TOR Tor is released: almost stable!

Discussion in 'TOR | TAILS' started by survivalmonkey, Dec 12, 2016.

  1. survivalmonkey

    survivalmonkey Monkey+++

    There's a new development release of Tor!

    Tor fixes a few small bugs remaining in Tor, including a few that had prevented tests from passing on some platforms.

    The source code for this release is now available from the download page on our website. Packages should be available soon. I expect that this Tor release will probably go into the hardened TorBrowser package series coming out in the next couple of days. (I hear that will be in the regular TorBrowser alphas, since those froze a little before I finished this Tor release.)

    We're rapidly running out of serious bugs to fix in 0.2.9.x, so this is probably the last release candidate before stable ... unless you find bugs while testing! Please try these releases, and let us know if anything breaks. Testing either or would be helpful.

    Changes in version - 2016-12-12

    • Minor features (geoip):
      • Update geoip and geoip6 to the December 7 2016 Maxmind GeoLite2 Country database.
    • Minor bugfix (build):
      • The current Git revision when building from a local repository is now detected correctly when using git worktrees. Fixes bug 20492; bugfix on

      • Minor bugfixes (directory authority):
        • When computing old Tor protocol line version in protover, we were looking at twice instead of a specific case for Fixes bug 20810; bugfix on tor-
      • Minor bugfixes (download scheduling):
        • Resolve a "bug" warning when considering a download schedule whose delay had approached INT_MAX. Fixes 20875; bugfix on
      • Minor bugfixes (logging):
        • Downgrade a harmless log message about the pending_entry_connections list from "warn" to "info". Mitigates bug 19926.
      • Minor bugfixes (memory leak):
        • Fix a small memory leak when receiving AF_UNIX connections on a SocksPort. Fixes bug 20716; bugfix on
        • When moving a signed descriptor object from a source to an existing destination, free the allocated memory inside that destination object. Fixes bug 20715; bugfix on tor-
      • Minor bugfixes (memory leak, use-after-free, linux seccomp2 sandbox):
        • Fix a memory leak and use-after-free error when removing entries from the sandbox's getaddrinfo() cache. Fixes bug 20710; bugfix on Patch from "cypherpunks".
      • Minor bugfixes (portability):
        • Use the correct spelling of MAC_OS_X_VERSION_10_12 on Fixes bug 20935; bugfix on
      • Minor bugfixes (unit tests):
        • Stop expecting NetBSD unit tests to report success for ipfw. Part of a fix for bug 19960; bugfix on
        • Fix tolerances in unit tests for monotonic time comparisons between nanoseconds and microseconds. Previously, we accepted a 10 us difference only, which is not realistic on every platform's clock_gettime(). Fixes bug 19974; bugfix on
        • Remove a double-free in the single onion service unit test. Stop ignoring a return value. Make future changes less error-prone. Fixes bug 20864; bugfix on

    Continue reading...
survivalmonkey SSL seal warrant canary