aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-11-06 03:51:57 +0000
committerRoger Dingledine <arma@torproject.org>2006-11-06 03:51:57 +0000
commit20cad22bb154e2fdfe5bf58021873f980ebb96b4 (patch)
tree30c6d04f714e9242ad2b1467ac61deeeae3df9ec
parent00fdcf27f5ff234d67f865600dd95489f127a0a3 (diff)
downloadtor-20cad22bb154e2fdfe5bf58021873f980ebb96b4.tar
tor-20cad22bb154e2fdfe5bf58021873f980ebb96b4.tar.gz
forward-port the 0.1.1.25 changelog
svn:r8909
-rw-r--r--ChangeLog33
1 files changed, 33 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index cbf5c8292..ad32c4633 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -396,6 +396,39 @@ Changes in version 0.1.2.1-alpha - 2006-08-27
goes) have predicted what we plan to respond to them.
+Changes in version 0.1.1.25 - 2006-11-04
+ o Major bugfixes:
+ - When a client asks us to resolve (rather than connect to)
+ an address, and we have a cached answer, give them the cached
+ answer. Previously, we would give them no answer at all.
+ - We were building exactly the wrong circuits when we predict
+ hidden service requirements, meaning Tor would have to build all
+ its circuits on demand.
+ - If none of our live entry guards have a high uptime, but we
+ require a guard with a high uptime, try adding a new guard before
+ we give up on the requirement. This patch should make long-lived
+ connections more stable on average.
+ - When testing reachability of our DirPort, don't launch new
+ tests when there's already one in progress -- unreachable
+ servers were stacking up dozens of testing streams.
+
+ o Security bugfixes:
+ - When the user sends a NEWNYM signal, clear the client-side DNS
+ cache too. Otherwise we continue to act on previous information.
+
+ o Minor bugfixes:
+ - Avoid a memory corruption bug when creating a hash table for
+ the first time.
+ - Avoid possibility of controller-triggered crash when misusing
+ certain commands from a v0 controller on platforms that do not
+ handle printf("%s",NULL) gracefully.
+ - Avoid infinite loop on unexpected controller input.
+ - Don't log spurious warnings when we see a circuit close reason we
+ don't recognize; it's probably just from a newer version of Tor.
+ - Add Vidalia to the OS X uninstaller script, so when we uninstall
+ Tor/Privoxy we also uninstall Vidalia.
+
+
Changes in version 0.1.1.24 - 2006-09-29
o Major bugfixes:
- Allow really slow clients to not hang up five minutes into their