diff options
author | Roger Dingledine <arma@torproject.org> | 2006-11-06 03:51:57 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2006-11-06 03:51:57 +0000 |
commit | 20cad22bb154e2fdfe5bf58021873f980ebb96b4 (patch) | |
tree | 30c6d04f714e9242ad2b1467ac61deeeae3df9ec | |
parent | 00fdcf27f5ff234d67f865600dd95489f127a0a3 (diff) | |
download | tor-20cad22bb154e2fdfe5bf58021873f980ebb96b4.tar tor-20cad22bb154e2fdfe5bf58021873f980ebb96b4.tar.gz |
forward-port the 0.1.1.25 changelog
svn:r8909
-rw-r--r-- | ChangeLog | 33 |
1 files changed, 33 insertions, 0 deletions
@@ -396,6 +396,39 @@ Changes in version 0.1.2.1-alpha - 2006-08-27 goes) have predicted what we plan to respond to them. +Changes in version 0.1.1.25 - 2006-11-04 + o Major bugfixes: + - When a client asks us to resolve (rather than connect to) + an address, and we have a cached answer, give them the cached + answer. Previously, we would give them no answer at all. + - We were building exactly the wrong circuits when we predict + hidden service requirements, meaning Tor would have to build all + its circuits on demand. + - If none of our live entry guards have a high uptime, but we + require a guard with a high uptime, try adding a new guard before + we give up on the requirement. This patch should make long-lived + connections more stable on average. + - When testing reachability of our DirPort, don't launch new + tests when there's already one in progress -- unreachable + servers were stacking up dozens of testing streams. + + o Security bugfixes: + - When the user sends a NEWNYM signal, clear the client-side DNS + cache too. Otherwise we continue to act on previous information. + + o Minor bugfixes: + - Avoid a memory corruption bug when creating a hash table for + the first time. + - Avoid possibility of controller-triggered crash when misusing + certain commands from a v0 controller on platforms that do not + handle printf("%s",NULL) gracefully. + - Avoid infinite loop on unexpected controller input. + - Don't log spurious warnings when we see a circuit close reason we + don't recognize; it's probably just from a newer version of Tor. + - Add Vidalia to the OS X uninstaller script, so when we uninstall + Tor/Privoxy we also uninstall Vidalia. + + Changes in version 0.1.1.24 - 2006-09-29 o Major bugfixes: - Allow really slow clients to not hang up five minutes into their |