. o Code simplifications and refactoring:
  3683. - Get rid of router->address, since in all cases it was just the
  3684. string representation of router->addr. Resolves ticket 5528.
  3685. o Test infrastructure:
  3686. - Update to the latest version of tinytest.
  3687. - Improve the tinytest implementation of string operation tests so
  3688. that comparisons with NULL strings no longer crash the tests; they
  3689. now just fail, normally. Fixes bug 9004; bugfix on 0.2.2.4-alpha.
  3690. Changes in version 0.2.4.21 - 2014-02-28
  3691. Tor 0.2.4.21 further improves security against potential adversaries who
  3692. find breaking 1024-bit crypto doable, and backports several stability
  3693. and robustness patches from the 0.2.5 branch.
  3694. o Major features (client security):
  3695. - When we choose a path for a 3-hop circuit, make sure it contains
  3696. at least one relay that supports the NTor circuit extension
  3697. handshake. Otherwise, there is a chance that we're building
  3698. a circuit that's worth attacking by an adversary who finds
  3699. breaking 1024-bit crypto doable, and that chance changes the game
  3700. theory. Implements ticket 9777.
  3701. o Major bugfixes:
  3702. - Do not treat streams that fail with reason
  3703. END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
  3704. since it could also indicate an ENETUNREACH connection error. Fixes
  3705. part of bug 10777; bugfix on 0.2.4.8-alpha.
  3706. o Code simplification and refactoring:
  3707. - Remove data structures which were introduced to implement the
  3708. CellStatistics option: they are now redundant with the new timestamp
  3709. field in the regular packed_cell_t data structure, which we did
  3710. in 0.2.4.18-rc in order to resolve bug 9093. Resolves ticket 10870.
  3711. o Minor features:
  3712. - Always clear OpenSSL bignums before freeing them -- even bignums
  3713. that don't contain secrets. Resolves ticket 10793. Patch by
  3714. Florent Daigniere.
  3715. - Build without warnings under clang 3.4. (We have some macros that
  3716. define static functions only some of which will get used later in
  3717. the module. Starting with clang 3.4, these give a warning unless the
  3718. unused attribute is set on them.) Resolves ticket 10904.
  3719. - Update geoip and geoip6 files to the February 7 2014 Maxmind
  3720. GeoLite2 Country database.
  3721. o Minor bugfixes:
  3722. - Set the listen() backlog limit to the largest actually supported
  3723. on the system, not to the value in a header file. Fixes bug 9716;
  3724. bugfix on every released Tor.
  3725. - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
  3726. exit node as a NOROUTE error, not an INTERNAL error, since they
  3727. can apparently happen when trying to connect to the wrong sort
  3728. of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
  3729. - Fix build warnings about missing "a2x" comment when building the
  3730. manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
  3731. Fixes bug 10929; bugfix on 0.2.2.9-alpha. Patch from Dana Koch.
  3732. - Avoid a segfault on SIGUSR1, where we had freed a connection but did
  3733. not entirely remove it from the connection lists. Fixes bug 9602;
  3734. bugfix on 0.2.4.4-alpha.
  3735. - Fix a segmentation fault in our benchmark code when running with
  3736. Fedora's OpenSSL package, or any other OpenSSL that provides
  3737. ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.
  3738. - Turn "circuit handshake stats since last time" log messages into a
  3739. heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
  3740. o Documentation fixes:
  3741. - Document that all but one DirPort entry must have the NoAdvertise
  3742. flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
  3743. Changes in version 0.2.5.2-alpha - 2014-02-13
  3744. Tor 0.2.5.2-alpha includes all the fixes from 0.2.4.18-rc and 0.2.4.20,
  3745. like the "poor random number generation" fix and the "building too many
  3746. circuits" fix. It also further improves security against potential
  3747. adversaries who find breaking 1024-bit crypto doable, and launches
  3748. pluggable transports on demand (which gets us closer to integrating
  3749. pluggable transport support by default -- not to be confused with Tor
  3750. bundles enabling pluggable transports and bridges by default).
  3751. o Major features (client security):
  3752. - When we choose a path for a 3-hop circuit, make sure it contains
  3753. at least one relay that supports the NTor circuit extension
  3754. handshake. Otherwise, there is a chance that we're building
  3755. a circuit that's worth attacking by an adversary who finds
  3756. breaking 1024-bit crypto doable, and that chance changes the game
  3757. theory. Implements ticket 9777.
  3758. - Clients now look at the "usecreatefast" consensus parameter to
  3759. decide whether to use CREATE_FAST or CREATE cells for the first hop
  3760. of their circuit. This approach can improve security on connections
  3761. where Tor's circuit handshake is stronger than the available TLS
  3762. connection security levels, but the tradeoff is more computational
  3763. load on guard relays. Implements proposal 221. Resolves ticket 9386.
  3764. o Major features (bridges):
  3765. - Don't launch pluggable transport proxies if we don't have any
  3766. bridges configured that would use them. Now we can list many
  3767. pluggable transports, and Tor will dynamically start one when it
  3768. hears a bridge address that needs it. Resolves ticket 5018.
  3769. - The bridge directory authority now assigns status flags (Stable,
  3770. Guard, etc) to bridges based on thresholds calculated over all
  3771. Running bridges. Now bridgedb can finally make use of its features
  3772. to e.g. include at least one Stable bridge in its answers. Fixes
  3773. bug 9859.
  3774. o Major features (other):
  3775. - Extend ORCONN controller event to include an "ID" parameter,
  3776. and add four new controller event types CONN_BW, CIRC_BW,
  3777. CELL_STATS, and TB_EMPTY that show connection and circuit usage.
  3778. The new events are emitted in private Tor networks only, with the
  3779. goal of being able to better track performance and load during
  3780. full-network simulations. Implements proposal 218 and ticket 7359.
  3781. - On some platforms (currently: recent OSX versions, glibc-based
  3782. platforms that support the ELF format, and a few other
  3783. Unix-like operating systems), Tor can now dump stack traces
  3784. when a crash occurs or an assertion fails. By default, traces
  3785. are dumped to stderr (if possible) and to any logs that are
  3786. reporting errors. Implements ticket 9299.
  3787. o Major bugfixes:
  3788. - Avoid a segfault on SIGUSR1, where we had freed a connection but did
  3789. not entirely remove it from the connection lists. Fixes bug 9602;
  3790. bugfix on 0.2.4.4-alpha.
  3791. - Do not treat streams that fail with reason
  3792. END_STREAM_REASON_INTERNAL as indicating a definite circuit failure,
  3793. since it could also indicate an ENETUNREACH connection error. Fixes
  3794. part of bug 10777; bugfix on 0.2.4.8-alpha.
  3795. o Major bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.20):
  3796. - Do not allow OpenSSL engines to replace the PRNG, even when
  3797. HardwareAccel is set. The only default builtin PRNG engine uses
  3798. the Intel RDRAND instruction to replace the entire PRNG, and
  3799. ignores all attempts to seed it with more entropy. That's
  3800. cryptographically stupid: the right response to a new alleged
  3801. entropy source is never to discard all previously used entropy
  3802. sources. Fixes bug 10402; works around behavior introduced in
  3803. OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
  3804. and "rl1987".
  3805. - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
  3806. address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.
  3807. - Avoid launching spurious extra circuits when a stream is pending.
  3808. This fixes a bug where any circuit that _wasn't_ unusable for new
  3809. streams would be treated as if it were, causing extra circuits to
  3810. be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.
  3811. o Major bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3812. - No longer stop reading or writing on cpuworker connections when
  3813. our rate limiting buckets go empty. Now we should handle circuit
  3814. handshake requests more promptly. Resolves bug 9731.
  3815. - Stop trying to bootstrap all our directory information from
  3816. only our first guard. Discovered while fixing bug 9946; bugfix
  3817. on 0.2.4.8-alpha.
  3818. o Minor features (bridges, pluggable transports):
  3819. - Add threshold cutoffs to the networkstatus document created by
  3820. the Bridge Authority. Fixes bug 1117.
  3821. - On Windows, spawn background processes using the CREATE_NO_WINDOW
  3822. flag. Now Tor Browser Bundle 3.5 with pluggable transports enabled
  3823. doesn't pop up a blank console window. (In Tor Browser Bundle 2.x,
  3824. Vidalia set this option for us.) Implements ticket 10297.
  3825. o Minor features (security):
  3826. - Always clear OpenSSL bignums before freeing them -- even bignums
  3827. that don't contain secrets. Resolves ticket 10793. Patch by
  3828. Florent Daignière.
  3829. o Minor features (config options and command line):
  3830. - Add an --allow-missing-torrc commandline option that tells Tor to
  3831. run even if the configuration file specified by -f is not available.
  3832. Implements ticket 10060.
  3833. - Add support for the TPROXY transparent proxying facility on Linux.
  3834. See documentation for the new TransProxyType option for more
  3835. details. Implementation by "thomo". Closes ticket 10582.
  3836. o Minor features (controller):
  3837. - Add a new "HS_DESC" controller event that reports activities
  3838. related to hidden service descriptors. Resolves ticket 8510.
  3839. - New "DROPGUARDS" controller command to forget all current entry
  3840. guards. Not recommended for ordinary use, since replacing guards
  3841. too frequently makes several attacks easier. Resolves ticket 9934;
  3842. patch from "ra".
  3843. o Minor features (build):
  3844. - Assume that a user using ./configure --host wants to cross-compile,
  3845. and give an error if we cannot find a properly named
  3846. tool-chain. Add a --disable-tool-name-check option to proceed
  3847. nevertheless. Addresses ticket 9869. Patch by Benedikt Gollatz.
  3848. - If we run ./configure and the compiler recognizes -fstack-protector
  3849. but the linker rejects it, warn the user about a potentially missing
  3850. libssp package. Addresses ticket 9948. Patch from Benedikt Gollatz.
  3851. o Minor features (testing):
  3852. - If Python is installed, "make check" now runs extra tests beyond
  3853. the unit test scripts.
  3854. - When bootstrapping a test network, sometimes very few relays get
  3855. the Guard flag. Now a new option "TestingDirAuthVoteGuard" can
  3856. specify a set of relays which should be voted Guard regardless of
  3857. their uptime or bandwidth. Addresses ticket 9206.
  3858. o Minor features (log messages):
  3859. - When ServerTransportPlugin is set on a bridge, Tor can write more
  3860. useful statistics about bridge use in its extrainfo descriptors,
  3861. but only if the Extended ORPort ("ExtORPort") is set too. Add a
  3862. log message to inform the user in this case. Resolves ticket 9651.
  3863. - When receiving a new controller connection, log the origin address.
  3864. Resolves ticket 9698; patch from "sigpipe".
  3865. - When logging OpenSSL engine status at startup, log the status of
  3866. more engines. Fixes ticket 10043; patch from Joshua Datko.
  3867. - Turn "circuit handshake stats since last time" log messages into a
  3868. heartbeat message. Fixes bug 10485; bugfix on 0.2.4.17-rc.
  3869. o Minor features (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3870. - Improve the circuit queue out-of-memory handler. Previously, when
  3871. we ran low on memory, we'd close whichever circuits had the most
  3872. queued cells. Now, we close those that have the *oldest* queued
  3873. cells, on the theory that those are most responsible for us
  3874. running low on memory. Based on analysis from a forthcoming paper
  3875. by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
  3876. - Generate bootstrapping status update events correctly when fetching
  3877. microdescriptors. Fixes bug 9927.
  3878. - Update to the October 2 2013 Maxmind GeoLite Country database.
  3879. o Minor bugfixes (clients):
  3880. - When closing a channel that has already been open, do not close
  3881. pending circuits that were waiting to connect to the same relay.
  3882. Fixes bug 9880; bugfix on 0.2.5.1-alpha. Thanks to skruffy for
  3883. finding this bug.
  3884. o Minor bugfixes (relays):
  3885. - Treat ENETUNREACH, EACCES, and EPERM connection failures at an
  3886. exit node as a NOROUTE error, not an INTERNAL error, since they
  3887. can apparently happen when trying to connect to the wrong sort
  3888. of netblocks. Fixes part of bug 10777; bugfix on 0.1.0.1-rc.
  3889. o Minor bugfixes (bridges):
  3890. - Fix a bug where the first connection works to a bridge that uses a
  3891. pluggable transport with client-side parameters, but we don't send
  3892. the client-side parameters on subsequent connections. (We don't
  3893. use any pluggable transports with client-side parameters yet,
  3894. but ScrambleSuit will soon become the first one.) Fixes bug 9162;
  3895. bugfix on 0.2.0.3-alpha. Based on a patch from "rl1987".
  3896. o Minor bugfixes (node selection):
  3897. - If ExcludeNodes is set, consider non-excluded hidden service
  3898. directory servers before excluded ones. Do not consider excluded
  3899. hidden service directory servers at all if StrictNodes is
  3900. set. (Previously, we would sometimes decide to connect to those
  3901. servers, and then realize before we initiated a connection that
  3902. we had excluded them.) Fixes bug 10722; bugfix on 0.2.0.10-alpha.
  3903. Reported by "mr-4".
  3904. - If we set the ExitNodes option but it doesn't include any nodes
  3905. that have the Exit flag, we would choose not to bootstrap. Now we
  3906. bootstrap so long as ExitNodes includes nodes which can exit to
  3907. some port. Fixes bug 10543; bugfix on 0.2.4.10-alpha.
  3908. o Minor bugfixes (controller and command-line):
  3909. - If changing a config option via "setconf" fails in a recoverable
  3910. way, we used to nonetheless write our new control ports to the
  3911. file described by the "ControlPortWriteToFile" option. Now we only
  3912. write out that file if we successfully switch to the new config
  3913. option. Fixes bug 5605; bugfix on 0.2.2.26-beta. Patch from "Ryman".
  3914. - When a command-line option such as --version or --help that
  3915. ordinarily implies --hush appears on the command line along with
  3916. --quiet, then actually obey --quiet. Previously, we obeyed --quiet
  3917. only if it appeared later on the command line. Fixes bug 9578;
  3918. bugfix on 0.2.5.1-alpha.
  3919. o Minor bugfixes (code correctness):
  3920. - Previously we used two temporary files when writing descriptors to
  3921. disk; now we only use one. Fixes bug 1376.
  3922. - Remove an erroneous (but impossible and thus harmless) pointer
  3923. comparison that would have allowed compilers to skip a bounds
  3924. check in channeltls.c. Fixes bugs 10313 and 9980; bugfix on
  3925. 0.2.0.10-alpha. Noticed by Jared L Wong and David Fifield.
  3926. - Fix an always-true assertion in pluggable transports code so it
  3927. actually checks what it was trying to check. Fixes bug 10046;
  3928. bugfix on 0.2.3.9-alpha. Found by "dcb".
  3929. o Minor bugfixes (protocol correctness):
  3930. - When receiving a VERSIONS cell with an odd number of bytes, close
  3931. the connection immediately since the cell is malformed. Fixes bug
  3932. 10365; bugfix on 0.2.0.10-alpha. Spotted by "bobnomnom"; fix by
  3933. "rl1987".
  3934. o Minor bugfixes (build):
  3935. - Restore the ability to compile Tor with V2_HANDSHAKE_SERVER
  3936. turned off (that is, without support for v2 link handshakes). Fixes
  3937. bug 4677; bugfix on 0.2.3.2-alpha. Patch from "piet".
  3938. - Fix compilation warnings and startup issues when running with
  3939. "Sandbox 1" and libseccomp-2.1.0. Fixes bug 10563; bugfix on
  3940. 0.2.5.1-alpha.
  3941. - Fix compilation on Solaris 9, which didn't like us having an
  3942. identifier named "sun". Fixes bug 10565; bugfix in 0.2.5.1-alpha.
  3943. o Minor bugfixes (testing):
  3944. - Fix a segmentation fault in our benchmark code when running with
  3945. Fedora's OpenSSL package, or any other OpenSSL that provides
  3946. ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.
  3947. o Minor bugfixes (log messages):
  3948. - Fix a bug where clients using bridges would report themselves
  3949. as 50% bootstrapped even without a live consensus document.
  3950. Fixes bug 9922; bugfix on 0.2.1.1-alpha.
  3951. - Suppress a warning where, if there's only one directory authority
  3952. in the network, we would complain that votes and signatures cannot
  3953. be uploaded to other directory authorities. Fixes bug 10842;
  3954. bugfix on 0.2.2.26-beta.
  3955. - Report bootstrapping progress correctly when we're downloading
  3956. microdescriptors. We had updated our "do we have enough microdescs
  3957. to begin building circuits?" logic most recently in 0.2.4.10-alpha
  3958. (see bug 5956), but we left the bootstrap status event logic at
  3959. "how far through getting 1/4 of them are we?" Fixes bug 9958;
  3960. bugfix on 0.2.2.36, which is where they diverged (see bug 5343).
  3961. o Minor bugfixes (new since 0.2.5.1-alpha, also in 0.2.4.20):
  3962. - Avoid a crash bug when starting with a corrupted microdescriptor
  3963. cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha.
  3964. - If we fail to dump a previously cached microdescriptor to disk, avoid
  3965. freeing duplicate data later on. Fixes bug 10423; bugfix on
  3966. 0.2.4.13-alpha. Spotted by "bobnomnom".
  3967. o Minor bugfixes on 0.2.4.x (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3968. - Correctly log long IPv6 exit policies, instead of truncating them
  3969. or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
  3970. - Our default TLS ecdhe groups were backwards: we meant to be using
  3971. P224 for relays (for performance win) and P256 for bridges (since
  3972. it is more common in the wild). Instead we had it backwards. After
  3973. reconsideration, we decided that the default should be P256 on all
  3974. hosts, since its security is probably better, and since P224 is
  3975. reportedly used quite little in the wild. Found by "skruffy" on
  3976. IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
  3977. - Free directory authority certificate download statuses on exit
  3978. rather than leaking them. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
  3979. o Minor bugfixes on 0.2.3.x (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  3980. - If the guard we choose first doesn't answer, we would try the
  3981. second guard, but once we connected to the second guard we would
  3982. abandon it and retry the first one, slowing down bootstrapping.
  3983. The fix is to treat all our initially chosen guards as acceptable
  3984. to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
  3985. - Fix an assertion failure that would occur when disabling the
  3986. ORPort setting on a running Tor process while accounting was
  3987. enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
  3988. - When examining the list of network interfaces to find our address,
  3989. do not consider non-running or disabled network interfaces. Fixes
  3990. bug 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
  3991. - Avoid an off-by-one error when checking buffer boundaries when
  3992. formatting the exit status of a pluggable transport helper.
  3993. This is probably not an exploitable bug, but better safe than
  3994. sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
  3995. Pedro Ribeiro.
  3996. o Removed code and features:
  3997. - Clients now reject any directory authority certificates lacking
  3998. a dir-key-crosscert element. These have been included since
  3999. 0.2.1.9-alpha, so there's no real reason for them to be optional
  4000. any longer. Completes proposal 157. Resolves ticket 10162.
  4001. - Remove all code that existed to support the v2 directory system,
  4002. since there are no longer any v2 directory authorities. Resolves
  4003. ticket 10758.
  4004. - Remove the HSAuthoritativeDir and AlternateHSAuthority torrc
  4005. options, which were used for designating authorities as "Hidden
  4006. service authorities". There has been no use of hidden service
  4007. authorities since 0.2.2.1-alpha, when we stopped uploading or
  4008. downloading v0 hidden service descriptors. Fixes bug 10881; also
  4009. part of a fix for bug 10841.
  4010. o Code simplification and refactoring:
  4011. - Remove some old fallback code designed to keep Tor clients working
  4012. in a network with only two working relays. Elsewhere in the code we
  4013. have long since stopped supporting such networks, so there wasn't
  4014. much point in keeping it around. Addresses ticket 9926.
  4015. - Reject 0-length EXTEND2 cells more explicitly. Fixes bug 10536;
  4016. bugfix on 0.2.4.8-alpha. Reported by "cypherpunks".
  4017. - Remove data structures which were introduced to implement the
  4018. CellStatistics option: they are now redundant with the addition
  4019. of a timestamp to the regular packed_cell_t data structure, which
  4020. we did in 0.2.4.18-rc in order to resolve ticket 9093. Implements
  4021. ticket 10870.
  4022. o Documentation (man page) fixes:
  4023. - Update manpage to describe some of the files you can expect to
  4024. find in Tor's DataDirectory. Addresses ticket 9839.
  4025. - Document that all but one DirPort entry must have the NoAdvertise
  4026. flag set. Fixes bug 10470; bugfix on 0.2.3.3-alpha / 0.2.3.16-alpha.
  4027. o Documentation fixes (new since 0.2.5.1-alpha, also in 0.2.4.18-rc):
  4028. - Clarify the usage and risks of setting the ContactInfo torrc line
  4029. for your relay or bridge. Resolves ticket 9854.
  4030. - Add anchors to the manpage so we can link to the html version of
  4031. the documentation for specific options. Resolves ticket 9866.
  4032. - Replace remaining references to DirServer in man page and
  4033. log entries. Resolves ticket 10124.
  4034. o Tool changes:
  4035. - Make the "tor-gencert" tool used by directory authority operators
  4036. create 2048-bit signing keys by default (rather than 1024-bit, since
  4037. 1024-bit is uncomfortably small these days). Addresses ticket 10324.
  4038. Changes in version 0.2.4.20 - 2013-12-22
  4039. Tor 0.2.4.20 fixes potentially poor random number generation for users
  4040. who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their
  4041. torrc file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors,
  4042. and 4) have no state file in their DataDirectory (as would happen on
  4043. first start). Users who generated relay or hidden service identity
  4044. keys in such a situation should discard them and generate new ones.
  4045. This release also fixes a logic error that caused Tor clients to build
  4046. many more preemptive circuits than they actually need.
  4047. o Major bugfixes:
  4048. - Do not allow OpenSSL engines to replace the PRNG, even when
  4049. HardwareAccel is set. The only default builtin PRNG engine uses
  4050. the Intel RDRAND instruction to replace the entire PRNG, and
  4051. ignores all attempts to seed it with more entropy. That's
  4052. cryptographically stupid: the right response to a new alleged
  4053. entropy source is never to discard all previously used entropy
  4054. sources. Fixes bug 10402; works around behavior introduced in
  4055. OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
  4056. and "rl1987".
  4057. - Fix assertion failure when AutomapHostsOnResolve yields an IPv6
  4058. address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.
  4059. - Avoid launching spurious extra circuits when a stream is pending.
  4060. This fixes a bug where any circuit that _wasn't_ unusable for new
  4061. streams would be treated as if it were, causing extra circuits to
  4062. be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.
  4063. o Minor bugfixes:
  4064. - Avoid a crash bug when starting with a corrupted microdescriptor
  4065. cache file. Fixes bug 10406; bugfix on 0.2.2.6-alpha.
  4066. - If we fail to dump a previously cached microdescriptor to disk, avoid
  4067. freeing duplicate data later on. Fixes bug 10423; bugfix on
  4068. 0.2.4.13-alpha. Spotted by "bobnomnom".
  4069. Changes in version 0.2.4.19 - 2013-12-11
  4070. The Tor 0.2.4 release series is dedicated to the memory of Aaron Swartz
  4071. (1986-2013). Aaron worked on diverse projects including helping to guide
  4072. Creative Commons, playing a key role in stopping SOPA/PIPA, bringing
  4073. transparency to the U.S government's PACER documents, and contributing
  4074. design and development for Tor and Tor2Web. Aaron was one of the latest
  4075. martyrs in our collective fight for civil liberties and human rights,
  4076. and his death is all the more painful because he was one of us.
  4077. Tor 0.2.4.19, the first stable release in the 0.2.4 branch, features
  4078. a new circuit handshake and link encryption that use ECC to provide
  4079. better security and efficiency; makes relays better manage circuit
  4080. creation requests; uses "directory guards" to reduce client enumeration
  4081. risks; makes bridges collect and report statistics about the pluggable
  4082. transports they support; cleans up and improves our geoip database;
  4083. gets much closer to IPv6 support for clients, bridges, and relays; makes
  4084. directory authorities use measured bandwidths rather than advertised
  4085. ones when computing flags and thresholds; disables client-side DNS
  4086. caching to reduce tracking risks; and fixes a big bug in bridge
  4087. reachability testing. This release introduces two new design
  4088. abstractions in the code: a new "channel" abstraction between circuits
  4089. and or_connections to allow for implementing alternate relay-to-relay
  4090. transports, and a new "circuitmux" abstraction storing the queue of
  4091. circuits for a channel. The release also includes many stability,
  4092. security, and privacy fixes.
  4093. Changes in version 0.2.4.18-rc - 2013-11-16
  4094. Tor 0.2.4.18-rc is the fourth release candidate for the Tor 0.2.4.x
  4095. series. It takes a variety of fixes from the 0.2.5.x branch to improve
  4096. stability, performance, and better handling of edge cases.
  4097. o Major features:
  4098. - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
  4099. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
  4100. 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
  4101. renegotiation from working with TLS 1.1 or 1.2, so we had disabled
  4102. them to solve bug 6033.)
  4103. o Major bugfixes:
  4104. - No longer stop reading or writing on cpuworker connections when
  4105. our rate limiting buckets go empty. Now we should handle circuit
  4106. handshake requests more promptly. Resolves bug 9731.
  4107. - If we are unable to save a microdescriptor to the journal, do not
  4108. drop it from memory and then reattempt downloading it. Fixes bug
  4109. 9645; bugfix on 0.2.2.6-alpha.
  4110. - Stop trying to bootstrap all our directory information from
  4111. only our first guard. Discovered while fixing bug 9946; bugfix
  4112. on 0.2.4.8-alpha.
  4113. - The new channel code sometimes lost track of in-progress circuits,
  4114. causing long-running clients to stop building new circuits. The
  4115. fix is to always call circuit_n_chan_done(chan, 0) from
  4116. channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
  4117. o Minor bugfixes (on 0.2.4.x):
  4118. - Correctly log long IPv6 exit policies, instead of truncating them
  4119. or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
  4120. - Our default TLS ecdhe groups were backwards: we meant to be using
  4121. P224 for relays (for performance win) and P256 for bridges (since
  4122. it is more common in the wild). Instead we had it backwards. After
  4123. reconsideration, we decided that the default should be P256 on all
  4124. hosts, since its security is probably better, and since P224 is
  4125. reportedly used quite little in the wild. Found by "skruffy" on
  4126. IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
  4127. - Free directory authority certificate download statuses on exit
  4128. rather than leaking them. Fixes bug 9644; bugfix on 0.2.4.13-alpha.
  4129. o Minor bugfixes (on 0.2.3.x and earlier):
  4130. - If the guard we choose first doesn't answer, we would try the
  4131. second guard, but once we connected to the second guard we would
  4132. abandon it and retry the first one, slowing down bootstrapping.
  4133. The fix is to treat all our initially chosen guards as acceptable
  4134. to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
  4135. - Fix an assertion failure that would occur when disabling the
  4136. ORPort setting on a running Tor process while accounting was
  4137. enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
  4138. - When examining the list of network interfaces to find our address,
  4139. do not consider non-running or disabled network interfaces. Fixes
  4140. bug 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
  4141. - Avoid an off-by-one error when checking buffer boundaries when
  4142. formatting the exit status of a pluggable transport helper.
  4143. This is probably not an exploitable bug, but better safe than
  4144. sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
  4145. Pedro Ribeiro.
  4146. o Minor features (protecting client timestamps):
  4147. - Clients no longer send timestamps in their NETINFO cells. These were
  4148. not used for anything, and they provided one small way for clients
  4149. to be distinguished from each other as they moved from network to
  4150. network or behind NAT. Implements part of proposal 222.
  4151. - Clients now round timestamps in INTRODUCE cells down to the nearest
  4152. 10 minutes. If a new Support022HiddenServices option is set to 0, or
  4153. if it's set to "auto" and the feature is disabled in the consensus,
  4154. the timestamp is sent as 0 instead. Implements part of proposal 222.
  4155. - Stop sending timestamps in AUTHENTICATE cells. This is not such
  4156. a big deal from a security point of view, but it achieves no actual
  4157. good purpose, and isn't needed. Implements part of proposal 222.
  4158. - Reduce down accuracy of timestamps in hidden service descriptors.
  4159. Implements part of proposal 222.
  4160. o Minor features (other):
  4161. - Improve the circuit queue out-of-memory handler. Previously, when
  4162. we ran low on memory, we'd close whichever circuits had the most
  4163. queued cells. Now, we close those that have the *oldest* queued
  4164. cells, on the theory that those are most responsible for us
  4165. running low on memory. Based on analysis from a forthcoming paper
  4166. by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
  4167. - Generate bootstrapping status update events correctly when fetching
  4168. microdescriptors. Fixes bug 9927.
  4169. - Update to the October 2 2013 Maxmind GeoLite Country database.
  4170. o Documentation fixes:
  4171. - Clarify the usage and risks of setting the ContactInfo torrc line
  4172. for your relay or bridge. Resolves ticket 9854.
  4173. - Add anchors to the manpage so we can link to the html version of
  4174. the documentation for specific options. Resolves ticket 9866.
  4175. - Replace remaining references to DirServer in man page and
  4176. log entries. Resolves ticket 10124.
  4177. Changes in version 0.2.5.1-alpha - 2013-10-02
  4178. Tor 0.2.5.1-alpha introduces experimental support for syscall sandboxing
  4179. on Linux, allows bridges that offer pluggable transports to report usage
  4180. statistics, fixes many issues to make testing easier, and provides
  4181. a pile of minor features and bugfixes that have been waiting for a
  4182. release of the new branch.
  4183. This is the first alpha release in a new series, so expect there to
  4184. be bugs. Users who would rather test out a more stable branch should
  4185. stay with 0.2.4.x for now.
  4186. o Major features (security):
  4187. - Use the seccomp2 syscall filtering facility on Linux to limit
  4188. which system calls Tor can invoke. This is an experimental,
  4189. Linux-only feature to provide defense-in-depth against unknown
  4190. attacks. To try turning it on, set "Sandbox 1" in your torrc
  4191. file. Please be ready to report bugs. We hope to add support
  4192. for better sandboxing in the future, including more fine-grained
  4193. filters, better division of responsibility, and support for more
  4194. platforms. This work has been done by Cristian-Matei Toader for
  4195. Google Summer of Code.
  4196. - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
  4197. Resolves ticket 6055. (OpenSSL before 1.0.1 didn't have TLS 1.1 or
  4198. 1.2, and OpenSSL from 1.0.1 through 1.0.1d had bugs that prevented
  4199. renegotiation from working with TLS 1.1 or 1.2, so we had disabled
  4200. them to solve bug 6033.)
  4201. o Major features (other):
  4202. - Add support for passing arguments to managed pluggable transport
  4203. proxies. Implements ticket 3594.
  4204. - Bridges now track GeoIP information and the number of their users
  4205. even when pluggable transports are in use, and report usage
  4206. statistics in their extra-info descriptors. Resolves tickets 4773
  4207. and 5040.
  4208. - Make testing Tor networks bootstrap better: lower directory fetch
  4209. retry schedules and maximum interval without directory requests,
  4210. and raise maximum download tries. Implements ticket 6752.
  4211. - Add make target 'test-network' to run tests on a Chutney network.
  4212. Implements ticket 8530.
  4213. - The ntor handshake is now on-by-default, no matter what the
  4214. directory authorities recommend. Implements ticket 8561.
  4215. o Major bugfixes:
  4216. - Instead of writing destroy cells directly to outgoing connection
  4217. buffers, queue them and intersperse them with other outgoing cells.
  4218. This can prevent a set of resource starvation conditions where too
  4219. many pending destroy cells prevent data cells from actually getting
  4220. delivered. Reported by "oftc_must_be_destroyed". Fixes bug 7912;
  4221. bugfix on 0.2.0.1-alpha.
  4222. - If we are unable to save a microdescriptor to the journal, do not
  4223. drop it from memory and then reattempt downloading it. Fixes bug
  4224. 9645; bugfix on 0.2.2.6-alpha.
  4225. - The new channel code sometimes lost track of in-progress circuits,
  4226. causing long-running clients to stop building new circuits. The
  4227. fix is to always call circuit_n_chan_done(chan, 0) from
  4228. channel_closed(). Fixes bug 9776; bugfix on 0.2.4.17-rc.
  4229. o Build features:
  4230. - Tor now builds each source file in two modes: a mode that avoids
  4231. exposing identifiers needlessly, and another mode that exposes
  4232. more identifiers for testing. This lets the compiler do better at
  4233. optimizing the production code, while enabling us to take more
  4234. radical measures to let the unit tests test things.
  4235. - The production builds no longer include functions used only in
  4236. the unit tests; all functions exposed from a module only for
  4237. unit-testing are now static in production builds.
  4238. - Add an --enable-coverage configuration option to make the unit
  4239. tests (and a new src/or/tor-cov target) to build with gcov test
  4240. coverage support.
  4241. o Testing:
  4242. - We now have rudimentary function mocking support that our unit
  4243. tests can use to test functions in isolation. Function mocking
  4244. lets the tests temporarily replace a function's dependencies with
  4245. stub functions, so that the tests can check the function without
  4246. invoking the other functions it calls.
  4247. - Add more unit tests for the <circid,channel>->circuit map, and
  4248. the destroy-cell-tracking code to fix bug 7912.
  4249. - Unit tests for failing cases of the TAP onion handshake.
  4250. - More unit tests for address-manipulation functions.
  4251. o Minor features (protecting client timestamps):
  4252. - Clients no longer send timestamps in their NETINFO cells. These were
  4253. not used for anything, and they provided one small way for clients
  4254. to be distinguished from each other as they moved from network to
  4255. network or behind NAT. Implements part of proposal 222.
  4256. - Clients now round timestamps in INTRODUCE cells down to the nearest
  4257. 10 minutes. If a new Support022HiddenServices option is set to 0, or
  4258. if it's set to "auto" and the feature is disabled in the consensus,
  4259. the timestamp is sent as 0 instead. Implements part of proposal 222.
  4260. - Stop sending timestamps in AUTHENTICATE cells. This is not such
  4261. a big deal from a security point of view, but it achieves no actual
  4262. good purpose, and isn't needed. Implements part of proposal 222.
  4263. - Reduce down accuracy of timestamps in hidden service descriptors.
  4264. Implements part of proposal 222.
  4265. o Minor features (config options):
  4266. - Config (torrc) lines now handle fingerprints which are missing
  4267. their initial '$'. Resolves ticket 4341; improvement over 0.0.9pre5.
  4268. - Support a --dump-config option to print some or all of the
  4269. configured options. Mainly useful for debugging the command-line
  4270. option parsing code. Helps resolve ticket 4647.
  4271. - Raise awareness of safer logging: notify user of potentially
  4272. unsafe config options, like logging more verbosely than severity
  4273. "notice" or setting SafeLogging to 0. Resolves ticket 5584.
  4274. - Add a new configuration option TestingV3AuthVotingStartOffset
  4275. that bootstraps a network faster by changing the timing for
  4276. consensus votes. Addresses ticket 8532.
  4277. - Add a new torrc option "ServerTransportOptions" that allows
  4278. bridge operators to pass configuration parameters to their
  4279. pluggable transports. Resolves ticket 8929.
  4280. - The config (torrc) file now accepts bandwidth and space limits in
  4281. bits as well as bytes. (Anywhere that you can say "2 Kilobytes",
  4282. you can now say "16 kilobits", and so on.) Resolves ticket 9214.
  4283. Patch by CharlieB.
  4284. o Minor features (build):
  4285. - Add support for `--library-versions` flag. Implements ticket 6384.
  4286. - Return the "unexpected sendme" warnings to a warn severity, but make
  4287. them rate limited, to help diagnose ticket 8093.
  4288. - Detect a missing asciidoc, and warn the user about it, during
  4289. configure rather than at build time. Fixes issue 6506. Patch from
  4290. Arlo Breault.
  4291. o Minor features (other):
  4292. - Use the SOCK_NONBLOCK socket type, if supported, to open nonblocking
  4293. sockets in a single system call. Implements ticket 5129.
  4294. - Log current accounting state (bytes sent and received + remaining
  4295. time for the current accounting period) in the relay's heartbeat
  4296. message. Implements ticket 5526; patch from Peter Retzlaff.
  4297. - Implement the TRANSPORT_LAUNCHED control port event that
  4298. notifies controllers about new launched pluggable
  4299. transports. Resolves ticket 5609.
  4300. - If we're using the pure-C 32-bit curve25519_donna implementation
  4301. of curve25519, build it with the -fomit-frame-pointer option to
  4302. make it go faster on register-starved hosts. This improves our
  4303. handshake performance by about 6% on i386 hosts without nacl.
  4304. Closes ticket 8109.
  4305. - Update to the September 4 2013 Maxmind GeoLite Country database.
  4306. o Minor bugfixes:
  4307. - Set the listen() backlog limit to the largest actually supported
  4308. on the system, not to the value in a header file. Fixes bug 9716;
  4309. bugfix on every released Tor.
  4310. - No longer accept malformed http headers when parsing urls from
  4311. headers. Now we reply with Bad Request ("400"). Fixes bug 2767;
  4312. bugfix on 0.0.6pre1.
  4313. - In munge_extrainfo_into_routerinfo(), check the return value of
  4314. memchr(). This would have been a serious issue if we ever passed
  4315. it a non-extrainfo. Fixes bug 8791; bugfix on 0.2.0.6-alpha. Patch
  4316. from Arlo Breault.
  4317. - On the chance that somebody manages to build Tor on a
  4318. platform where time_t is unsigned, correct the way that
  4319. microdesc_add_to_cache() handles negative time arguments.
  4320. Fixes bug 8042; bugfix on 0.2.3.1-alpha.
  4321. - Reject relative control socket paths and emit a warning. Previously,
  4322. single-component control socket paths would be rejected, but Tor
  4323. would not log why it could not validate the config. Fixes bug 9258;
  4324. bugfix on 0.2.3.16-alpha.
  4325. o Minor bugfixes (command line):
  4326. - Use a single command-line parser for parsing torrc options on the
  4327. command line and for finding special command-line options to avoid
  4328. inconsistent behavior for torrc option arguments that have the same
  4329. names as command-line options. Fixes bugs 4647 and 9578; bugfix on
  4330. 0.0.9pre5.
  4331. - No longer allow 'tor --hash-password' with no arguments. Fixes bug
  4332. 9573; bugfix on 0.0.9pre5.
  4333. o Minor fixes (build, auxiliary programs):
  4334. - Stop preprocessing the "torify" script with autoconf, since
  4335. it no longer refers to LOCALSTATEDIR. Fixes bug 5505; patch
  4336. from Guilhem.
  4337. - The tor-fw-helper program now follows the standard convention and
  4338. exits with status code "0" on success. Fixes bug 9030; bugfix on
  4339. 0.2.3.1-alpha. Patch by Arlo Breault.
  4340. - Corrected ./configure advice for what openssl dev package you should
  4341. install on Debian. Fixes bug 9207; bugfix on 0.2.0.1-alpha.
  4342. o Minor code improvements:
  4343. - Remove constants and tests for PKCS1 padding; it's insecure and
  4344. shouldn't be used for anything new. Fixes bug 8792; patch
  4345. from Arlo Breault.
  4346. - Remove instances of strcpy() from the unit tests. They weren't
  4347. hurting anything, since they were only in the unit tests, but it's
  4348. embarassing to have strcpy() in the code at all, and some analysis
  4349. tools don't like it. Fixes bug 8790; bugfix on 0.2.3.6-alpha and
  4350. 0.2.3.8-alpha. Patch from Arlo Breault.
  4351. o Removed features:
  4352. - Remove migration code from when we renamed the "cached-routers"
  4353. file to "cached-descriptors" back in 0.2.0.8-alpha. This
  4354. incidentally resolves ticket 6502 by cleaning up the related code
  4355. a bit. Patch from Akshay Hebbar.
  4356. o Code simplification and refactoring:
  4357. - Extract the common duplicated code for creating a subdirectory
  4358. of the data directory and writing to a file in it. Fixes ticket
  4359. 4282; patch from Peter Retzlaff.
  4360. - Since OpenSSL 0.9.7, the i2d_*() functions support allocating output
  4361. buffer. Avoid calling twice: i2d_RSAPublicKey(), i2d_DHparams(),
  4362. i2d_X509(), and i2d_PublicKey(). Resolves ticket 5170.
  4363. - Add a set of accessor functions for the circuit timeout data
  4364. structure. Fixes ticket 6153; patch from "piet".
  4365. - Clean up exit paths from connection_listener_new(). Closes ticket
  4366. 8789. Patch from Arlo Breault.
  4367. - Since we rely on OpenSSL 0.9.8 now, we can use EVP_PKEY_cmp()
  4368. and drop our own custom pkey_eq() implementation. Fixes bug 9043.
  4369. - Use a doubly-linked list to implement the global circuit list.
  4370. Resolves ticket 9108. Patch from Marek Majkowski.
  4371. - Remove contrib/id_to_fp.c since it wasn't used anywhere.
  4372. Changes in version 0.2.4.17-rc - 2013-09-05
  4373. Tor 0.2.4.17-rc is the third release candidate for the Tor 0.2.4.x
  4374. series. It adds an emergency step to help us tolerate the massive
  4375. influx of users: 0.2.4 clients using the new (faster and safer) "NTor"
  4376. circuit-level handshakes now effectively jump the queue compared to
  4377. the 0.2.3 clients using "TAP" handshakes. This release also fixes a
  4378. big bug hindering bridge reachability tests.
  4379. o Major features:
  4380. - Relays now process the new "NTor" circuit-level handshake requests
  4381. with higher priority than the old "TAP" circuit-level handshake
  4382. requests. We still process some TAP requests to not totally starve
  4383. 0.2.3 clients when NTor becomes popular. A new consensus parameter
  4384. "NumNTorsPerTAP" lets us tune the balance later if we need to.
  4385. Implements ticket 9574.
  4386. o Major bugfixes:
  4387. - If the circuit build timeout logic is disabled (via the consensus,
  4388. or because we are an authority), then don't build testing circuits.
  4389. Fixes bug 9657; bugfix on 0.2.2.14-alpha.
  4390. - Bridges now send AUTH_CHALLENGE cells during their v3 handshakes;
  4391. previously they did not, which prevented them from receiving
  4392. successful connections from relays for self-test or bandwidth
  4393. testing. Also, when a relay is extending a circuit to a bridge,
  4394. it needs to send a NETINFO cell, even when the bridge hasn't sent
  4395. an AUTH_CHALLENGE cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
  4396. - If the time to download the next old-style networkstatus is in
  4397. the future, do not decline to consider whether to download the
  4398. next microdescriptor networkstatus. Fixes bug 9564; bugfix on
  4399. 0.2.3.14-alpha.
  4400. o Minor bugfixes:
  4401. - Avoid double-closing the listener socket in our socketpair()
  4402. replacement (used on Windows) in the case where the addresses on
  4403. our opened sockets don't match what we expected. Fixes bug 9400;
  4404. bugfix on 0.0.2pre7. Found by Coverity.
  4405. o Minor fixes (config options):
  4406. - Avoid overflows when the user sets MaxCircuitDirtiness to a
  4407. ridiculously high value, by imposing a (ridiculously high) 30-day
  4408. maximum on MaxCircuitDirtiness.
  4409. - Fix the documentation of HeartbeatPeriod to say that the heartbeat
  4410. message is logged at notice, not at info.
  4411. - Warn and fail if a server is configured not to advertise any
  4412. ORPorts at all. (We need *something* to put in our descriptor,
  4413. or we just won't work.)
  4414. o Minor features:
  4415. - Track how many "TAP" and "NTor" circuit handshake requests we get,
  4416. and how many we complete, and log it every hour to help relay
  4417. operators follow trends in network load. Addresses ticket 9658.
  4418. - Update to the August 7 2013 Maxmind GeoLite Country database.
  4419. Changes in version 0.2.4.16-rc - 2013-08-10
  4420. Tor 0.2.4.16-rc is the second release candidate for the Tor 0.2.4.x
  4421. series. It fixes several crash bugs in the 0.2.4 branch.
  4422. o Major bugfixes:
  4423. - Fix a bug in the voting algorithm that could yield incorrect results
  4424. when a non-naming authority declared too many flags. Fixes bug 9200;
  4425. bugfix on 0.2.0.3-alpha.
  4426. - Fix an uninitialized read that could in some cases lead to a remote
  4427. crash while parsing INTRODUCE2 cells. Bugfix on 0.2.4.1-alpha.
  4428. Anybody running a hidden service on the experimental 0.2.4.x
  4429. branch should upgrade. (This is, so far as we know, unrelated to
  4430. the recent news.)
  4431. - Avoid an assertion failure when processing DNS replies without the
  4432. answer types we expected. Fixes bug 9337; bugfix on 0.2.4.7-alpha.
  4433. - Avoid a crash when using --hash-password. Fixes bug 9295; bugfix on
  4434. 0.2.4.15-rc. Found by stem integration tests.
  4435. o Minor bugfixes:
  4436. - Fix an invalid memory read that occured when a pluggable
  4437. transport proxy failed its configuration protocol.
  4438. Fixes bug 9288; bugfix on 0.2.4.1-alpha.
  4439. - When evaluating whether to use a connection that we haven't
  4440. decided is canonical using a recent link protocol version,
  4441. decide that it's canonical only if it used address _does_
  4442. match the desired address. Fixes bug 9309; bugfix on
  4443. 0.2.4.4-alpha. Reported by skruffy.
  4444. - Make the default behavior of NumDirectoryGuards be to track
  4445. NumEntryGuards. Now a user who changes only NumEntryGuards will get
  4446. the behavior she expects. Fixes bug 9354; bugfix on 0.2.4.8-alpha.
  4447. - Fix a spurious compilation warning with some older versions of
  4448. GCC on FreeBSD. Fixes bug 9254; bugfix on 0.2.4.14-alpha.
  4449. o Minor features:
  4450. - Update to the July 3 2013 Maxmind GeoLite Country database.
  4451. Changes in version 0.2.4.15-rc - 2013-07-01
  4452. Tor 0.2.4.15-rc is the first release candidate for the Tor 0.2.4.x
  4453. series. It fixes a few smaller bugs, but generally appears stable.
  4454. Please test it and let us know whether it is!
  4455. o Major bugfixes:
  4456. - When receiving a new configuration file via the control port's
  4457. LOADCONF command, do not treat the defaults file as absent.
  4458. Fixes bug 9122; bugfix on 0.2.3.9-alpha.
  4459. o Minor features:
  4460. - Issue a warning when running with the bufferevents backend enabled.
  4461. It's still not stable, and people should know that they're likely
  4462. to hit unexpected problems. Closes ticket 9147.
  4463. Changes in version 0.2.4.14-alpha - 2013-06-18
  4464. Tor 0.2.4.14-alpha fixes a pair of client guard enumeration problems
  4465. present in 0.2.4.13-alpha.
  4466. o Major bugfixes:
  4467. - When we have too much memory queued in circuits (according to a new
  4468. MaxMemInCellQueues option), close the circuits consuming the most
  4469. memory. This prevents us from running out of memory as a relay if
  4470. circuits fill up faster than they can be drained. Fixes bug 9063;
  4471. bugfix on the 54th commit of Tor. This bug is a further fix beyond
  4472. bug 6252, whose fix was merged into 0.2.3.21-rc.
  4473. This change also fixes an earlier approach taken in 0.2.4.13-alpha,
  4474. where we tried to solve this issue simply by imposing an upper limit
  4475. on the number of queued cells for a single circuit. That approach
  4476. proved to be problematic, since there are ways to provoke clients to
  4477. send a number of cells in excess of any such reasonable limit. Fixes
  4478. bug 9072; bugfix on 0.2.4.13-alpha.
  4479. - Limit hidden service descriptors to at most ten introduction
  4480. points, to slow one kind of guard enumeration. Fixes bug 9002;
  4481. bugfix on 0.1.1.11-alpha.
  4482. Changes in version 0.2.4.13-alpha - 2013-06-14
  4483. Tor 0.2.4.13-alpha fixes a variety of potential remote crash
  4484. vulnerabilities, makes socks5 username/password circuit isolation
  4485. actually actually work (this time for sure!), and cleans up a bunch
  4486. of other issues in preparation for a release candidate.
  4487. o Major bugfixes (robustness):
  4488. - Close any circuit that has too many cells queued on it. Fixes
  4489. bug 9063; bugfix on the 54th commit of Tor. This bug is a further
  4490. fix beyond bug 6252, whose fix was merged into 0.2.3.21-rc.
  4491. - Prevent the get_freelists() function from running off the end of
  4492. the list of freelists if it somehow gets an unrecognized
  4493. allocation. Fixes bug 8844; bugfix on 0.2.0.16-alpha. Reported by
  4494. eugenis.
  4495. - Avoid an assertion failure on OpenBSD (and perhaps other BSDs)
  4496. when an exit connection with optimistic data succeeds immediately
  4497. rather than returning EINPROGRESS. Fixes bug 9017; bugfix on
  4498. 0.2.3.1-alpha.
  4499. - Fix a directory authority crash bug when building a consensus
  4500. using an older consensus as its basis. Fixes bug 8833. Bugfix
  4501. on 0.2.4.12-alpha.
  4502. o Major bugfixes:
  4503. - Avoid a memory leak where we would leak a consensus body when we
  4504. find that a consensus which we couldn't previously verify due to
  4505. missing certificates is now verifiable. Fixes bug 8719; bugfix
  4506. on 0.2.0.10-alpha.
  4507. - We used to always request authority certificates by identity digest,
  4508. meaning we'd get the newest one even when we wanted one with a
  4509. different signing key. Then we would complain about being given
  4510. a certificate we already had, and never get the one we really
  4511. wanted. Now we use the "fp-sk/" resource as well as the "fp/"
  4512. resource to request the one we want. Fixes bug 5595; bugfix on
  4513. 0.2.0.8-alpha.
  4514. - Follow the socks5 protocol when offering username/password
  4515. authentication. The fix for bug 8117 exposed this bug, and it
  4516. turns out real-world applications like Pidgin do care. Bugfix on
  4517. 0.2.3.2-alpha; fixes bug 8879.
  4518. - Prevent failures on Windows Vista and later when rebuilding the
  4519. microdescriptor cache. Diagnosed by Robert Ransom. Fixes bug 8822;
  4520. bugfix on 0.2.4.12-alpha.
  4521. o Minor bugfixes:
  4522. - Fix an impossible buffer overrun in the AES unit tests. Fixes
  4523. bug 8845; bugfix on 0.2.0.7-alpha. Found by eugenis.
  4524. - If for some reason we fail to write a microdescriptor while
  4525. rebuilding the cache, do not let the annotations from that
  4526. microdescriptor linger in the cache file, and do not let the
  4527. microdescriptor stay recorded as present in its old location.
  4528. Fixes bug 9047; bugfix on 0.2.2.6-alpha.
  4529. - Fix a memo