Commit 9aebb252 authored by Nick Mathewson's avatar Nick Mathewson 👜
Browse files

Initial incorporation of 0.4.3.x changelogs.

parent 722a6d3e
This diff is collapsed.
o Minor features (defense in depth):
- Add additional sanity checks around tor_vasprintf() usage in case the
function returns an error. Patch by Tobias Stoeckmann. Fixes ticket 31147.
o Minor features (controller):
- Add stream isolation data to STREAM event. Closes ticket 19859.
o Major features (directory authority, ed25519):
Add support for banning a relay's ed25519 keys in the approved-routers
file. This will allow us to migrate away from RSA keys in the future.
Previously, only RSA keys could be banned in approved-routers. Resolves
ticket 22029. Patch by Neel Chauhan.
o Minor bugfixes (onion service v2):
- When sending the INTRO cell for a v2 Onion Service, look at the failure
cache alongside timeout values to check if the intro point is marked
as failed. Previously, we only looked at if the relay timeout values.
Fixes bug 25568; bugfix on 0.2.7.3-rc. Patch by Neel Chauhan.
o Minor bugfixes (linux seccomp sandbox):
- Correct how we use libseccomp. Particularly, stop assuming that
rules are applied in a particular order or that more rules are
processed after the first match. Neither is the case! In libseccomp
<2.4.0 this lead to some rules having no effect. Libseccomp 2.4.0
changed how rules are generated leading to a different ordering
which in turn lead to a fatal crash during startup. Fixes bug
29819; bugfix on 0.2.5.1-alpha. Patch by Peter Gerber.
o Major features (controller):
- New ONION_CLIENT_AUTH_ADD control port command to add client-side onion
service client authorization credentials. Closes part of ticket 30381.
- New ONION_CLIENT_AUTH_REMOVE control port command to remove client-side
onion service client authorization credentials. Closes part of ticket
30381.
- New ONION_CLIENT_AUTH_VIEW control port command to view stored
client-side onion service client authorization credentials. Closes part
of ticket 30381.
\ No newline at end of file
o Minor bugfixes (configuration handling):
- Make control_event_conf_changed() take in a config_line_t instead of
a smartlist(k, v, k, v, ...) where keys are followed by values. Fixes
bug 31531; bugfix on 0.2.3.3-alpha. Patch by Neel Chauhan.
o Minor bugfixes (tests):
- Our option-validation tests no longer depend on specially configured
non-default, non-passing set of options. Previously, the tests had
been written to assume that options would _not_ be set to their
defaults, which led to needless complexity and verbosity.
Fixes bug 32175; bugfix on 0.2.8.1-alpha.
o Minor bugfixes (dirauth module):
- When the dirauth module is disabled, reject attempts to set the
AuthoritativeDir option, rather than ignoring the value of the
option. Fixes bug 32213; bugfix on 0.3.4.1-alpha.
- Split the dirauth config code into a separate file in the dirauth
module. Disable this code when the dirauth module is disabled.
Closes ticket 32213.
o Minor features (relay module):
- When the relay module is disabled, reject attempts to set the
ORPort, DirPort, DirCache, BridgeRelay, ExtORPort, or
ServerTransport* options, rather than ignoring the values of these
options. Closes ticket 32213.
- Split the relay and server pluggable transport config code into
separate files in the relay module. Disable this code when the relay
module is disabled. Closes ticket 32213.
o Code simplification and refactoring:
- Simplify some relay and dirauth config code. Closes ticket 32213.
o Testing:
- Improve test coverage for relay and dirauth config code, focusing on
option validation and normalization. Closes ticket 32213.
o Major bugfixes (networking):
- Correctly handle IPv6 addresses in SOCKS5 RESOLVE_PTR requests,
and accept strings as well as binary addresses. Fixes bug 32315;
bugfix on 0.3.5.1-alpha.
o Minor bugfixes (config):
- When dumping the config, stop adding a trailing space after the option
name, when there is no option value. This issue only affects options
that accept an empty value or list. (Most options reject empty values,
or delete the entire line from the dumped options.)
Fixes bug 32352; bugfix on 0.0.9pre6.
o Minor bugfixes (test):
- Use the same code to find the tor binary in all of our test scripts.
This change makes sure we are always using the coverage binary, when
coverage is enabled. Fixes bug 32368; bugfix on 0.2.7.3-rc.
o Minor bugfixes (build):
- Fix "make autostyle" for out-of-tree builds.
Fixes bug 32370; bugfix on 0.4.1.2-alpha.
o Minor bugfixes (scripts):
- Fix update_versions.py for out-of-tree builds.
Fixes bug 32371; bugfix on 0.4.0.1-alpha.
o Minor bugfixes (testing):
- Stop ignoring "tor --dump-config" errors in test_parseconf.sh.
Fixes bug 32468; bugfix on 0.4.2.1-alpha.
o Minor bugfixes (onion services):
- In cancel_descriptor_fetches(), use connection_list_by_type_purpose()
instead of connection_list_by_type_state(). Fixes bug 32639; bugfix on
0.3.2.1-alpha. Patch by Neel Chauhan.
o Minor bugfixes (bridges):
- Lowercase the value of BridgeDistribution from torrc before adding it to
the descriptor. Fixes bug 32753; bugfix on 0.3.2.3-alpha.
o Minor bugfixes (logging, crash):
- Avoid a possible crash when trying to log a (fatal) assertion failure
about mismatched magic numbers in configuration objects. Fixes bug 32771;
bugfix on 0.4.2.1-alpha.
o Minor bugfixes (windows service):
- Initialize publish/subscribe system when running as a windows service.
Fixes bug 32778; bugfix on 0.4.1.1-alpha.
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment