Tor 0.3.2.3-alpha is released, with small bugfixes
Tor 0.3.2.3-alpha is the third release in the 0.3.2 series. It fixes numerous small bugs in earlier versions of 0.3.2.x, and adds a new directory authority, Bastet.
You can download the source from the usual place on the website. Binary packages should be available soon, with an alpha Tor Browser likely some time in November.
Remember: This is an alpha release, and it's likely to have more bugs than usual. We hope that people will try it out to find and report bugs, though.
Changes in version 0.3.2.3-alpha - 2017-10-27
- Directory authority changes:
- Minor features (bridge):
- Bridge relays can now set the BridgeDistribution config option to add a "bridge-distribution-request" line to their bridge descriptor, which tells BridgeDB how they'd like their bridge address to be given out. (Note that as of Oct 2017, BridgeDB does not yet implement this feature.) As a side benefit, this feature provides a way to distinguish bridge descriptors from non-bridge descriptors. Implements tickets 18329.
- Minor features (client, entry guards):
- Improve log messages when missing descriptors for primary guards. Resolves ticket 23670.
- Minor features (geoip):
- Update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2 Country database.
- Minor bugfixes (bridge):
- Overwrite the bridge address earlier in the process of retrieving its descriptor, to make sure we reach it on the configured address. Fixes bug 20532; bugfix on 0.2.0.10-alpha.
- Minor bugfixes (documentation):
- Document better how to read gcov, and what our gcov postprocessing scripts do. Fixes bug 23739; bugfix on 0.2.9.1-alpha.
- Minor bugfixes (entry guards):
- Tor now updates its guard state when it reads a consensus regardless of whether it's missing descriptors. That makes tor use its primary guards to fetch descriptors in some edge cases where it would previously have used fallback directories. Fixes bug 23862; bugfix on 0.3.0.1-alpha.
- Minor bugfixes (onion service client):
- When handling multiple SOCKS request for the same .onion address, only fetch the service descriptor once.
- When a descriptor fetch fails with a non-recoverable error, close all pending SOCKS requests for that .onion. Fixes bug 23653; bugfix on 0.3.2.1-alpha.
- Minor bugfixes (onion service):
- Always regenerate missing onion service public key files. Prior to this, if the public key was deleted from disk, it wouldn't get recreated. Fixes bug 23748; bugfix on 0.3.2.2-alpha. Patch from "cathugger".
- Make sure that we have a usable ed25519 key when the intro point relay supports ed25519 link authentication. Fixes bug 24002; bugfix on 0.3.2.1-alpha.
- Minor bugfixes (onion service, v2):
- When reloading configured onion services, copy all information from the old service object. Previously, some data was omitted, causing delays in descriptor upload, and other bugs. Fixes bug 23790; bugfix on 0.2.1.9-alpha.
- Minor bugfixes (memory safety, defensive programming):
- Clear the target address when node_get_prim_orport() returns early. Fixes bug 23874; bugfix on 0.2.8.2-alpha.
- Minor bugfixes (relay):
- Avoid a BUG warning when receiving a dubious CREATE cell while an option transition is in progress. Fixes bug 23952; bugfix on 0.3.2.1-alpha.
- Minor bugfixes (testing):
- Adjust the GitLab CI configuration to more closely match that of Travis CI. Fixes bug 23757; bugfix on 0.3.2.2-alpha.
- Prevent scripts/test/coverage from attempting to move gcov output to the root directory. Fixes bug 23741; bugfix on 0.2.5.1-alpha.
- When running unit tests as root, skip a test that would fail because it expects a permissions error. This affects some continuous integration setups. Fixes bug 23758; bugfix on 0.3.2.2-alpha.
- Stop unconditionally mirroring the tor repository in GitLab CI. This prevented developers from enabling GitLab CI on master. Fixes bug 23755; bugfix on 0.3.2.2-alpha.
- Fix the onion service v3 descriptor decoding fuzzing to use the latest decoding API correctly. Fixes bug 21509; bugfix on 0.3.2.1-alpha.
- Minor bugfixes (warnings):
- When we get an HTTP request on a SOCKS port, tell the user about the new HTTPTunnelPort option. Previously, we would give a "Tor is not an HTTP Proxy" message, which stopped being true when HTTPTunnelPort was introduced. Fixes bug 23678; bugfix on 0.3.2.1-alpha.
Comments
Please note that the comment area below has been archived.
When we will see tor.exe 64…
When we will see tor.exe 64-bit for Windows?
Thank you
Thank you
@someone: For what exactly…
@someone: For what exactly do you need a 64-bit windows version? Just use 32-bit...WoW64... And,well, to get an exe... compile it :-) I usually use mingw32/msys, but your mileage may vary. IMHO, if you cannot compile it yourself, you shouldn't be using tor alpha, in your very own interest - no offense, but think about it, please :-)
Tor should keep have kept on…
Tor should keep have kept on supporting Windows XP
+1
+1
strange isp blocking tor now…
strange isp blocking tor now. can't even get through unless you vpn or proxy
witam i dzieki :D
witam i dzieki :D