Tor 0.3.3.4-alpha is released!
Hi! There's a new alpha release available for download. If you build Tor from source, you can download the source code for 0.3.3.4-alpha from the usual place on the website. If you don't build Tor from source, don't worry! Updated packages should be available over the coming weeks, with a new alpha Tor Browser release some time in April.
Tor 0.3.3.4-alpha includes various bugfixes for issues found during the alpha testing of earlier releases in its series. We are approaching a stable 0.3.3.4-alpha release: more testing is welcome!
Changes in version 0.3.3.4-alpha - 2018-03-29
- New system requirements:
- When built with Rust, Tor now depends on version 0.2.39 of the libc crate. Closes tickets 25310 and 25664.
- Major bugfixes (relay, connection):
- If we have failed to connect to a relay and received a connection refused, timeout, or similar error (at the TCP level), do not try that same address/port again for 60 seconds after the failure has occurred. Fixes bug 24767; bugfix on 0.0.6.
- Minor features (geoip):
- Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2 Country database. Closes ticket 25469.
- Minor features (log messages):
- Improve log message in the out-of-memory handler to include information about memory usage from the different compression backends. Closes ticket 25372.
- Minor features (sandbox):
- Explicitly permit the poll() system call when the Linux seccomp2-based sandbox is enabled: apparently, some versions of libc use poll() when calling getpwnam(). Closes ticket 25313.
- Minor bugfixes (C correctness):
- Fix a very unlikely (impossible, we believe) null pointer dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by Coverity; this is CID 1430932.
- Minor bugfixes (channel, client):
- Better identify client connection when reporting to the geoip client cache. Fixes bug 24904; bugfix on 0.3.1.7.
- Minor bugfixes (compilation):
- Fix a C99 compliance issue in our configuration script that caused compilation issues when compiling Tor with certain versions of xtools. Fixes bug 25474; bugfix on 0.3.2.5-alpha.
- Minor bugfixes (controller, reliability):
- Avoid a (nonfatal) assertion failure when extending a one-hop circuit from the controller to become a multihop circuit. Fixes bug 24903; bugfix on 0.2.5.2-alpha.
- Minor bugfixes (networking):
- Minor bugfixes (onion service v3):
- Avoid an assertion failure when the next the next onion service descriptor rotation type is out of sync with the consensus's valid-after time. Instead, log a warning message with extra information, so we can better hunt down the cause of this assertion. Fixes bug 25306; bugfix on 0.3.2.1-alpha.
- Minor bugfixes (testing):
- Avoid intermittent test failures due to a test that had relied on onion service introduction point creation finishing within 5 seconds of real clock time. Fixes bug 25450; bugfix on 0.3.1.3-alpha.
- Rust crates are now automatically detected and tested. Previously, some crates were not tested by `make test-rust` due to a static string in the `src/test/test_rust.sh` script specifying which crates to test. Fixes bug 25560; bugfix on 0.3.3.3-alpha.
- Minor bugfixes (testing, benchmarks):
- Fix a crash when running benchmark tests on win32 systems. The crash was due to a mutex that wasn't initialized before logging and options were initialized. Fixes bug 25479; bugfix on 0.3.3.3-alpha.
- Minor bugfixes (warnings, ipv6):
- Avoid a bug warning that could occur when trying to connect to a relay over IPv6. This warning would occur on a Tor instance that downloads router descriptors, but prefers to use microdescriptors. Fixes bug 25213; bugfix on 0.3.3.1-alpha.
- Code simplification and refactoring:
- Remove the old (deterministic) directory retry logic entirely: We've used exponential backoff exclusively for some time. Closes ticket 23814.
I was surprised that Tor network throughput had been improved a lot! Thank you so much.
Many thanks to dgoulet for designing and implementing the DDoS protection which helped a lot and even scared the DDoSers into pausing their DDoS.
Thank you so much dgoulet, I like torsocks command too since it's easy and secure to use!
There has also been a large improvement in download times for .onion's shown here.