aboutsummaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2014-01-20 15:41:06 -0500
committerNick Mathewson <nickm@torproject.org>2014-01-20 15:41:06 -0500
commit694562815fd5fac55a7b1fb7a2cc538a7fb2328a (patch)
tree450056b254700121439f43adfe91d3db88dddc34 /ChangeLog
parent9be105f94badd2a9ab1674b3c2b427df33426ecd (diff)
downloadtor-694562815fd5fac55a7b1fb7a2cc538a7fb2328a.tar
tor-694562815fd5fac55a7b1fb7a2cc538a7fb2328a.tar.gz
Move all merged-in-0.2.4.18-rc items into 0.2.5.2-alpha changelog section.
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog86
1 files changed, 86 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index 0863b61c4..c9ed9fdc3 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,89 @@
+Changes in version 0.2.5.2 - 2013-01-??
+
+ALSO IN 0.2.4.18-rc
+ o Major bugfixes:
+ - Do not apply connection_consider_empty_read/write_buckets to
+ non-rate-limited connections.
+ o Documentation:
+ - Add anchors to the manpage so we can link to the documentation for
+ specific options. Resolves ticket 9866.
+ o Documentation fixes:
+ - Clarify the usage and risks of ContactInfo. Resolves ticket 9854.
+
+ o Documentation:
+ - Replace remaining references to DirServer in man page and
+ log entries. Resolves ticket 10124.
+ o Minor bugfixes:
+ - Fix an assertion failure that would occur when disabling the
+ ORPort setting on a running Tor process while accounting was
+ enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.
+ o Minor features:
+ - Improve the circuit queue out-of-memory handler. Previously, when
+ we ran low on memory, we'd close whichever circuits had the most
+ queued cells. Now, we close those that have the *oldest* queued
+ cells, on the theory that those are most responsible for us
+ running low on memory. Based on analysis from a forthcoming paper
+ by Jansen, Tschorsch, Johnson, and Scheuermann. Fixes bug 9093.
+ o Minor bugfixes:
+ - Correctly log long IPv6 exit policy, instead of truncating them
+ or reporting an error. Fixes bug 9596; bugfix on 0.2.4.7-alpha.
+ o Minor bugfixes:
+ - Fix a small memory leak on exit. (We weren't freeing directory
+ authority certificate download statuses.) Fixes bug 9644; bugfix
+ on 0.2.4.13-alpha.
+ o Minor bugfixes (performance, fingerprinting):
+ - Our default TLS ecdhe groups were backwards: we meant to be using
+ P224 for relays (for performance win) and P256 for bridges (since
+ it is more common in the wild). Instead we had it backwards. After
+ reconsideration, we decided that the default should be P256 on all
+ hosts, since its security is probably better, and since P224 is
+ reportedly used quite little in the wild. Found by "skruffy" on
+ IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
+ o Minor bugfixes:
+ - When closing a channel that has already been open, do not close
+ pending circuits that were waiting to connect to the same relay.
+ Fixes bug 9880; bugfix on 0.2.5.1-alpha. Thanks to skruffy for
+ finding this bug. (Bug was merged to 0.2.4 branch but not released
+ in any 0.2.4 version)
+ o Minor bugfixes:
+ - When examining list of network interfaces to find our address, do
+ not consider non-running or disabled network interfaces. Fixes bug
+ 9904; bugfix on 0.2.3.11-alpha. Patch from "hantwister".
+ o Minor features:
+ - Generate bootstrapping status update events correctly for fetching
+ microdescriptors. Fixes bug 9927.
+ o Minor bugfixes:
+ - Avoid an off-by-one error when checking buffer boundaries when
+ formatting the exit status of a pluggable transport helper.
+ This is probably not an exploitable bug, but better safe than
+ sorry. Fixes bug 9928; bugfix on 0.2.3.18-rc. Bug found by
+ Pedro Ribeiro.
+ o Minor bugfixes:
+ - If the guard we choose first doesn't answer, we would try the
+ second guard, but once we connected to the second guard we would
+ abandon it and retry the first one, slowing down bootstrapping.
+ The fix is to treat all our initially chosen guards as acceptable
+ to use. Fixes bug 9946; bugfix on 0.1.1.11-alpha.
+
+ o Major bugfixes:
+ - Stop trying to fetch all our directory information from our first
+ guard. Discovered while fixing bug 9946; bugfix on 0.2.4.8-alpha.
+
+ o Minor features:
+ - Update to the October 2 2013 Maxmind GeoLite Country database.
+==============================
+ALSO IN 0.2.4.19:
+
+
+==============================
+ALSO IN 0.2.4.20:
+
+
+
+
+==============================
+
+
Changes in version 0.2.4.20 - 2013-12-22
Tor 0.2.4.20 fixes potentially poor random number generation for users
who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their