Skip to content

Latest commit

 

History

History
83 lines (74 loc) · 3.4 KB

CHANGES.rst

File metadata and controls

83 lines (74 loc) · 3.4 KB

next

  • Allow --control_ip to be a hostname #49
  • Properly apply loglevel from config file #44
  • Ignore circuits and timeouts between CBT RESET and COMPUTED #58
  • Improve options documentation in example conf. #55.
  • Improve documentation for relay/bridge use. #50.
  • Document current traffic analysis research horizon. #60.
  • Document that vanguards disables path restrictions. #53.
  • Document that CookieAuthentication is automatic by default. #48.
  • Add option to close service introduction circs with too much traffic (off by default) #42.
  • Provide syslog logging ability. #56.
  • Add path verification component for integration testing. #61.
  • Include vanguards_parallel.sh for high load services. #62.
  • Set NumDirectoryGuards to 2, to help ensure only 2 orconns. #63
  • Automatically try common control sock and control ports if unset. #64.
  • Workaround for Tor bug #40359 (dropped cell on padded intro circs after use). #65
  • Demote Tor Bug #29699 dropped cell NOTICE to INFO. #66
  • Close circuits before logging about the issue. #67.
  • Always close PATH_BIAS_TESTING circutis with invalid cells. #68
  • Eliminate clearly invalid cases of allowed dropped cells. #69
  • Use 4 Layer2 guards, to match upcoming C tor's vanguards-lite. #73.

0.3.1

  • Workaround for dropped cell WARNS due to Tor bugs #29699, #29700, #29786, and #29927. These cases are now logged at INFO/NOTICE, with specific Tor bug number for each case. #37
  • Re-apply vanguard config params upon SIGHUP. #40.

0.3.0

  • Apply bandguards limits to non-HS circuits too. #34.

0.2.3

  • Global option to disable circuit killing. #32.
  • Fix config parsing of boolean values. #36.
  • Add tests/default.conf to sdist/pip tarball. #27
  • Do not allow any dropped cells if Tor 0.3.4.10+ is being used. #25 and #3.
  • Retry Tor connection if Tor is missing descriptors at startup. #35.
  • Reorganized README_SECURITY to link to specific mitigation sections for each adversary attack.

0.2.2

  • Fix exception when a connection to a guard is closed with more than one live circuit. #29
  • Catch control+c and exit cleanly. #30.
  • Use Tor's network liveness events to double-check connectivity.
  • Print out relevant versions at startup.

0.2.1

  • Read ExcludeNodes from Tor and don't pick layer2 or layer3 guards in this set. #11
  • Add --one_shot_vanguards and --disable_vanguards options (to enable OnionBalance synchronization). #12
  • Don't write to torrc by default. #18
  • Keep attempting to reconnect if the control port dies. #19
  • Support tighter bounds on dropped data to defend against DropMark, and change circ_max_dropped_bytes_percent to circ_max_dropped_cells. However, leave these at NOTICE pending Tor patch #25573. #20.
  • Limit rend requests from relays that are not in our consensus. #22.
  • Added connectivity accounting: WARN if we're disconnected or can't build circuits for more than 'conn_max_disconnected_secs' and 'circ_max_disconnected_secs'. Also emit a NOTICE if a connection dies while there are live circuits on it. #23
  • Fix several false positive cases in rendguard. More may remain, so demote logline to NOTICE for now. #24
  • Change rendguard params to lower the false positive rate. If you use a conf file, be sure to update the values there, if specified. #24.
  • Standardize using WARN for messages that we're confident represent serious issues, and use NOTICE for heuristics that may need more tuning.

0.1.1

  • Initial release