diff options
author | Roger Dingledine <arma@torproject.org> | 2007-09-21 20:19:38 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2007-09-21 20:19:38 +0000 |
commit | 6786ebf4f9c42c619bd18da0ebbcff56369dcc47 (patch) | |
tree | 445a1bbf5455095ab7690981b883b2a8d8869fa0 /ChangeLog | |
parent | 05b027f4c049d1b10341f541f4075ec953e6275b (diff) | |
download | tor-6786ebf4f9c42c619bd18da0ebbcff56369dcc47.tar tor-6786ebf4f9c42c619bd18da0ebbcff56369dcc47.tar.gz |
clean up changelog before release
svn:r11563
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 88 |
1 files changed, 45 insertions, 43 deletions
@@ -3,31 +3,49 @@ Changes in version 0.2.0.7-alpha - 2007-09-21 - Set up moria1 and tor26 as the first v3 directory authorities. See doc/spec/dir-spec.txt for details on the new directory design. - o Major features (bridges): + o Major bugfixes (crashes): + - Fix possible segfaults in functions called from + rend_process_relay_cell(). Bugfix on 0.1.2.x. + + o Major bugfixes (bridges): + - Fix a bug that made servers send a "404 Not found" in response to + attempts to fetch their server descriptor. This caused Tor servers + to take many minutes to establish reachability for their DirPort, + and it totally crippled bridges. Bugfix on 0.2.0.5-alpha. - Make "UpdateBridgesFromAuthority" torrc option work: when bridge users configure that and specify a bridge with an identity fingerprint, now they will lookup the bridge descriptor at the default bridge authority via a one-hop tunnel, but once circuits are established they will switch to a three-hop tunnel for later - connections to the bridge authority. + connections to the bridge authority. Bugfix in 0.2.0.3-alpha. + + o Major bugfixes (hidden services): + - Hidden services were choosing introduction points uniquely by + hexdigest, but when constructing the hidden service descriptor + they merely wrote the (potentially ambiguous) nickname. + - Clients now use the v2 intro format for hidden service + connections: they specify their chosen rendezvous point by identity + digest rather than by (potentially ambiguous) nickname. Both + are bugfixes on 0.1.2.x, and they could speed up hidden service + connections dramatically. Thanks to Karsten Loesing. o Minor features (security): - - As a client, do not believe any server that tells us that any address - maps to an internal address space. + - As a client, do not believe any server that tells us that an + address maps to an internal address space. - Make it possible to enable HashedControlPassword and CookieAuthentication at the same time. o Minor features (guard nodes): - - Tag every guard node in our state file with the version that we believe - added it, or with our own version if we add it. This way, if a user - temporarily runs an old version of Tor and then switches back to a new - one, she doesn't automatically lose her guards. + - Tag every guard node in our state file with the version that + we believe added it, or with our own version if we add it. This way, + if a user temporarily runs an old version of Tor and then switches + back to a new one, she doesn't automatically lose her guards. o Minor features (speed): - When implementing AES counter mode, update only the portions of the counter buffer that need to change, and don't keep separate - network-order and host-order counters when they are the same (i.e., on - big-endian hosts.) + network-order and host-order counters when they are the same (i.e., + on big-endian hosts.) o Minor features (controller): - Accept LF instead of CRLF on controller, since some software has a @@ -39,9 +57,9 @@ Changes in version 0.2.0.7-alpha - 2007-09-21 o Removed features: - Routers no longer include bandwidth-history lines in their descriptors; this information is already available in extra-info - documents, and including it in router descriptors took up 60% (!) of - compressed router descriptor downloads. Completes implementation of - proposal 104. + documents, and including it in router descriptors took up 60% + (!) of compressed router descriptor downloads. Completes + implementation of proposal 104. - Remove the contrib scripts ExerciseServer.py, PathDemo.py, and TorControl.py, as they use the old v0 controller protocol, and are obsoleted by TorFlow anyway. @@ -51,48 +69,32 @@ Changes in version 0.2.0.7-alpha - 2007-09-21 - On OSX, stop warning the user that kqueue support in libevent is "experimental", since it seems to have worked fine for ages. - o Major bugfixes: - - Fix possible segfaults in functions called from - rend_process_relay_cell(). Bugfix on 0.1.2.x. - - Hidden services were choosing introduction points uniquely by - hexdigest, but when constructing the hidden service descriptor - they merely wrote the (potentially ambiguous) nickname. - Bugfix on 0.1.2.x. - - Clients now use the v2 intro format for hidden service - connections: they specify their chosen rendezvous point by identity - digest rather than by (potentially ambiguous) nickname. These - changes could speed up hidden service connections dramatically. - Bugfix on 0.1.2.x. - - Fix a bug that made servers send a "404 Not found" in response to - attempts to fetch their server descriptor. This caused Tor servers - to take many minutes to establish reachability for their DirPort, - and it totally crippled bridges. Bugfix on 0.2.0.5-alpha. - o Minor bugfixes: - When generating information telling us how to extend to a given - router, do not try to include the nickname if it is absent. Fixes - bug 467. Bugfix on 0.2.0.3-alpha - - Fix a user-triggerable segfault in expand_filename(). (There isn't - a way to trigger this remotely.) Bugfix on 0.1.2.x. + router, do not try to include the nickname if it is absent. Fixes + bug 467. Bugfix on 0.2.0.3-alpha. + - Fix a user-triggerable (but not remotely-triggerable) segfault + in expand_filename(). Bugfix on 0.1.2.x. - Fix a memory leak when freeing incomplete requests from DNSPort. - (Found by Niels Provos with valgrind.) Bugfix on 0.2.0.1-alpha + Found by Niels Provos with valgrind. Bugfix on 0.2.0.1-alpha. - Don't try to access (or alter) the state file when running --list-fingerprint or --verify-config or --hash-password. (Resolves - bug 499.) Bugfix on 0.1.2.x + bug 499.) Bugfix on 0.1.2.x. - Servers used to decline to publish their DirPort if their BandwidthRate, RelayBandwidthRate, or MaxAdvertisedBandwidth were below a threshold. Now they only look at BandwidthRate and - RelayBandwidthRate. Bugfix on ???? - - Remove an optimization in the AES counter-mode code that assumed that - the counter never exceeded 2^68. When the counter can be set - arbitrarily as an IV (as it is by Karsten's new hidden services code), - this assumption no longer holds. Bugfix on 0.1.2.x. + RelayBandwidthRate. Bugfix on 0.1.2.x. + - Remove an optimization in the AES counter-mode code that assumed + that the counter never exceeded 2^68. When the counter can be set + arbitrarily as an IV (as it is by Karsten's new hidden services + code), this assumption no longer holds. Bugfix on 0.1.2.x. - Resume listing "AUTHORITY" flag for authorities in network status. Bugfix on 0.2.0.3-alpha; reported by Alex de Joode. o Code simplifications and refactoring: - - Revamp file-writing logic so we don't need to have the entire contents - of a file in memory at once before we write to disk. Tor, meet stdio. + - Revamp file-writing logic so we don't need to have the entire + contents of a file in memory at once before we write to disk. Tor, + meet stdio. - Turn "descriptor store" into a full-fledged type. - Move all NT services code into a separate source file. - Unify all code that computes medians, percentile elements, etc. |