1 Changes so far in 0.0.9:
4 - Finally fix a bug that's been plaguing us for a year:
5 With high load, circuit package window was reaching 0. Whenever
6 we got a circuit-level sendme, we were reading a lot on each
7 socket, but only writing out a bit. So we would eventually reach
8 eof. This would be noticed and acted on even when there were still
9 bytes sitting in the inbuf.
10 - When poll() is interrupted, we shouldn't believe the revents values.
12 o Bugfixes on 0.0.9pre6:
13 - Fix hibernate bug that caused pre6 to be broken.
14 - Don't keep rephist info for routers that haven't had activity for
15 24 hours. (This matters now that clients have keys, since we track
17 - Never call close_temp_logs while validating log options.
18 - Fix backslash-escaping on tor.sh.in and torctl.in.
21 - Implement weekly/monthly/daily accounting: now you specify your
22 hibernation properties by
23 AccountingMax N bytes|KB|MB|GB|TB
24 AccountingStart day|week|month [day] HH:MM
25 Defaults to "month 1 0:00".
26 - Let bandwidth and interval config options be specified as 5 bytes,
27 kb, kilobytes, etc; and as seconds, minutes, hours, days, weeks.
28 - kill -USR2 now moves all logs to loglevel debug (kill -HUP to
30 - If your requested entry or exit node has advertised bandwidth 0,
32 - Be more greedy about filling up relay cells -- we try reading again
33 once we've processed the stuff we read, in case enough has arrived
34 to fill the last cell completely.
35 - Apply NT service patch from Osamu Fujino. Still needs more work.
38 o Bugfixes on 0.0.8.1:
39 - Fix assert failure on malformed socks4a requests.
40 - Use identity comparison, not nickname comparison, to choose which
41 half of circuit-ID-space each side gets to use. This is needed
42 because sometimes we think of a router as a nickname, and sometimes
43 as a hex ID, and we can't predict what the other side will do.
44 - Catch and ignore SIGXFSZ signals when log files exceed 2GB; our
45 write() call will fail and we handle it there.
46 - Add a FAST_SMARTLIST define to optionally inline smartlist_get
47 and smartlist_len, which are two major profiling offenders.
49 o Bugfixes on 0.0.9pre5:
50 - Fix a bug in read_all that was corrupting config files on windows.
51 - When we're raising the max number of open file descriptors to
52 'unlimited', don't log that we just raised it to '-1'.
53 - Include event code with events, as required by control-spec.txt.
54 - Don't give a fingerprint when clients do --list-fingerprint:
55 it's misleading, because it will never be the same again.
56 - Stop using strlcpy in tor_strndup, since it was slowing us
58 - Remove warn on startup about missing cached-directory file.
59 - Make kill -USR1 work again.
60 - Hibernate if we start tor during the "wait for wakeup-time" phase
61 of an accounting interval. Log our hibernation plans better.
62 - Authoritative dirservers now also cache their directory, so they
66 - Fetch running-routers; cache running-routers; compress
67 running-routers; serve compressed running-routers.z
68 - Add NSI installer script contributed by J Doe.
69 - Commit VC6 and VC7 workspace/project files.
70 - Commit a tor.spec for making RPM files, with help from jbash.
71 - Add contrib/torctl.in contributed by Glenn Fink.
72 - Implement the control-spec's SAVECONF command, to write your
73 configuration to torrc.
74 - Get cookie authentication for the controller closer to working.
75 - Include control-spec.txt in the tarball.
76 - When set_conf changes our server descriptor, upload a new copy.
77 But don't upload it too often if there are frequent changes.
78 - Document authentication config in man page, and document signals
80 - Clean up confusing parts of man page and torrc.sample.
81 - Make expand_filename handle ~ and ~username.
82 - Use autoconf to enable largefile support where necessary. Use
83 ftello where available, since ftell can fail at 2GB.
84 - Distinguish between TOR_TLS_CLOSE and TOR_TLS_ERROR, so we can
85 log more informatively.
86 - Give a slightly more useful output for "tor -h".
87 - Refuse application socks connections to port 0.
88 - Check clock skew for verified servers, but allow unverified
89 servers and clients to have any clock skew.
90 - Break DirFetchPostPeriod into:
91 - DirFetchPeriod for fetching full directory,
92 - StatusFetchPeriod for fetching running-routers,
93 - DirPostPeriod for posting server descriptor,
94 - RendPostPeriod for posting hidden service descriptors.
95 - Make sure the hidden service descriptors are at a random offset
96 from each other, to hinder linkability.
99 o Bugfixes on 0.0.8.1:
100 - Fix an assert bug where a hidden service provider would fail if
101 the first hop of his rendezvous circuit was down.
102 - Hidden service operators now correctly handle version 1 style
103 INTRODUCE1 cells (nobody generates them still, so not a critical
105 - If do_hup fails, actually notice.
106 - Handle more errnos from accept() without closing the listener.
107 Some OpenBSD machines were closing their listeners because
108 they ran out of file descriptors.
109 - Better handling of winsock includes on non-MSV win32 compilers.
110 - Some people had wrapped their tor client/server in a script
111 that would restart it whenever it died. This did not play well
112 with our "shut down if your version is obsolete" code. Now people
113 don't fetch a new directory if their local cached version is
115 - Make our autogen.sh work on ksh as well as bash.
117 o Bugfixes on 0.0.9pre4:
118 - Fix a seg fault in unit tests (doesn't affect main program).
119 - Send resolve cells to exit routers that are running a new
120 enough version of the resolve code to work right.
123 - Hibernation: New config option "AccountingMaxKB" lets you
124 set how many KBytes per month you want to allow your server to
125 consume. Rather than spreading those bytes out evenly over the
126 month, we instead hibernate for some of the month and pop up
127 at a deterministic time, work until the bytes are consumed, then
128 hibernate again. Config option "MonthlyAccountingStart" lets you
129 specify which day of the month your billing cycle starts on.
130 - Control interface: a separate program can now talk to your
131 client/server over a socket, and get/set config options, receive
132 notifications of circuits and streams starting/finishing/dying,
133 bandwidth used, etc. The next step is to get some GUIs working.
134 Let us know if you want to help out. See doc/control-spec.txt .
135 - Ship a contrib/tor-control.py as an example script to interact
136 with the control port.
137 - "tor --hash-password zzyxz" will output a salted password for
138 use in authenticating to the control interface.
139 - New log format in config:
140 "Log minsev[-maxsev] stdout|stderr|syslog" or
141 "Log minsev[-maxsev] file /var/foo"
144 - DirPolicy config option, to let people reject incoming addresses
145 from their dirserver.
146 - "tor --list-fingerprint" will list your identity key fingerprint
148 - Add "pass" target for RedirectExit, to make it easier to break
149 out of a sequence of RedirectExit rules.
150 - Clients now generate a TLS cert too, in preparation for having
151 them act more like real nodes.
152 - Ship src/win32/ in the tarball, so people can use it to build.
153 - Make old win32 fall back to CWD if SHGetSpecialFolderLocation
155 - New "router-status" line in directory, to better bind each verified
156 nickname to its identity key.
157 - Deprecate unofficial config option abbreviations, and abbreviations
158 not on the command line.
159 - Add a pure-C tor-resolve implementation.
160 - Use getrlimit and friends to ensure we can reach MaxConn (currently
161 1024) file descriptors.
163 o Code security improvements, inspired by Ilja:
164 - Replace sprintf with snprintf. (I think they were all safe, but
166 - Replace strcpy/strncpy with strlcpy in more places.
167 - Avoid strcat; use snprintf or strlcat instead.
168 - snprintf wrapper with consistent (though not C99) overflow behavior.
171 o Bugfixes on 0.0.9pre3:
172 - Ignore fascistfirewall when uploading/downloading hidden service
173 descriptors, since we go through Tor for those; and when using
174 an HttpProxy, since we assume it can reach them all.
175 - When looking for an authoritative dirserver, use only the ones
176 configured at boot. Don't bother looking in the directory.
177 - If the server doesn't specify an exit policy, use the real default
178 exit policy, not reject *:*.
179 - The rest of the fix for get_default_conf_file() on older win32.
180 - Make 'Routerfile' config option obsolete.
183 - New 'MyFamily nick1,...' config option for a server to
184 specify other servers that shouldn't be used in the same circuit
185 with it. Only believed if nick1 also specifies us.
186 - New 'NodeFamily nick1,nick2,...' config option for a client to
187 specify nodes that it doesn't want to use in the same circuit.
188 - New 'Redirectexit pattern address:port' config option for a
189 server to redirect exit connections, e.g. to a local squid.
192 o Bugfixes on 0.0.8.1:
193 - Better torrc example lines for dirbindaddress and orbindaddress.
194 - Improved bounds checking on parsed ints (e.g. config options and
195 the ones we find in directories.)
196 - Better handling of size_t vs int, so we're more robust on 64
198 - Fix the rest of the bug where a newly started OR would appear
199 as unverified even after we've added his fingerprint and hupped
201 - Fix a bug from 0.0.7: when read() failed on a stream, we would
202 close it without sending back an end. So 'connection refused'
203 would simply be ignored and the user would get no response.
205 o Bugfixes on 0.0.9pre2:
206 - Serving the cached-on-disk directory to people is bad. We now
207 provide no directory until we've fetched a fresh one.
208 - Workaround for bug on windows where cached-directories get crlf
210 - Make get_default_conf_file() work on older windows too.
211 - If we write a *:* exit policy line in the descriptor, don't write
212 any more exit policy lines.
215 - Use only 0.0.9pre1 and later servers for resolve cells.
216 - Make the dirservers file obsolete.
217 - Include a dir-signing-key token in directories to tell the
218 parsing entity which key is being used to sign.
219 - Remove the built-in bulky default dirservers string.
220 - New config option "Dirserver %s:%d [fingerprint]", which can be
221 repeated as many times as needed. If no dirservers specified,
222 default to moria1,moria2,tor26.
223 - Make moria2 advertise a dirport of 80, so people behind firewalls
224 will be able to get a directory.
226 - Dirservers translate requests for http://%s:%d/x to /x
227 - You can specify "HttpProxy %s[:%d]" and all dir fetches will
228 be routed through this host.
229 - Clients ask for /tor/x rather than /x for new enough dirservers.
230 This way we can one day coexist peacefully with apache.
231 - Clients specify a "Host: %s%d" http header, to be compatible
232 with more proxies, and so running squid on an exit node can work.
236 - Make fetching a cached directory work for 64-bit platforms too.
237 - Make zlib.h a required header, not an optional header.
241 - Stop using separate defaults for no-config-file and
242 empty-config-file. Now you have to explicitly turn off SocksPort,
243 if you don't want it open.
244 - Improve man page to mention more of the 0.0.8 features.
245 - Change our file IO stuff (especially wrt OpenSSL) so win32 is
247 - Fix more dns related bugs: send back resolve_failed and end cells
248 more reliably when the resolve fails, rather than closing the
249 circuit and then trying to send the cell. Also attach dummy resolve
250 connections to a circuit *before* calling dns_resolve(), to fix
251 a bug where cached answers would never be sent in RESOLVED cells.
252 - When we run out of disk space, or other log writing error, don't
253 crash. Just stop logging to that log and continue.
254 - We were starting to daemonize before we opened our logs, so if
255 there were any problems opening logs, we would complain to stderr,
256 which wouldn't work, and then mysteriously exit.
257 - Fix a rare bug where sometimes a verified OR would connect to us
258 before he'd uploaded his descriptor, which would cause us to
259 assign conn->nickname as though he's unverified. Now we look through
260 the fingerprint list to see if he's there.
263 - Clients can ask dirservers for /dir.z to get a compressed version
264 of the directory. Only works for servers running 0.0.9, of course.
265 - Make clients cache directories and use them to seed their router
266 lists at startup. This means clients have a datadir again.
267 - Configuration infrastructure support for warning on obsolete
269 - Respond to content-encoding headers by trying to uncompress as
271 - Reply with a deflated directory when a client asks for "dir.z".
272 We could use allow-encodings instead, but allow-encodings isn't
273 specified in HTTP 1.0.
274 - Raise the max dns workers from 50 to 100.
275 - Discourage people from setting their dirfetchpostperiod more often
277 - Protect dirservers from overzealous descriptor uploading -- wait
278 10 seconds after directory gets dirty, before regenerating.
281 Changes in version 0.0.8.1 - 2004-10-13
283 - Fix a seg fault that can be triggered remotely for Tor
284 clients/servers with an open dirport.
285 - Fix a rare assert trigger, where routerinfos for entries in
286 our cpath would expire while we're building the path.
287 - Fix a bug in OutboundBindAddress so it (hopefully) works.
288 - Fix a rare seg fault for people running hidden services on
289 intermittent connections.
290 - Fix a bug in parsing opt keywords with objects.
291 - Fix a stale pointer assert bug when a stream detaches and
293 - Fix a string format vulnerability (probably not exploitable)
294 in reporting stats locally.
295 - Fix an assert trigger: sometimes launching circuits can fail
296 immediately, e.g. because too many circuits have failed recently.
297 - Fix a compile warning on 64 bit platforms.
300 Changes in version 0.0.8 - 2004-08-25
302 - Made our unit tests compile again on OpenBSD 3.5, and tor
303 itself compile again on OpenBSD on a sparc64.
304 - We were neglecting milliseconds when logging on win32, so
305 everything appeared to happen at the beginning of each second.
306 - Check directory signature _before_ you decide whether you're
307 you're running an obsolete version and should exit.
308 - Check directory signature _before_ you parse the running-routers
309 list to decide who's running.
310 - Check return value of fclose while writing to disk, so we don't
311 end up with broken files when servers run out of disk space.
312 - Port it to SunOS 5.9 / Athena
313 - Fix two bugs in saving onion keys to disk when rotating, so
314 hopefully we'll get fewer people using old onion keys.
315 - Remove our mostly unused -- and broken -- hex_encode()
316 function. Use base16_encode() instead. (Thanks to Timo Lindfors
317 for pointing out this bug.)
318 - Only pick and establish intro points after we've gotten a
320 - Fix assert triggers: if the other side returns an address 0.0.0.0,
321 don't put it into the client dns cache.
322 - If a begin failed due to exit policy, but we believe the IP
323 address should have been allowed, switch that router to exitpolicy
324 reject *:* until we get our next directory.
327 - 'Extend' relay cell payloads now include the digest of the
328 intended next hop's identity key. Now we can verify that we're
329 extending to the right router, and also extend to routers we
330 hadn't heard of before.
333 - Tor nodes can now act as relays (with an advertised ORPort)
334 without being manually verified by the dirserver operators.
335 - Uploaded descriptors of unverified routers are now accepted
336 by the dirservers, and included in the directory.
337 - Verified routers are listed by nickname in the running-routers
338 list; unverified routers are listed as "$<fingerprint>".
339 - We now use hash-of-identity-key in most places rather than
340 nickname or addr:port, for improved security/flexibility.
341 - AllowUnverifiedNodes config option to let circuits choose no-name
342 routers in entry,middle,exit,introduction,rendezvous positions.
343 Allow middle and rendezvous positions by default.
344 - When picking unverified routers, skip those with low uptime and/or
345 low bandwidth, depending on what properties you care about.
346 - ClientOnly option for nodes that never want to become servers.
348 - "AuthoritativeDir 1" option for the official dirservers.
349 - Now other nodes (clients and servers) will cache the latest
350 directory they've pulled down.
351 - They can enable their DirPort to serve it to others.
352 - Clients will pull down a directory from any node with an open
353 DirPort, and check the signature/timestamp correctly.
354 - Authoritative dirservers now fetch directories from other
355 authdirservers, to stay better synced.
356 - Running-routers list tells who's down also, along with noting
357 if they're verified (listed by nickname) or unverified (listed
359 - Allow dirservers to serve running-router list separately.
361 - You can now fetch $DIRURL/running-routers to get just the
362 running-routers line, not the whole descriptor list. (But
363 clients don't use this yet.)
364 - Clients choose nodes proportional to advertised bandwidth.
365 - Clients avoid using nodes with low uptime as introduction points.
366 - Handle servers with dynamic IP addresses: don't just replace
367 options->Address with the resolved one at startup, and
368 detect our address right before we make a routerinfo each time.
369 - 'FascistFirewall' option to pick dirservers and ORs on specific
370 ports; plus 'FirewallPorts' config option to tell FascistFirewall
371 which ports are open. (Defaults to 80,443)
372 - Try other dirservers immediately if the one you try is down. This
373 should tolerate down dirservers better now.
374 - ORs connect-on-demand to other ORs
375 - If you get an extend cell to an OR you're not connected to,
376 connect, handshake, and forward the create cell.
377 - The authoritative dirservers stay connected to everybody,
378 and everybody stays connected to 0.0.7 servers, but otherwise
379 clients/servers expire unused connections after 5 minutes.
380 - When servers get a sigint, they delay 30 seconds (refusing new
381 connections) then exit. A second sigint causes immediate exit.
382 - File and name management:
383 - Look for .torrc if no CONFDIR "torrc" is found.
384 - If no datadir is defined, then choose, make, and secure ~/.tor
386 - If torrc not found, exitpolicy reject *:*.
387 - Expands ~/ in filenames to $HOME/ (but doesn't yet expand ~arma).
388 - If no nickname is defined, derive default from hostname.
389 - Rename secret key files, e.g. identity.key -> secret_id_key,
390 to discourage people from mailing their identity key to tor-ops.
391 - Refuse to build a circuit before the directory has arrived --
392 it won't work anyway, since you won't know the right onion keys
394 - Parse tor version numbers so we can do an is-newer-than check
395 rather than an is-in-the-list check.
396 - New socks command 'resolve', to let us shim gethostbyname()
398 - A 'tor_resolve' script to access the socks resolve functionality.
399 - A new socks-extensions.txt doc file to describe our
400 interpretation and extensions to the socks protocols.
401 - Add a ContactInfo option, which gets published in descriptor.
402 - Write tor version at the top of each log file
403 - New docs in the tarball:
405 - Document that you should proxy your SSL traffic too.
406 - Log a warning if the user uses an unsafe socks variant, so people
407 are more likely to learn about privoxy or socat.
408 - Log a warning if you're running an unverified server, to let you
409 know you might want to get it verified.
410 - Change the default exit policy to reject the default edonkey,
411 kazaa, gnutella ports.
412 - Add replace_file() to util.[ch] to handle win32's rename().
413 - Publish OR uptime in descriptor (and thus in directory) too.
414 - Remember used bandwidth (both in and out), and publish 15-minute
415 snapshots for the past day into our descriptor.
416 - Be more aggressive about trying to make circuits when the network
417 has changed (e.g. when you unsuspend your laptop).
418 - Check for time skew on http headers; report date in response to
420 - If the entrynode config line has only one node, don't pick it as
422 - Add strict{entry|exit}nodes config options. If set to 1, then
423 we refuse to build circuits that don't include the specified entry
425 - OutboundBindAddress config option, to bind to a specific
426 IP address for outgoing connect()s.
427 - End truncated log entries (e.g. directories) with "[truncated]".
430 Changes in version 0.0.7.3 - 2004-08-12
431 o Stop dnsworkers from triggering an assert failure when you
432 ask them to resolve the host "".
435 Changes in version 0.0.7.2 - 2004-07-07
436 o A better fix for the 0.0.0.0 problem, that will hopefully
437 eliminate the remaining related assertion failures.
440 Changes in version 0.0.7.1 - 2004-07-04
441 o When an address resolves to 0.0.0.0, treat it as a failed resolve,
442 since internally we use 0.0.0.0 to signify "not yet resolved".
445 Changes in version 0.0.7 - 2004-06-07
446 o Fixes for crashes and other obnoxious bugs:
447 - Fix an epipe bug: sometimes when directory connections failed
448 to connect, we would give them a chance to flush before closing
450 - When we detached from a circuit because of resolvefailed, we
451 would immediately try the same circuit twice more, and then
452 give up on the resolve thinking we'd tried three different
454 - Limit the number of intro circuits we'll attempt to build for a
455 hidden service per 15-minute period.
456 - Check recommended-software string *early*, before actually parsing
457 the directory. Thus we can detect an obsolete version and exit,
458 even if the new directory format doesn't parse.
459 o Fixes for security bugs:
460 - Remember which nodes are dirservers when you startup, and if a
461 random OR enables his dirport, don't automatically assume he's
464 - Directory connections were asking the wrong poll socket to
465 start writing, and not asking themselves to start writing.
466 - When we detached from a circuit because we sent a begin but
467 didn't get a connected, we would use it again the first time;
468 but after that we would correctly switch to a different one.
469 - Stop warning when the first onion decrypt attempt fails; they
470 will sometimes legitimately fail now that we rotate keys.
471 - Override unaligned-access-ok check when $host_cpu is ia64 or
472 arm. Apparently they allow it but the kernel whines.
473 - Dirservers try to reconnect periodically too, in case connections
475 - Fix some memory leaks in directory servers.
476 - Allow backslash in Win32 filenames.
477 - Made Tor build complain-free on FreeBSD, hopefully without
478 breaking other BSD builds. We'll see.
479 - Check directory signatures based on name of signer, not on whom
480 we got the directory from. This will let us cache directories more
482 - Rotate dnsworkers and cpuworkers on SIGHUP, so they get new config
485 - Doxygen markup on all functions and global variables.
486 - Make directory functions update routerlist, not replace it. So
487 now directory disagreements are not so critical a problem.
488 - Remove the upper limit on number of descriptors in a dirserver's
489 directory (not that we were anywhere close).
490 - Allow multiple logfiles at different severity ranges.
491 - Allow *BindAddress to specify ":port" rather than setting *Port
492 separately. Allow multiple instances of each BindAddress config
493 option, so you can bind to multiple interfaces if you want.
494 - Allow multiple exit policy lines, which are processed in order.
495 Now we don't need that huge line with all the commas in it.
496 - Enable accept/reject policies on SOCKS connections, so you can bind
497 to 0.0.0.0 but still control who can use your OP.
498 - Updated the man page to reflect these features.
501 Changes in version 0.0.6.2 - 2004-05-16
502 o Our integrity-checking digest was checking only the most recent cell,
503 not the previous cells like we'd thought.
504 Thanks to Stefan Mark for finding the flaw!
507 Changes in version 0.0.6.1 - 2004-05-06
508 o Fix two bugs in our AES counter-mode implementation (this affected
509 onion-level stream encryption, but not TLS-level). It turns
510 out we were doing something much more akin to a 16-character
511 polyalphabetic cipher. Oops.
512 Thanks to Stefan Mark for finding the flaw!
513 o Retire moria3 as a directory server, and add tor26 as a directory
517 Changes in version 0.0.6 - 2004-05-02
519 - Hidden services and rendezvous points are implemented. Go to
520 http://6sxoyfb3h2nvok2d.onion/ for an index of currently available
521 hidden services. (This only works via a socks4a proxy such as
522 Privoxy, and currently it's quite slow.)
523 - We now rotate link (tls context) keys and onion keys.
524 - CREATE cells now include oaep padding, so you can tell
525 if you decrypted them correctly.
526 - Retry stream correctly when we fail to connect because of
527 exit-policy-reject (should try another) or can't-resolve-address.
528 - When we hup a dirserver and we've *removed* a server from the
529 approved-routers list, now we remove that server from the
530 in-memory directories too.
531 - Add bandwidthburst to server descriptor.
532 - Directories now say which dirserver signed them.
533 - Use a tor_assert macro that logs failed assertions too.
534 - Since we don't support truncateds much, don't bother sending them;
536 - Fetch randomness from /dev/urandom better (not via fopen/fread)
537 - Better debugging for tls errors
538 - Set Content-Type on the directory and hidserv descriptor.
539 - Remove IVs from cipher code, since AES-ctr has none.
541 - Fix an assert trigger for exit nodes that's been plaguing us since
542 the days of 0.0.2prexx (thanks weasel!)
543 - Fix a bug where we were closing tls connections intermittently.
544 It turns out openssl keeps its errors around -- so if an error
545 happens, and you don't ask about it, and then another openssl
546 operation happens and succeeds, and you ask if there was an error,
547 it tells you about the first error.
548 - Fix a bug that's been lurking since 27 may 03 (!)
549 When passing back a destroy cell, we would use the wrong circ id.
550 - Don't crash if a conn that sent a begin has suddenly lost its circuit.
551 - Some versions of openssl have an SSL_pending function that erroneously
552 returns bytes when there is a non-application record pending.
553 - Win32 fixes. Tor now compiles on win32 with no warnings/errors.
554 o We were using an array of length zero in a few places.
555 o Win32's gethostbyname can't resolve an IP to an IP.
556 o Win32's close can't close a socket.
557 o Handle windows socket errors correctly.
559 - check for <sys/limits.h> so we build on FreeBSD again, and
560 <machine/limits.h> for NetBSD.
563 Changes in version 0.0.5 - 2004-03-30
564 o Install torrc as torrc.sample -- we no longer clobber your
566 o Fix mangled-state bug in directory fetching (was causing sigpipes).
567 o Only build circuits after we've fetched the directory: clients were
568 using only the directory servers before they'd fetched a directory.
569 This also means longer startup time; so it goes.
570 o Fix an assert trigger where an OP would fail to handshake, and we'd
571 expect it to have a nickname.
572 o Work around a tsocks bug: do a socks reject when AP connection dies
573 early, else tsocks goes into an infinite loop.
574 o Hold socks connection open until reply is flushed (if possible)
575 o Make exit nodes resolve IPs to IPs immediately, rather than asking
576 the dns farm to do it.
577 o Fix c99 aliasing warnings in rephist.c
578 o Don't include server descriptors that are older than 24 hours in the
580 o Give socks 'reject' replies their whole 15s to attempt to flush,
581 rather than seeing the 60s timeout and assuming the flush had failed.
582 o Clean automake droppings from the cvs repository
583 o Add in a 'notice' log level for things the operator should hear
584 but that aren't warnings
587 Changes in version 0.0.4 - 2004-03-26
588 o When connecting to a dirserver or OR and the network is down,
592 Changes in version 0.0.3 - 2004-03-26
593 o Warn and fail if server chose a nickname with illegal characters
594 o Port to Solaris and Sparc:
595 - include missing header fcntl.h
596 - have autoconf find -lsocket -lnsl automatically
597 - deal with hardware word alignment
598 - make uname() work (solaris has a different return convention)
599 - switch from using signal() to sigaction()
600 o Preliminary work on reputation system:
601 - Keep statistics on success/fail of connect attempts; they're published
602 by kill -USR1 currently.
603 - Add a RunTesting option to try to learn link state by creating test
604 circuits, even when SocksPort is off.
605 - Remove unused open circuits when there are too many.
608 Changes in version 0.0.2 - 2004-03-19
609 - Include strlcpy and strlcat for safer string ops
610 - define INADDR_NONE so we compile (but still not run) on solaris
613 Changes in version 0.0.2pre27 - 2004-03-14
615 - Allow internal tor networks (we were rejecting internal IPs,
616 now we allow them if they're set explicitly).
617 - And fix a few endian issues.
620 Changes in version 0.0.2pre26 - 2004-03-14
622 - If a stream times out after 15s without a connected cell, don't
623 try that circuit again: try a new one.
624 - Retry streams at most 4 times. Then give up.
625 - When a dirserver gets a descriptor from an unknown router, it
626 logs its fingerprint (so the dirserver operator can choose to
627 accept it even without mail from the server operator).
628 - Inform unapproved servers when we reject their descriptors.
629 - Make tor build on Windows again. It works as a client, who knows
631 - Clearer instructions in the torrc for how to set up a server.
632 - Be more efficient about reading fd's when our global token bucket
633 (used for rate limiting) becomes empty.
635 - Stop asserting that computers always go forward in time. It's
637 - When we sent a cell (e.g. destroy) and then marked an OR connection
638 expired, we might close it before finishing a flush if the other
639 side isn't reading right then.
640 - Don't allow dirservers to start if they haven't defined
642 - We were caching transient dns failures. Oops.
643 - Prevent servers from publishing an internal IP as their address.
644 - Address a strcat vulnerability in circuit.c
647 Changes in version 0.0.2pre25 - 2004-03-04
649 - Put the OR's IP in its router descriptor, not its fqdn. That way
650 we'll stop being stalled by gethostbyname for nodes with flaky dns,
653 - If the user typed in an address that didn't resolve, the server
657 Changes in version 0.0.2pre24 - 2004-03-03
659 - Fix an assertion failure in dns.c, where we were trying to dequeue
660 a pending dns resolve even if it wasn't pending
661 - Fix a spurious socks5 warning about still trying to write after the
662 connection is finished.
663 - Hold certain marked_for_close connections open until they're finished
664 flushing, rather than losing bytes by closing them too early.
665 - Correctly report the reason for ending a stream
666 - Remove some duplicate calls to connection_mark_for_close
667 - Put switch_id and start_daemon earlier in the boot sequence, so it
668 will actually try to chdir() to options.DataDirectory
669 - Make 'make test' exit(1) if a test fails; fix some unit tests
670 - Make tor fail when you use a config option it doesn't know about,
671 rather than warn and continue.
672 - Make --version work
673 - Bugfixes on the rpm spec file and tor.sh, so it's more up to date
676 Changes in version 0.0.2pre23 - 2004-02-29
678 - Print a statement when the first circ is finished, so the user
680 - If a relay cell is unrecognized at the end of the circuit,
681 send back a destroy. (So attacks to mutate cells are more
683 - New config option 'excludenodes' to avoid certain nodes for circuits.
684 - When it daemonizes, it chdir's to the DataDirectory rather than "/",
685 so you can collect coredumps there.
687 - Fix a bug in tls flushing where sometimes data got wedged and
688 didn't flush until more data got sent. Hopefully this bug was
689 a big factor in the random delays we were seeing.
690 - Make 'connected' cells include the resolved IP, so the client
691 dns cache actually gets populated.
692 - Disallow changing from ORPort=0 to ORPort>0 on hup.
693 - When we time-out on a stream and detach from the circuit, send an
694 end cell down it first.
695 - Only warn about an unknown router (in exitnodes, entrynodes,
696 excludenodes) after we've fetched a directory.
699 Changes in version 0.0.2pre22 - 2004-02-26
701 - Servers publish less revealing uname information in descriptors.
702 - More memory tracking and assertions, to crash more usefully when
704 - If the default torrc isn't there, just use some default defaults.
705 Plus provide an internal dirservers file if they don't have one.
706 - When the user tries to use Tor as an http proxy, give them an http
707 501 failure explaining that we're a socks proxy.
708 - Dump a new router.desc on hup, to help confused people who change
709 their exit policies and then wonder why router.desc doesn't reflect
711 - Clean up the generic tor.sh init script that we ship with.
713 - If the exit stream is pending on the resolve, and a destroy arrives,
714 then the stream wasn't getting removed from the pending list. I
715 think this was the one causing recent server crashes.
716 - Use a more robust poll on OSX 10.3, since their poll is flaky.
717 - When it couldn't resolve any dirservers, it was useless from then on.
718 Now it reloads the RouterFile (or default dirservers) if it has no
720 - Move the 'tor' binary back to /usr/local/bin/ -- it turns out
721 many users don't even *have* a /usr/local/sbin/.
724 Changes in version 0.0.2pre21 - 2004-02-18
726 - There's a ChangeLog file that actually reflects the changelog.
727 - There's a 'torify' wrapper script, with an accompanying
728 tor-tsocks.conf, that simplifies the process of using tsocks for
729 tor. It even has a man page.
730 - The tor binary gets installed to sbin rather than bin now.
731 - Retry streams where the connected cell hasn't arrived in 15 seconds
732 - Clean up exit policy handling -- get the default out of the torrc,
733 so we can update it without forcing each server operator to fix
735 - Allow imaps and pop3s in default exit policy
737 - Prevent picking middleman nodes as the last node in the circuit
740 Changes in version 0.0.2pre20 - 2004-01-30
742 - We now have a deb package, and it's in debian unstable. Go to
744 - I've split the TotalBandwidth option into BandwidthRate (how many
745 bytes per second you want to allow, long-term) and
746 BandwidthBurst (how many bytes you will allow at once before the cap
747 kicks in). This better token bucket approach lets you, say, set
748 BandwidthRate to 10KB/s and BandwidthBurst to 10MB, allowing good
749 performance while not exceeding your monthly bandwidth quota.
750 - Push out a tls record's worth of data once you've got it, rather
751 than waiting until you've read everything waiting to be read. This
752 may improve performance by pipelining better. We'll see.
753 - Add an AP_CONN_STATE_CONNECTING state, to allow streams to detach
754 from failed circuits (if they haven't been connected yet) and attach
756 - Expire old streams that haven't managed to connect. Some day we'll
757 have them reattach to new circuits instead.
760 - Fix several memory leaks that were causing servers to become bloated
762 - Fix a few very rare assert triggers. A few more remain.
763 - Setuid to User _before_ complaining about running as root.
766 Changes in version 0.0.2pre19 - 2004-01-07
768 - Fix deadlock condition in dns farm. We were telling a child to die by
769 closing the parent's file descriptor to him. But newer children were
770 inheriting the open file descriptor from the parent, and since they
771 weren't closing it, the socket never closed, so the child never read
772 eof, so he never knew to exit. Similarly, dns workers were holding
773 open other sockets, leading to all sorts of chaos.
774 - New cleaner daemon() code for forking and backgrounding.
775 - If you log to a file, it now prints an entry at the top of the
776 logfile so you know it's working.
777 - The onionskin challenge length was 30 bytes longer than necessary.
778 - Started to patch up the spec so it's not quite so out of date.
781 Changes in version 0.0.2pre18 - 2004-01-02
783 - Fix endian issues with the 'integrity' field in the relay header.
784 - Fix a potential bug where connections in state
785 AP_CONN_STATE_CIRCUIT_WAIT might unexpectedly ask to write.
788 Changes in version 0.0.2pre17 - 2003-12-30
790 - Made --debuglogfile (or any second log file, actually) work.
791 - Resolved an edge case in get_unique_circ_id_by_conn where a smart
792 adversary could force us into an infinite loop.
795 - Each onionskin handshake now includes a hash of the computed key,
796 to prove the server's identity and help perfect forward secrecy.
797 - Changed cell size from 256 to 512 bytes (working toward compatibility
799 - Changed cell length to 2 bytes, and moved it to the relay header.
800 - Implemented end-to-end integrity checking for the payloads of
802 - Separated streamid from 'recognized' (otherwise circuits will get
803 messed up when we try to have streams exit from the middle). We
804 use the integrity-checking to confirm that a cell is addressed to
806 - Randomize the initial circid and streamid values, so an adversary who
807 breaks into a node can't learn how many circuits or streams have
811 Changes in version 0.0.2pre16 - 2003-12-14
813 - Fixed a bug that made HUP trigger an assert
814 - Fixed a bug where a circuit that immediately failed wasn't being
815 counted as a failed circuit in counting retries.
818 - Now we close the circuit when we get a truncated cell: otherwise we're
819 open to an anonymity attack where a bad node in the path truncates
820 the circuit and then we open streams at him.
821 - Add port ranges to exit policies
822 - Add a conservative default exit policy
823 - Warn if you're running tor as root
824 - on HUP, retry OR connections and close/rebind listeners
825 - options.EntryNodes: try these nodes first when picking the first node
826 - options.ExitNodes: if your best choices happen to include any of
827 your preferred exit nodes, you choose among just those preferred
829 - options.ExcludedNodes: nodes that are never picked in path building
832 Changes in version 0.0.2pre15 - 2003-12-03
833 o Robustness and bugfixes:
834 - Sometimes clients would cache incorrect DNS resolves, which would
835 really screw things up.
836 - An OP that goes offline would slowly leak all its sockets and stop
838 - A wide variety of bugfixes in exit node selection, exit policy
839 handling, and processing pending streams when a new circuit is
841 - Pick nodes for a path only from those the directory says are up
842 - Choose randomly from all running dirservers, not always the first one
843 - Increase allowed http header size for directory fetch.
844 - Stop writing to stderr (if we're daemonized it will be closed).
845 - Enable -g always, so cores will be more useful to me.
846 - Switch "-lcrypto -lssl" to "-lssl -lcrypto" for broken distributions.
849 - Wrote a man page. It lists commonly used options.
852 - Change default loglevel to warn.
853 - Make PidFile default to null rather than littering in your CWD.
854 - OnionRouter config option is now obsolete. Instead it just checks
856 - Moved to a single unified torrc file for both clients and servers.
859 Changes in version 0.0.2pre14 - 2003-11-29
860 o Robustness and bugfixes:
861 - Force the admin to make the DataDirectory himself
862 - to get ownership/permissions right
863 - so clients no longer make a DataDirectory and then never use it
864 - fix bug where a client who was offline for 45 minutes would never
865 pull down a directory again
866 - fix (or at least hide really well) the dns assert bug that was
867 causing server crashes
868 - warnings and improved robustness wrt clockskew for certs
869 - use the native daemon(3) to daemonize, when available
870 - exit if bind() fails
871 - exit if neither socksport nor orport is defined
872 - include our own tor_timegm (Win32 doesn't have its own)
873 - bugfix for win32 with lots of connections
874 - fix minor bias in PRNG
875 - make dirserver more robust to corrupt cached directory
878 - Wrote the design document (woo)
880 o Circuit building and exit policies:
881 - Circuits no longer try to use nodes that the directory has told them
883 - Exit policies now support bitmasks (18.0.0.0/255.0.0.0) and
884 bitcounts (18.0.0.0/8).
885 - Make AP connections standby for a circuit if no suitable circuit
886 exists, rather than failing
887 - Circuits choose exit node based on addr/port, exit policies, and
888 which AP connections are standing by
889 - Bump min pathlen from 2 to 3
890 - Relay end cells have a payload to describe why the stream ended.
891 - If the stream failed because of exit policy, try again with a new
893 - Clients have a dns cache to remember resolved addresses.
894 - Notice more quickly when we have no working circuits
897 - APPort is now called SocksPort
898 - SocksBindAddress, ORBindAddress, DirBindAddress let you configure
900 - RecommendedVersions is now a config variable rather than
901 hardcoded (for dirservers)
902 - Reloads config on HUP
903 - Usage info on -h or --help
904 - If you set User and Group config vars, it'll setu/gid to them.
906 Changes in version 0.0.2pre13 - 2003-10-19
908 - SSL_write no longer fails when it returns WANTWRITE and the number
909 of bytes in the buf has changed by the next SSL_write call.
910 - Fix segfault fetching directory when network is down
911 - Fix a variety of minor memory leaks
912 - Dirservers reload the fingerprints file on HUP, so I don't have
913 to take down the network when I approve a new router
914 - Default server config file has explicit Address line to specify fqdn
917 - Buffers grow and shrink as needed (Cut process size from 20M to 2M)
918 - Make listener connections not ever alloc bufs
920 o Autoconf improvements:
921 - don't clobber an external CFLAGS in ./configure
922 - Make install now works
923 - create var/lib/tor on make install
924 - autocreate a tor.sh initscript to help distribs
925 - autocreate the torrc and sample-server-torrc with correct paths
927 o Log files and Daemonizing now work:
928 - If --DebugLogFile is specified, log to it at -l debug
929 - If --LogFile is specified, use it instead of commandline
930 - If --RunAsDaemon is set, tor forks and backgrounds on startup