- Allow --control_ip to be a hostname #49
- Properly apply loglevel from config file #44
- Ignore circuits and timeouts between CBT RESET and COMPUTED #58
- Improve options documentation in example conf. #55.
- Improve documentation for relay/bridge use. #50.
- Document current traffic analysis research horizon. #60.
- Document that vanguards disables path restrictions. #53.
- Document that CookieAuthentication is automatic by default. #48.
- Add option to close service introduction circs with too much traffic (off by default) #42.
- Provide syslog logging ability. #56.
- Add path verification component for integration testing. #61.
- Include vanguards_parallel.sh for high load services. #62.
- Set NumDirectoryGuards to 2, to help ensure only 2 orconns. #63
- Automatically try common control sock and control ports if unset. #64.
- Workaround for Tor bug #40359 (dropped cell on padded intro circs after use). #65
- Demote Tor Bug #29699 dropped cell NOTICE to INFO. #66
- Close circuits before logging about the issue. #67.
- Always close PATH_BIAS_TESTING circutis with invalid cells. #68
- Eliminate clearly invalid cases of allowed dropped cells. #69
- Use 4 Layer2 guards, to match upcoming C tor's vanguards-lite. #73.
- Workaround for dropped cell WARNS due to Tor bugs #29699, #29700, #29786, and #29927. These cases are now logged at INFO/NOTICE, with specific Tor bug number for each case. #37
- Re-apply vanguard config params upon SIGHUP. #40.
- Apply bandguards limits to non-HS circuits too. #34.
- Global option to disable circuit killing. #32.
- Fix config parsing of boolean values. #36.
- Add tests/default.conf to sdist/pip tarball. #27
- Do not allow any dropped cells if Tor 0.3.4.10+ is being used. #25 and #3.
- Retry Tor connection if Tor is missing descriptors at startup. #35.
- Reorganized README_SECURITY to link to specific mitigation sections for each adversary attack.
- Fix exception when a connection to a guard is closed with more than one live circuit. #29
- Catch control+c and exit cleanly. #30.
- Use Tor's network liveness events to double-check connectivity.
- Print out relevant versions at startup.
- Read ExcludeNodes from Tor and don't pick layer2 or layer3 guards in this set. #11
- Add --one_shot_vanguards and --disable_vanguards options (to enable OnionBalance synchronization). #12
- Don't write to torrc by default. #18
- Keep attempting to reconnect if the control port dies. #19
- Support tighter bounds on dropped data to defend against DropMark, and change circ_max_dropped_bytes_percent to circ_max_dropped_cells. However, leave these at NOTICE pending Tor patch #25573. #20.
- Limit rend requests from relays that are not in our consensus. #22.
- Added connectivity accounting: WARN if we're disconnected or can't build circuits for more than 'conn_max_disconnected_secs' and 'circ_max_disconnected_secs'. Also emit a NOTICE if a connection dies while there are live circuits on it. #23
- Fix several false positive cases in rendguard. More may remain, so demote logline to NOTICE for now. #24
- Change rendguard params to lower the false positive rate. If you use a conf file, be sure to update the values there, if specified. #24.
- Standardize using WARN for messages that we're confident represent serious issues, and use NOTICE for heuristics that may need more tuning.
- Initial release