1 Changes so far in 0.0.9:
4 - Flush the log file descriptor after we print "Tor opening log file",
5 so we don't see those messages days later.
7 o Bugfixes on 0.0.9rc1:
8 - Make tor-resolve work again.
9 - Avoid infinite loop in tor-resolve if tor hangs up on it.
10 - Fix an assert trigger for clients/servers handling resolves.
13 o Bugfixes on 0.0.9rc1:
14 - I broke socks5 support while fixing the eof bug.
15 - Allow unitless bandwidths and intervals; they default to bytes
17 - New servers don't start out hibernating; they are active until
18 they run out of bytes, so they have a better estimate of how
19 long it takes, and so their operators can know they're working.
22 o Bugfixes on 0.0.8.1:
23 - Finally fix a bug that's been plaguing us for a year:
24 With high load, circuit package window was reaching 0. Whenever
25 we got a circuit-level sendme, we were reading a lot on each
26 socket, but only writing out a bit. So we would eventually reach
27 eof. This would be noticed and acted on even when there were still
28 bytes sitting in the inbuf.
29 - When poll() is interrupted, we shouldn't believe the revents values.
31 o Bugfixes on 0.0.9pre6:
32 - Fix hibernate bug that caused pre6 to be broken.
33 - Don't keep rephist info for routers that haven't had activity for
34 24 hours. (This matters now that clients have keys, since we track
36 - Never call close_temp_logs while validating log options.
37 - Fix backslash-escaping on tor.sh.in and torctl.in.
40 - Implement weekly/monthly/daily accounting: now you specify your
41 hibernation properties by
42 AccountingMax N bytes|KB|MB|GB|TB
43 AccountingStart day|week|month [day] HH:MM
44 Defaults to "month 1 0:00".
45 - Let bandwidth and interval config options be specified as 5 bytes,
46 kb, kilobytes, etc; and as seconds, minutes, hours, days, weeks.
47 - kill -USR2 now moves all logs to loglevel debug (kill -HUP to
49 - If your requested entry or exit node has advertised bandwidth 0,
51 - Be more greedy about filling up relay cells -- we try reading again
52 once we've processed the stuff we read, in case enough has arrived
53 to fill the last cell completely.
54 - Apply NT service patch from Osamu Fujino. Still needs more work.
57 o Bugfixes on 0.0.8.1:
58 - Fix assert failure on malformed socks4a requests.
59 - Use identity comparison, not nickname comparison, to choose which
60 half of circuit-ID-space each side gets to use. This is needed
61 because sometimes we think of a router as a nickname, and sometimes
62 as a hex ID, and we can't predict what the other side will do.
63 - Catch and ignore SIGXFSZ signals when log files exceed 2GB; our
64 write() call will fail and we handle it there.
65 - Add a FAST_SMARTLIST define to optionally inline smartlist_get
66 and smartlist_len, which are two major profiling offenders.
68 o Bugfixes on 0.0.9pre5:
69 - Fix a bug in read_all that was corrupting config files on windows.
70 - When we're raising the max number of open file descriptors to
71 'unlimited', don't log that we just raised it to '-1'.
72 - Include event code with events, as required by control-spec.txt.
73 - Don't give a fingerprint when clients do --list-fingerprint:
74 it's misleading, because it will never be the same again.
75 - Stop using strlcpy in tor_strndup, since it was slowing us
77 - Remove warn on startup about missing cached-directory file.
78 - Make kill -USR1 work again.
79 - Hibernate if we start tor during the "wait for wakeup-time" phase
80 of an accounting interval. Log our hibernation plans better.
81 - Authoritative dirservers now also cache their directory, so they
85 - Fetch running-routers; cache running-routers; compress
86 running-routers; serve compressed running-routers.z
87 - Add NSI installer script contributed by J Doe.
88 - Commit VC6 and VC7 workspace/project files.
89 - Commit a tor.spec for making RPM files, with help from jbash.
90 - Add contrib/torctl.in contributed by Glenn Fink.
91 - Implement the control-spec's SAVECONF command, to write your
92 configuration to torrc.
93 - Get cookie authentication for the controller closer to working.
94 - Include control-spec.txt in the tarball.
95 - When set_conf changes our server descriptor, upload a new copy.
96 But don't upload it too often if there are frequent changes.
97 - Document authentication config in man page, and document signals
99 - Clean up confusing parts of man page and torrc.sample.
100 - Make expand_filename handle ~ and ~username.
101 - Use autoconf to enable largefile support where necessary. Use
102 ftello where available, since ftell can fail at 2GB.
103 - Distinguish between TOR_TLS_CLOSE and TOR_TLS_ERROR, so we can
104 log more informatively.
105 - Give a slightly more useful output for "tor -h".
106 - Refuse application socks connections to port 0.
107 - Check clock skew for verified servers, but allow unverified
108 servers and clients to have any clock skew.
109 - Break DirFetchPostPeriod into:
110 - DirFetchPeriod for fetching full directory,
111 - StatusFetchPeriod for fetching running-routers,
112 - DirPostPeriod for posting server descriptor,
113 - RendPostPeriod for posting hidden service descriptors.
114 - Make sure the hidden service descriptors are at a random offset
115 from each other, to hinder linkability.
118 o Bugfixes on 0.0.8.1:
119 - Fix an assert bug where a hidden service provider would fail if
120 the first hop of his rendezvous circuit was down.
121 - Hidden service operators now correctly handle version 1 style
122 INTRODUCE1 cells (nobody generates them still, so not a critical
124 - If do_hup fails, actually notice.
125 - Handle more errnos from accept() without closing the listener.
126 Some OpenBSD machines were closing their listeners because
127 they ran out of file descriptors.
128 - Better handling of winsock includes on non-MSV win32 compilers.
129 - Some people had wrapped their tor client/server in a script
130 that would restart it whenever it died. This did not play well
131 with our "shut down if your version is obsolete" code. Now people
132 don't fetch a new directory if their local cached version is
134 - Make our autogen.sh work on ksh as well as bash.
136 o Bugfixes on 0.0.9pre4:
137 - Fix a seg fault in unit tests (doesn't affect main program).
138 - Send resolve cells to exit routers that are running a new
139 enough version of the resolve code to work right.
142 - Hibernation: New config option "AccountingMaxKB" lets you
143 set how many KBytes per month you want to allow your server to
144 consume. Rather than spreading those bytes out evenly over the
145 month, we instead hibernate for some of the month and pop up
146 at a deterministic time, work until the bytes are consumed, then
147 hibernate again. Config option "MonthlyAccountingStart" lets you
148 specify which day of the month your billing cycle starts on.
149 - Control interface: a separate program can now talk to your
150 client/server over a socket, and get/set config options, receive
151 notifications of circuits and streams starting/finishing/dying,
152 bandwidth used, etc. The next step is to get some GUIs working.
153 Let us know if you want to help out. See doc/control-spec.txt .
154 - Ship a contrib/tor-control.py as an example script to interact
155 with the control port.
156 - "tor --hash-password zzyxz" will output a salted password for
157 use in authenticating to the control interface.
158 - New log format in config:
159 "Log minsev[-maxsev] stdout|stderr|syslog" or
160 "Log minsev[-maxsev] file /var/foo"
163 - DirPolicy config option, to let people reject incoming addresses
164 from their dirserver.
165 - "tor --list-fingerprint" will list your identity key fingerprint
167 - Add "pass" target for RedirectExit, to make it easier to break
168 out of a sequence of RedirectExit rules.
169 - Clients now generate a TLS cert too, in preparation for having
170 them act more like real nodes.
171 - Ship src/win32/ in the tarball, so people can use it to build.
172 - Make old win32 fall back to CWD if SHGetSpecialFolderLocation
174 - New "router-status" line in directory, to better bind each verified
175 nickname to its identity key.
176 - Deprecate unofficial config option abbreviations, and abbreviations
177 not on the command line.
178 - Add a pure-C tor-resolve implementation.
179 - Use getrlimit and friends to ensure we can reach MaxConn (currently
180 1024) file descriptors.
182 o Code security improvements, inspired by Ilja:
183 - Replace sprintf with snprintf. (I think they were all safe, but
185 - Replace strcpy/strncpy with strlcpy in more places.
186 - Avoid strcat; use snprintf or strlcat instead.
187 - snprintf wrapper with consistent (though not C99) overflow behavior.
190 o Bugfixes on 0.0.9pre3:
191 - Ignore fascistfirewall when uploading/downloading hidden service
192 descriptors, since we go through Tor for those; and when using
193 an HttpProxy, since we assume it can reach them all.
194 - When looking for an authoritative dirserver, use only the ones
195 configured at boot. Don't bother looking in the directory.
196 - If the server doesn't specify an exit policy, use the real default
197 exit policy, not reject *:*.
198 - The rest of the fix for get_default_conf_file() on older win32.
199 - Make 'Routerfile' config option obsolete.
202 - New 'MyFamily nick1,...' config option for a server to
203 specify other servers that shouldn't be used in the same circuit
204 with it. Only believed if nick1 also specifies us.
205 - New 'NodeFamily nick1,nick2,...' config option for a client to
206 specify nodes that it doesn't want to use in the same circuit.
207 - New 'Redirectexit pattern address:port' config option for a
208 server to redirect exit connections, e.g. to a local squid.
211 o Bugfixes on 0.0.8.1:
212 - Better torrc example lines for dirbindaddress and orbindaddress.
213 - Improved bounds checking on parsed ints (e.g. config options and
214 the ones we find in directories.)
215 - Better handling of size_t vs int, so we're more robust on 64
217 - Fix the rest of the bug where a newly started OR would appear
218 as unverified even after we've added his fingerprint and hupped
220 - Fix a bug from 0.0.7: when read() failed on a stream, we would
221 close it without sending back an end. So 'connection refused'
222 would simply be ignored and the user would get no response.
224 o Bugfixes on 0.0.9pre2:
225 - Serving the cached-on-disk directory to people is bad. We now
226 provide no directory until we've fetched a fresh one.
227 - Workaround for bug on windows where cached-directories get crlf
229 - Make get_default_conf_file() work on older windows too.
230 - If we write a *:* exit policy line in the descriptor, don't write
231 any more exit policy lines.
234 - Use only 0.0.9pre1 and later servers for resolve cells.
235 - Make the dirservers file obsolete.
236 - Include a dir-signing-key token in directories to tell the
237 parsing entity which key is being used to sign.
238 - Remove the built-in bulky default dirservers string.
239 - New config option "Dirserver %s:%d [fingerprint]", which can be
240 repeated as many times as needed. If no dirservers specified,
241 default to moria1,moria2,tor26.
242 - Make moria2 advertise a dirport of 80, so people behind firewalls
243 will be able to get a directory.
245 - Dirservers translate requests for http://%s:%d/x to /x
246 - You can specify "HttpProxy %s[:%d]" and all dir fetches will
247 be routed through this host.
248 - Clients ask for /tor/x rather than /x for new enough dirservers.
249 This way we can one day coexist peacefully with apache.
250 - Clients specify a "Host: %s%d" http header, to be compatible
251 with more proxies, and so running squid on an exit node can work.
255 - Make fetching a cached directory work for 64-bit platforms too.
256 - Make zlib.h a required header, not an optional header.
260 - Stop using separate defaults for no-config-file and
261 empty-config-file. Now you have to explicitly turn off SocksPort,
262 if you don't want it open.
263 - Improve man page to mention more of the 0.0.8 features.
264 - Change our file IO stuff (especially wrt OpenSSL) so win32 is
266 - Fix more dns related bugs: send back resolve_failed and end cells
267 more reliably when the resolve fails, rather than closing the
268 circuit and then trying to send the cell. Also attach dummy resolve
269 connections to a circuit *before* calling dns_resolve(), to fix
270 a bug where cached answers would never be sent in RESOLVED cells.
271 - When we run out of disk space, or other log writing error, don't
272 crash. Just stop logging to that log and continue.
273 - We were starting to daemonize before we opened our logs, so if
274 there were any problems opening logs, we would complain to stderr,
275 which wouldn't work, and then mysteriously exit.
276 - Fix a rare bug where sometimes a verified OR would connect to us
277 before he'd uploaded his descriptor, which would cause us to
278 assign conn->nickname as though he's unverified. Now we look through
279 the fingerprint list to see if he's there.
282 - Clients can ask dirservers for /dir.z to get a compressed version
283 of the directory. Only works for servers running 0.0.9, of course.
284 - Make clients cache directories and use them to seed their router
285 lists at startup. This means clients have a datadir again.
286 - Configuration infrastructure support for warning on obsolete
288 - Respond to content-encoding headers by trying to uncompress as
290 - Reply with a deflated directory when a client asks for "dir.z".
291 We could use allow-encodings instead, but allow-encodings isn't
292 specified in HTTP 1.0.
293 - Raise the max dns workers from 50 to 100.
294 - Discourage people from setting their dirfetchpostperiod more often
296 - Protect dirservers from overzealous descriptor uploading -- wait
297 10 seconds after directory gets dirty, before regenerating.
300 Changes in version 0.0.8.1 - 2004-10-13
302 - Fix a seg fault that can be triggered remotely for Tor
303 clients/servers with an open dirport.
304 - Fix a rare assert trigger, where routerinfos for entries in
305 our cpath would expire while we're building the path.
306 - Fix a bug in OutboundBindAddress so it (hopefully) works.
307 - Fix a rare seg fault for people running hidden services on
308 intermittent connections.
309 - Fix a bug in parsing opt keywords with objects.
310 - Fix a stale pointer assert bug when a stream detaches and
312 - Fix a string format vulnerability (probably not exploitable)
313 in reporting stats locally.
314 - Fix an assert trigger: sometimes launching circuits can fail
315 immediately, e.g. because too many circuits have failed recently.
316 - Fix a compile warning on 64 bit platforms.
319 Changes in version 0.0.8 - 2004-08-25
321 - Made our unit tests compile again on OpenBSD 3.5, and tor
322 itself compile again on OpenBSD on a sparc64.
323 - We were neglecting milliseconds when logging on win32, so
324 everything appeared to happen at the beginning of each second.
325 - Check directory signature _before_ you decide whether you're
326 you're running an obsolete version and should exit.
327 - Check directory signature _before_ you parse the running-routers
328 list to decide who's running.
329 - Check return value of fclose while writing to disk, so we don't
330 end up with broken files when servers run out of disk space.
331 - Port it to SunOS 5.9 / Athena
332 - Fix two bugs in saving onion keys to disk when rotating, so
333 hopefully we'll get fewer people using old onion keys.
334 - Remove our mostly unused -- and broken -- hex_encode()
335 function. Use base16_encode() instead. (Thanks to Timo Lindfors
336 for pointing out this bug.)
337 - Only pick and establish intro points after we've gotten a
339 - Fix assert triggers: if the other side returns an address 0.0.0.0,
340 don't put it into the client dns cache.
341 - If a begin failed due to exit policy, but we believe the IP
342 address should have been allowed, switch that router to exitpolicy
343 reject *:* until we get our next directory.
346 - 'Extend' relay cell payloads now include the digest of the
347 intended next hop's identity key. Now we can verify that we're
348 extending to the right router, and also extend to routers we
349 hadn't heard of before.
352 - Tor nodes can now act as relays (with an advertised ORPort)
353 without being manually verified by the dirserver operators.
354 - Uploaded descriptors of unverified routers are now accepted
355 by the dirservers, and included in the directory.
356 - Verified routers are listed by nickname in the running-routers
357 list; unverified routers are listed as "$<fingerprint>".
358 - We now use hash-of-identity-key in most places rather than
359 nickname or addr:port, for improved security/flexibility.
360 - AllowUnverifiedNodes config option to let circuits choose no-name
361 routers in entry,middle,exit,introduction,rendezvous positions.
362 Allow middle and rendezvous positions by default.
363 - When picking unverified routers, skip those with low uptime and/or
364 low bandwidth, depending on what properties you care about.
365 - ClientOnly option for nodes that never want to become servers.
367 - "AuthoritativeDir 1" option for the official dirservers.
368 - Now other nodes (clients and servers) will cache the latest
369 directory they've pulled down.
370 - They can enable their DirPort to serve it to others.
371 - Clients will pull down a directory from any node with an open
372 DirPort, and check the signature/timestamp correctly.
373 - Authoritative dirservers now fetch directories from other
374 authdirservers, to stay better synced.
375 - Running-routers list tells who's down also, along with noting
376 if they're verified (listed by nickname) or unverified (listed
378 - Allow dirservers to serve running-router list separately.
380 - You can now fetch $DIRURL/running-routers to get just the
381 running-routers line, not the whole descriptor list. (But
382 clients don't use this yet.)
383 - Clients choose nodes proportional to advertised bandwidth.
384 - Clients avoid using nodes with low uptime as introduction points.
385 - Handle servers with dynamic IP addresses: don't just replace
386 options->Address with the resolved one at startup, and
387 detect our address right before we make a routerinfo each time.
388 - 'FascistFirewall' option to pick dirservers and ORs on specific
389 ports; plus 'FirewallPorts' config option to tell FascistFirewall
390 which ports are open. (Defaults to 80,443)
391 - Try other dirservers immediately if the one you try is down. This
392 should tolerate down dirservers better now.
393 - ORs connect-on-demand to other ORs
394 - If you get an extend cell to an OR you're not connected to,
395 connect, handshake, and forward the create cell.
396 - The authoritative dirservers stay connected to everybody,
397 and everybody stays connected to 0.0.7 servers, but otherwise
398 clients/servers expire unused connections after 5 minutes.
399 - When servers get a sigint, they delay 30 seconds (refusing new
400 connections) then exit. A second sigint causes immediate exit.
401 - File and name management:
402 - Look for .torrc if no CONFDIR "torrc" is found.
403 - If no datadir is defined, then choose, make, and secure ~/.tor
405 - If torrc not found, exitpolicy reject *:*.
406 - Expands ~/ in filenames to $HOME/ (but doesn't yet expand ~arma).
407 - If no nickname is defined, derive default from hostname.
408 - Rename secret key files, e.g. identity.key -> secret_id_key,
409 to discourage people from mailing their identity key to tor-ops.
410 - Refuse to build a circuit before the directory has arrived --
411 it won't work anyway, since you won't know the right onion keys
413 - Parse tor version numbers so we can do an is-newer-than check
414 rather than an is-in-the-list check.
415 - New socks command 'resolve', to let us shim gethostbyname()
417 - A 'tor_resolve' script to access the socks resolve functionality.
418 - A new socks-extensions.txt doc file to describe our
419 interpretation and extensions to the socks protocols.
420 - Add a ContactInfo option, which gets published in descriptor.
421 - Write tor version at the top of each log file
422 - New docs in the tarball:
424 - Document that you should proxy your SSL traffic too.
425 - Log a warning if the user uses an unsafe socks variant, so people
426 are more likely to learn about privoxy or socat.
427 - Log a warning if you're running an unverified server, to let you
428 know you might want to get it verified.
429 - Change the default exit policy to reject the default edonkey,
430 kazaa, gnutella ports.
431 - Add replace_file() to util.[ch] to handle win32's rename().
432 - Publish OR uptime in descriptor (and thus in directory) too.
433 - Remember used bandwidth (both in and out), and publish 15-minute
434 snapshots for the past day into our descriptor.
435 - Be more aggressive about trying to make circuits when the network
436 has changed (e.g. when you unsuspend your laptop).
437 - Check for time skew on http headers; report date in response to
439 - If the entrynode config line has only one node, don't pick it as
441 - Add strict{entry|exit}nodes config options. If set to 1, then
442 we refuse to build circuits that don't include the specified entry
444 - OutboundBindAddress config option, to bind to a specific
445 IP address for outgoing connect()s.
446 - End truncated log entries (e.g. directories) with "[truncated]".
449 Changes in version 0.0.7.3 - 2004-08-12
450 o Stop dnsworkers from triggering an assert failure when you
451 ask them to resolve the host "".
454 Changes in version 0.0.7.2 - 2004-07-07
455 o A better fix for the 0.0.0.0 problem, that will hopefully
456 eliminate the remaining related assertion failures.
459 Changes in version 0.0.7.1 - 2004-07-04
460 o When an address resolves to 0.0.0.0, treat it as a failed resolve,
461 since internally we use 0.0.0.0 to signify "not yet resolved".
464 Changes in version 0.0.7 - 2004-06-07
465 o Fixes for crashes and other obnoxious bugs:
466 - Fix an epipe bug: sometimes when directory connections failed
467 to connect, we would give them a chance to flush before closing
469 - When we detached from a circuit because of resolvefailed, we
470 would immediately try the same circuit twice more, and then
471 give up on the resolve thinking we'd tried three different
473 - Limit the number of intro circuits we'll attempt to build for a
474 hidden service per 15-minute period.
475 - Check recommended-software string *early*, before actually parsing
476 the directory. Thus we can detect an obsolete version and exit,
477 even if the new directory format doesn't parse.
478 o Fixes for security bugs:
479 - Remember which nodes are dirservers when you startup, and if a
480 random OR enables his dirport, don't automatically assume he's
483 - Directory connections were asking the wrong poll socket to
484 start writing, and not asking themselves to start writing.
485 - When we detached from a circuit because we sent a begin but
486 didn't get a connected, we would use it again the first time;
487 but after that we would correctly switch to a different one.
488 - Stop warning when the first onion decrypt attempt fails; they
489 will sometimes legitimately fail now that we rotate keys.
490 - Override unaligned-access-ok check when $host_cpu is ia64 or
491 arm. Apparently they allow it but the kernel whines.
492 - Dirservers try to reconnect periodically too, in case connections
494 - Fix some memory leaks in directory servers.
495 - Allow backslash in Win32 filenames.
496 - Made Tor build complain-free on FreeBSD, hopefully without
497 breaking other BSD builds. We'll see.
498 - Check directory signatures based on name of signer, not on whom
499 we got the directory from. This will let us cache directories more
501 - Rotate dnsworkers and cpuworkers on SIGHUP, so they get new config
504 - Doxygen markup on all functions and global variables.
505 - Make directory functions update routerlist, not replace it. So
506 now directory disagreements are not so critical a problem.
507 - Remove the upper limit on number of descriptors in a dirserver's
508 directory (not that we were anywhere close).
509 - Allow multiple logfiles at different severity ranges.
510 - Allow *BindAddress to specify ":port" rather than setting *Port
511 separately. Allow multiple instances of each BindAddress config
512 option, so you can bind to multiple interfaces if you want.
513 - Allow multiple exit policy lines, which are processed in order.
514 Now we don't need that huge line with all the commas in it.
515 - Enable accept/reject policies on SOCKS connections, so you can bind
516 to 0.0.0.0 but still control who can use your OP.
517 - Updated the man page to reflect these features.
520 Changes in version 0.0.6.2 - 2004-05-16
521 o Our integrity-checking digest was checking only the most recent cell,
522 not the previous cells like we'd thought.
523 Thanks to Stefan Mark for finding the flaw!
526 Changes in version 0.0.6.1 - 2004-05-06
527 o Fix two bugs in our AES counter-mode implementation (this affected
528 onion-level stream encryption, but not TLS-level). It turns
529 out we were doing something much more akin to a 16-character
530 polyalphabetic cipher. Oops.
531 Thanks to Stefan Mark for finding the flaw!
532 o Retire moria3 as a directory server, and add tor26 as a directory
536 Changes in version 0.0.6 - 2004-05-02
538 - Hidden services and rendezvous points are implemented. Go to
539 http://6sxoyfb3h2nvok2d.onion/ for an index of currently available
540 hidden services. (This only works via a socks4a proxy such as
541 Privoxy, and currently it's quite slow.)
542 - We now rotate link (tls context) keys and onion keys.
543 - CREATE cells now include oaep padding, so you can tell
544 if you decrypted them correctly.
545 - Retry stream correctly when we fail to connect because of
546 exit-policy-reject (should try another) or can't-resolve-address.
547 - When we hup a dirserver and we've *removed* a server from the
548 approved-routers list, now we remove that server from the
549 in-memory directories too.
550 - Add bandwidthburst to server descriptor.
551 - Directories now say which dirserver signed them.
552 - Use a tor_assert macro that logs failed assertions too.
553 - Since we don't support truncateds much, don't bother sending them;
555 - Fetch randomness from /dev/urandom better (not via fopen/fread)
556 - Better debugging for tls errors
557 - Set Content-Type on the directory and hidserv descriptor.
558 - Remove IVs from cipher code, since AES-ctr has none.
560 - Fix an assert trigger for exit nodes that's been plaguing us since
561 the days of 0.0.2prexx (thanks weasel!)
562 - Fix a bug where we were closing tls connections intermittently.
563 It turns out openssl keeps its errors around -- so if an error
564 happens, and you don't ask about it, and then another openssl
565 operation happens and succeeds, and you ask if there was an error,
566 it tells you about the first error.
567 - Fix a bug that's been lurking since 27 may 03 (!)
568 When passing back a destroy cell, we would use the wrong circ id.
569 - Don't crash if a conn that sent a begin has suddenly lost its circuit.
570 - Some versions of openssl have an SSL_pending function that erroneously
571 returns bytes when there is a non-application record pending.
572 - Win32 fixes. Tor now compiles on win32 with no warnings/errors.
573 o We were using an array of length zero in a few places.
574 o Win32's gethostbyname can't resolve an IP to an IP.
575 o Win32's close can't close a socket.
576 o Handle windows socket errors correctly.
578 - check for <sys/limits.h> so we build on FreeBSD again, and
579 <machine/limits.h> for NetBSD.
582 Changes in version 0.0.5 - 2004-03-30
583 o Install torrc as torrc.sample -- we no longer clobber your
585 o Fix mangled-state bug in directory fetching (was causing sigpipes).
586 o Only build circuits after we've fetched the directory: clients were
587 using only the directory servers before they'd fetched a directory.
588 This also means longer startup time; so it goes.
589 o Fix an assert trigger where an OP would fail to handshake, and we'd
590 expect it to have a nickname.
591 o Work around a tsocks bug: do a socks reject when AP connection dies
592 early, else tsocks goes into an infinite loop.
593 o Hold socks connection open until reply is flushed (if possible)
594 o Make exit nodes resolve IPs to IPs immediately, rather than asking
595 the dns farm to do it.
596 o Fix c99 aliasing warnings in rephist.c
597 o Don't include server descriptors that are older than 24 hours in the
599 o Give socks 'reject' replies their whole 15s to attempt to flush,
600 rather than seeing the 60s timeout and assuming the flush had failed.
601 o Clean automake droppings from the cvs repository
602 o Add in a 'notice' log level for things the operator should hear
603 but that aren't warnings
606 Changes in version 0.0.4 - 2004-03-26
607 o When connecting to a dirserver or OR and the network is down,
611 Changes in version 0.0.3 - 2004-03-26
612 o Warn and fail if server chose a nickname with illegal characters
613 o Port to Solaris and Sparc:
614 - include missing header fcntl.h
615 - have autoconf find -lsocket -lnsl automatically
616 - deal with hardware word alignment
617 - make uname() work (solaris has a different return convention)
618 - switch from using signal() to sigaction()
619 o Preliminary work on reputation system:
620 - Keep statistics on success/fail of connect attempts; they're published
621 by kill -USR1 currently.
622 - Add a RunTesting option to try to learn link state by creating test
623 circuits, even when SocksPort is off.
624 - Remove unused open circuits when there are too many.
627 Changes in version 0.0.2 - 2004-03-19
628 - Include strlcpy and strlcat for safer string ops
629 - define INADDR_NONE so we compile (but still not run) on solaris
632 Changes in version 0.0.2pre27 - 2004-03-14
634 - Allow internal tor networks (we were rejecting internal IPs,
635 now we allow them if they're set explicitly).
636 - And fix a few endian issues.
639 Changes in version 0.0.2pre26 - 2004-03-14
641 - If a stream times out after 15s without a connected cell, don't
642 try that circuit again: try a new one.
643 - Retry streams at most 4 times. Then give up.
644 - When a dirserver gets a descriptor from an unknown router, it
645 logs its fingerprint (so the dirserver operator can choose to
646 accept it even without mail from the server operator).
647 - Inform unapproved servers when we reject their descriptors.
648 - Make tor build on Windows again. It works as a client, who knows
650 - Clearer instructions in the torrc for how to set up a server.
651 - Be more efficient about reading fd's when our global token bucket
652 (used for rate limiting) becomes empty.
654 - Stop asserting that computers always go forward in time. It's
656 - When we sent a cell (e.g. destroy) and then marked an OR connection
657 expired, we might close it before finishing a flush if the other
658 side isn't reading right then.
659 - Don't allow dirservers to start if they haven't defined
661 - We were caching transient dns failures. Oops.
662 - Prevent servers from publishing an internal IP as their address.
663 - Address a strcat vulnerability in circuit.c
666 Changes in version 0.0.2pre25 - 2004-03-04
668 - Put the OR's IP in its router descriptor, not its fqdn. That way
669 we'll stop being stalled by gethostbyname for nodes with flaky dns,
672 - If the user typed in an address that didn't resolve, the server
676 Changes in version 0.0.2pre24 - 2004-03-03
678 - Fix an assertion failure in dns.c, where we were trying to dequeue
679 a pending dns resolve even if it wasn't pending
680 - Fix a spurious socks5 warning about still trying to write after the
681 connection is finished.
682 - Hold certain marked_for_close connections open until they're finished
683 flushing, rather than losing bytes by closing them too early.
684 - Correctly report the reason for ending a stream
685 - Remove some duplicate calls to connection_mark_for_close
686 - Put switch_id and start_daemon earlier in the boot sequence, so it
687 will actually try to chdir() to options.DataDirectory
688 - Make 'make test' exit(1) if a test fails; fix some unit tests
689 - Make tor fail when you use a config option it doesn't know about,
690 rather than warn and continue.
691 - Make --version work
692 - Bugfixes on the rpm spec file and tor.sh, so it's more up to date
695 Changes in version 0.0.2pre23 - 2004-02-29
697 - Print a statement when the first circ is finished, so the user
699 - If a relay cell is unrecognized at the end of the circuit,
700 send back a destroy. (So attacks to mutate cells are more
702 - New config option 'excludenodes' to avoid certain nodes for circuits.
703 - When it daemonizes, it chdir's to the DataDirectory rather than "/",
704 so you can collect coredumps there.
706 - Fix a bug in tls flushing where sometimes data got wedged and
707 didn't flush until more data got sent. Hopefully this bug was
708 a big factor in the random delays we were seeing.
709 - Make 'connected' cells include the resolved IP, so the client
710 dns cache actually gets populated.
711 - Disallow changing from ORPort=0 to ORPort>0 on hup.
712 - When we time-out on a stream and detach from the circuit, send an
713 end cell down it first.
714 - Only warn about an unknown router (in exitnodes, entrynodes,
715 excludenodes) after we've fetched a directory.
718 Changes in version 0.0.2pre22 - 2004-02-26
720 - Servers publish less revealing uname information in descriptors.
721 - More memory tracking and assertions, to crash more usefully when
723 - If the default torrc isn't there, just use some default defaults.
724 Plus provide an internal dirservers file if they don't have one.
725 - When the user tries to use Tor as an http proxy, give them an http
726 501 failure explaining that we're a socks proxy.
727 - Dump a new router.desc on hup, to help confused people who change
728 their exit policies and then wonder why router.desc doesn't reflect
730 - Clean up the generic tor.sh init script that we ship with.
732 - If the exit stream is pending on the resolve, and a destroy arrives,
733 then the stream wasn't getting removed from the pending list. I
734 think this was the one causing recent server crashes.
735 - Use a more robust poll on OSX 10.3, since their poll is flaky.
736 - When it couldn't resolve any dirservers, it was useless from then on.
737 Now it reloads the RouterFile (or default dirservers) if it has no
739 - Move the 'tor' binary back to /usr/local/bin/ -- it turns out
740 many users don't even *have* a /usr/local/sbin/.
743 Changes in version 0.0.2pre21 - 2004-02-18
745 - There's a ChangeLog file that actually reflects the changelog.
746 - There's a 'torify' wrapper script, with an accompanying
747 tor-tsocks.conf, that simplifies the process of using tsocks for
748 tor. It even has a man page.
749 - The tor binary gets installed to sbin rather than bin now.
750 - Retry streams where the connected cell hasn't arrived in 15 seconds
751 - Clean up exit policy handling -- get the default out of the torrc,
752 so we can update it without forcing each server operator to fix
754 - Allow imaps and pop3s in default exit policy
756 - Prevent picking middleman nodes as the last node in the circuit
759 Changes in version 0.0.2pre20 - 2004-01-30
761 - We now have a deb package, and it's in debian unstable. Go to
763 - I've split the TotalBandwidth option into BandwidthRate (how many
764 bytes per second you want to allow, long-term) and
765 BandwidthBurst (how many bytes you will allow at once before the cap
766 kicks in). This better token bucket approach lets you, say, set
767 BandwidthRate to 10KB/s and BandwidthBurst to 10MB, allowing good
768 performance while not exceeding your monthly bandwidth quota.
769 - Push out a tls record's worth of data once you've got it, rather
770 than waiting until you've read everything waiting to be read. This
771 may improve performance by pipelining better. We'll see.
772 - Add an AP_CONN_STATE_CONNECTING state, to allow streams to detach
773 from failed circuits (if they haven't been connected yet) and attach
775 - Expire old streams that haven't managed to connect. Some day we'll
776 have them reattach to new circuits instead.
779 - Fix several memory leaks that were causing servers to become bloated
781 - Fix a few very rare assert triggers. A few more remain.
782 - Setuid to User _before_ complaining about running as root.
785 Changes in version 0.0.2pre19 - 2004-01-07
787 - Fix deadlock condition in dns farm. We were telling a child to die by
788 closing the parent's file descriptor to him. But newer children were
789 inheriting the open file descriptor from the parent, and since they
790 weren't closing it, the socket never closed, so the child never read
791 eof, so he never knew to exit. Similarly, dns workers were holding
792 open other sockets, leading to all sorts of chaos.
793 - New cleaner daemon() code for forking and backgrounding.
794 - If you log to a file, it now prints an entry at the top of the
795 logfile so you know it's working.
796 - The onionskin challenge length was 30 bytes longer than necessary.
797 - Started to patch up the spec so it's not quite so out of date.
800 Changes in version 0.0.2pre18 - 2004-01-02
802 - Fix endian issues with the 'integrity' field in the relay header.
803 - Fix a potential bug where connections in state
804 AP_CONN_STATE_CIRCUIT_WAIT might unexpectedly ask to write.
807 Changes in version 0.0.2pre17 - 2003-12-30
809 - Made --debuglogfile (or any second log file, actually) work.
810 - Resolved an edge case in get_unique_circ_id_by_conn where a smart
811 adversary could force us into an infinite loop.
814 - Each onionskin handshake now includes a hash of the computed key,
815 to prove the server's identity and help perfect forward secrecy.
816 - Changed cell size from 256 to 512 bytes (working toward compatibility
818 - Changed cell length to 2 bytes, and moved it to the relay header.
819 - Implemented end-to-end integrity checking for the payloads of
821 - Separated streamid from 'recognized' (otherwise circuits will get
822 messed up when we try to have streams exit from the middle). We
823 use the integrity-checking to confirm that a cell is addressed to
825 - Randomize the initial circid and streamid values, so an adversary who
826 breaks into a node can't learn how many circuits or streams have
830 Changes in version 0.0.2pre16 - 2003-12-14
832 - Fixed a bug that made HUP trigger an assert
833 - Fixed a bug where a circuit that immediately failed wasn't being
834 counted as a failed circuit in counting retries.
837 - Now we close the circuit when we get a truncated cell: otherwise we're
838 open to an anonymity attack where a bad node in the path truncates
839 the circuit and then we open streams at him.
840 - Add port ranges to exit policies
841 - Add a conservative default exit policy
842 - Warn if you're running tor as root
843 - on HUP, retry OR connections and close/rebind listeners
844 - options.EntryNodes: try these nodes first when picking the first node
845 - options.ExitNodes: if your best choices happen to include any of
846 your preferred exit nodes, you choose among just those preferred
848 - options.ExcludedNodes: nodes that are never picked in path building
851 Changes in version 0.0.2pre15 - 2003-12-03
852 o Robustness and bugfixes:
853 - Sometimes clients would cache incorrect DNS resolves, which would
854 really screw things up.
855 - An OP that goes offline would slowly leak all its sockets and stop
857 - A wide variety of bugfixes in exit node selection, exit policy
858 handling, and processing pending streams when a new circuit is
860 - Pick nodes for a path only from those the directory says are up
861 - Choose randomly from all running dirservers, not always the first one
862 - Increase allowed http header size for directory fetch.
863 - Stop writing to stderr (if we're daemonized it will be closed).
864 - Enable -g always, so cores will be more useful to me.
865 - Switch "-lcrypto -lssl" to "-lssl -lcrypto" for broken distributions.
868 - Wrote a man page. It lists commonly used options.
871 - Change default loglevel to warn.
872 - Make PidFile default to null rather than littering in your CWD.
873 - OnionRouter config option is now obsolete. Instead it just checks
875 - Moved to a single unified torrc file for both clients and servers.
878 Changes in version 0.0.2pre14 - 2003-11-29
879 o Robustness and bugfixes:
880 - Force the admin to make the DataDirectory himself
881 - to get ownership/permissions right
882 - so clients no longer make a DataDirectory and then never use it
883 - fix bug where a client who was offline for 45 minutes would never
884 pull down a directory again
885 - fix (or at least hide really well) the dns assert bug that was
886 causing server crashes
887 - warnings and improved robustness wrt clockskew for certs
888 - use the native daemon(3) to daemonize, when available
889 - exit if bind() fails
890 - exit if neither socksport nor orport is defined
891 - include our own tor_timegm (Win32 doesn't have its own)
892 - bugfix for win32 with lots of connections
893 - fix minor bias in PRNG
894 - make dirserver more robust to corrupt cached directory
897 - Wrote the design document (woo)
899 o Circuit building and exit policies:
900 - Circuits no longer try to use nodes that the directory has told them
902 - Exit policies now support bitmasks (18.0.0.0/255.0.0.0) and
903 bitcounts (18.0.0.0/8).
904 - Make AP connections standby for a circuit if no suitable circuit
905 exists, rather than failing
906 - Circuits choose exit node based on addr/port, exit policies, and
907 which AP connections are standing by
908 - Bump min pathlen from 2 to 3
909 - Relay end cells have a payload to describe why the stream ended.
910 - If the stream failed because of exit policy, try again with a new
912 - Clients have a dns cache to remember resolved addresses.
913 - Notice more quickly when we have no working circuits
916 - APPort is now called SocksPort
917 - SocksBindAddress, ORBindAddress, DirBindAddress let you configure
919 - RecommendedVersions is now a config variable rather than
920 hardcoded (for dirservers)
921 - Reloads config on HUP
922 - Usage info on -h or --help
923 - If you set User and Group config vars, it'll setu/gid to them.
925 Changes in version 0.0.2pre13 - 2003-10-19
927 - SSL_write no longer fails when it returns WANTWRITE and the number
928 of bytes in the buf has changed by the next SSL_write call.
929 - Fix segfault fetching directory when network is down
930 - Fix a variety of minor memory leaks
931 - Dirservers reload the fingerprints file on HUP, so I don't have
932 to take down the network when I approve a new router
933 - Default server config file has explicit Address line to specify fqdn
936 - Buffers grow and shrink as needed (Cut process size from 20M to 2M)
937 - Make listener connections not ever alloc bufs
939 o Autoconf improvements:
940 - don't clobber an external CFLAGS in ./configure
941 - Make install now works
942 - create var/lib/tor on make install
943 - autocreate a tor.sh initscript to help distribs
944 - autocreate the torrc and sample-server-torrc with correct paths
946 o Log files and Daemonizing now work:
947 - If --DebugLogFile is specified, log to it at -l debug
948 - If --LogFile is specified, use it instead of commandline
949 - If --RunAsDaemon is set, tor forks and backgrounds on startup