tor

The Tor anonymity network
git clone https://git.dasho.dev/tor.git
Log | Files | Refs | README | LICENSE

commit 6512c6b4629c8b9979865eb5125dd47a9506306f
parent d377f98a50d6ecaa32dbe09637d64b860913513d
Author: Alexander Hansen Færøy <ahf@torproject.org>
Date:   Mon, 12 Jan 2026 16:20:39 +0100

Merge branch 'changelogs-049' into 'main'

forward-port 0.4.8 changelogs plus recent fixes

See merge request tpo/core/tor!967
Diffstat:
MChangeLog | 159+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++----------
MReleaseNotes | 241++++++++++++++++++++++++++++++++++++-------------------------------------------
2 files changed, 250 insertions(+), 150 deletions(-)

diff --git a/ChangeLog b/ChangeLog @@ -1,3 +1,83 @@ +Changes in version 0.4.8.21 - 2025-11-17 + This release is a continuation of the previous one and addresses additional + Conflux-related issues identified through further testing and feedback from + relay operators. We strongly recommend upgrading as soon as possible. + + o Major bugfixes (conflux, exit): + - When dequeuing out-of-order conflux cells, the circuit could be + closed in between two dequeues, which could lead to mishandling + a NULL pointer. Fixes bug 41162; bugfix on 0.4.8.4. + + o Minor feature (compiler flag): + - Add -mbranch-protection=standard for arm64. + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on November 17, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/11/17. + + o Minor bugfixes (bridges, pluggable transport): + - Fix a bug causing the initial tor process to hang instead of + exiting with RunAsDaemon, when pluggable transports are used. + Fixes bug 41088; bugfix on 0.4.8.1-alpha. + + +Changes in version 0.4.8.20 - 2025-11-10 + This release fixes several bugs related to Conflux edge cases as well as + adding a new hardening compiler flag if supported. + + o Minor feature (compiler flag): + - Add -fcf-protection=full if supported by the compiler. + Implements ticket 41139. + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on November 10, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/11/10. + + o Minor bugfixes (conflux fragile asserts): + - Fix the root cause of some conflux fragile asserts when a control + port listener is attached. Fixes bug 41037; bugfix on 0.4.8.16. + + o Minor bugfixes (conflux, relay): + - Fix a series of conflux edge cases about sequence number + arithmetic and OOM handler kicking in under heavy memory pressure. + Fixes bug 41155; bugfix on 0.4.8.4. + + +Changes in version 0.4.8.19 - 2025-10-06 + This release provides major bugfixes for a LibreSSL issue and a flow control + C-tor specific problem (not protocol). We strongly recommend you upgrade as + soon as possible. + + o Major bugfixes (client, TLS): + - Fix some clients not being able to connect to LibreSSL relays. + Fixes bug 41134; bugfix on 0.4.8.17. + + o Minor bugfixes (stream flow control performance): + - Use a 5 ms grace period to allow an edge connection to flush its + stream data to the socket before sending an XOFF. This + significantly reduces the number of XON/XOFF messages sent when + (1) the application is reading stream data at a fast rate, and (2) + conflux is enabled. Fixes part of bug 41130; bugfix on 0.4.7.2-alpha. + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on October 06, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/10/06. + + o Minor bugfix (process): + - Avoid closing all possible FDs when spawning a process (PT). On + some systems, this could lead to 3+ minutes hang. Fixes bug 40990; + bugfix on 0.3.5.1-alpha. + + Changes in version 0.4.9.3-alpha - 2025-09-16 This is the third alpha release and likely the last before going stable. This release contains the new CGO circuit encryption. See proposal 359 for @@ -137,6 +217,44 @@ Changes in version 0.4.9.3-alpha - 2025-09-16 0.2.3.6-alpha). Part of ticket 41031. +Changes in version 0.4.8.18 - 2025-09-16 + This is a minor release with a major onion service directory cache (HSDir) + bug fix. A series of minor bugfixes as well. As always, we strongly recommend + to upgrade as soon as possible. + + o Major bugfixes (onion service directory cache): + - Preserve the download counter of an onion service descriptor + across descriptor uploads, so that recently updated descriptors + don't get pruned if there is memory pressure soon after update. + Additionally, create a separate torrc option MaxHSDirCacheBytes + that defaults to the former 20% of MaxMemInQueues threshold, but + can be controlled by relay operators under DoS. Also enforce this + threshold during HSDir uploads. Fixes bug 41006; bugfix + on 0.4.8.14. + + o Minor feature (padding, logging): + - Reduce the amount of messages being logged related to channel + padding timeout when log level is "notice". + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on September 16, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/09/16. + + o Minor bugfix (conflux): + - Remove the pending nonce if we realize that the nonce of the + unlinked circuit is not tracked anymore. Should avoid the non + fatal assert triggered with a control port circuit event. Fixes + bug 41037; bugfix on 0.4.8.15. + + o Minor bugfixes (circuit handling): + - Prevent circuit_mark_for_close() from being called twice on the + same circuit. Second fix attempt Fixes bug 41106; bugfix + on 0.4.8.17. + + Changes in version 0.4.8.17 - 2025-06-30 This is a minor providing a series of minor features especially in the realm of TLS. It also brings a new set of recommended and required sub protocols. @@ -346,9 +464,8 @@ Changes in version 0.4.9.2-alpha - 2025-04-02 Changes in version 0.4.8.16 - 2025-03-24 - This is quick second release since 0.4.8.15 due to a typo in a directory - authority rule file. This only affects directory authorities. Regardless, - upgrading to latest stable is always desired. + This is a quick second release since 0.4.8.15 due to a typo in a directory + authority rule file. This only affects directory authorities. o Minor features (geoip data): - Update the geoip files to match the IPFire Location Database, as @@ -356,13 +473,13 @@ Changes in version 0.4.8.16 - 2025-03-24 o Minor bugfix (dirauth): - Fix typo in flag assignment approved-routers file. Fixes bug - 41035; bugfix on 0.4.8.15 + 41035; bugfix on 0.4.8.15. Changes in version 0.4.8.15 - 2025-03-20 This is a minor release fixing a sandbox issue for bandwidth authority and a conflux issue on the control port. It also has a client fix about relay flag - usage. We strongly recommend to update as soon as possible as usual. + usage. o Minor feature (testing, CI): - Use a fixed version of chutney (be881a1e) instead of its current @@ -380,18 +497,18 @@ Changes in version 0.4.8.15 - 2025-03-20 retrieved on 2025/03/20. o Minor bugfixes (control port): - - Correctly report conflux pair information to controller fields - Fixes bug 40872; bugfix on 0.4.8.1-alpha + - Correctly report conflux pair information to controller fields. + Fixes bug 40872; bugfix on 0.4.8.1-alpha. o Minor bugfixes (relay flag usage): - Fix client usage of the MiddleOnly flag so that MiddleOnly relays are not used as HS IP or RP by clients or services. Additionally, give dirauths the ability to remove specific flags, as an - alternative to MiddleOnly. Fixes bug 41023; bugfix on 0.4.7.2-alpha + alternative to MiddleOnly. Fixes bug 41023; bugfix on 0.4.7.2-alpha. o Minor bugfixes (sandbox, bwauth): - Fix sandbox to work for bandwidth authority. Fixes bug 40933; - bugfix on 0.2.2.1-alpha + bugfix on 0.2.2.1-alpha. Changes in version 0.4.8.14 - 2025-02-05 @@ -556,8 +673,8 @@ Changes in version 0.4.9.1-alpha - 2024-12-03 Changes in version 0.4.8.13 - 2024-10-24 - This is minor release fixing an important client circuit building (Conflux - related) bug which lead to performance degradation and extra load on the + This minor release fixes an important client circuit building (conflux + related) bug which led to performance degradation and extra load on the network. Some minor memory leaks fixes as well as an important minor feature for pluggable transports. We strongly recommend to update as soon as possible for clients in order to neutralize this conflux bug. @@ -570,7 +687,7 @@ Changes in version 0.4.8.13 - 2024-10-24 which added overall load to the network, used bandwidth and battery from clients that weren't actively using their Tor, and kept sockets open on guards which added connection padding - essentially forever. Fixes bug 40981; bugfix on 0.4.8.1-alpha; + essentially forever. Fixes bug 40981; bugfix on 0.4.8.1-alpha. o Minor feature (bridges, pluggable transport): - Add STATUS TYPE=version handler for Pluggable Transport. This @@ -630,7 +747,11 @@ Changes in version 0.4.8.11 - 2024-04-10 o Minor features (directory authorities): - Reject 0.4.7.x series at the authority level. Closes ticket 40896. - - New IP address and keys for tor26. + + o Minor feature (dirauth, tor26): + - New IP address and keys. + + o Minor feature (directory authority): - Allow BandwidthFiles "node_id" KeyValue without the dollar sign at the start of the hexdigit, in order to easier database queries combining Tor documents in which the relays fingerprint does not @@ -646,7 +767,8 @@ Changes in version 0.4.8.11 - 2024-04-10 o Minor bugfixes (directory authorities): - Add a warning when publishing a vote or signatures to another - directory authority fails. Fixes bug 40910; bugfix on 0.2.0.3-alpha. + directory authority fails. Fixes bug 40910; bugfix + on 0.2.0.3-alpha. Changes in version 0.4.8.10 - 2023-12-08 @@ -747,11 +869,10 @@ Changes in version 0.4.8.7 - 2023-09-25 Changes in version 0.4.8.6 - 2023-09-18 - This version contains an important fix for onion service regarding congestion - control and its reliability. Apart from that, unneeded BUG warnings have been - suppressed especially about a compression bomb seen on relays. We strongly - recommend, in particular onion service operators, to upgrade as soon as - possible to this latest stable. + This version contains an important fix for onion services regarding + congestion control and its reliability. Apart from that, unneeded BUG + warnings have been suppressed especially about a compression bomb seen + on relays. o Major bugfixes (onion service): - Fix a reliability issue where services were expiring their diff --git a/ReleaseNotes b/ReleaseNotes @@ -2,32 +2,90 @@ This document summarizes new features and bugfixes in each stable release of Tor. If you want to see more detailed descriptions of the changes in each development snapshot, see the ChangeLog file. -Changes in version 0.4.9.3-alpha - 2025-09-16 - This is the third alpha release and likely the last before going stable. - This release contains the new CGO circuit encryption. See proposal 359 for - more details. Several TLS minor fixes which will strengthen the link - security. +Changes in version 0.4.8.21 - 2025-11-17 + This release is a continuation of the previous one and addresses additional + Conflux-related issues identified through further testing and feedback from + relay operators. We strongly recommend upgrading as soon as possible. + + o Major bugfixes (conflux, exit): + - When dequeuing out-of-order conflux cells, the circuit could be + closed in between two dequeues, which could lead to mishandling + a NULL pointer. Fixes bug 41162; bugfix on 0.4.8.4. + + o Minor feature (compiler flag): + - Add -mbranch-protection=standard for arm64. + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on November 17, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/11/17. + + o Minor bugfixes (bridges, pluggable transport): + - Fix a bug causing the initial tor process to hang instead of + exiting with RunAsDaemon, when pluggable transports are used. + Fixes bug 41088; bugfix on 0.4.8.1-alpha. + + +Changes in version 0.4.8.20 - 2025-11-10 + This release fixes several bugs related to Conflux edge cases as well as + adding a new hardening compiler flag if supported. + + o Minor feature (compiler flag): + - Add -fcf-protection=full if supported by the compiler. + Implements ticket 41139. + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on November 10, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/11/10. + + o Minor bugfixes (conflux fragile asserts): + - Fix the root cause of some conflux fragile asserts when a control + port listener is attached. Fixes bug 41037; bugfix on 0.4.8.16. + + o Minor bugfixes (conflux, relay): + - Fix a series of conflux edge cases about sequence number + arithmetic and OOM handler kicking in under heavy memory pressure. + Fixes bug 41155; bugfix on 0.4.8.4. + + +Changes in version 0.4.8.19 - 2025-10-06 + This release provides major bugfixes for a LibreSSL issue and a flow control + C-tor specific problem (not protocol). We strongly recommend you upgrade as + soon as possible. + + o Major bugfixes (client, TLS): + - Fix some clients not being able to connect to LibreSSL relays. + Fixes bug 41134; bugfix on 0.4.8.17. + + o Minor bugfixes (stream flow control performance): + - Use a 5 ms grace period to allow an edge connection to flush its + stream data to the socket before sending an XOFF. This + significantly reduces the number of XON/XOFF messages sent when + (1) the application is reading stream data at a fast rate, and (2) + conflux is enabled. Fixes part of bug 41130; bugfix on 0.4.7.2-alpha. + + o Minor features (fallbackdir): + - Regenerate fallback directories generated on October 06, 2025. + + o Minor features (geoip data): + - Update the geoip files to match the IPFire Location Database, as + retrieved on 2025/10/06. + + o Minor bugfix (process): + - Avoid closing all possible FDs when spawning a process (PT). On + some systems, this could lead to 3+ minutes hang. Fixes bug 40990; + bugfix on 0.3.5.1-alpha. - o New system requirements: - - When built with LibreSSL, Tor now requires LibreSSL 3.7 or later. - Part of ticket 41059. - - When built with OpenSSL, Tor now requires OpenSSL 1.1.1 or later. - (We strongly recommend 3.0 or later, but still build with 1.1.1, - even though it is not supported by the OpenSSL team, due to its - presence in Debian oldstable.) Part of ticket 41059. - - o Major features (cell format): - - Tor now has (unused) internal support to encode and decode relay - messages in the new format required by our newer CGO encryption - algorithm. Closes ticket 41051. Part of proposal 359. - - o Major features (cryptography): - - Clients and relays can now negotiate Counter Galois Onion (CGO) - relay cryptography, as designed by Jean Paul Degabriele, - Alessandro Melloni, Jean-Pierre Münch, and Martijn Stam. CGO - provides improved resistance to several kinds of tagging attacks, - better forward secrecy, and better forgery resistance. Closes - ticket 41047. Implements proposal 359. + +Changes in version 0.4.8.18 - 2025-09-16 + This is a minor release with a major onion service directory cache (HSDir) + bug fix. A series of minor bugfixes as well. As always, we strongly recommend + to upgrade as soon as possible. o Major bugfixes (onion service directory cache): - Preserve the download counter of an onion service descriptor @@ -36,112 +94,30 @@ Changes in version 0.4.9.3-alpha - 2025-09-16 Additionally, create a separate torrc option MaxHSDirCacheBytes that defaults to the former 20% of MaxMemInQueues threshold, but can be controlled by relay operators under DoS. Also enforce this - theshold during HSDir uploads. Fixes bug 41006; bugfix + threshold during HSDir uploads. Fixes bug 41006; bugfix on 0.4.8.14. - o Minor features (security): - - Increase the size of our finite-field Diffie Hellman TLS group - (which we should never actually use!) to 2048 bits. Part of - ticket 41067. - - Require TLS version 1.2 or later. (Version 1.3 support will be - required in the near future.) Part of ticket 41067. - - Update TLS 1.2 client cipher list to match current Firefox. Part - of ticket 41067. - - o Minor features (security, TLS): - - When we are running with OpenSSL 3.5.0 or later, support using the - ML-KEM768 for post-quantum key agreement. Closes ticket 41041. - - o Minor feature (client, TLS): - - Set the TLS 1.3 cipher list instead of falling back on the - default value. - o Minor feature (padding, logging): - Reduce the amount of messages being logged related to channel padding timeout when log level is "notice". - o Minor features (bridges): - - Save complete bridge lines to 'datadir/bridgelines'. Closes - ticket 29128. - o Minor features (fallbackdir): - - Regenerate fallback directories generated on June 30, 2025. - Regenerate fallback directories generated on September 16, 2025. o Minor features (geoip data): - Update the geoip files to match the IPFire Location Database, as - retrieved on 2025/06/30. - - Update the geoip files to match the IPFire Location Database, as retrieved on 2025/09/16. - o Minor features (hidden services): - - Reduce the minimum value of hsdir_interval to match recent tor- - spec change. - - o Minor features (hsdesc POW): - - Tolerate multiple PoW schemes in onion service descriptors, for - future extensibility. Implements torspec ticket 272. - - o Minor features (performance TLS): - - When running with with OpenSSL 3.0.0 or later, support using - X25519 for TLS key agreement. (This should slightly improve - performance for TLS session establishment.) - - o Minor features (portability): - - Fix warnings when compiling with GCC 15. Closes ticket 41079. - o Minor bugfix (conflux): - Remove the pending nonce if we realize that the nonce of the unlinked circuit is not tracked anymore. Should avoid the non fatal assert triggered with a control port circuit event. Fixes bug 41037; bugfix on 0.4.8.15. - o Minor bugfixes (bridges, pluggable transport): - - Fix a bug causing the initial tor process to hang intead of - exiting with RunAsDaemon, when pluggable transports are used. - Fixes bug 41088; bugfix on 0.4.9.1-alpha. - o Minor bugfixes (circuit handling): - Prevent circuit_mark_for_close() from being called twice on the - same circuit. Fixes bug 40951; bugfix on 0.4.8.16-dev. - - Prevent circuit_mark_for_close() from being called twice on the same circuit. Second fix attempt Fixes bug 41106; bugfix - on 0.4.8.17 - - o Minor bugfixes (compilation): - - Fix linking on systems without a working stdatomic.h. Fixes bug - 41076; bugfix on 0.4.9.1-alpha. - - o Minor bugfixes (compiler warnings): - - Make sure the two bitfields in the half-closed edge struct are - unsigned, as we're using them for boolean values and assign 1 to - them. Fixes bug 40911; bugfix on 0.4.7.2-alpha. - - o Minor bugfixes (logging, metrics port): - - Count BUG statements for the MetricsPort only if they are warnings - or errors. Fixes bug 41104; bugfix on 0.4.7.1-alpha. Patch - contributed by shadowcoder. - - o Minor bugfixes (protocol): - - Set the length field correctly on RELAY_COMMAND_CONFLUX_SWITCH - messages. Previously, it was always set to the maximum value. - Fixes bug 41056; bugfix on 0.4.8.1-alpha. - - o Minor bugfixes (relay): - - Fix a crash when FamilyKeyDir is a path that cannot be read. Fixes - bug 41043; bugfix on 0.4.9.2-alpha. - - o Minor bugfixes (threads): - - Make thread control POSIX compliant. Fixes bug 41109; bugfix - on 0.4.8.17-dev. - - o Removed features: - - Relays no longer support clients that falsely advertise TLS - ciphers they don't really support. (Clients have not done this - since 0.2.3.17-beta). Part of ticket 41031. - - Relays no longer support clients that require obsolete v1 and v2 - link handshakes. (The v3 link handshake has been supported since - 0.2.3.6-alpha). Part of ticket 41031. + on 0.4.8.17. Changes in version 0.4.8.17 - 2025-06-30 @@ -215,9 +191,8 @@ Changes in version 0.4.8.17 - 2025-06-30 Changes in version 0.4.8.16 - 2025-03-24 - This is quick second release since 0.4.8.15 due to a typo in a directory - authority rule file. This only affects directory authorities. Regardless, - upgrading to latest stable is always desired. + This is a quick second release since 0.4.8.15 due to a typo in a directory + authority rule file. This only affects directory authorities. o Minor features (geoip data): - Update the geoip files to match the IPFire Location Database, as @@ -225,13 +200,13 @@ Changes in version 0.4.8.16 - 2025-03-24 o Minor bugfix (dirauth): - Fix typo in flag assignment approved-routers file. Fixes bug - 41035; bugfix on 0.4.8.15 + 41035; bugfix on 0.4.8.15. Changes in version 0.4.8.15 - 2025-03-20 This is a minor release fixing a sandbox issue for bandwidth authority and a conflux issue on the control port. It also has a client fix about relay flag - usage. We strongly recommend to update as soon as possible as usual. + usage. o Minor feature (testing, CI): - Use a fixed version of chutney (be881a1e) instead of its current @@ -249,18 +224,18 @@ Changes in version 0.4.8.15 - 2025-03-20 retrieved on 2025/03/20. o Minor bugfixes (control port): - - Correctly report conflux pair information to controller fields - Fixes bug 40872; bugfix on 0.4.8.1-alpha + - Correctly report conflux pair information to controller fields. + Fixes bug 40872; bugfix on 0.4.8.1-alpha. o Minor bugfixes (relay flag usage): - Fix client usage of the MiddleOnly flag so that MiddleOnly relays are not used as HS IP or RP by clients or services. Additionally, give dirauths the ability to remove specific flags, as an - alternative to MiddleOnly. Fixes bug 41023; bugfix on 0.4.7.2-alpha + alternative to MiddleOnly. Fixes bug 41023; bugfix on 0.4.7.2-alpha. o Minor bugfixes (sandbox, bwauth): - Fix sandbox to work for bandwidth authority. Fixes bug 40933; - bugfix on 0.2.2.1-alpha + bugfix on 0.2.2.1-alpha. Changes in version 0.4.8.14 - 2025-02-05 @@ -292,8 +267,8 @@ Changes in version 0.4.8.14 - 2025-02-05 Changes in version 0.4.8.13 - 2024-10-24 - This is minor release fixing an important client circuit building (Conflux - related) bug which lead to performance degradation and extra load on the + This minor release fixes an important client circuit building (conflux + related) bug which led to performance degradation and extra load on the network. Some minor memory leaks fixes as well as an important minor feature for pluggable transports. We strongly recommend to update as soon as possible for clients in order to neutralize this conflux bug. @@ -306,7 +281,7 @@ Changes in version 0.4.8.13 - 2024-10-24 which added overall load to the network, used bandwidth and battery from clients that weren't actively using their Tor, and kept sockets open on guards which added connection padding - essentially forever. Fixes bug 40981; bugfix on 0.4.8.1-alpha; + essentially forever. Fixes bug 40981; bugfix on 0.4.8.1-alpha. o Minor feature (bridges, pluggable transport): - Add STATUS TYPE=version handler for Pluggable Transport. This @@ -366,7 +341,11 @@ Changes in version 0.4.8.11 - 2024-04-10 o Minor features (directory authorities): - Reject 0.4.7.x series at the authority level. Closes ticket 40896. - - New IP address and keys for tor26. + + o Minor feature (dirauth, tor26): + - New IP address and keys. + + o Minor feature (directory authority): - Allow BandwidthFiles "node_id" KeyValue without the dollar sign at the start of the hexdigit, in order to easier database queries combining Tor documents in which the relays fingerprint does not @@ -382,7 +361,8 @@ Changes in version 0.4.8.11 - 2024-04-10 o Minor bugfixes (directory authorities): - Add a warning when publishing a vote or signatures to another - directory authority fails. Fixes bug 40910; bugfix on 0.2.0.3-alpha. + directory authority fails. Fixes bug 40910; bugfix + on 0.2.0.3-alpha. Changes in version 0.4.8.10 - 2023-12-08 @@ -483,11 +463,10 @@ Changes in version 0.4.8.7 - 2023-09-25 Changes in version 0.4.8.6 - 2023-09-18 - This version contains an important fix for onion service regarding congestion - control and its reliability. Apart from that, unneeded BUG warnings have been - suppressed especially about a compression bomb seen on relays. We strongly - recommend, in particular onion service operators, to upgrade as soon as - possible to this latest stable. + This version contains an important fix for onion services regarding + congestion control and its reliability. Apart from that, unneeded BUG + warnings have been suppressed especially about a compression bomb seen + on relays. o Major bugfixes (onion service): - Fix a reliability issue where services were expiring their @@ -633,8 +612,8 @@ Changes in version 0.4.8.4 - 2023-08-23 o Minor features (testing): - All Rust code is now linted (cargo clippy) as part of GitLab CI, and - existing warnings have been fixed. - Any unit tests written in Rust now - run as part of GitLab CI. + existing warnings have been fixed. + - Any unit tests written in Rust now run as part of GitLab CI. o Minor feature (CI): - Update CI to use Debian Bullseye for runners. @@ -1435,7 +1414,7 @@ Changes in version 0.4.7.7 - 2022-04-27 Exit, Guard, HSDir, and V2Dir; and in favor of BadExit. Implements part of proposal 335. Based on a patch from Neel Chauhan. - o Major features (Proposal 332, onion services, guard selection algorithm): + o Major features (Proposal 333, onion services, guard selection algorithm): - Clients and onion services now choose four long-lived "layer 2" guard relays for use as the middle hop in all onion circuits. These relays are kept in place for a randomized duration averaging