Tor 0.2.1.14-rc released

Changes in version 0.2.1.14-rc - 2009-04-12
Major features:

  • Clients replace entry guards that were chosen more than a few months ago. This change should significantly improve client performance, especially once more people upgrade, since relays that have been a guard for a long time are currently overloaded.

Major bugfixes (on 0.2.0):

  • Finally fix the bug where dynamic-IP relays disappear when their IP address changes: directory mirrors were mistakenly telling them their old address if they asked via begin_dir, so they never got an accurate answer about their new address, so they just vanished after a day. For belt-and-suspenders, relays that don't set Address in their config now avoid using begin_dir for all direct connections. Should fix bugs 827, 883, and 900.
  • Relays were falling out of the networkstatus consensus for part of a day if they changed their local config but the authorities discarded their new descriptor as "not sufficiently different". Now directory authorities accept a descriptor as changed if bandwidthrate or bandwidthburst changed. Partial fix for bug 962; patch by Sebastian.
  • Avoid crashing in the presence of certain malformed descriptors. Found by lark, and by automated fuzzing.

Minor features:

  • When generating circuit events with verbose nicknames for controllers, try harder to look up nicknames for routers on a circuit. (Previously, we would look in the router descriptors we had for nicknames, but not in the consensus.) Partial fix for bug 941.
  • If the bridge config line doesn't specify a port, assume 443. This makes bridge lines a bit smaller and easier for users to understand.
  • Raise the minimum bandwidth to be a relay from 20000 bytes to 20480 bytes (aka 20KB/s), to match our documentation. Also update directory authorities so they always assign the Fast flag to relays with 20KB/s of capacity. Now people running relays won't suddenly find themselves not seeing any use, if the network gets faster on average.
  • Update to the "April 3 2009" ip-to-country file.

Minor bugfixes:

  • Avoid trying to print raw memory to the logs when we decide to give up on downloading a given relay descriptor. Bugfix on 0.2.1.9-alpha.
  • In tor-resolve, when the Tor client to use is specified by :, actually use the specified port rather than defaulting to 9050. Bugfix on 0.2.1.6-alpha.
  • Make directory usage recording work again. Bugfix on 0.2.1.6-alpha.
  • When starting with a cache over a few days old, do not leak memory for the obsolete router descriptors in it. Bugfix on 0.2.0.33.
  • Avoid double-free on list of successfully uploaded hidden service discriptors. Fix for bug 948. Bugfix on 0.2.1.6-alpha.
  • Change memarea_strndup() implementation to work even when duplicating a string at the end of a page. This bug was harmless for now, but could have meant crashes later. Fix by lark. Bugfix on 0.2.1.1-alpha.
  • Limit uploaded directory documents to be 16M rather than 500K. The directory authorities were refusing v3 consensus votes from other authorities, since the votes are now 504K. Fixes bug 959; bugfix on 0.0.2pre17 (where we raised it from 50K to 500K ;).
  • Directory authorities should never send a 503 "busy" response to requests for votes or keys. Bugfix on 0.2.0.8-alpha; exposed by bug 959.

I saw you where using the "stable" version 0.2.0.34 have you considered trying the Alpha/ReleaseCandidate version series maby the 0.2.1.15RC handles these things better?

Anonymous

May 29, 2009

Permalink

I saw you where using the "stable" version 0.2.0.34 have you considered trying the Alpha/ReleaseCandidate version series maby the 0.2.1.15RC handles these things better?

Anonymous

June 03, 2009

Permalink

I haven't try yet doing the same with 0.2.1.15RC

At the moment I just took it from the launchpad TOR-Team repository.

I think I might get a try... if weather is bad during my next holidays... to understand the code, and do-it-myself, blocking by country.

But of course, supposing I get to something, it cannot be commited to trunk development like that as protocol has to be changed to say "Hi, I am an exit node that blocks {PL}, {HU}, and accept {CA}"

Anonymous

September 15, 2009

Permalink

I am using

StrictEntryNodes 1
EntryNodes thenode
StrictExitNodes 1
ExitNodes thenode

Can I set up for example the relay ?

StrictRelayNodes 1
RelayNodes thenode ?

Thanks

Anonymous

November 13, 2009

Permalink
Anonymous

January 09, 2010

Permalink

adasd

Anonymous

January 19, 2010

Permalink

Thank you very nice post.very good thanks

dizi izleme sektörünün yeni lideri olmak için yola çıkmıştır bu sitemizde ise dizi izlenir ve dizi seyret vardır. en iyi dizileri son bölümleri online izleyebilirsiniz.ve online dizi izleyebilirsinizkurtlar vadisi pusu izleyebilirsiniz.aşkı memnu izleyebilirsiniz.ezel izleyebilirsiniz.tüm bölümleri izleyebilirsiniz.son bölüm izleyebilirsiniz.online dizi izleyebilirsiniz.canlı dizi izleyebilirsiniz.full dizi izleyebilirsiniz.aşk ve ceza izleyebilirsiniz.geniş aile izleyebilirsiniz.bölüm izleyebilirsiniz.dizisi izleyebilirsiniz.
oyun oynayabilirsiniz.

Anonymous

March 30, 2010

Permalink

thanks

Anonymous

July 17, 2010

Permalink

thakns

Anonymous

January 20, 2011

Permalink

I would appreciate your help in solving this problem. TOR running perfectly before, now I am getting these error messages:
No specified exit routers seem to be running, and StrictExitNodes is set: can't choose an exit.
failed to choose an exit server

Vidalia: 0.2.7
Tor: 0.2.1.25
Qt: 4.6.2
Firefox 3.6.13

Thanks for any assistance you may provide.