aboutsummaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2008-02-26 03:11:37 +0000
committerRoger Dingledine <arma@torproject.org>2008-02-26 03:11:37 +0000
commitf24b7a3f8f55bf09f3db8ae10bc38573f1181df2 (patch)
treef99a5c0e16d068424f5ab35bffce35e99b9de86f /ChangeLog
parentfa24596e8e5249a78f6bcb7693a94151c501ecf1 (diff)
downloadtor-f24b7a3f8f55bf09f3db8ae10bc38573f1181df2.tar
tor-f24b7a3f8f55bf09f3db8ae10bc38573f1181df2.tar.gz
a blurb for 0.2.0.20-rc
svn:r13732
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog18
1 files changed, 14 insertions, 4 deletions
diff --git a/ChangeLog b/ChangeLog
index fb02f1bbc..b2b7324b6 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,4 +1,14 @@
+Changes in version 0.2.0.21-rc - 2008-0?-??
+
+
Changes in version 0.2.0.20-rc - 2008-02-24
+ Tor 0.2.0.20-rc is the first release candidate for the 0.2.0 series. It
+ makes more progress towards normalizing Tor's TLS handshake, makes
+ hidden services work better again, helps relays bootstrap if they don't
+ know their IP address, adds optional support for linking in openbsd's
+ allocator or tcmalloc, allows really fast relays to scale past 15000
+ sockets, and fixes a bunch of minor bugs reported by Veracode.
+
o Major features:
- Enable the revised TLS handshake based on the one designed by
Steven Murdoch in proposal 124, as revised in proposal 130. It
@@ -50,7 +60,7 @@ Changes in version 0.2.0.20-rc - 2008-02-24
with Tor's memory allocation patterns. Pass
--enable-openbsd-malloc to get the replacement malloc code.
- Add a --with-tcmalloc option to the configure script to link
- against tcmalloc (if present). Does not yet search for
+ against tcmalloc (if present). Does not yet search for
non-system include paths.
- Stop imposing an arbitrary maximum on the number of file descriptors
used for busy servers. Bug reported by Olaf Selke; patch from
@@ -67,7 +77,7 @@ Changes in version 0.2.0.20-rc - 2008-02-24
o Minor bugfixes (memory leaks and code problems):
- We were leaking a file descriptor if Tor started with a zero-length
cached-descriptors file. Patch by freddy77; bugfix on 0.1.2.
- - Detect size overflow in zlib code.
+ - Detect size overflow in zlib code. Reported by Dan Kaminsky.
- We were comparing the raw BridgePassword entry with a base64'ed
version of it, when handling a "/tor/networkstatus-bridges"
directory request. Now compare correctly. Noticed by Veracode.
@@ -75,7 +85,7 @@ Changes in version 0.2.0.20-rc - 2008-02-24
Should fix bug 537.
- Alter the code that tries to recover from unhandled write
errors, to not try to flush onto a socket that's given us
- unhandled errors. Bugfix on 0.1.2.x.
+ unhandled errors. Bugfix on 0.1.2.x.
- Make Unix controlsockets work correctly on OpenBSD. Patch from
tup. Bugfix on 0.2.0.3-alpha.
@@ -88,7 +98,7 @@ Changes in version 0.2.0.20-rc - 2008-02-24
address if the connection appears to be coming from the same /24
network; it was producing too many wrong guesses.
- Make the new hidden service code respect the SafeLogging setting.
- Bugfix on 0.2.0.x. Patch from Karsten.
+ Bugfix on 0.2.0.x. Patch from Karsten.
- When starting as an authority, do not overwrite all certificates
cached from other authorities. Bugfix on 0.2.0.x. Fixes bug 606.
- If we're trying to flush the last bytes on a connection (for