1 Changes so far in 0.0.9:
3 o Bugfixes on 0.0.9pre:
4 - Clean up some more integer underflow opportunities (not exploitable
6 - While hibernating, hup should not regrow our listeners.
7 - Send an end to the streams we close when we hibernate, rather
8 than just chopping them off.
9 - React to eof immediately on non-open edge connections.
11 o Bugfixes on 0.0.8.1:
12 - Calculate timeout for waiting for a connected cell from the time
13 we sent the begin cell, not from the time the stream started. If
14 it took a long time to establish the circuit, we would time out
15 right after sending the begin cell.
16 - Fix router_compare_addr_to_addr_policy: it was not treating a port
17 of * as always matching, so we were picking reject *:* nodes as
21 - New circuit building strategy: keep a list of ports that we've
22 used in the past 6 hours, and always try to have 2 circuits open
23 or on the way that will handle each such port. Seed us with port
24 80 so web users won't complain that Tor is "slow to start up".
25 - Make kill -USR1 dump more useful stats about circuits.
26 - When warning about retrying or giving up, print the address, so
27 the user knows which one it's talking about.
28 - If you haven't used a clean circuit in an hour, throw it away,
29 just to be on the safe side. (This means after 6 hours a totally
30 unused Tor client will have no circuits open.)
33 o Bugfixes on 0.0.8.1:
34 - Disallow NDEBUG. We don't ever want anybody to turn off debug.
35 - Let resolve conns retry/expire also, rather than sticking around
37 - If we are using select, make sure we stay within FD_SETSIZE.
39 o Bugfixes on 0.0.9pre:
40 - Fix integer underflow in tor_vsnprintf() that may be exploitable,
41 but doesn't seem to be currently; thanks to Ilja van Sprundel for
43 - If anybody set DirFetchPostPeriod, give them StatusFetchPeriod
44 instead. Impose minima and maxima for all *Period options; impose
45 even tighter maxima for fetching if we are a caching dirserver.
46 Clip rather than rejecting.
47 - Fetch cached running-routers from servers that serve it (that is,
48 authdirservers and servers running 0.0.9rc5-cvs or later.)
51 - Accept *:706 (silc) in default exit policy.
52 - Implement new versioning format for post 0.1.
53 - Support "foo.nickname.exit" addresses, to let Alice request the
54 address "foo" as viewed by exit node "nickname". Based on a patch
56 - Make tor --version --version dump the cvs Id of every file.
59 o Bugfixes on 0.0.8.1:
60 - Make windows sockets actually non-blocking (oops), and handle
61 win32 socket errors better.
63 o Bugfixes on 0.0.9rc1:
64 - Actually catch the -USR2 signal.
67 o Bugfixes on 0.0.8.1:
68 - Flush the log file descriptor after we print "Tor opening log file",
69 so we don't see those messages days later.
71 o Bugfixes on 0.0.9rc1:
72 - Make tor-resolve work again.
73 - Avoid infinite loop in tor-resolve if tor hangs up on it.
74 - Fix an assert trigger for clients/servers handling resolves.
77 o Bugfixes on 0.0.9rc1:
78 - I broke socks5 support while fixing the eof bug.
79 - Allow unitless bandwidths and intervals; they default to bytes
81 - New servers don't start out hibernating; they are active until
82 they run out of bytes, so they have a better estimate of how
83 long it takes, and so their operators can know they're working.
86 o Bugfixes on 0.0.8.1:
87 - Finally fix a bug that's been plaguing us for a year:
88 With high load, circuit package window was reaching 0. Whenever
89 we got a circuit-level sendme, we were reading a lot on each
90 socket, but only writing out a bit. So we would eventually reach
91 eof. This would be noticed and acted on even when there were still
92 bytes sitting in the inbuf.
93 - When poll() is interrupted, we shouldn't believe the revents values.
95 o Bugfixes on 0.0.9pre6:
96 - Fix hibernate bug that caused pre6 to be broken.
97 - Don't keep rephist info for routers that haven't had activity for
98 24 hours. (This matters now that clients have keys, since we track
100 - Never call close_temp_logs while validating log options.
101 - Fix backslash-escaping on tor.sh.in and torctl.in.
104 - Implement weekly/monthly/daily accounting: now you specify your
105 hibernation properties by
106 AccountingMax N bytes|KB|MB|GB|TB
107 AccountingStart day|week|month [day] HH:MM
108 Defaults to "month 1 0:00".
109 - Let bandwidth and interval config options be specified as 5 bytes,
110 kb, kilobytes, etc; and as seconds, minutes, hours, days, weeks.
111 - kill -USR2 now moves all logs to loglevel debug (kill -HUP to
113 - If your requested entry or exit node has advertised bandwidth 0,
115 - Be more greedy about filling up relay cells -- we try reading again
116 once we've processed the stuff we read, in case enough has arrived
117 to fill the last cell completely.
118 - Apply NT service patch from Osamu Fujino. Still needs more work.
121 o Bugfixes on 0.0.8.1:
122 - Fix assert failure on malformed socks4a requests.
123 - Use identity comparison, not nickname comparison, to choose which
124 half of circuit-ID-space each side gets to use. This is needed
125 because sometimes we think of a router as a nickname, and sometimes
126 as a hex ID, and we can't predict what the other side will do.
127 - Catch and ignore SIGXFSZ signals when log files exceed 2GB; our
128 write() call will fail and we handle it there.
129 - Add a FAST_SMARTLIST define to optionally inline smartlist_get
130 and smartlist_len, which are two major profiling offenders.
132 o Bugfixes on 0.0.9pre5:
133 - Fix a bug in read_all that was corrupting config files on windows.
134 - When we're raising the max number of open file descriptors to
135 'unlimited', don't log that we just raised it to '-1'.
136 - Include event code with events, as required by control-spec.txt.
137 - Don't give a fingerprint when clients do --list-fingerprint:
138 it's misleading, because it will never be the same again.
139 - Stop using strlcpy in tor_strndup, since it was slowing us
141 - Remove warn on startup about missing cached-directory file.
142 - Make kill -USR1 work again.
143 - Hibernate if we start tor during the "wait for wakeup-time" phase
144 of an accounting interval. Log our hibernation plans better.
145 - Authoritative dirservers now also cache their directory, so they
149 - Fetch running-routers; cache running-routers; compress
150 running-routers; serve compressed running-routers.z
151 - Add NSI installer script contributed by J Doe.
152 - Commit VC6 and VC7 workspace/project files.
153 - Commit a tor.spec for making RPM files, with help from jbash.
154 - Add contrib/torctl.in contributed by Glenn Fink.
155 - Implement the control-spec's SAVECONF command, to write your
156 configuration to torrc.
157 - Get cookie authentication for the controller closer to working.
158 - Include control-spec.txt in the tarball.
159 - When set_conf changes our server descriptor, upload a new copy.
160 But don't upload it too often if there are frequent changes.
161 - Document authentication config in man page, and document signals
163 - Clean up confusing parts of man page and torrc.sample.
164 - Make expand_filename handle ~ and ~username.
165 - Use autoconf to enable largefile support where necessary. Use
166 ftello where available, since ftell can fail at 2GB.
167 - Distinguish between TOR_TLS_CLOSE and TOR_TLS_ERROR, so we can
168 log more informatively.
169 - Give a slightly more useful output for "tor -h".
170 - Refuse application socks connections to port 0.
171 - Check clock skew for verified servers, but allow unverified
172 servers and clients to have any clock skew.
173 - Break DirFetchPostPeriod into:
174 - DirFetchPeriod for fetching full directory,
175 - StatusFetchPeriod for fetching running-routers,
176 - DirPostPeriod for posting server descriptor,
177 - RendPostPeriod for posting hidden service descriptors.
178 - Make sure the hidden service descriptors are at a random offset
179 from each other, to hinder linkability.
182 o Bugfixes on 0.0.8.1:
183 - Fix an assert bug where a hidden service provider would fail if
184 the first hop of his rendezvous circuit was down.
185 - Hidden service operators now correctly handle version 1 style
186 INTRODUCE1 cells (nobody generates them still, so not a critical
188 - If do_hup fails, actually notice.
189 - Handle more errnos from accept() without closing the listener.
190 Some OpenBSD machines were closing their listeners because
191 they ran out of file descriptors.
192 - Better handling of winsock includes on non-MSV win32 compilers.
193 - Some people had wrapped their tor client/server in a script
194 that would restart it whenever it died. This did not play well
195 with our "shut down if your version is obsolete" code. Now people
196 don't fetch a new directory if their local cached version is
198 - Make our autogen.sh work on ksh as well as bash.
200 o Bugfixes on 0.0.9pre4:
201 - Fix a seg fault in unit tests (doesn't affect main program).
202 - Send resolve cells to exit routers that are running a new
203 enough version of the resolve code to work right.
206 - Hibernation: New config option "AccountingMaxKB" lets you
207 set how many KBytes per month you want to allow your server to
208 consume. Rather than spreading those bytes out evenly over the
209 month, we instead hibernate for some of the month and pop up
210 at a deterministic time, work until the bytes are consumed, then
211 hibernate again. Config option "MonthlyAccountingStart" lets you
212 specify which day of the month your billing cycle starts on.
213 - Control interface: a separate program can now talk to your
214 client/server over a socket, and get/set config options, receive
215 notifications of circuits and streams starting/finishing/dying,
216 bandwidth used, etc. The next step is to get some GUIs working.
217 Let us know if you want to help out. See doc/control-spec.txt .
218 - Ship a contrib/tor-control.py as an example script to interact
219 with the control port.
220 - "tor --hash-password zzyxz" will output a salted password for
221 use in authenticating to the control interface.
222 - New log format in config:
223 "Log minsev[-maxsev] stdout|stderr|syslog" or
224 "Log minsev[-maxsev] file /var/foo"
227 - DirPolicy config option, to let people reject incoming addresses
228 from their dirserver.
229 - "tor --list-fingerprint" will list your identity key fingerprint
231 - Add "pass" target for RedirectExit, to make it easier to break
232 out of a sequence of RedirectExit rules.
233 - Clients now generate a TLS cert too, in preparation for having
234 them act more like real nodes.
235 - Ship src/win32/ in the tarball, so people can use it to build.
236 - Make old win32 fall back to CWD if SHGetSpecialFolderLocation
238 - New "router-status" line in directory, to better bind each verified
239 nickname to its identity key.
240 - Deprecate unofficial config option abbreviations, and abbreviations
241 not on the command line.
242 - Add a pure-C tor-resolve implementation.
243 - Use getrlimit and friends to ensure we can reach MaxConn (currently
244 1024) file descriptors.
246 o Code security improvements, inspired by Ilja:
247 - Replace sprintf with snprintf. (I think they were all safe, but
249 - Replace strcpy/strncpy with strlcpy in more places.
250 - Avoid strcat; use snprintf or strlcat instead.
251 - snprintf wrapper with consistent (though not C99) overflow behavior.
254 o Bugfixes on 0.0.9pre3:
255 - Ignore fascistfirewall when uploading/downloading hidden service
256 descriptors, since we go through Tor for those; and when using
257 an HttpProxy, since we assume it can reach them all.
258 - When looking for an authoritative dirserver, use only the ones
259 configured at boot. Don't bother looking in the directory.
260 - If the server doesn't specify an exit policy, use the real default
261 exit policy, not reject *:*.
262 - The rest of the fix for get_default_conf_file() on older win32.
263 - Make 'Routerfile' config option obsolete.
266 - New 'MyFamily nick1,...' config option for a server to
267 specify other servers that shouldn't be used in the same circuit
268 with it. Only believed if nick1 also specifies us.
269 - New 'NodeFamily nick1,nick2,...' config option for a client to
270 specify nodes that it doesn't want to use in the same circuit.
271 - New 'Redirectexit pattern address:port' config option for a
272 server to redirect exit connections, e.g. to a local squid.
275 o Bugfixes on 0.0.8.1:
276 - Better torrc example lines for dirbindaddress and orbindaddress.
277 - Improved bounds checking on parsed ints (e.g. config options and
278 the ones we find in directories.)
279 - Better handling of size_t vs int, so we're more robust on 64
281 - Fix the rest of the bug where a newly started OR would appear
282 as unverified even after we've added his fingerprint and hupped
284 - Fix a bug from 0.0.7: when read() failed on a stream, we would
285 close it without sending back an end. So 'connection refused'
286 would simply be ignored and the user would get no response.
288 o Bugfixes on 0.0.9pre2:
289 - Serving the cached-on-disk directory to people is bad. We now
290 provide no directory until we've fetched a fresh one.
291 - Workaround for bug on windows where cached-directories get crlf
293 - Make get_default_conf_file() work on older windows too.
294 - If we write a *:* exit policy line in the descriptor, don't write
295 any more exit policy lines.
298 - Use only 0.0.9pre1 and later servers for resolve cells.
299 - Make the dirservers file obsolete.
300 - Include a dir-signing-key token in directories to tell the
301 parsing entity which key is being used to sign.
302 - Remove the built-in bulky default dirservers string.
303 - New config option "Dirserver %s:%d [fingerprint]", which can be
304 repeated as many times as needed. If no dirservers specified,
305 default to moria1,moria2,tor26.
306 - Make moria2 advertise a dirport of 80, so people behind firewalls
307 will be able to get a directory.
309 - Dirservers translate requests for http://%s:%d/x to /x
310 - You can specify "HttpProxy %s[:%d]" and all dir fetches will
311 be routed through this host.
312 - Clients ask for /tor/x rather than /x for new enough dirservers.
313 This way we can one day coexist peacefully with apache.
314 - Clients specify a "Host: %s%d" http header, to be compatible
315 with more proxies, and so running squid on an exit node can work.
319 - Make fetching a cached directory work for 64-bit platforms too.
320 - Make zlib.h a required header, not an optional header.
324 - Stop using separate defaults for no-config-file and
325 empty-config-file. Now you have to explicitly turn off SocksPort,
326 if you don't want it open.
327 - Improve man page to mention more of the 0.0.8 features.
328 - Change our file IO stuff (especially wrt OpenSSL) so win32 is
330 - Fix more dns related bugs: send back resolve_failed and end cells
331 more reliably when the resolve fails, rather than closing the
332 circuit and then trying to send the cell. Also attach dummy resolve
333 connections to a circuit *before* calling dns_resolve(), to fix
334 a bug where cached answers would never be sent in RESOLVED cells.
335 - When we run out of disk space, or other log writing error, don't
336 crash. Just stop logging to that log and continue.
337 - We were starting to daemonize before we opened our logs, so if
338 there were any problems opening logs, we would complain to stderr,
339 which wouldn't work, and then mysteriously exit.
340 - Fix a rare bug where sometimes a verified OR would connect to us
341 before he'd uploaded his descriptor, which would cause us to
342 assign conn->nickname as though he's unverified. Now we look through
343 the fingerprint list to see if he's there.
346 - Clients can ask dirservers for /dir.z to get a compressed version
347 of the directory. Only works for servers running 0.0.9, of course.
348 - Make clients cache directories and use them to seed their router
349 lists at startup. This means clients have a datadir again.
350 - Configuration infrastructure support for warning on obsolete
352 - Respond to content-encoding headers by trying to uncompress as
354 - Reply with a deflated directory when a client asks for "dir.z".
355 We could use allow-encodings instead, but allow-encodings isn't
356 specified in HTTP 1.0.
357 - Raise the max dns workers from 50 to 100.
358 - Discourage people from setting their dirfetchpostperiod more often
360 - Protect dirservers from overzealous descriptor uploading -- wait
361 10 seconds after directory gets dirty, before regenerating.
364 Changes in version 0.0.8.1 - 2004-10-13
366 - Fix a seg fault that can be triggered remotely for Tor
367 clients/servers with an open dirport.
368 - Fix a rare assert trigger, where routerinfos for entries in
369 our cpath would expire while we're building the path.
370 - Fix a bug in OutboundBindAddress so it (hopefully) works.
371 - Fix a rare seg fault for people running hidden services on
372 intermittent connections.
373 - Fix a bug in parsing opt keywords with objects.
374 - Fix a stale pointer assert bug when a stream detaches and
376 - Fix a string format vulnerability (probably not exploitable)
377 in reporting stats locally.
378 - Fix an assert trigger: sometimes launching circuits can fail
379 immediately, e.g. because too many circuits have failed recently.
380 - Fix a compile warning on 64 bit platforms.
383 Changes in version 0.0.8 - 2004-08-25
385 - Made our unit tests compile again on OpenBSD 3.5, and tor
386 itself compile again on OpenBSD on a sparc64.
387 - We were neglecting milliseconds when logging on win32, so
388 everything appeared to happen at the beginning of each second.
389 - Check directory signature _before_ you decide whether you're
390 you're running an obsolete version and should exit.
391 - Check directory signature _before_ you parse the running-routers
392 list to decide who's running.
393 - Check return value of fclose while writing to disk, so we don't
394 end up with broken files when servers run out of disk space.
395 - Port it to SunOS 5.9 / Athena
396 - Fix two bugs in saving onion keys to disk when rotating, so
397 hopefully we'll get fewer people using old onion keys.
398 - Remove our mostly unused -- and broken -- hex_encode()
399 function. Use base16_encode() instead. (Thanks to Timo Lindfors
400 for pointing out this bug.)
401 - Only pick and establish intro points after we've gotten a
403 - Fix assert triggers: if the other side returns an address 0.0.0.0,
404 don't put it into the client dns cache.
405 - If a begin failed due to exit policy, but we believe the IP
406 address should have been allowed, switch that router to exitpolicy
407 reject *:* until we get our next directory.
410 - 'Extend' relay cell payloads now include the digest of the
411 intended next hop's identity key. Now we can verify that we're
412 extending to the right router, and also extend to routers we
413 hadn't heard of before.
416 - Tor nodes can now act as relays (with an advertised ORPort)
417 without being manually verified by the dirserver operators.
418 - Uploaded descriptors of unverified routers are now accepted
419 by the dirservers, and included in the directory.
420 - Verified routers are listed by nickname in the running-routers
421 list; unverified routers are listed as "$<fingerprint>".
422 - We now use hash-of-identity-key in most places rather than
423 nickname or addr:port, for improved security/flexibility.
424 - AllowUnverifiedNodes config option to let circuits choose no-name
425 routers in entry,middle,exit,introduction,rendezvous positions.
426 Allow middle and rendezvous positions by default.
427 - When picking unverified routers, skip those with low uptime and/or
428 low bandwidth, depending on what properties you care about.
429 - ClientOnly option for nodes that never want to become servers.
431 - "AuthoritativeDir 1" option for the official dirservers.
432 - Now other nodes (clients and servers) will cache the latest
433 directory they've pulled down.
434 - They can enable their DirPort to serve it to others.
435 - Clients will pull down a directory from any node with an open
436 DirPort, and check the signature/timestamp correctly.
437 - Authoritative dirservers now fetch directories from other
438 authdirservers, to stay better synced.
439 - Running-routers list tells who's down also, along with noting
440 if they're verified (listed by nickname) or unverified (listed
442 - Allow dirservers to serve running-router list separately.
444 - You can now fetch $DIRURL/running-routers to get just the
445 running-routers line, not the whole descriptor list. (But
446 clients don't use this yet.)
447 - Clients choose nodes proportional to advertised bandwidth.
448 - Clients avoid using nodes with low uptime as introduction points.
449 - Handle servers with dynamic IP addresses: don't just replace
450 options->Address with the resolved one at startup, and
451 detect our address right before we make a routerinfo each time.
452 - 'FascistFirewall' option to pick dirservers and ORs on specific
453 ports; plus 'FirewallPorts' config option to tell FascistFirewall
454 which ports are open. (Defaults to 80,443)
455 - Try other dirservers immediately if the one you try is down. This
456 should tolerate down dirservers better now.
457 - ORs connect-on-demand to other ORs
458 - If you get an extend cell to an OR you're not connected to,
459 connect, handshake, and forward the create cell.
460 - The authoritative dirservers stay connected to everybody,
461 and everybody stays connected to 0.0.7 servers, but otherwise
462 clients/servers expire unused connections after 5 minutes.
463 - When servers get a sigint, they delay 30 seconds (refusing new
464 connections) then exit. A second sigint causes immediate exit.
465 - File and name management:
466 - Look for .torrc if no CONFDIR "torrc" is found.
467 - If no datadir is defined, then choose, make, and secure ~/.tor
469 - If torrc not found, exitpolicy reject *:*.
470 - Expands ~/ in filenames to $HOME/ (but doesn't yet expand ~arma).
471 - If no nickname is defined, derive default from hostname.
472 - Rename secret key files, e.g. identity.key -> secret_id_key,
473 to discourage people from mailing their identity key to tor-ops.
474 - Refuse to build a circuit before the directory has arrived --
475 it won't work anyway, since you won't know the right onion keys
477 - Parse tor version numbers so we can do an is-newer-than check
478 rather than an is-in-the-list check.
479 - New socks command 'resolve', to let us shim gethostbyname()
481 - A 'tor_resolve' script to access the socks resolve functionality.
482 - A new socks-extensions.txt doc file to describe our
483 interpretation and extensions to the socks protocols.
484 - Add a ContactInfo option, which gets published in descriptor.
485 - Write tor version at the top of each log file
486 - New docs in the tarball:
488 - Document that you should proxy your SSL traffic too.
489 - Log a warning if the user uses an unsafe socks variant, so people
490 are more likely to learn about privoxy or socat.
491 - Log a warning if you're running an unverified server, to let you
492 know you might want to get it verified.
493 - Change the default exit policy to reject the default edonkey,
494 kazaa, gnutella ports.
495 - Add replace_file() to util.[ch] to handle win32's rename().
496 - Publish OR uptime in descriptor (and thus in directory) too.
497 - Remember used bandwidth (both in and out), and publish 15-minute
498 snapshots for the past day into our descriptor.
499 - Be more aggressive about trying to make circuits when the network
500 has changed (e.g. when you unsuspend your laptop).
501 - Check for time skew on http headers; report date in response to
503 - If the entrynode config line has only one node, don't pick it as
505 - Add strict{entry|exit}nodes config options. If set to 1, then
506 we refuse to build circuits that don't include the specified entry
508 - OutboundBindAddress config option, to bind to a specific
509 IP address for outgoing connect()s.
510 - End truncated log entries (e.g. directories) with "[truncated]".
513 Changes in version 0.0.7.3 - 2004-08-12
514 o Stop dnsworkers from triggering an assert failure when you
515 ask them to resolve the host "".
518 Changes in version 0.0.7.2 - 2004-07-07
519 o A better fix for the 0.0.0.0 problem, that will hopefully
520 eliminate the remaining related assertion failures.
523 Changes in version 0.0.7.1 - 2004-07-04
524 o When an address resolves to 0.0.0.0, treat it as a failed resolve,
525 since internally we use 0.0.0.0 to signify "not yet resolved".
528 Changes in version 0.0.7 - 2004-06-07
529 o Fixes for crashes and other obnoxious bugs:
530 - Fix an epipe bug: sometimes when directory connections failed
531 to connect, we would give them a chance to flush before closing
533 - When we detached from a circuit because of resolvefailed, we
534 would immediately try the same circuit twice more, and then
535 give up on the resolve thinking we'd tried three different
537 - Limit the number of intro circuits we'll attempt to build for a
538 hidden service per 15-minute period.
539 - Check recommended-software string *early*, before actually parsing
540 the directory. Thus we can detect an obsolete version and exit,
541 even if the new directory format doesn't parse.
542 o Fixes for security bugs:
543 - Remember which nodes are dirservers when you startup, and if a
544 random OR enables his dirport, don't automatically assume he's
547 - Directory connections were asking the wrong poll socket to
548 start writing, and not asking themselves to start writing.
549 - When we detached from a circuit because we sent a begin but
550 didn't get a connected, we would use it again the first time;
551 but after that we would correctly switch to a different one.
552 - Stop warning when the first onion decrypt attempt fails; they
553 will sometimes legitimately fail now that we rotate keys.
554 - Override unaligned-access-ok check when $host_cpu is ia64 or
555 arm. Apparently they allow it but the kernel whines.
556 - Dirservers try to reconnect periodically too, in case connections
558 - Fix some memory leaks in directory servers.
559 - Allow backslash in Win32 filenames.
560 - Made Tor build complain-free on FreeBSD, hopefully without
561 breaking other BSD builds. We'll see.
562 - Check directory signatures based on name of signer, not on whom
563 we got the directory from. This will let us cache directories more
565 - Rotate dnsworkers and cpuworkers on SIGHUP, so they get new config
568 - Doxygen markup on all functions and global variables.
569 - Make directory functions update routerlist, not replace it. So
570 now directory disagreements are not so critical a problem.
571 - Remove the upper limit on number of descriptors in a dirserver's
572 directory (not that we were anywhere close).
573 - Allow multiple logfiles at different severity ranges.
574 - Allow *BindAddress to specify ":port" rather than setting *Port
575 separately. Allow multiple instances of each BindAddress config
576 option, so you can bind to multiple interfaces if you want.
577 - Allow multiple exit policy lines, which are processed in order.
578 Now we don't need that huge line with all the commas in it.
579 - Enable accept/reject policies on SOCKS connections, so you can bind
580 to 0.0.0.0 but still control who can use your OP.
581 - Updated the man page to reflect these features.
584 Changes in version 0.0.6.2 - 2004-05-16
585 o Our integrity-checking digest was checking only the most recent cell,
586 not the previous cells like we'd thought.
587 Thanks to Stefan Mark for finding the flaw!
590 Changes in version 0.0.6.1 - 2004-05-06
591 o Fix two bugs in our AES counter-mode implementation (this affected
592 onion-level stream encryption, but not TLS-level). It turns
593 out we were doing something much more akin to a 16-character
594 polyalphabetic cipher. Oops.
595 Thanks to Stefan Mark for finding the flaw!
596 o Retire moria3 as a directory server, and add tor26 as a directory
600 Changes in version 0.0.6 - 2004-05-02
602 - Hidden services and rendezvous points are implemented. Go to
603 http://6sxoyfb3h2nvok2d.onion/ for an index of currently available
604 hidden services. (This only works via a socks4a proxy such as
605 Privoxy, and currently it's quite slow.)
606 - We now rotate link (tls context) keys and onion keys.
607 - CREATE cells now include oaep padding, so you can tell
608 if you decrypted them correctly.
609 - Retry stream correctly when we fail to connect because of
610 exit-policy-reject (should try another) or can't-resolve-address.
611 - When we hup a dirserver and we've *removed* a server from the
612 approved-routers list, now we remove that server from the
613 in-memory directories too.
614 - Add bandwidthburst to server descriptor.
615 - Directories now say which dirserver signed them.
616 - Use a tor_assert macro that logs failed assertions too.
617 - Since we don't support truncateds much, don't bother sending them;
619 - Fetch randomness from /dev/urandom better (not via fopen/fread)
620 - Better debugging for tls errors
621 - Set Content-Type on the directory and hidserv descriptor.
622 - Remove IVs from cipher code, since AES-ctr has none.
624 - Fix an assert trigger for exit nodes that's been plaguing us since
625 the days of 0.0.2prexx (thanks weasel!)
626 - Fix a bug where we were closing tls connections intermittently.
627 It turns out openssl keeps its errors around -- so if an error
628 happens, and you don't ask about it, and then another openssl
629 operation happens and succeeds, and you ask if there was an error,
630 it tells you about the first error.
631 - Fix a bug that's been lurking since 27 may 03 (!)
632 When passing back a destroy cell, we would use the wrong circ id.
633 - Don't crash if a conn that sent a begin has suddenly lost its circuit.
634 - Some versions of openssl have an SSL_pending function that erroneously
635 returns bytes when there is a non-application record pending.
636 - Win32 fixes. Tor now compiles on win32 with no warnings/errors.
637 o We were using an array of length zero in a few places.
638 o Win32's gethostbyname can't resolve an IP to an IP.
639 o Win32's close can't close a socket.
640 o Handle windows socket errors correctly.
642 - check for <sys/limits.h> so we build on FreeBSD again, and
643 <machine/limits.h> for NetBSD.
646 Changes in version 0.0.5 - 2004-03-30
647 o Install torrc as torrc.sample -- we no longer clobber your
649 o Fix mangled-state bug in directory fetching (was causing sigpipes).
650 o Only build circuits after we've fetched the directory: clients were
651 using only the directory servers before they'd fetched a directory.
652 This also means longer startup time; so it goes.
653 o Fix an assert trigger where an OP would fail to handshake, and we'd
654 expect it to have a nickname.
655 o Work around a tsocks bug: do a socks reject when AP connection dies
656 early, else tsocks goes into an infinite loop.
657 o Hold socks connection open until reply is flushed (if possible)
658 o Make exit nodes resolve IPs to IPs immediately, rather than asking
659 the dns farm to do it.
660 o Fix c99 aliasing warnings in rephist.c
661 o Don't include server descriptors that are older than 24 hours in the
663 o Give socks 'reject' replies their whole 15s to attempt to flush,
664 rather than seeing the 60s timeout and assuming the flush had failed.
665 o Clean automake droppings from the cvs repository
666 o Add in a 'notice' log level for things the operator should hear
667 but that aren't warnings
670 Changes in version 0.0.4 - 2004-03-26
671 o When connecting to a dirserver or OR and the network is down,
675 Changes in version 0.0.3 - 2004-03-26
676 o Warn and fail if server chose a nickname with illegal characters
677 o Port to Solaris and Sparc:
678 - include missing header fcntl.h
679 - have autoconf find -lsocket -lnsl automatically
680 - deal with hardware word alignment
681 - make uname() work (solaris has a different return convention)
682 - switch from using signal() to sigaction()
683 o Preliminary work on reputation system:
684 - Keep statistics on success/fail of connect attempts; they're published
685 by kill -USR1 currently.
686 - Add a RunTesting option to try to learn link state by creating test
687 circuits, even when SocksPort is off.
688 - Remove unused open circuits when there are too many.
691 Changes in version 0.0.2 - 2004-03-19
692 - Include strlcpy and strlcat for safer string ops
693 - define INADDR_NONE so we compile (but still not run) on solaris
696 Changes in version 0.0.2pre27 - 2004-03-14
698 - Allow internal tor networks (we were rejecting internal IPs,
699 now we allow them if they're set explicitly).
700 - And fix a few endian issues.
703 Changes in version 0.0.2pre26 - 2004-03-14
705 - If a stream times out after 15s without a connected cell, don't
706 try that circuit again: try a new one.
707 - Retry streams at most 4 times. Then give up.
708 - When a dirserver gets a descriptor from an unknown router, it
709 logs its fingerprint (so the dirserver operator can choose to
710 accept it even without mail from the server operator).
711 - Inform unapproved servers when we reject their descriptors.
712 - Make tor build on Windows again. It works as a client, who knows
714 - Clearer instructions in the torrc for how to set up a server.
715 - Be more efficient about reading fd's when our global token bucket
716 (used for rate limiting) becomes empty.
718 - Stop asserting that computers always go forward in time. It's
720 - When we sent a cell (e.g. destroy) and then marked an OR connection
721 expired, we might close it before finishing a flush if the other
722 side isn't reading right then.
723 - Don't allow dirservers to start if they haven't defined
725 - We were caching transient dns failures. Oops.
726 - Prevent servers from publishing an internal IP as their address.
727 - Address a strcat vulnerability in circuit.c
730 Changes in version 0.0.2pre25 - 2004-03-04
732 - Put the OR's IP in its router descriptor, not its fqdn. That way
733 we'll stop being stalled by gethostbyname for nodes with flaky dns,
736 - If the user typed in an address that didn't resolve, the server
740 Changes in version 0.0.2pre24 - 2004-03-03
742 - Fix an assertion failure in dns.c, where we were trying to dequeue
743 a pending dns resolve even if it wasn't pending
744 - Fix a spurious socks5 warning about still trying to write after the
745 connection is finished.
746 - Hold certain marked_for_close connections open until they're finished
747 flushing, rather than losing bytes by closing them too early.
748 - Correctly report the reason for ending a stream
749 - Remove some duplicate calls to connection_mark_for_close
750 - Put switch_id and start_daemon earlier in the boot sequence, so it
751 will actually try to chdir() to options.DataDirectory
752 - Make 'make test' exit(1) if a test fails; fix some unit tests
753 - Make tor fail when you use a config option it doesn't know about,
754 rather than warn and continue.
755 - Make --version work
756 - Bugfixes on the rpm spec file and tor.sh, so it's more up to date
759 Changes in version 0.0.2pre23 - 2004-02-29
761 - Print a statement when the first circ is finished, so the user
763 - If a relay cell is unrecognized at the end of the circuit,
764 send back a destroy. (So attacks to mutate cells are more
766 - New config option 'excludenodes' to avoid certain nodes for circuits.
767 - When it daemonizes, it chdir's to the DataDirectory rather than "/",
768 so you can collect coredumps there.
770 - Fix a bug in tls flushing where sometimes data got wedged and
771 didn't flush until more data got sent. Hopefully this bug was
772 a big factor in the random delays we were seeing.
773 - Make 'connected' cells include the resolved IP, so the client
774 dns cache actually gets populated.
775 - Disallow changing from ORPort=0 to ORPort>0 on hup.
776 - When we time-out on a stream and detach from the circuit, send an
777 end cell down it first.
778 - Only warn about an unknown router (in exitnodes, entrynodes,
779 excludenodes) after we've fetched a directory.
782 Changes in version 0.0.2pre22 - 2004-02-26
784 - Servers publish less revealing uname information in descriptors.
785 - More memory tracking and assertions, to crash more usefully when
787 - If the default torrc isn't there, just use some default defaults.
788 Plus provide an internal dirservers file if they don't have one.
789 - When the user tries to use Tor as an http proxy, give them an http
790 501 failure explaining that we're a socks proxy.
791 - Dump a new router.desc on hup, to help confused people who change
792 their exit policies and then wonder why router.desc doesn't reflect
794 - Clean up the generic tor.sh init script that we ship with.
796 - If the exit stream is pending on the resolve, and a destroy arrives,
797 then the stream wasn't getting removed from the pending list. I
798 think this was the one causing recent server crashes.
799 - Use a more robust poll on OSX 10.3, since their poll is flaky.
800 - When it couldn't resolve any dirservers, it was useless from then on.
801 Now it reloads the RouterFile (or default dirservers) if it has no
803 - Move the 'tor' binary back to /usr/local/bin/ -- it turns out
804 many users don't even *have* a /usr/local/sbin/.
807 Changes in version 0.0.2pre21 - 2004-02-18
809 - There's a ChangeLog file that actually reflects the changelog.
810 - There's a 'torify' wrapper script, with an accompanying
811 tor-tsocks.conf, that simplifies the process of using tsocks for
812 tor. It even has a man page.
813 - The tor binary gets installed to sbin rather than bin now.
814 - Retry streams where the connected cell hasn't arrived in 15 seconds
815 - Clean up exit policy handling -- get the default out of the torrc,
816 so we can update it without forcing each server operator to fix
818 - Allow imaps and pop3s in default exit policy
820 - Prevent picking middleman nodes as the last node in the circuit
823 Changes in version 0.0.2pre20 - 2004-01-30
825 - We now have a deb package, and it's in debian unstable. Go to
827 - I've split the TotalBandwidth option into BandwidthRate (how many
828 bytes per second you want to allow, long-term) and
829 BandwidthBurst (how many bytes you will allow at once before the cap
830 kicks in). This better token bucket approach lets you, say, set
831 BandwidthRate to 10KB/s and BandwidthBurst to 10MB, allowing good
832 performance while not exceeding your monthly bandwidth quota.
833 - Push out a tls record's worth of data once you've got it, rather
834 than waiting until you've read everything waiting to be read. This
835 may improve performance by pipelining better. We'll see.
836 - Add an AP_CONN_STATE_CONNECTING state, to allow streams to detach
837 from failed circuits (if they haven't been connected yet) and attach
839 - Expire old streams that haven't managed to connect. Some day we'll
840 have them reattach to new circuits instead.
843 - Fix several memory leaks that were causing servers to become bloated
845 - Fix a few very rare assert triggers. A few more remain.
846 - Setuid to User _before_ complaining about running as root.
849 Changes in version 0.0.2pre19 - 2004-01-07
851 - Fix deadlock condition in dns farm. We were telling a child to die by
852 closing the parent's file descriptor to him. But newer children were
853 inheriting the open file descriptor from the parent, and since they
854 weren't closing it, the socket never closed, so the child never read
855 eof, so he never knew to exit. Similarly, dns workers were holding
856 open other sockets, leading to all sorts of chaos.
857 - New cleaner daemon() code for forking and backgrounding.
858 - If you log to a file, it now prints an entry at the top of the
859 logfile so you know it's working.
860 - The onionskin challenge length was 30 bytes longer than necessary.
861 - Started to patch up the spec so it's not quite so out of date.
864 Changes in version 0.0.2pre18 - 2004-01-02
866 - Fix endian issues with the 'integrity' field in the relay header.
867 - Fix a potential bug where connections in state
868 AP_CONN_STATE_CIRCUIT_WAIT might unexpectedly ask to write.
871 Changes in version 0.0.2pre17 - 2003-12-30
873 - Made --debuglogfile (or any second log file, actually) work.
874 - Resolved an edge case in get_unique_circ_id_by_conn where a smart
875 adversary could force us into an infinite loop.
878 - Each onionskin handshake now includes a hash of the computed key,
879 to prove the server's identity and help perfect forward secrecy.
880 - Changed cell size from 256 to 512 bytes (working toward compatibility
882 - Changed cell length to 2 bytes, and moved it to the relay header.
883 - Implemented end-to-end integrity checking for the payloads of
885 - Separated streamid from 'recognized' (otherwise circuits will get
886 messed up when we try to have streams exit from the middle). We
887 use the integrity-checking to confirm that a cell is addressed to
889 - Randomize the initial circid and streamid values, so an adversary who
890 breaks into a node can't learn how many circuits or streams have
894 Changes in version 0.0.2pre16 - 2003-12-14
896 - Fixed a bug that made HUP trigger an assert
897 - Fixed a bug where a circuit that immediately failed wasn't being
898 counted as a failed circuit in counting retries.
901 - Now we close the circuit when we get a truncated cell: otherwise we're
902 open to an anonymity attack where a bad node in the path truncates
903 the circuit and then we open streams at him.
904 - Add port ranges to exit policies
905 - Add a conservative default exit policy
906 - Warn if you're running tor as root
907 - on HUP, retry OR connections and close/rebind listeners
908 - options.EntryNodes: try these nodes first when picking the first node
909 - options.ExitNodes: if your best choices happen to include any of
910 your preferred exit nodes, you choose among just those preferred
912 - options.ExcludedNodes: nodes that are never picked in path building
915 Changes in version 0.0.2pre15 - 2003-12-03
916 o Robustness and bugfixes:
917 - Sometimes clients would cache incorrect DNS resolves, which would
918 really screw things up.
919 - An OP that goes offline would slowly leak all its sockets and stop
921 - A wide variety of bugfixes in exit node selection, exit policy
922 handling, and processing pending streams when a new circuit is
924 - Pick nodes for a path only from those the directory says are up
925 - Choose randomly from all running dirservers, not always the first one
926 - Increase allowed http header size for directory fetch.
927 - Stop writing to stderr (if we're daemonized it will be closed).
928 - Enable -g always, so cores will be more useful to me.
929 - Switch "-lcrypto -lssl" to "-lssl -lcrypto" for broken distributions.
932 - Wrote a man page. It lists commonly used options.
935 - Change default loglevel to warn.
936 - Make PidFile default to null rather than littering in your CWD.
937 - OnionRouter config option is now obsolete. Instead it just checks
939 - Moved to a single unified torrc file for both clients and servers.
942 Changes in version 0.0.2pre14 - 2003-11-29
943 o Robustness and bugfixes:
944 - Force the admin to make the DataDirectory himself
945 - to get ownership/permissions right
946 - so clients no longer make a DataDirectory and then never use it
947 - fix bug where a client who was offline for 45 minutes would never
948 pull down a directory again
949 - fix (or at least hide really well) the dns assert bug that was
950 causing server crashes
951 - warnings and improved robustness wrt clockskew for certs
952 - use the native daemon(3) to daemonize, when available
953 - exit if bind() fails
954 - exit if neither socksport nor orport is defined
955 - include our own tor_timegm (Win32 doesn't have its own)
956 - bugfix for win32 with lots of connections
957 - fix minor bias in PRNG
958 - make dirserver more robust to corrupt cached directory
961 - Wrote the design document (woo)
963 o Circuit building and exit policies:
964 - Circuits no longer try to use nodes that the directory has told them
966 - Exit policies now support bitmasks (18.0.0.0/255.0.0.0) and
967 bitcounts (18.0.0.0/8).
968 - Make AP connections standby for a circuit if no suitable circuit
969 exists, rather than failing
970 - Circuits choose exit node based on addr/port, exit policies, and
971 which AP connections are standing by
972 - Bump min pathlen from 2 to 3
973 - Relay end cells have a payload to describe why the stream ended.
974 - If the stream failed because of exit policy, try again with a new
976 - Clients have a dns cache to remember resolved addresses.
977 - Notice more quickly when we have no working circuits
980 - APPort is now called SocksPort
981 - SocksBindAddress, ORBindAddress, DirBindAddress let you configure
983 - RecommendedVersions is now a config variable rather than
984 hardcoded (for dirservers)
985 - Reloads config on HUP
986 - Usage info on -h or --help
987 - If you set User and Group config vars, it'll setu/gid to them.
989 Changes in version 0.0.2pre13 - 2003-10-19
991 - SSL_write no longer fails when it returns WANTWRITE and the number
992 of bytes in the buf has changed by the next SSL_write call.
993 - Fix segfault fetching directory when network is down
994 - Fix a variety of minor memory leaks
995 - Dirservers reload the fingerprints file on HUP, so I don't have
996 to take down the network when I approve a new router
997 - Default server config file has explicit Address line to specify fqdn
1000 - Buffers grow and shrink as needed (Cut process size from 20M to 2M)
1001 - Make listener connections not ever alloc bufs
1003 o Autoconf improvements:
1004 - don't clobber an external CFLAGS in ./configure
1005 - Make install now works
1006 - create var/lib/tor on make install
1007 - autocreate a tor.sh initscript to help distribs
1008 - autocreate the torrc and sample-server-torrc with correct paths
1010 o Log files and Daemonizing now work:
1011 - If --DebugLogFile is specified, log to it at -l debug
1012 - If --LogFile is specified, use it instead of commandline
1013 - If --RunAsDaemon is set, tor forks and backgrounds on startup