Skip to content
Snippets Groups Projects
Commit 527eb563 authored by Nick Mathewson's avatar Nick Mathewson :game_die:
Browse files

Remove changes files for those items already merged in 0.3.2

parent 0b4e59b7
Branches
Tags
No related merge requests found
o Major bugfixes (Exit nodes):
- Fix an issue causing high-bandwidth exit nodes to fail a majority
or all of their DNS requests, making them basically unsuitable for
regular usage in Tor circuits. The problem is related to
libevent's DNS handling, but we can work around it in Tor. Fixes
bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced
eventdns. Credit goes to Dhalgren for identifying and finding a
workaround to this bug and to gamambel, arthuredelstein and
arma in helping to track it down and analyze it.
o Minor bugfixes (path selection):
- When selecting relays by bandwidth, avoid a rounding error that
could sometimes cause load to be imbalanced incorrectly. Previously,
we would always round upwards; now, we round towards the nearest
integer. This had the biggest effect when a relay's weight adjustments
should have given it weight 0, but it got weight 1 instead.
Fixes bug 23318; bugfix on 0.2.4.3-alpha.
- When calculating the fraction of nodes that have descriptors, and all
all nodes in the network have zero bandwidths, count the number of nodes
instead.
Fixes bug 23318; bugfix on 0.2.4.10-alpha.
o Minor bugfixes (onion services):
- Cache some needed onion service client information instead of
continuously computing it over and over again. Fixes bug 23623; bugfix
on 0.3.2.1-alpha.
o Minor bugfixes (relay, crash):
- Avoid a crash when transitioning from client mode to bridge mode.
Previously, we would launch the worker threads whenever our "public
server" mode changed, but not when our "server" mode changed.
Fixes bug 23693; bugfix on 0.2.6.3-alpha.
o Minor bugfixes (scheduler, channel):
- Ignore channels that have been closed while flushing cells. This can
happen if the write on the connection fails leading to the channel being
closed while in the scheduler loop. This is not a complete fix, it is a
bandaid until we are able to refactor those interactions. Fixes bug
23751; bugfix on 0.3.2.1-alpha.
o Minor features (logging, scheduler):
- Introduce a SCHED_BUG() function to log extra information about the
scheduler state if we ever catch a bug in the scheduler. Closes ticket
23753.
o Minor bugfixes (hidden service v3):
- Properly retry HSv3 descriptor fetches in the case where we were initially
missing required directory information. Fixes bug 23762; bugfix on
0.3.2.1-alpha.
o Minor bugfixes (memory leak):
- Fix a minor memory-leak-at-exit in the KIST scheduler. This
bug should have no user-visible impact. Fixes bug 23774;
bugfix on 0.3.2.1-alpha.
o Minor bugfixes (directory client):
- On failure to download directory information, delay retry attempts
by a random amount based on the "decorrelated jitter" algorithm.
Our previous delay algorithm tended to produce extra-long delays too
easily. Fixes bug 23816; bugfix on 0.2.9.1-alpha.
o Minor bugfixes (IPv6, v3 single onion services):
- Remove buggy code for IPv6-only v3 single onion services, and reject
attempts to configure them. This release supports IPv4, dual-stack, and
IPv6-only v3 hidden services; and IPv4 and dual-stack v3 single onion
services. Fixes bug 23820; bugfix on 0.3.2.1-alpha.
o Minor bugfixes (bootstrapping):
- Fetch descriptors aggressively whenever we lack enough
to build circuits, regardless of how many descriptors we are missing.
Previously, we would delay launching the fetch when we had fewer than
15 missing descriptors, even if some of those descriptors were
blocking circuits from building. Fixes bug 23985; bugfix on
0.1.1.11-alpha. The effects of this bug became worse in 0.3.0.3-alpha,
when we began treating missing descriptors from our primary guards
as a reason to delay circuits.
o Minor bugfixes (logging, relay):
- Downgrade a warning to a protocol warning in the case the ed25519 key is
not consistent between the descriptor and micro descriptor of a relay.
This can happen for instance if the relay has been flagged
NoEdConsensus. Fixes bug 24025; bugfix on 0.3.2.1-alpha.
o Minor bugfixes (testing):
- Fix a spurious fuzzing-only use of an uninitialized value.
Found by Brian Carpenter. Fixes bug 24082; bugfix on 0.3.0.3-alpha.
o Minor bugfixes (manpage, hidden service):
- Mention that the HiddenServiceNumIntroductionPoints option is 0-10 for
v2 service and 0-20 for v3 service. Fixes bug 24115; bugfix on
0.3.2.1-alpha.
o Minor bugfixes (v3 onion services):
- Fix a memory leak when decrypting a badly formatted v3 onion
service descriptor. Fixes bug 24150; bugfix on 0.3.2.1-alpha.
Found by OSS-Fuzz; this is OSS-Fuzz issue 3994.
o Minor bugfixes (path selection):
- Actually log the total bandwidth in compute_weighted_bandwidths().
Fixes bug 24170; bugfix on 0.2.4.3-alpha.
o Minor bugfixes (fuzzing):
- Fix a bug in our fuzzing mock replacement for crypto_pk_checksig(), to
correctly handle cases where a caller gives it an RSA key of under 160
bits. (This is not actually a bug in Tor itself, but wrather in our
fuzzing code.) Fixes bug 24247; bugfix on 0.3.0.3-alpha.
Found by OSS-Fuzz as issue 4177.
o Minor features (geoip):
- Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
Country database.
o Minor features (testing):
- Our fuzzing tests now test the encrypted portions of the
v3 hidden service descriptors. Implements more of 21509.
o Minor features (removed deprecations):
- The ClientDNSRejectInternalAddresses flag can once again be set in
non-testing Tor networks, so long as they do not use the default
directory authorities.
This change also removes the deprecation of this
flag in 0.2.9.2-alpha. Closes ticket 21031.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment