Delivery-Date: Mon, 09 Mar 2015 21:50:09 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD,URIBL_BLOCKED
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id E51551E0A7E
	for <archiver@seul.org>; Mon,  9 Mar 2015 21:50:06 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 7D588341FF;
	Tue, 10 Mar 2015 01:50:02 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 4E0EE341FC
 for <tor-talk@lists.torproject.org>; Tue, 10 Mar 2015 01:49:59 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id cMXt0J8KX6vh for <tor-talk@lists.torproject.org>;
 Tue, 10 Mar 2015 01:49:59 +0000 (UTC)
Received: from mail-lb0-x235.google.com (mail-lb0-x235.google.com
 [IPv6:2a00:1450:4010:c04::235])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id E19A03407B
 for <tor-talk@lists.torproject.org>; Tue, 10 Mar 2015 01:49:58 +0000 (UTC)
Received: by lbiz12 with SMTP id z12so47315570lbi.12
 for <tor-talk@lists.torproject.org>; Mon, 09 Mar 2015 18:49:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:sender:date:message-id:subject:from:to:content-type;
 bh=TQ36sIuep72ekdp049A9yIwhIYNveR608SXvYATi3BA=;
 b=TISpCgzvD9aTrQRU0FA6y1kVhICEVAXS9sDt5aK9tllamDthSCkKkfquc1FdcV5Lqh
 pDNWWfYfFlEOjQvJuTbKX7nMJQEeUY+BqLtRrVrC7pXVo0csPflqaPW2gIWazBQMNKD6
 gO5U/r7uf4Q8WPrC59EL8C8JjC4/xPv9SJsL78Sz7MhPMXKjKBSW/fxfI8WtOgDsWOsY
 ncUIgNnAzbC4fH9RBgZ5Ftqx/k2XZa+1/lxeMTiADuh3SRv/245U2U7AxakSM97tDNuH
 djgw3N254RUv6JZDDJkDINOFmniJVu2KoDaVKx4hUTR88l73xhYeEA8UNg1cuwcrRdOM
 zE3Q==
MIME-Version: 1.0
X-Received: by 10.112.219.196 with SMTP id pq4mr28388112lbc.104.1425952195600; 
 Mon, 09 Mar 2015 18:49:55 -0700 (PDT)
Received: by 10.112.219.225 with HTTP; Mon, 9 Mar 2015 18:49:55 -0700 (PDT)
Date: Mon, 9 Mar 2015 21:49:55 -0400
X-Google-Sender-Auth: oqnVJL9vTYgr8UC9li_zEPpiPSw
Message-ID: <CAKDKvuxSxfZg+Oeiq4UKeqt2RwcYDA8w=X+Rm3SZC5=0K7_1ug@mail.gmail.com>
From: Nick Mathewson <nickm@torproject.org>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Subject: [tor-talk] Tor 0.2.6.4-rc is released!
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hi, all!

I've just tagged and uploaded Tor 0.2.6.4-rc to the usual places.
This is the first release candidate for the 0.2.6.x series, and I hope
the next release for 0.2.6 will be the stable release.

The source is available in the usual places on the website; packages
should follow. I'll put out an updated 0.2.5.11 in a few days, once
the changes in this release have seen more testing.

Changes in version 0.2.6.4-rc - 2015-03-09
  Tor 0.2.6.4-rc fixes an issue in the directory code that an
  attacker might be able to use in order to crash certain Tor
  directories. It also resolves some minor issues left over from, or
  introduced in, Tor 0.2.6.3-alpha or earlier.

  o Major bugfixes (crash, OSX, security):
    - Fix a remote denial-of-service opportunity caused by a bug in
      OSX's _strlcat_chk() function. Fixes bug 15205; bug first appeared
      in OSX 10.9.

  o Major bugfixes (relay, stability, possible security):
    - Fix a bug that could lead to a relay crashing with an assertion
      failure if a buffer of exactly the wrong layout is passed to
      buf_pullup() at exactly the wrong time. Fixes bug 15083; bugfix on
      0.2.0.10-alpha. Patch from "cypherpunks".
    - Do not assert if the 'data' pointer on a buffer is advanced to the
      very end of the buffer; log a BUG message instead. Only assert if
      it is past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.

  o Major bugfixes (FreeBSD IPFW transparent proxy):
    - Fix address detection with FreeBSD transparent proxies, when
      "TransProxyType ipfw" is in use. Fixes bug 15064; bugfix
      on 0.2.5.4-alpha.

  o Major bugfixes (Linux seccomp2 sandbox):
    - Pass IPPROTO_TCP rather than 0 to socket(), so that the Linux
      seccomp2 sandbox doesn't fail. Fixes bug 14989; bugfix
      on 0.2.6.3-alpha.
    - Allow AF_UNIX hidden services to be used with the seccomp2
      sandbox. Fixes bug 15003; bugfix on 0.2.6.3-alpha.
    - Upon receiving sighup with the seccomp2 sandbox enabled, do not
      crash during attempts to call wait4. Fixes bug 15088; bugfix on
      0.2.5.1-alpha. Patch from "sanic".

  o Minor features (controller):
    - Messages about problems in the bootstrap process now include
      information about the server we were trying to connect to when we
      noticed the problem. Closes ticket 15006.

  o Minor features (geoip):
    - Update geoip to the March 3 2015 Maxmind GeoLite2 Country database.
    - Update geoip6 to the March 3 2015 Maxmind GeoLite2
      Country database.

  o Minor features (logs):
    - Quiet some log messages in the heartbeat and at startup. Closes
      ticket 14950.

  o Minor bugfixes (certificate handling):
    - If an authority operator accidentally makes a signing certificate
      with a future publication time, do not discard its real signing
      certificates. Fixes bug 11457; bugfix on 0.2.0.3-alpha.
    - Remove any old authority certificates that have been superseded
      for at least two days. Previously, we would keep superseded
      certificates until they expired, if they were published close in
      time to the certificate that superseded them. Fixes bug 11454;
      bugfix on 0.2.1.8-alpha.

  o Minor bugfixes (compilation):
    - Fix a compilation warning on s390. Fixes bug 14988; bugfix
      on 0.2.5.2-alpha.
    - Fix a compilation warning on FreeBSD. Fixes bug 15151; bugfix
      on 0.2.6.2-alpha.

  o Minor bugfixes (testing):
    - Fix endianness issues in unit test for resolve_my_address() to
      have it pass on big endian systems. Fixes bug 14980; bugfix on
      Tor 0.2.6.3-alpha.
    - Avoid a side-effect in a tor_assert() in the unit tests. Fixes bug
      15188; bugfix on 0.1.2.3-alpha. Patch from Tom van der Woerdt.
    - When running the new 'make test-stem' target, use the configured
      python binary. Fixes bug 15037; bugfix on 0.2.6.3-alpha. Patch
      from "cypherpunks".
    - When running the zero-length-keys tests, do not use the default
      torrc file. Fixes bug 15033; bugfix on 0.2.6.3-alpha. Reported
      by "reezer".

  o Directory authority IP change:
    - The directory authority Faravahar has a new IP address. This
      closes ticket 14487.

  o Removed code:
    - Remove some lingering dead code that once supported mempools.
      Mempools were disabled by default in 0.2.5, and removed entirely
      in 0.2.6.3-alpha. Closes more of ticket 14848; patch
      by "cypherpunks".
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

