Skip to content
Snippets Groups Projects
Commit 49062d72 authored by Nick Mathewson's avatar Nick Mathewson :game_die:
Browse files

Start on 0.4.0.1-alpha changelog

parent 13920217
No related branches found
No related tags found
No related merge requests found
Changes in version 0.4.0.1-alpha - 2019-01-18
blurb blurb blurb
o Major features (battery management, client, dormant mode):
- When Tor is running as a client, and it is unused for a long time,
it can now enter a "dormant" state. When Tor is dormant, it avoids
network activity and CPU wakeups until it is reawoken either by a
user request or by a controller command. For more information, see
the configuration options starting with "Dormant". Implements
tickets 2149 and 28335.
- The client's memory of whether it is "dormant", and how long it
has spend idle, persists across invocations. Implements
ticket 28624.
- There is a DormantOnFirstStartup option that integrators can use
if they expect that in many cases, Tor will be installed but
not used.
o Major features (bootstrap):
- Report the first connection to a relay as the earliest phases of
bootstrap progress, regardless of whether it's a connection for
building application circuits. This allows finer-grained reporting
of early progress than previously possible with the improvements
of ticket 27169. Closes tickets 27167 and 27103. Addresses
ticket 27308.
- Separately report the intermediate stage of having connected to a
proxy or pluggable transport, versus succesfully using that proxy
or pluggable transport to connect to a relay. Closes tickets 27100
and 28884.
o Major features (circuit padding):
- Implement preliminary support for the circuit padding portion of
Proposal 254. The implementation supports Adaptive Padding (aka
WTF-PAD) state machines for use between experimental clients and
relays. Support is also provided for APE-style state machines that
use probability distributions instead of histograms to specify
inter-packet delay. At the moment, Tor does not provide any
padding state machines that are used in normal operation -- this
feature exists solely for experimentation in this release. Closes
ticket 28142.
o Major features (refactoring):
- Tor now uses an explicit list of its own subsystems when
initializing and shutting down. Previously, these systems were
managed implicitly though various places throughout the codebase.
(There still some subsystems using the old system.) Closes
ticket 28330.
o Minor feature (bootstrap):
- When reporting bootstrap progress, stop distinguishing between
situations where it seems that only internal paths are available
and situations where it seems that external paths are available.
Previously, tor would often erroneously report that it had only
internal paths. Closes ticket 27402.
o Minor features (Continuous Integration):
- Log Python version during each Travis CI job. Resolves
issue 28551.
o Minor features (controller):
- Add a DROPOWNERSHIP command to undo the effects of TAKEOWNERSHIP.
Implements ticket 28843.
o Minor features (developer tooling):
- Provide a git hook script to prevent "fixup!" and "squash!"
commits from ending up in master. Closes ticket 27993.
o Minor features (directory authority):
- Directory authorities support a new consensus algorithm, under
which microdescriptor entries are encoded in a canonical form.
This improves their compressibility in transit and on the client.
Closes ticket 28266; implements proposal 298.
o Minor features (directory authority, relay):
- Authorities now vote on a "StaleDesc" flag to indicate that a
relay's descriptor is so old that the relay should upload again
soon. Relays understand this flag, and treat it as a signal to
upload a new descriptor. This flag will eventually let us remove
the 'published' date from routerstatus entries, and save a great
deal of space in our consensus diffs. Closes ticket 26770;
implements proposal 293.
o Minor features (fallback directory mirrors):
- Update the fallback whitelist based on operator opt-ins and opt-
outs. Closes ticket 24805, patch by Phoul.
- Accept fallbacks that deliver reasonably live consensuses.
(Consensuses that will become valid less than 24 hours in the
future, or that expired less than 24 hours ago.) Closes
ticket 28768.
- Accept relays that are a fuzzy match to a fallback whitelist
entry. If a relay matches at least one fingerprint, IPv4 address,
or IPv6 address in the fallback whitelist, it can become a
fallback. This reduces the work required to keep the list up to
date. Closes ticket 24838.
o Minor features (FreeBSD):
- Warn relay operators if the "net.inet.ip.random_id" sysctl (IP ID
randomization) is disabled on their relay if it is running on
FreeBSD based operating systems. Closes ticket 28518.
o Minor features (HTTP standards compliance):
- Don't send Content-Type: application/octet-stream for transparently
compressed documents, which confused browsers. Closes ticket 28100.
o Minor features (ipv6):
- We add an option ClientAutoIPv6ORPort which makes clients randomly
prefer a node's IPv4 or IPv6 ORPort. The random preference is set
every time a node is loaded from a new consensus or bridge config.
Closes ticket 27490. Patch by Neel Chauhan.
- When using addrs_in_same_network_family(), check IPv6 subnets as
well as IPv4 ones where possible when a client chooses circuit
paths. Previously, we used this function only for IPv4 subnets.
Closes ticket 24393. Patch by Neel Chauhan.
o Minor features (log messages):
- Improve log message in HSv3 service that could print out negative
revision counters. Closes ticket 27707. Patch by "ffmancera".
o Minor features (memory usage):
- Store microdescriptor family lists with a more compact
representation to save memory. Closes ticket 27359.
- Tor clients no longer need to keep the full text of a consensus in
memory in order to parse it, or apply a diff to it. Instead, they
use mmap() to read the consensus files from disk. Closes
ticket 27244.
o Minor features (parsing):
- Directory authorities now validate that router descriptors and
ExtraInfo documents are in a valid subset of UTF-8, and reject
them if not. Closes ticket 27367.
o Minor features (performance):
- Avoid parsing the same protocol-versions string over and over in
summarize_protover_flags(). This should save us a huge number of
malloc calls on startup, and may reduce memory fragmentation with
some allocators. Closes ticket 27225.
- Remove a needless memset() call from get_token_arguments, thereby
speeding up the tokenization of directory objects by about 20%.
Closes ticket 28852.
- Replace parse_short_policy() with a faster implementation, to
improve microdescriptor parsing time. Closes ticket 28853.
- Speed up directory parsing a little by avoiding use of the non-
inlined strcmp_len() function. Closes ticket 28856.
- Speed up microdesriptor parsing by about 30%, to help improve
startup time. Closes ticket 28839.
o Minor features (pluggable transports):
- Add support for emitting STATUS updates to Tor's control port from
a pluggable transport process. Closes ticket 28846.
- Add support for logging to Tor's logging subsystem from a
pluggable transport process. Closes ticket 28180
o Minor features (process management):
- Add new Process API for handling child processes. This new API
allows Tor to have bi-directional communication with child
processes on both Unix and Windows. Closes ticket 28179.
- Use the subsystem module to initialize and shut down the process
module. Closes ticket 28847.
o Minor features (relay):
- When listing relay families, list them in canonical form including
the relay's own identity, and try to give a more useful set of
warnings. Part of ticket 28266 and proposal 298.
o Minor features (required protocols):
- Tor no longer exits if it is missing a required protocol, if the
consensus that requires the protocol predates the release date of
the version of Tor. This change prevents Tor releases from exiting
because of an old cached consensus, on the theory that a newer
cached consensus might not require the protocol. Implements
proposal 297; closes ticket 27735.
o Minor features (testing):
- Allow HeartbeatPeriod of less than 30 minutes in testing Tor
networks. Closes ticket 28840, patch by robgjansen
o Minor bugfixes (client, bootstrap):
- When Tor's clock is behind the clocks on the authorities, allow
Tor to bootstrap successfully. Fixes bug 28591; bugfix
on 0.2.0.9-alpha.
o Minor bugfixes (client, guard selection):
- When Tor's consensus has expired, but is still reasonably live,
use it to select guards. Fixes bug 24661; bugfix on 0.3.0.1-alpha.
o Minor bugfixes (compilation):
- Fix missing headers required for proper detection of OpenBSD. Fixes
bug 28938; bugfix on 0.3.5.1-alpha. Patch from Kris Katterjohn.
o Minor bugfixes (directory clients):
- Mark outdated dirservers when Tor only has a reasonably live
consensus. Fixes bug 28569; bugfix on 0.3.2.5-alpha.
o Minor bugfixes (directory mirror):
- When Tor's clock is behind the clocks on the authorities, allow
Tor to serve future consensuses. Fixes bug 28654; bugfix
on 0.3.0.1-alpha.
o Minor bugfixes (DNS):
- Gracefully handle empty or absent resolve.conf file by falling
back to using localhost DNS service and hoping it works. Fixes bug
21900; bugfix on 0.2.1.10-alpha.
o Minor bugfixes (fallback scripts):
- In updateFallbackDirs.py, call the filter file a "fallback list"
instead of a "whitelist" in check_existing mode. Fixes bug 24953;
bugfix on 0.3.0.3-alpha.
o Minor bugfixes (guards):
- In count_acceptable_nodes(), check if we have at least one bridge
or guard node, and two non-guard nodes for a circuit. Previously,
we have added up the sum of all nodes with a descriptor, but that
could cause us to build circuits that fail if we had either too
many bridges, or not enough guard nodes. Fixes bug 25885; bugfix
on 0.3.6.1-alpha. Patch by Neel Chauhan.
o Minor bugfixes (IPv6):
- Fix tor_ersatz_socketpair on IPv6-only systems. Previously, the
IPv6 socket was bound using an address family of AF_INET instead
of AF_INET6. Fixes bug 28995; bugfix on 0.3.5.1-alpha. Patch from
Kris Katterjohn.
o Minor bugfixes (logging):
- Rework rep_hist_log_link_protocol_counts() to iterate through all
link protocol versions when logging incoming/outgoing connection
counts. Tor no longer skips version 5 and we don't have to
remember to update this function when new link protocol version is
developed. Fixes bug 28920; bugfix on 0.2.6.10.
o Minor bugfixes (networking):
- Introduce additional checks into tor_addr_parse() to reject
certain incorrect inputs that previously were not detected. Fixes
bug 23082; bugfix on 0.2.0.10-alpha.
o Minor bugfixes (onion service v3, client):
- Avoid a BUG() stacktrace in case a SOCKS connection is found
waiting for the descriptor while we do have it in the cache. There
is a rare case when this can happen. Now, tor will recover and
retry the descriptor. Fixes bug 28669; bugfix on 0.3.2.4-alpha.
o Minor bugfixes (periodic events):
- Refrain from calling routerlist_remove_old_routers() from
check_descriptor_callback(). Instead, create a new periodic event
that will run once every hour even if Tor is not configured as
onion router. Fixes bug 27929; bugfix on 0.2.8.1-alpha.
o Minor bugfixes (pluggable transports):
- Make sure that data is continously read from standard out and
error of the PT child-process to avoid deadlocking when the pipes'
buffer is full. Fixes bug 26360; bugfix on 0.2.3.6-alpha.
o Minor bugfixes (unit tests):
- Instead of relying on hs_free_all() to clean up all onion service
objects we created in test_build_descriptors(), deallocate them
one by one. This lets Coverity know that we are not leaking memory
here and fixes CID 1442277. Fixes bug 28989; bugfix
on 0.3.5.1-alpha.
o Minor bugfixes (usability):
- Stop saying "Your Guard ..." in pathbias_measure_{use,close}_rate()
as that confusingly suggests that mentioned guard node is under
control and responsibility of end user, which it is not. Fixes bug
28895; bugfix on Tor 0.3.0.1-alpha.
o Code simplification and refactoring:
- Reimplement NETINFO cell parsing and generation to rely on
trunnel-generated wire format handling code. Closes ticket 27325.
- Remove unnecessarily unsafe code from the rust macro cstr!. Closes
ticket 28077.
- Rework SOCKS wire format handling to rely on trunnel-generated
parsing/generation code. Resolves ticket 27620.
- Split out bootstrap progress reporting from control.c into a
separate file. Part of ticket 27402.
- The .may_include files that we use to describe our directory-by-
directory dependency structure now describe a noncircular
dependency graph over the directories that they cover. Our
checkIncludes.py tool now enforces this. Closes ticket 28362.
o Documentation:
- Mention that you cannot add new Onion Service if Tor is already
running with Sandbox enabled. Closes ticket 28560.
- Improve ControlPort description in tor manpage to mention that it
accepts address/port pair, and can be used multiple times. Closes
ticket 28805.
- Document the exact output of "tor --version". Closes ticket 28889.
o Removed features:
- Stop responding to 'GETINFO status/version/num-concurring' and
'GETINFO status/version/num-versioning' control port commands, as
those were deprecated back in 0.2.0.30. Also stop listing them in
output of 'GETINFO info/names'. Resolves ticket 28757.
- The scripts used to generate and maintain the list of fallback
directories have been extracted into a new "fallback-scripts"
repository. Closes ticket 27914.
o Testing:
- Run shellcheck for stuff in scripts/ directory. Closes
ticket 28058.
- Write some unit tests for tokenize_string() and get_next_token()
functions. Resolves ticket 27625.
o Code simplification and refactoring (onion service v3):
- Consolidate the authorized client descriptor cookie computation
code from client and service into one function. Closes
ticket 27549.
o Code simplification and refactoring (shell scripts):
- Cleanup scan-build.sh to silence shellcheck warnings. Closes
ticket 28007.
- Fix issues that shellcheck found in chutney-git-bisect.sh.
Resolves ticket 28006.
- Fix issues that shellcheck found in updateRustDependencies.sh.
Resolves ticket 28012.
- Fix shellcheck warnings in cov-diff script. Resolves issue 28009.
- Fix shellcheck warnings in run_calltool.sh. Resolves ticket 28011.
- Fix shellcheck warnings in run_trunnel.sh. Resolves issue 28010.
- Fix shellcheck warnings in scripts/test/coverage. Resolves
issue 28008.
Changes in version 0.3.3.11 - 2018-01-07
Tor 0.3.3.11 backports numerous fixes from later versions of Tor.
numerous fixes, including an important fix for anyone using OpenSSL
o Minor bugfixes (DNS):
- Gracefully handle empty or absent resolve.conf file by falling
back to using localhost DNS service and hoping it works. Fixes
bug 21900; bugfix on 0.2.1.10-alpha.
o Minor bugfixes (networking):
- Introduce additional checks into tor_addr_parse() to
reject certain incorrect inputs that previously were
not detected. Fixes bug 23082; bugfix on 0.2.0.10-alpha.
o Minor features (ipv6):
- When using addrs_in_same_network_family(), check IPv6 subnets as well as
IPv4 ones where possible when a client chooses circuit paths. Previously,
we used this function only for IPv4 subnets. Closes ticket 24393. Patch
by Neel Chauhan.
o Minor bugfixes (client, guard selection):
- When Tor's consensus has expired, but is still reasonably live, use it
to select guards. Fixes bug 24661; bugfix on 0.3.0.1-alpha.
o Minor bugfixes (fallback scripts):
- In updateFallbackDirs.py, call the filter file a "fallback list"
instead of a "whitelist" in check_existing mode.
Fixes bug 24953; bugfix on 0.3.0.3-alpha.
o Minor bugfixes (guards):
- In count_acceptable_nodes(), check if we have at least one bridge
or guard node, and two non-guard nodes for a circuit. Previously,
we have added up the sum of all nodes with a descriptor, but that
could cause us to build circuits that fail if we had either too
many bridges, or not enough guard nodes. Fixes bug 25885; bugfix
on 0.3.6.1-alpha. Patch by Neel Chauhan.
o Minor features (log messages):
- Improve log message in HSv3 service that could print out negative
revision counters. Closes ticket 27707. Patch by "ffmancera".
\ No newline at end of file
o Minor bugfixes (periodic events):
- Refrain from calling routerlist_remove_old_routers() from
check_descriptor_callback(). Instead, create a new periodic
event that will run once every hour even if Tor is not configured
as onion router. Fixes bug 27929; bugfix on 0.2.8.1-alpha.
o Minor features (FreeBSD):
- Warn relay operators if the "net.inet.ip.random_id" sysctl (IP ID
randomization) is disabled on their relay if it is running on FreeBSD
based operating systems. Closes ticket 28518.
o Minor bugfixes (unit tests, directory clients):
- Mark outdated dirservers when Tor only has a reasonably live consensus.
Fixes bug 28569; bugfix on 0.3.2.5-alpha.
o Minor bugfixes (client, bootstrap):
- When Tor's clock is behind the clocks on the authorities, allow Tor to
bootstrap successfully. Fixes bug 28591; bugfix on 0.2.0.9-alpha.
o Minor bugfixes (directory mirror):
- When Tor's clock is behind the clocks on the authorities, allow Tor to
serve future consensuses. Fixes bug 28654; bugfix on 0.3.0.1-alpha.
o Minor bugfixes (usability):
- Stop saying "Your Guard ..." in pathbias_measure_{use,close}_rate()
as that confusingly suggests that mentioned guard node is under control
and responsibility of end user, which it is not. Fixes bug 28895;
bugfix on Tor 0.3.0.1-alpha.
o Minor bugfixes (logging):
- Rework rep_hist_log_link_protocol_counts() to iterate through all link
protocol versions when logging incoming/outgoing connection counts. Tor
no longer skips version 5 and we don't have to remember to update this
function when new link protocol version is developed. Fixes bug 28920;
bugfix on 0.2.6.10.
o Minor bugfixes (compilation):
- Fix missing headers required for proper detection of
OpenBSD. Fixes bug 28938; bugfix on 0.3.5.1-alpha.
Patch from Kris Katterjohn.
o Minor bugfixes (unit tests):
- Instead of relying on hs_free_all() to clean up all onion service
objects we created in test_build_descriptors(), deallocate
them one by one. This lets Coverity know that we are not leaking memory
here and fixes CID 1442277. Fixes bug 28989; bugfix on 0.3.5.1-alpha.
o Minor bugfix (IPv6):
Fix tor_ersatz_socketpair on IPv6-only systems. Previously,
the IPv6 socket was bound using an address family of AF_INET
instead of AF_INET6. Fixes bug 28995; bugfix on 0.3.5.1-alpha.
Patch from Kris Katterjohn.
o Documentation (hidden service manpage, sandbox):
- Mention that you cannot add new Onion Service if Tor is already
running with Sandbox enabled. Closes ticket 28560.
o Documentation (manpage):
- Improve ControlPort description in tor manpage to mention that it
accepts address/port pair, and can be used multiple times. Closes ticket
28805.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment