Skip to content
Snippets Groups Projects
Commit ec68ed5a authored by Nick Mathewson's avatar Nick Mathewson :game_die:
Browse files

Start on an 0.3.0.1-alpha changelog

parent 69c8d6ad
No related branches found
No related tags found
No related merge requests found
o Minor features (diagnostic, directory client):
- Warn if we find an unexpected inconsistency in directory download
status objects. Prevents some negative consequences of bug 20593.
o Minor bugfixes (configuration):
- Support "TByte" and "TBytes" units in options given in bytes.
"TB", "terabyte(s)", "TBit(s)" and "terabit(s)" were already
supported. Fixes bug 20622; bugfix on 0.2.0.14-alpha.
o Minor bugfixes (documentation):
- Include the "TBits" unit in Tor's man page. Fixes part of bug
20622; bugfix on tor-0.2.5.1-alpha.
o Minor bugfix (util):
- When finishing writing a file to disk, if we were about to replace the
file with the temporary file created before and we fail to replace it,
remove the temporary file so it doesn't stay on disk. Fixes bug 20646;
bugfix on tor-0.2.0.7-alpha. Patch by fk.
o Minor bugfixes (directory downloads):
- Download all consensus flavors, descriptors, and authority certificates
when FetchUselessDescriptors is set, regardless of whether tor is a
directory cache or not.
Fixes bug 20667; bugfix on all recent tor versions.
o Minor bugfixes (descriptors):
- Correctly recognise downloaded full descriptors as valid, even when
using microdescriptors as circuits. This affects clients with
FetchUselessDescriptors set, and may affect directory authorities.
Fixes bug 20839; bugfix on commit 6083276 in 0.2.3.2-alpha.
o Minor bugfixes (hidden services):
- Stop ignoring duplicate hidden services when validating: this could
lead to a crash when those services were created.
Fixes bug 20860; bugfix on 20559; not in any released version of tor.
o Minor bugfixes (directory system):
- Bridges and relays now use microdescriptors (like clients do)
rather than old-style router descriptors. Now bridges will blend in
with clients in terms of the circuits they build. Fixes bug 6769;
bugfix on 0.2.3.2-alpha.
o Minor features (fingerprinting resistence, authentication):
- Extend the length of RSA keys used for TLS link authentication to
2048 bits. (These weren't used for forward secrecy; for forward
secrecy, we used P256.) Closes ticket 13752.
o Major features (protocol, Ed25519):
- Tor relays now use Ed25519 to prove their Ed25519 identities and
Ed25519 to one another, and to clients. This algorithm is faster
and more secure than the RSA-based handshake we've been doing until
now. Implements the second big part of proposal 220; Closes ticket
15055.
o Major features (ed25519 identity keys):
- Relays now understand requests to extend to other relays
by their Ed25519 identity keys. When an Ed25519 identity key
is included in an EXTEND2 cell, the relay will only extend
the circuit if the other relay can prove ownership of that identity.
Implements part of ticket 15056; part of proposal 220.
- Clients now support including Ed25519 identity keys in the EXTEND2
cells they generate. By default, this is controlled by a consensus
parameter, currently disabled. You can turn this feature on for
testing by setting ExtendByEd25519ID in your configuration. This might
make your traffic appear different than the traffic generated by other
users, however.
Implements part of ticket 15056; part of proposal 220.
o Code simplification and refactoring:
- The code to generate and parse EXTEND and EXTEND2 cells has
been replaced with code automatically generated by the "trunnel"
utility.
- Remove data structures that were used to index or_connection objects by
their RSA identity digests. These structures are fully redundant with
the similar structures used in the channel abstraction.
o Minor features (directory authority):
- Add a new authority-only AuthDirTestEd25519LinkKeys option (on by
default) to control whether authorities should try to probe relays by
their Ed25519 link keys. This option will go away in a few
releases--unless we encounter major trouble in our ed25519 link
protocol rollout, in which case it will serve as a safety option.
o Major features (onion services):
- Tor relays now support the HSDir version 3 protocol meaning they can
store and serve v3 descriptors. This is part of the next generation
onion service work detailled in proposal 224. The tor daemon also
contains all the necessary code to encode and decode a v3 descriptor but
it's currently only used by the directory subsystem. Closes ticket 17238.
o Minor features (ed25519 link handshake):
- Advertise support for the ed25519 link handshake using the
subprotocol-versions mechanism, so that clients can tell which
relays can identity themselves by Ed25519 ID. Closes ticket 20552.
o Code simplification and refactoring:
- Refactor circuit_predict_and_launch_new for readability and
testability. Closes ticket 18873.
- Extract magic numbers in circuituse.c into defined variables.
- Refactor circuit_is_available_for_use to remove unnecessary check.
o Minor features (unit tests):
- Extract dummy_origin_circuit_new so it can be used by other test
functions.
- Add unit tests circuit_predict_and_launch_new.
o Code simplification and refactoring (guards):
- Abolish all global guard context in entrynodes.c; replace with new
guard_selection_t structure as preparation for proposal 271. Closes
ticket 19858.
o Code simplification and refactoring:
- Remove redundant behavior of is_sensitive_dir_purpose, refactor to use
only purpose_needs_anonymity. Closes part of ticket 20077.
- Refactor large if statement in purpose_needs_anonymity to use switch
statement instead. Closes part of ticket 20077.
o Documentation (Onion Services):
- tor's man page incorrectly states that HiddenServiceDir must already
exist. This is not true. Fixes 20486.
o Code simplification and refactoring:
- Refactor the hashing API to return negative values for errors, as is done
as throughout the codebase. Closes ticket 20717.
o Removed features:
- The UseDirectoryGuards torrc options is
no longer present: all users that use entry guards will also use
directory guards. Related to proposal 271; implements part of
ticket 20831.
o Removed features:
- The AuthDirMaxServersPerAuthAddr option no longer exists: The same
limit for relays running on a single IP applies to authority IP
addresses as well as to non-authority IP addresses. Closes ticket
20960.
o Testing:
- Perform the coding style checks when running the tests and fail when
coding style violations are found. Closes ticket 5500.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment