Congratulations to all the contributers and project managers.
Thanks for all the hard work you have put in on this up date


Andrew


On Sun, Jun 16, 2013 at 10:18 PM, Mike Perry <mikepe...@torproject.org>wrote:

> Roger Dingledine:
> > Tor 0.2.4.13-alpha fixes a variety of potential remote crash
> > vulnerabilities, makes socks5 username/password circuit isolation
> > actually actually work (this time for sure!), and cleans up a bunch
> > of other issues in preparation for a release candidate.
> >
> > https://www.torproject.org/dist/
>
> As a heads up, a bug was introduced in this release that allows
> malicious websites to discover a client's Guard nodes in a very short
> amount of time (on the order an hour), if those Guard nodes upgrade to
> this release.
>
> Unfortunately, the bug was introduced by fixing another issue that
> allows Guard nodes to be selectively DoSed with an OOM condition, so
> Guard node (and Guard+Exit node) operators are kind of in a jam.
>
> I think the best course of action is to suggest that nodes with the
> Guard flag *not* upgrade to this release, unless they are experiencing
> unexplained OOMing?
>
> If we can't find a solution that rigorously fixes both issues, I think
> that future releases should have the OOM DoS fix off by default but
> available through a torrc option.
>
> See also:
> https://trac.torproject.org/projects/tor/ticket/9072
>
>
> > Changes in version 0.2.4.13-alpha - 2013-06-14
> >   o Major bugfixes (robustness):
> >     - Close any circuit that has too many cells queued on it. Fixes
> >       bug 9063; bugfix on the 54th commit of Tor. This bug is a further
> >       fix beyond bug 6252, whose fix was merged into 0.2.3.21-rc.
> >     - Prevent the get_freelists() function from running off the end of
> >       the list of freelists if it somehow gets an unrecognized
> >       allocation. Fixes bug 8844; bugfix on 0.2.0.16-alpha. Reported by
> >       eugenis.
> >     - Avoid an assertion failure on OpenBSD (and perhaps other BSDs)
> >       when an exit connection with optimistic data succeeds immediately
> >       rather than returning EINPROGRESS. Fixes bug 9017; bugfix on
> >       0.2.3.1-alpha.
> >     - Fix a directory authority crash bug when building a consensus
> >       using an older consensus as its basis. Fixes bug 8833. Bugfix
> >       on 0.2.4.12-alpha.
> >
> >   o Major bugfixes:
> >     - Avoid a memory leak where we would leak a consensus body when we
> >       find that a consensus which we couldn't previously verify due to
> >       missing certificates is now verifiable. Fixes bug 8719; bugfix
> >       on 0.2.0.10-alpha.
> >     - We used to always request authority certificates by identity
> digest,
> >       meaning we'd get the newest one even when we wanted one with a
> >       different signing key. Then we would complain about being given
> >       a certificate we already had, and never get the one we really
> >       wanted. Now we use the "fp-sk/" resource as well as the "fp/"
> >       resource to request the one we want. Fixes bug 5595; bugfix on
> >       0.2.0.8-alpha.
> >     - Follow the socks5 protocol when offering username/password
> >       authentication. The fix for bug 8117 exposed this bug, and it
> >       turns out real-world applications like Pidgin do care. Bugfix on
> >       0.2.3.2-alpha; fixes bug 8879.
> >     - Prevent failures on Windows Vista and later when rebuilding the
> >       microdescriptor cache. Diagnosed by Robert Ransom. Fixes bug 8822;
> >       bugfix on 0.2.4.12-alpha.
> >
> >   o Minor bugfixes:
> >     - Fix an impossible buffer overrun in the AES unit tests. Fixes
> >       bug 8845; bugfix on 0.2.0.7-alpha. Found by eugenis.
> >     - If for some reason we fail to write a microdescriptor while
> >       rebuilding the cache, do not let the annotations from that
> >       microdescriptor linger in the cache file, and do not let the
> >       microdescriptor stay recorded as present in its old location.
> >       Fixes bug 9047; bugfix on 0.2.2.6-alpha.
> >     - Fix a memory leak that would occur whenever a configuration
> >       option changed. Fixes bug 8718; bugfix on 0.2.3.3-alpha.
> >     - Paste the description for PathBias parameters from the man
> >       page into or.h, so the code documents them too. Fixes bug 7982;
> >       bugfix on 0.2.3.17-beta and 0.2.4.8-alpha.
> >     - Relays now treat a changed IPv6 ORPort as sufficient reason to
> >       publish an updated descriptor. Fixes bug 6026; bugfix on
> >       0.2.4.1-alpha.
> >      - When launching a resolve request on behalf of an AF_UNIX control
> >        socket, omit the address field of the new entry connection, used
> in
> >        subsequent controller events, rather than letting tor_dup_addr()
> >        set it to "<unknown address type>". Fixes bug 8639; bugfix on
> >        0.2.4.12-alpha.
> >
> >   o Minor bugfixes (log messages):
> >     - Fix a scaling issue in the path bias accounting code that
> >       resulted in "Bug:" log messages from either
> >       pathbias_scale_close_rates() or pathbias_count_build_success().
> >       This represents a bugfix on a previous bugfix: the original fix
> >       attempted in 0.2.4.10-alpha was incomplete. Fixes bug 8235; bugfix
> >       on 0.2.4.1-alpha.
> >     - Give a less useless error message when the user asks for an IPv4
> >       address on an IPv6-only port, or vice versa. Fixes bug 8846; bugfix
> >       on 0.2.4.7-alpha.
> >
> >   o Minor features:
> >     - Downgrade "unexpected SENDME" warnings to protocol-warn for
> 0.2.4.x,
> >       to tolerate bug 8093 for now.
> >     - Add an "ignoring-advertised-bws" boolean to the flag-threshold
> lines
> >       in directory authority votes to describe whether they have enough
> >       measured bandwidths to ignore advertised (relay descriptor)
> >       bandwidth claims. Resolves ticket 8711.
> >     - Update to the June 5 2013 Maxmind GeoLite Country database.
> >
> >   o Removed documentation:
> >     - Remove some of the older contents of doc/ as obsolete; move others
> >       to torspec.git. Fixes bug 8965.
> >
> >   o Code simplification and refactoring:
> >     - Avoid using character buffers when constructing most directory
> >       objects: this approach was unwieldy and error-prone. Instead,
> >       build smartlists of strings, and concatenate them when done.
> >
>
>
>
> > _______________________________________________
> > tor-talk mailing list
> > tor-talk@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
> --
> Mike Perry
>
> _______________________________________________
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to