Tor 0.3.3.6 is released: a new stable series!

[chan] I2P
May 23 17:47 [raw]

Tor 0.3.3.6 is released: a new stable series! nickm May 22, 2018 Hello, everyone! After months of work, we have a new stable release series! If you build Tor from source, you can download the source code for 0.3.3.6 on the website. Packages should be available within the next several weeks, with a new Tor Browser by some time in June. Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It backports several important fixes from the 0.3.4.1-alpha. The Tor 0.3.3 series includes controller support and other improvements for v3 onion services, official support for embedding Tor within other applications, and our first non-trivial module written in the Rust programming language. (Rust is still not enabled by default when building Tor.) And as usual, there are numerous other smaller bugfixes, features, and improvements. Below are the changes since 0.3.2.10. For a list of only the changes since 0.3.3.5-rc, see the ChangeLog file. Changes in version 0.3.3.6 - 2018-05-22 New system requirements: When built with Rust, Tor now depends on version 0.2.39 of the libc crate. Closes tickets 25310 and 25664. Major features (embedding): There is now a documented stable API for programs that need to embed Tor. See tor_api.h for full documentation and known bugs. Closes ticket 23684. Tor now has support for restarting in the same process. Controllers that run Tor using the "tor_api.h" interface can now restart Tor after Tor has exited. This support is incomplete, however: we fixed crash bugs that prevented it from working at all, but many bugs probably remain, including a possibility of security issues. Implements ticket 24581. Major features (IPv6, directory documents): Add consensus method 27, which adds IPv6 ORPorts to the microdesc consensus. This information makes it easier for IPv6 clients to bootstrap and choose reachable entry guards. Implements ticket 23826. Add consensus method 28, which removes IPv6 ORPorts from microdescriptors. Now that the consensus contains IPv6 ORPorts, they are redundant in microdescs. This change will be used by Tor clients on 0.2.8.x and later. (That is to say, with all Tor clients that have IPv6 bootstrap and guard support.) Implements ticket 23828. Expand the documentation for AuthDirHasIPv6Connectivity when it is set by different numbers of authorities. Fixes 23870 on 0.2.4.1-alpha. Major features (onion service v3, control port): The control port now supports commands and events for v3 onion services. It is now possible to create ephemeral v3 services using ADD_ONION. Additionally, several events (HS_DESC, HS_DESC_CONTENT, CIRC and CIRC_MINOR) and commands (GETINFO, HSPOST, ADD_ONION and DEL_ONION) have been extended to support v3 onion services. Closes ticket 20699; implements proposal 284. Major features (onion services): Provide torrc options to pin the second and third hops of onion service circuits to a list of nodes. The option HSLayer2Guards pins the second hop, and the option HSLayer3Guards pins the third hop. These options are for use in conjunction with experiments with "vanguards" for preventing guard enumeration attacks. Closes ticket 13837. When v3 onion service clients send introduce cells, they now include the IPv6 address of the rendezvous point, if it has one. Current v3 onion services running 0.3.2 ignore IPv6 addresses, but in future Tor versions, IPv6-only v3 single onion services will be able to use IPv6 addresses to connect directly to the rendezvous point. Closes ticket 23577. Patch by Neel Chauhan. Major features (relay): Implement an option, ReducedExitPolicy, to allow an Tor exit relay operator to use a more reasonable ("reduced") exit policy, rather than the default one. If you want to run an exit node without thinking too hard about which ports to allow, this one is for you. Closes ticket 13605. Patch from Neel Chauhan. Major features (rust, portability, experimental): Tor now ships with an optional implementation of one of its smaller modules (protover.c) in the Rust programming language. To try it out, install a Rust build environment, and configure Tor with "--enable-rust --enable-cargo-online-mode". This should not cause any user-visible changes, but should help us gain more experience with Rust, and plan future Rust integration work. Implementation by Chelsea Komlo. Closes ticket 22840. Major bugfixes (directory authorities, security, backport from 0.3.4.1-alpha): When directory authorities read a zero-byte bandwidth file, they would previously log a warning with the contents of an uninitialised buffer. They now log a warning about the empty file instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha. Major bugfixes (security, directory authority, denial-of-service): Fix a bug that could have allowed an attacker to force a directory authority to use up all its RAM by passing it a maliciously crafted protocol versions string. Fixes bug 25517; bugfix on 0.2.9.4-alpha. This issue is also tracked as TROVE-2018-005. Major bugfixes (crash, backport from 0.3.4.1-alpha): Avoid a rare assertion failure in the circuit build timeout code if we fail to allow any circuits to actually complete. Fixes bug 25733; bugfix on 0.2.2.2-alpha. Major bugfixes (netflow padding): Stop adding unneeded channel padding right after we finish flushing to a connection that has been trying to flush for many seconds. Instead, treat all partial or complete flushes as activity on the channel, which will defer the time until we need to add padding. This fix should resolve confusing and scary log messages like "Channel padding timeout scheduled 221453ms in the past." Fixes bug 22212; bugfix on 0.3.1.1-alpha. Major bugfixes (networking): Tor will no longer reject IPv6 address strings from Tor Browser when they are passed as hostnames in SOCKS5 requests. Fixes bug 25036, bugfix on Tor 0.3.1.2. Major bugfixes (onion service, backport from 0.3.4.1-alpha): Correctly detect when onion services get disabled after HUP. Fixes bug 25761; bugfix on 0.3.2.1. Major bugfixes (performance, load balancing): Directory authorities no longer vote in favor of the Guard flag for relays without directory support. Starting in Tor 0.3.0.1-alpha, clients have been avoiding using such relays in the Guard position, leading to increasingly broken load balancing for the 5%-or-so of Guards that don't advertise directory support. Fixes bug 22310; bugfix on 0.3.0.6. Major bugfixes (relay): If we have failed to connect to a relay and received a connection refused, timeout, or similar error (at the TCP level), do not try that same address/port again for 60 seconds after the failure has occurred. Fixes bug 24767; bugfix on 0.0.6. Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha): Impose a limit on circuit cell queue size. The limit can be controlled by a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha. Minor features (cleanup): Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile when it stops. Closes ticket 23271. Minor features (compatibility, backport from 0.3.4.1-alpha): Avoid some compilation warnings with recent versions of LibreSSL. Closes ticket 26006. Minor features (config options): Change the way the default value for MaxMemInQueues is calculated. We now use 40% of the hardware RAM if the system has 8 GB RAM or more. Otherwise we use the former value of 75%. Closes ticket 24782. Minor features (continuous integration): Update the Travis CI configuration to use the stable Rust channel, now that we have decided to require that. Closes ticket 25714. Minor features (continuous integration, backport from 0.3.4.1-alpha): Our .travis.yml configuration now includes support for testing the results of "make distcheck". (It's not uncommon for "make check" to pass but "make distcheck" to fail.) Closes ticket 25814. Our Travis CI configuration now integrates with the Coveralls coverage analysis tool. Closes ticket 25818. Minor features (defensive programming): Most of the functions in Tor that free objects have been replaced with macros that free the objects and set the corresponding pointers to NULL. This change should help prevent a large class of dangling pointer bugs. Closes ticket 24337. Where possible, the tor_free() macro now only evaluates its input once. Part of ticket 24337. Check that microdesc ed25519 ids are non-zero in node_get_ed25519_id() before returning them. Implements ticket 24001, patch by "aruna1234". Minor features (directory authority): When directory authorities are unable to add signatures to a pending consensus, log the reason why. Closes ticket 24849. Minor features (embedding): Tor can now start with a preauthenticated control connection created by the process that launched it. This feature is meant for use by programs that want to launch and manage a Tor process without allowing other programs to manage it as well. For more information, see the __OwningControllerFD option documented in control-spec.txt. Closes ticket 23900. On most errors that would cause Tor to exit, it now tries to return from the tor_main() function, rather than calling the system exit() function. Most users won't notice a difference here, but it should be significant for programs that run Tor inside a separate thread: they should now be able to survive Tor's exit conditions rather than having Tor shut down the entire process. Closes ticket 23848. Applications that want to embed Tor can now tell Tor not to register any of its own POSIX signal handlers, using the __DisableSignalHandlers option. Closes ticket 24588. Minor features (fallback directory list): Avoid selecting fallbacks that change their IP addresses too often. Select more fallbacks by ignoring the Guard flag, and allowing lower cutoffs for the Running and V2Dir flags. Also allow a lower bandwidth, and a higher number of fallbacks per operator (5% of the list). Implements ticket 24785. Update the fallback whitelist and blacklist based on opt-ins and relay changes. Closes tickets 22321, 24678, 22527, 24135, and 24695. Minor features (fallback directory mirror configuration): Add a nickname to each fallback in a C comment. This makes it easier for operators to find their relays, and allows stem to use nicknames to identify fallbacks. Implements ticket 24600. Add a type and version header to the fallback directory mirror file. Also add a delimiter to the end of each fallback entry. This helps external parsers like stem and Relay Search. Implements ticket 24725. Add an extrainfo cache flag for each fallback in a C comment. This allows stem to use fallbacks to fetch extra-info documents, rather than using authorities. Implements ticket 22759. Add the generateFallbackDirLine.py script for automatically generating fallback directory mirror lines from relay fingerprints. No more typos! Add the lookupFallbackDirContact.py script for automatically looking up operator contact info from relay fingerprints. Implements ticket 24706, patch by teor and atagar. Reject any fallback directory mirror that serves an expired consensus. Implements ticket 20942, patch by "minik". Remove commas and equals signs from external string inputs to the fallback list. This avoids format confusion attacks. Implements ticket 24726. Remove the "weight=10" line from fallback directory mirror entries. Ticket 24681 will maintain the current fallback weights by changing Tor's default fallback weight to 10. Implements ticket 24679. Stop logging excessive information about fallback netblocks. Implements ticket 24791. Minor features (forward-compatibility): If a relay supports some link authentication protocol that we do not recognize, then include that relay's ed25519 key when telling other relays to extend to it. Previously, we treated future versions as if they were too old to support ed25519 link authentication. Closes ticket 20895. Minor features (geoip): Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2 Country database. Closes ticket 26104. Minor features (heartbeat): Add onion service information to our heartbeat logs, displaying stats about the activity of configured onion services. Closes ticket 24896. Minor features (instrumentation, development): Add the MainloopStats option to allow developers to get instrumentation information from the main event loop via the heartbeat messages. We hope to use this to improve Tor's behavior when it's trying to sleep. Closes ticket 24605. Minor features (IPv6): Make IPv6-only clients wait for microdescs for relays, even if we were previously using descriptors (or were using them as a bridge) and have a cached descriptor for them. Implements ticket 23827. When a consensus has IPv6 ORPorts, make IPv6-only clients use them, rather than waiting to download microdescriptors. Implements ticket 23827. Minor features (log messages): Improve log message in the out-of-memory handler to include information about memory usage from the different compression backends. Closes ticket 25372. Improve a warning message that happens when we fail to re-parse an old router because of an expired certificate. Closes ticket 20020. Make the log more quantitative when we hit MaxMemInQueues threshold exposing some values. Closes ticket 24501. Minor features (logging): Clarify the log messages produced when getrandom() or a related entropy-generation mechanism gives an error. Closes ticket 25120. Added support for the Android logging subsystem. Closes ticket 24362. Minor features (performance): Support predictive circuit building for onion service circuits with multiple layers of guards. Closes ticket 23101. Use stdatomic.h where available, rather than mutexes, to implement atomic_counter_t. Closes ticket 23953. Minor features (performance, 32-bit): Improve performance on 32-bit systems by avoiding 64-bit division when calculating the timestamp in milliseconds for channel padding computations. Implements ticket 24613. Improve performance on 32-bit systems by avoiding 64-bit division when timestamping cells and buffer chunks for OOM calculations. Implements ticket 24374. Minor features (performance, OSX, iOS): Use the mach_approximate_time() function (when available) to implement coarse monotonic time. Having a coarse time function should avoid a large number of system calls, and improve performance slightly, especially under load. Closes ticket 24427. Minor features (performance, windows): Improve performance on Windows Vista and Windows 7 by adjusting TCP send window size according to the recommendation from SIO_IDEAL_SEND_BACKLOG_QUERY. Closes ticket 22798. Patch from Vort. Minor features (sandbox): Explicitly permit the poll() system call when the Linux seccomp2-based sandbox is enabled: apparently, some versions of libc use poll() when calling getpwnam(). Closes ticket 25313. Minor features (storage, configuration): Users can store cached directory documents somewhere other than the DataDirectory by using the CacheDirectory option. Similarly, the storage location for relay's keys can be overridden with the KeyDirectory option. Closes ticket 22703. Minor features (testing): Add a "make test-rust" target to run the rust tests only. Closes ticket 25071. Minor features (testing, debugging, embedding): For development purposes, Tor now has a mode in which it runs for a few seconds, then stops, and starts again without exiting the process. This mode is meant to help us debug various issues with ticket 23847. To use this feature, compile with --enable-restart-debugging, and set the TOR_DEBUG_RESTART environment variable. This is expected to crash a lot, and is really meant for developers only. It will likely be removed in a future release. Implements ticket 24583. Minor bugfixes (build, rust): Fix output of autoconf checks to display success messages for Rust dependencies and a suitable rustc compiler version. Fixes bug 24612; bugfix on 0.3.1.3-alpha. Don't pass the --quiet option to cargo: it seems to suppress some errors, which is not what we want to do when building. Fixes bug 24518; bugfix on 0.3.1.7. Build correctly when building from outside Tor's source tree with the TOR_RUST_DEPENDENCIES option set. Fixes bug 22768; bugfix on 0.3.1.7. Minor bugfixes (C correctness): Fix a very unlikely (impossible, we believe) null pointer dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by Coverity; this is CID 1430932. Minor bugfixes (channel, client): Better identify client connection when reporting to the geoip client cache. Fixes bug 24904; bugfix on 0.3.1.7. Minor bugfixes (circuit, cannibalization): Don't cannibalize preemptively-built circuits if we no longer recognize their first hop. This situation can happen if our Guard relay went off the consensus after the circuit was created. Fixes bug 24469; bugfix on 0.0.6. Minor bugfixes (client, backport from 0.3.4.1-alpha): Don't consider Tor running as a client if the ControlPort is open, but no actual client ports are open. Fixes bug 26062; bugfix on 0.2.9.4-alpha. Minor bugfixes (compilation): Fix a C99 compliance issue in our configuration script that caused compilation issues when compiling Tor with certain versions of xtools. Fixes bug 25474; bugfix on 0.3.2.5-alpha. Minor bugfixes (controller): Restore the correct operation of the RESOLVE command, which had been broken since we added the ability to enable/disable DNS on specific listener ports. Fixes bug 25617; bugfix on 0.2.9.3-alpha. Avoid a (nonfatal) assertion failure when extending a one-hop circuit from the controller to become a multihop circuit. Fixes bug 24903; bugfix on 0.2.5.2-alpha. Minor bugfixes (correctness): Remove a nonworking, unnecessary check to see whether a circuit hop's identity digest was set when the circuit failed. Fixes bug 24927; bugfix on 0.2.4.4-alpha. Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha): Upon receiving a malformed connected cell, stop processing the cell immediately. Previously we would mark the connection for close, but continue processing the cell as if the connection were open. Fixes bug 26072; bugfix on 0.2.4.7-alpha. Minor bugfixes (directory authorities, IPv6): When creating a routerstatus (vote) from a routerinfo (descriptor), set the IPv6 address to the unspecified IPv6 address, and explicitly initialize the port to zero. Fixes bug 24488; bugfix on 0.2.4.1-alpha. Minor bugfixes (documentation): Document that the PerConnBW{Rate,Burst} options will fall back to their corresponding consensus parameters only if those parameters are set. Previously we had claimed that these values would always be set in the consensus. Fixes bug 25296; bugfix on 0.2.2.7-alpha. Minor bugfixes (documentation, backport from 0.3.4.1-alpha): Stop saying in the manual that clients cache ipv4 dns answers from exit relays. We haven't used them since 0.2.6.3-alpha, and in ticket 24050 we stopped even caching them as of 0.3.2.6-alpha, but we forgot to say so in the man page. Fixes bug 26052; bugfix on 0.3.2.6-alpha. Minor bugfixes (exit relay DNS retries): Re-attempt timed-out DNS queries 3 times before failure, since our timeout is 5 seconds for them, but clients wait 10-15. Also allow slightly more timeouts per resolver when an exit has multiple resolvers configured. Fixes bug 21394; bugfix on 0.3.1.9. Minor bugfixes (fallback directory mirrors): Make updateFallbackDirs.py search harder for python. (Some OSs don't put it in /usr/bin.) Fixes bug 24708; bugfix on 0.2.8.1-alpha. Minor bugfixes (hibernation, bandwidth accounting, shutdown): When hibernating, close connections normally and allow them to flush. Fixes bug 23571; bugfix on 0.2.4.7-alpha. Also fixes bug 7267. Do not attempt to launch self-reachability tests when entering hibernation. Fixes a case of bug 12062; bugfix on 0.0.9pre5. Resolve several bugs related to descriptor fetching on bridge clients with bandwidth accounting enabled. (This combination is not recommended!) Fixes a case of bug 12062; bugfix on 0.2.0.3-alpha. When hibernating, do not attempt to launch DNS checks. Fixes a case of bug 12062; bugfix on 0.1.2.2-alpha. When hibernating, do not try to upload or download descriptors. Fixes a case of bug 12062; bugfix on 0.0.9pre5. Minor bugfixes (IPv6, bridges): Tor now always sets IPv6 preferences for bridges. Fixes bug 24573; bugfix on 0.2.8.2-alpha. Tor now sets IPv6 address in the routerstatus as well as in the router descriptors when updating addresses for a bridge. Closes ticket 24572; bugfix on 0.2.4.5-alpha. Patch by "ffmancera". Minor bugfixes (Linux seccomp2 sandbox): When running with the sandbox enabled, reload configuration files correctly even when %include was used. Previously we would crash. Fixes bug 22605; bugfix on 0.3.1. Patch from Daniel Pinto. Minor bugfixes (Linux seccomp2 sandbox, backport from 0.3.4.1-alpha): Allow the nanosleep() system call, which glibc uses to implement sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha. Minor bugfixes (logging): Fix a (mostly harmless) race condition when invoking LOG_PROTOCOL_WARN message from a subthread while the torrc options are changing. Fixes bug 23954; bugfix on 0.1.1.9-alpha. Minor bugfixes (man page, SocksPort): Remove dead code from the old "SocksSocket" option, and rename SocksSocketsGroupWritable to UnixSocksGroupWritable. The old option still works, but is deprecated. Fixes bug 24343; bugfix on 0.2.6.3. Minor bugfixes (memory leaks): Avoid possible at-exit memory leaks related to use of Libevent's event_base_once() function. (This function tends to leak memory if the event_base is closed before the event fires.) Fixes bug 24584; bugfix on 0.2.8.1-alpha. Fix a harmless memory leak in tor-resolve. Fixes bug 24582; bugfix on 0.2.1.1-alpha. Minor bugfixes (network IPv6 test): Tor's test scripts now check if "ping -6 ::1" works when the user runs "make test-network-all". Fixes bug 24677; bugfix on 0.2.9.3-alpha. Patch by "ffmancera". Minor bugfixes (networking): string_is_valid_hostname() will not consider IP strings to be valid hostnames. Fixes bug 25055; bugfix on Tor 0.2.5.5. Minor bugfixes (onion service v3): Avoid an assertion failure when the next onion service descriptor rotation type is out of sync with the consensus's valid-after time. Instead, log a warning message with extra information, so we can better hunt down the cause of this assertion. Fixes bug 25306; bugfix on 0.3.2.1-alpha. Minor bugfixes (onion service, backport from 0.3.4.1-alpha): Fix a memory leak when a v3 onion service is configured and gets a SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha. When parsing the descriptor signature, look for the token plus an extra white-space at the end. This is more correct but also will allow us to support new fields that might start with "signature". Fixes bug 26069; bugfix on 0.3.0.1-alpha. Minor bugfixes (onion services): If we are configured to offer a single onion service, don't log long-term established one hop rendezvous points in the heartbeat. Fixes bug 25116; bugfix on 0.2.9.6-rc. Minor bugfixes (performance): Reduce the number of circuits that will be opened at once during the circuit build timeout phase. This is done by increasing the idle timeout to 3 minutes, and lowering the maximum number of concurrent learning circuits to 10. Fixes bug 24769; bugfix on 0.3.1.1-alpha. Avoid calling protocol_list_supports_protocol() from inside tight loops when running with cached routerinfo_t objects. Instead, summarize the relevant protocols as flags in the routerinfo_t, as we do for routerstatus_t objects. This change simplifies our code a little, and saves a large amount of short-term memory allocation operations. Fixes bug 25008; bugfix on 0.2.9.4-alpha. Minor bugfixes (performance, timeouts): Consider circuits for timeout as soon as they complete a hop. This is more accurate than applying the timeout in circuit_expire_building() because that function is only called once per second, which is now too slow for typical timeouts on the current network. Fixes bug 23114; bugfix on 0.2.2.2-alpha. Use onion service circuits (and other circuits longer than 3 hops) to calculate a circuit build timeout. Previously, Tor only calculated its build timeout based on circuits that planned to be exactly 3 hops long. With this change, we include measurements from all circuits at the point where they complete their third hop. Fixes bug 23100; bugfix on 0.2.2.2-alpha. Minor bugfixes (relay, crash, backport from 0.3.4.1-alpha): Avoid a crash when running with DirPort set but ORPort tuned off. Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha. Minor bugfixes (Rust FFI): Fix a minor memory leak which would happen whenever the C code would call the Rust implementation of protover_get_supported_protocols(). This was due to the C version returning a static string, whereas the Rust version newly allocated a CString to pass accross the FFI boundary. Consequently, the C code was not expecting to need to free() what it was given. Fixes bug 25127; bugfix on 0.3.2.1-alpha. Minor bugfixes (spelling): Use the "misspell" tool to detect and fix typos throughout the source code. Fixes bug 23650; bugfix on various versions of Tor. Patch from Deepesh Pathak. Minor bugfixes (testing): Avoid intermittent test failures due to a test that had relied on onion service introduction point creation finishing within 5 seconds of real clock time. Fixes bug 25450; bugfix on 0.3.1.3-alpha. Give out Exit flags in bootstrapping networks. Fixes bug 24137; bugfix on 0.2.3.1-alpha. Minor bugfixes (unit test, monotonic time): Increase a constant (1msec to 10msec) in the monotonic time test that makes sure the nsec/usec/msec times read are synchronized. This change was needed to accommodate slow systems like armel or when the clock_gettime() is not a VDSO on the running kernel. Fixes bug 25113; bugfix on 0.2.9.1. Code simplification and refactoring: Move the list of default directory authorities to its own file. Closes ticket 24854. Patch by "beastr0". Remove the old (deterministic) directory retry logic entirely: We've used exponential backoff exclusively for some time. Closes ticket 23814. Remove the unused nodelist_recompute_all_hsdir_indices(). Closes ticket 25108. Remove a series of counters used to track circuit extend attempts and connection status but that in reality we aren't using for anything other than stats logged by a SIGUSR1 signal. Closes ticket 25163. Remove /usr/athena from search path in configure.ac. Closes ticket 24363. Remove duplicate code in node_has_curve25519_onion_key() and node_get_curve25519_onion_key(), and add a check for a zero microdesc curve25519 onion key. Closes ticket 23966, patch by "aruna1234" and teor. Rewrite channel_rsa_id_group_set_badness to reduce temporary memory allocations with large numbers of OR connections (e.g. relays). Closes ticket 24119. Separate the function that deletes ephemeral files when Tor stops gracefully. Small changes to Tor's buf_t API to make it suitable for use as a general-purpose safe string constructor. Closes ticket 22342. Switch -Wnormalized=id to -Wnormalized=nfkc in configure.ac to avoid source code identifier confusion. Closes ticket 24467. The tor_git_revision[] constant no longer needs to be redeclared by everything that links against the rest of Tor. Done as part of ticket 23845, to simplify our external API. We make extend_info_from_node() use node_get_curve25519_onion_key() introduced in ticket 23577 to access the curve25519 public keys rather than accessing it directly. Closes ticket 23760. Patch by Neel Chauhan. Add a function to log channels' scheduler state changes to aid debugging efforts. Closes ticket 24531. Documentation: Improved the documentation of AccountingStart parameter. Closes ticket 23635. Update the documentation for "Log" to include the current list of logging domains. Closes ticket 25378. Add documentation on how to build tor with Rust dependencies without having to be online. Closes ticket 22907; bugfix on 0.3.0.3-alpha. Clarify the behavior of RelayBandwidth{Rate,Burst} with client traffic. Closes ticket 24318. Document that OutboundBindAddress doesn't apply to DNS requests. Closes ticket 22145. Patch from Aruna Maurya. Code simplification and refactoring (channels): Remove the incoming and outgoing channel queues. These were never used, but still took up a step in our fast path. The majority of the channel unit tests have been rewritten and the code coverage has now been raised to 83.6% for channel.c. Closes ticket 23709. Remove other dead code from the channel subsystem: All together, this cleanup has removed more than 1500 lines of code overall and adding very little except for unit test. Code simplification and refactoring (circuit rendezvous): Split the client-side rendezvous circuit lookup into two functions: one that returns only established circuits and another that returns all kinds of circuits. Closes ticket 23459. Code simplification and refactoring (controller): Make most of the variables in networkstatus_getinfo_by_purpose() const. Implements ticket 24489. Documentation (backport from 0.3.4.1-alpha): Correct an IPv6 error in the documentation for ExitPolicy. Closes ticket 25857. Patch from "CTassisF". Documentation (man page): The HiddenServiceVersion torrc option accepts only one number: either version 2 or 3. Closes ticket 25026; bugfix on 0.3.2.2-alpha. Documentation (manpage, denial of service): Provide more detail about the denial-of-service options, by listing each mitigation and explaining how they relate. Closes ticket 25248.

[chan] general
May 23 23:51 [raw]

> The Tor 0.3.3 series includes controller support and other improvements for v3 onion services, good. > official support for embedding Tor within other applications, very good > and our first non-trivial module written in the Rust programming language. YGBSM. way to go, just complicate the heck out of it and make yet another vector for security vulnerabilities. It's bad enough it's bundled with firefox. Do we try to be trendy or cutesy with people's lives on the line?

[chan] general
May 26 12:35 [raw]

TOR is insecure piece of shit, and the mainstream crypto community knows it.

[chan] general
BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r

Subject Last Count
Three balloons go up on Thursday Jun 24 06:14 50
Testing the DML concept Jun 23 19:03 1
testing DML Jun 23 19:01 4
So-called "hacktivists" play an unwitting role in helping the NSA Jun 23 18:08 15
Why is Tor not enough for Deep Web Anonymity? Jun 23 18:08 1
How to Legally Accept a Drug Package as Per Police and Prosecutors Jun 23 18:08 1
Someone please help me Jun 23 15:44 2
Reminder Jun 23 11:53 2
UK Column News - 22nd June 2018 Jun 23 08:05 4
Flat Earth PROOF | Not a joke. Low IQ NOT required! Jun 22 19:56 4
Curtis Keyer inventor goes SK Jun 22 17:50 1
ITU chief declares Z6 prefix illegal Jun 22 17:47 1
Torrent trackers list, one per line. Jun 22 17:35 11
UK Column News - 21st June 2018 Jun 21 19:25 1
How to detect emulator or virtual machine from DOS? Jun 21 15:28 1
UK Column News - 20th June 2018 Jun 21 06:11 3
Bitmessage Security Test: ZWD attempt Jun 20 13:44 2
YES !! Man Hacks Employer To Death Over UG-$250,000 Jun 20 13:44 2
UK Column News - 19th June 2018 Jun 20 06:19 2
C575032EBE4B4872E938D61CFEC4E98C Jun 19 16:46 1
Plane sailing Jun 19 14:35 7
Самое педерастическое и лживое место в БМ это каналы серии ru.politics, ru.alt.politics, ru.alt-1.politics по ru.alt-... .politics Jun 19 05:24 6
Україна под усе Jun 19 04:32 1
UK Column News - today Jun 18 19:11 1
UK Column News - 18th June 2018 Jun 18 17:22 2
0705EBC1F49EC58DD57FC3D919FF4085 Jun 18 12:52 1
Binsend 1.2 has been released Jun 18 03:21 32
Pieces of Polish Tu154M wreckage stored in Smolensk disappear one by one Jun 17 20:45 3
"How the NSA Attacks Tor/Firefox Users With QUANTUM and FOXACID" Jun 17 16:41 1
Companies founded by 8200 Jun 17 16:20 1
play with it Jun 17 09:09 1
touch it Jun 17 08:50 1
TRYLEHAT Jun 16 16:18 1
RBN adds FT8 spots Jun 16 12:57 1
71CEF0D49B55B37841B12FC44589D6E2 Jun 16 12:42 1
RetroShare channels / friends Jun 16 08:27 8
UK Column News - 15th June 2018 Jun 16 07:19 2
Україна понад усе Jun 16 06:57 5
Ascii85 Test Jun 16 06:55 17
Intelligent discussion? Jun 15 19:30 9
Корабль обреченных идиотов Jun 15 06:41 1
The Transgender Assualt on the Creator of JavaScript Jun 15 04:35 3
Does Torchat still work? Jun 15 04:35 5
Boer Genocide Jun 14 19:05 8
Can somebody explain this strange Tox ban at ImageFap? Jun 14 18:26 3
5BA656884AC10D8316CEEFCEDC70A75E Jun 14 17:41 1
UK Column News - 14th June 2018 Jun 14 16:31 2
cute pose Jun 14 16:27 1
Free Bitcoins!!! Jun 14 16:10 2
South Africans get 100kHz on 60m Jun 14 15:41 1
necklace Jun 14 14:54 2
(no subject) Jun 14 14:41 193
Test multi addr Jun 14 13:27 9
UK Column News - 13th June 2018 Jun 14 06:58 1
dripping wet Jun 13 22:47 3
New BinSend Version is out Jun 13 22:04 6
Kissing Daddy Goodnight Jun 13 21:25 2
Самое педерастическое и лживое место в БМ это каналы ru.politics и ru.alt.politics => The most fucking-gay and false place in BM is the channels ru.politic Jun 13 16:28 1
Naked teen girl Jun 13 13:14 3
Самое педерастическое и лживое место в БМ это каналы ru.politics и ru.alt.politics Jun 13 12:07 1
Самое педерастическое и лживое место в БМ это канал ru.politics Jun 13 10:04 1
UK Column News - 12th June 2018 Jun 13 07:25 1
Do you know any strange Japanese customs? Jun 12 22:00 6
ИНСАЙД (Re: Повышенное Внмниe!) Jun 12 19:16 1
Повышенное Внмниe! Jun 12 19:10 2
The Slashdot front page looks rather depressing right now Jun 12 15:46 1
UK Column News - 11th June 2018 Jun 12 14:40 2
EBF15A85D1E97B79C328396CB99B4649 Jun 12 14:40 1
New ebooks June 10 2018 Jun 12 05:48 2
Graf Archive - Star Wars digital preservation project Jun 11 21:36 1
UK Column News - 7th June 2018 Jun 11 17:48 4
http://falkvinge.net/2012/09/07/three-reasons-child-porn-must-be-re-legalized-in-the-coming-decade/ Jun 11 07:17 3
miniLock Jun 11 07:11 3
So many people asked for citizenship LOL Jun 10 11:45 1
YES !! Man Hacks Employer To Death Over UG-$250,000 Jun 10 06:43 4
Spam filter Jun 9 16:30 11
9402B060FDC6D2F5FA27735751454E78 Jun 9 12:36 1
fast encryption/decryption routine using group summing method Jun 9 10:59 1
NSA doesn't joke, folks Jun 9 10:48 1
D5FBAF8FF8A4645D935B1C0ED56E2879 Jun 9 09:02 1
D1CD16414993436D7300E7AECBEA0719 Jun 9 09:01 1
Bitmessage is slow Jun 9 00:21 14
Chan dead? Jun 8 23:33 4
EFAIL?! Jun 8 23:23 1
UK Column News - 8th June 2018 Jun 8 21:08 2
sun hat Jun 8 19:32 4
76B272B54C8779061595BC726C179D8A Jun 8 16:59 1
hacker for hire Jun 8 00:30 5
Binsend Jun 7 22:37 2
A70361EDD36261292031F5EBCF8DE12A Jun 7 16:41 1
Base64 encoding test Jun 7 16:31 1
New channel for portuguese speakers Jun 7 13:32 1
Information about Wednesday's broadcast Jun 6 16:43 2
6AF9BBE3A2E5FDC545AFF80573AB54FA Jun 6 16:10 25
Please post Binsend.exe Jun 6 12:00 4
7969BD8C7412749F83C7FFAA439922DE Jun 6 10:39 1
Others BitMessage software Jun 6 10:17 2
Самое пидорское место в БМ канал BM-2cUVksQWs8n74X5LBkZJgWCX8J5UELCZzn ru.politics Jun 6 10:12 3
RAM usage Jun 6 10:06 5
Join [chan] alt.anonymous.messages ! Jun 6 06:26 2