tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 06c31b1b79cd0dfac72893bdb5b058aa2d9cbe7a
parent db10d001997a820aa89bdb81def86b42d230faf1
Author: Nick Mathewson <nickm@torproject.org>
Date:   Wed, 12 Aug 2020 08:51:43 -0400

Remove changes files that have also appeared in 0.4.4 releases.

Diffstat:
Dchanges/bug16016 | 4----
Dchanges/bug27315 | 6------
Dchanges/bug31036 | 3---
Dchanges/bug33119 | 4----
Dchanges/bug34084 | 3---
Dchanges/bug34086 | 3---
Dchanges/bug40001 | 4----
Dchanges/bug40020 | 9---------
Dchanges/bug40028 | 3---
Dchanges/bug40072 | 4----
Dchanges/bug40076 | 5-----
Dchanges/bug40083 | 5-----
Dchanges/bug40095 | 4----
Dchanges/ticket31812 | 4----
Dchanges/ticket32622 | 5-----
Dchanges/ticket32696 | 7-------
Dchanges/ticket33346 | 3---
Dchanges/ticket33747 | 7-------
Dchanges/ticket33796 | 7-------
Dchanges/ticket33873 | 4----
Dchanges/ticket33880 | 6------
Dchanges/ticket34087 | 3---
Dchanges/ticket34382 | 6------
Dchanges/ticket40003 | 3---
Dchanges/ticket40005 | 3---
Dchanges/ticket40026 | 3---
Dchanges/ticket40030 | 7-------
Dchanges/ticket40035 | 5-----
Dchanges/ticket40061 | 5-----
Dchanges/ticket40081 | 6------
Dchanges/ticket6198 | 3---
31 files changed, 0 insertions(+), 144 deletions(-)

diff --git a/changes/bug16016 b/changes/bug16016 @@ -1,4 +0,0 @@ - o Minor bugfixes (logging): - - Downgrade a noisy log message that could occur naturally when - receiving an extrainfo document that we no longer want. - Fixes bug 16016; bugfix on 0.2.6.3-alpha. diff --git a/changes/bug27315 b/changes/bug27315 @@ -1,6 +0,0 @@ - o Minor bugfixes (linux seccomp2 sandbox): - - Fix a regression on sandboxing rules for the openat() syscall. - The fix for bug 25440 fixed the problem on systems with glibc >= - 2.27 but broke tor on previous versions of glibc. We now apply - the correct seccomp rule according to the running glibc version. - Patch from Daniel Pinto. Fixes bug 27315; bugfix on 0.3.5.11. diff --git a/changes/bug31036 b/changes/bug31036 @@ -1,3 +0,0 @@ - o Minor bugfixes (windows): - - Fix a bug that prevented Tor from starting if its log file - grew above 2GB. Fixes bug 31036; bugfix on 0.2.1.8-alpha. diff --git a/changes/bug33119 b/changes/bug33119 @@ -1,4 +0,0 @@ - o Major bugfixes (NSS): - - Fix out-of-bound memory access in `tor_tls_cert_matches_key()` when Tor is - compiled with NSS support. Fixes bug 33119; bugfix on 0.3.5.1-alpha. This - issue is also tracked as TROVE-2020-001. diff --git a/changes/bug34084 b/changes/bug34084 @@ -1,3 +0,0 @@ - o Minor bugfixes (onion services v3): - - Avoid a non-fatal assert log in an edge-case of opening an intro circuit - as a client. Fixes bug 34084; bugfix on 0.3.2.1-alpha. diff --git a/changes/bug34086 b/changes/bug34086 @@ -1,3 +0,0 @@ - o Minor bugfixes (onion service v3): - - Remove a BUG() warning that could trigger in certain unlikely edge-cases. - Fixes bug 34086; bugfix on 0.3.2.1-alpha. diff --git a/changes/bug40001 b/changes/bug40001 @@ -1,3 +0,0 @@ - o Minor features (entry guards): - - Reinstate support for GUARD NEW/UP/DOWN control port events. - Closes ticket 40001. -\ No newline at end of file diff --git a/changes/bug40020 b/changes/bug40020 @@ -1,9 +0,0 @@ - o Minor bugfixes (linux seccomp2 sandbox): - - Makes the seccomp sandbox allow the correct syscall for opendir - according to the running glibc version. The opendir function - either uses open or openat but the current code does not - differenciate between opendir and open calls. This adds a new - seccomp sandbox rule for opendir. This fixes crashes when - reloading torrc with sandbox enabled when running on glibc - 2.15 to 2.21 and 2.26. Patch from Daniel Pinto. Fixes bug 40020; - bugfix on 0.3.5.11. diff --git a/changes/bug40028 b/changes/bug40028 @@ -1,3 +0,0 @@ - o Minor bugfixes (compiler warnings): - - Fix a compiler warning on platforms with 32-bit time_t values. - Fixes bug 40028; bugfix on 0.3.2.8-rc. diff --git a/changes/bug40072 b/changes/bug40072 @@ -1,4 +0,0 @@ - o Minor bugfixes (linux seccomp2 sandbox): - - Fix startup crash with seccomp sandbox enabled when tor tries to - open the data directory. Patch from Daniel Pinto. Fixes bug 40072; - bugfix on 0.4.4.3-alpha-dev. diff --git a/changes/bug40076 b/changes/bug40076 @@ -1,5 +0,0 @@ - o Minor bugfixes (correctness, buffers): - - Fix a correctness bug that could cause an assertion failure if we ever - tried using the buf_move_all() function with an empty input. - As far as we know, no released versions of Tor do this. - Fixes bug 40076; bugfix on 0.3.3.1-alpha. diff --git a/changes/bug40083 b/changes/bug40083 @@ -1,5 +0,0 @@ - o Minor bugfixes (relay, self-testing): - - When starting up as a relay, if we haven't been able to verify that - we're reachable, only launch reachability tests at most once a minute. - Previously, we had been launching tests up to once a second, which - was needlessly noisy. Fixes bug 40083; bugfix on 0.2.8.1-alpha. diff --git a/changes/bug40095 b/changes/bug40095 @@ -1,4 +0,0 @@ - o Minor bugfixes (testing): - - When running the subsystem order check, use the python binary - configured with the PYTHON environment variable. Fixes bug 40095; - bugfix on 0.4.4.1-alpha. diff --git a/changes/ticket31812 b/changes/ticket31812 @@ -1,4 +0,0 @@ - o Documentation: - - Replace most http:// URLs in our code and documentation with https:// - URLs. (We have left unchanged the code in src/ext/, and the text in - LICENSE.) Closes ticket 31812. Patch from Jeremy Rand. diff --git a/changes/ticket32622 b/changes/ticket32622 @@ -1,5 +0,0 @@ - o Minor features (bootstrap reporting): - - Report more detailed reasons for bootstrap failure when the failure - happens due to a TLS error. Previously we would just call these errors - "MISC" when they happened during read, and "DONE" when they - happened during any other TLS operation. Closes ticket 32622. diff --git a/changes/ticket32696 b/changes/ticket32696 @@ -1,7 +0,0 @@ - o Minor features (directory authority): - - Authorities now recommend protocol versions that are supported - by Tor 0.3.5 and later. (Earlier versions of Tor have been - deprecated since January of this year.) This recommendation - will cause older clients and relays to give a warning on startup, - or when they download a consensus directory. - Closes ticket 32696. diff --git a/changes/ticket33346 b/changes/ticket33346 @@ -1,3 +0,0 @@ - o Minor features (linux seccomp2 sandbox): - - Permit the unlinkat() syscall, which some Libc implementations - use to implement unlink(). Closes ticket 33346. diff --git a/changes/ticket33747 b/changes/ticket33747 @@ -1,7 +0,0 @@ - o Minor bugfixes (rate limiting, bridges, pluggable transports): - - On a bridge, treat all connections from an ExtORPort as remote - by default for the purposes of rate-limiting. Previously, - bridges would treat the connection as local unless they explicitly - received a "USERADDR" command. ExtORPort connections still - count as local if there is a USERADDR command with an explicit local - address. Fixes bug 33747; bugfix on 0.2.5.1-alpha. diff --git a/changes/ticket33796 b/changes/ticket33796 @@ -1,7 +0,0 @@ - o Removed features (IPv6, revert): - - Revert the client port prefer IPv6 feature because it breaks the - torsocks use case. The SOCKS resolve command is lacking a mechanism to - ask for a specific address family (v4 or v6) thus prioritizing IPv6 when - an IPv4 address is asked on the resolve SOCKS interface resulting in a - failure. Tor Browser explicitly set PreferIPv6 so this should not affect - the majority of our users. Closes ticket 33796; bugfix on 0.4.4.1-alpha. diff --git a/changes/ticket33873 b/changes/ticket33873 @@ -1,4 +0,0 @@ - o Minor bugfix (SOCKS, onion service client): - - Also detect bad v3 onion service address of the wrong length when - returning the F6 ExtendedErrors code. Fixes bug 33873; bugfix on - 0.4.3.1-alpha. diff --git a/changes/ticket33880 b/changes/ticket33880 @@ -1,6 +0,0 @@ - o Minor bugfixes (relay, usability): - - Adjust the rules for when to warn about having too many connections - to other relays. Previously we'd tolerate up to 1.5 connections - per relay on average. Now we tolerate more connections for directory - authorities, and raise the number of total connections we need - to see before we warn. Fixes bug 33880; bugfix on 0.3.1.1-alpha. diff --git a/changes/ticket34087 b/changes/ticket34087 @@ -1,3 +0,0 @@ - o Minor bugfix (onion service v3 client): - - Remove a BUG() warning that can occur naturally. Fixes bug 34087; bugfix - on 0.3.2.1-alpha. diff --git a/changes/ticket34382 b/changes/ticket34382 @@ -1,6 +0,0 @@ - o Minor features (Linux seccomp2 sandbox, compilation): - - Allow Tor to build on platforms where it doesn't know how to - report which syscall had caused the linux seccomp2 sandbox - to fail. This change should make the sandbox code more portable - to less common Linux architectures. - Closes ticket 34382. diff --git a/changes/ticket40003 b/changes/ticket40003 @@ -1,3 +0,0 @@ - o Deprecated features (onion service v2): - - Add deprecation warning for onion service version 2. Tor now logs a - warning once if a version 2 service is configured. Closes ticket 40003. diff --git a/changes/ticket40005 b/changes/ticket40005 @@ -1,3 +0,0 @@ - o Minor bugfix (control port, onion service): - - Consistently use 'address' in "Invalid v3 address" response to - ONION_CLIENT_AUTH commands. Fixes bug 40005; bugfix on 0.4.3.1-alpha. diff --git a/changes/ticket40026 b/changes/ticket40026 @@ -1,3 +0,0 @@ - o Minor bugfix (CI, Windows): - - Don't use stdio 64 bit printf format when compiling with MINGW on - Appveyor. Fixes bug 40026; bugfix on 0.3.5.5-alpha. diff --git a/changes/ticket40030 b/changes/ticket40030 @@ -1,7 +0,0 @@ - o Removed features: - - Our "check-local" test target no longer tries to use the Coccinelle - semantic patching tool parse all the C files. While it is a good idea - to try to make sure Coccinelle works on our C before we run a - Coccinelle patch, doing so on every test run has proven to be disruptive. - You can still run this tool manually with "make check-cocci". Closes - ticket 40030. diff --git a/changes/ticket40035 b/changes/ticket40035 @@ -1,5 +0,0 @@ - o Major bugfixes (NSS): - - When running with NSS enabled, make sure that NSS knows to expect - nonblocking sockets. Previously, we set our TCP sockets as blocking, - but did not tell NSS about the fact, which in turn could lead to - unexpected blocking behavior. Fixes bug 40035; bugfix on 0.3.5.1-alpha. diff --git a/changes/ticket40061 b/changes/ticket40061 @@ -1,5 +0,0 @@ - o Major feature (fallback directory list): - - Replace the 148 fallback directories originally included in - Tor 0.4.1.4-rc (of which around 105 are still functional) with - a list of 144 fallbacks generated in July 2020. - Closes ticket 40061. diff --git a/changes/ticket40081 b/changes/ticket40081 @@ -1,6 +0,0 @@ - o Minor features (security): - - Channels using obsolete versions of the Tor link protocol are no - longer allowed to circumvent address-canonicity checks. - (This is only a minor issue, since such channels have no way to - set ed25519 keys, and therefore should always be rejected.) - Closes ticket 40081. diff --git a/changes/ticket6198 b/changes/ticket6198 @@ -1,3 +0,0 @@ - o Minor features (defense in depth): - - Wipe more data from connection address fields before returning them to - the memory heap. Closes ticket 6198.