o Major features (IPv6, directory documents):
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
- consensus. This information it easier for IPv6 clients to
+ consensus. This information makes it easier for IPv6 clients to
bootstrap and choose reachable entry guards. Implements 23826.
- Add consensus method 28, which removes IPv6 ORPorts from
- microdescriptors. Now that there are the consensus contains IPv6
+ microdescriptors. Now that the consensus contains IPv6
ORPorts, they are redundant in microdescs. This change will be
- used by tor clients on 0.2.8.x and later. (That is to say, with
+ used by Tor clients on 0.2.8.x and later. (That is to say, with
all Tor clients having IPv6 bootstrap and guard support.)
Implements 23828.
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
on 0.2.4.1-alpha.
o Major features (onion service v3, control port):
- - The control port now supports command and events for v3 onion
- services: It is now possible to create ephemeral v3 services using
+ - The control port now supports commands and events for v3 onion
+ services. It is now possible to create ephemeral v3 services using
ADD_ONION. Additionally, several events (HS_DESC, HS_DESC_CONTENT,
CIRC and CIRC_MINOR) and commands (GETINFO, HSPOST, ADD_ONION and
DEL_ONION) have been extended to support v3 onion services. Closes
service circuits to a list of nodes. The option HSLayer2Guards
pins the second hop, and the option HSLayer3Guards pins the third
hop. These options are for use in conjunction with experiments
- with a "vanguards" for preventing guard enumeration attacks.
+ with "vanguards" for preventing guard enumeration attacks.
Closes ticket 13837.
o Major features (rust, portability, experimental):
include the IPv6 address of the rendezvous point, if it has one.
Current v3 onion services running 0.3.2 ignore IPv6 addresses, but
in future Tor versions, IPv6-only v3 single onion services will be
- able to IPv6 addresses to connect directly to the rendezvous
+ able to use IPv6 addresses to connect directly to the rendezvous
point. Closes ticket 23577. Patch by Neel Chauhan.
o Major bugfixes (onion services, retry behavior):
flush. Fixes bug 23571; bugfix on 0.2.4.7-alpha. Also fixes
bug 7267.
- Do not attempt to launch self-reachability tests when entering
- hibernation. Fixes a base of bug 12062; bugfix on 0.0.9pre5.
+ hibernation. Fixes a case of bug 12062; bugfix on 0.0.9pre5.
- Resolve several bugs related to descriptor fetching on bridge
clients with bandwidth accounting enabled. (This combination is
not recommended!) Fixes a case of bug 12062; bugfix
- Remove duplicate code in node_has_curve25519_onion_key() and
node_get_curve25519_onion_key(), and add a check for a zero
microdesc curve25519 onion key. Closes ticket 23966, patch by
- "aruna1234" and "teor".
+ "aruna1234" and teor.
- Rewrite channel_rsa_id_group_set_badness to reduce temporary
memory allocations with large numbers of OR connections (e.g.
relays). Closes ticket 24119.
introduced in ticket 23577 to access the curve25519 public keys
rather than accessing it directly. Closes ticket 23760. Patch by
Neel Chauhan.
- - Add a function to log channels' scheduler state changes to aide
+ - Add a function to log channels' scheduler state changes to aid
debugging efforts. Closes ticket 24531.
o Documentation:
- Add documentation on how to build tor with Rust dependencies
- without having to beonline. Closes ticket 22907; bugfix
+ without having to be online. Closes ticket 22907; bugfix
on 0.3.0.3-alpha.
- Clarify the behavior of RelayBandwidth{Rate,Burst} with client
traffic. Closes ticket 24318.
expected to set MyFamily and ContactInfo correctly. Closes
ticket 24526.
- o Code simplification and refactoring (channels):
- - Remove the incoming and outgoing channel queues: These were never
+ o Code simplification and refactoring (channels):
+ - Remove the incoming and outgoing channel queues. These were never
used, but still took up a step in our fast path.
- The majority of the channel unit tests have been rewritten and the
code coverage has now been raised to 83.6% for channel.c. Closes
ticket 23709.
- - Remove other dead code from the a lot the channel subsystem: All
+ - Remove other dead code from the channel subsystem: All
together, this cleanup has removed more than 1500 lines of code
overall and adding very little except for unit test.