commit c111adb5fe757ea9baf9aaca151af7e8cd5e5808 Author: Roger Dingledine arma@torproject.org Date: Fri Apr 8 16:30:39 2011 -0400
add a blurb for 0.2.2.24-alpha --- ChangeLog | 21 +++++++++++++-------- 1 files changed, 13 insertions(+), 8 deletions(-)
diff --git a/ChangeLog b/ChangeLog index 8d47e3d..9c9ccc3 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,12 +1,10 @@ -Changes in version 0.2.2.24-alpha - 2011-04-0? +Changes in version 0.2.2.24-alpha - 2011-04-08 + Tor 0.2.2.24-alpha fixes a variety of bugs, including a big bug that + prevented Tor clients from effectively using "multihomed" bridges, + that is, bridges that listen on multiple ports or IP addresses so users + can continue to use some of their addresses even if others get blocked. + o Major bugfixes: - - Directory authorities now use data collected from their own - uptime observations when choosing whether to assign the HSDir flag - to relays, instead of trusting the uptime value the relay reports in - its descriptor. This change helps prevent an attack where a small - set of nodes with frequently-changing identity keys can blackhole - a hidden service. (Only authorities need upgrade; others will be - fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709. - Fix a bug where bridge users who configure the non-canonical address of a bridge automatically switch to its canonical address. If a bridge listens at more than one address, it should be @@ -18,6 +16,13 @@ Changes in version 0.2.2.24-alpha - 2011-04-0? to use bridge A if it's still reachable. While this behavior is a feature if your goal is connectivity, in some scenarios it's a dangerous bug. Bugfix on Tor 0.2.0.1-alpha; fixes bug 2511. + - Directory authorities now use data collected from their own + uptime observations when choosing whether to assign the HSDir flag + to relays, instead of trusting the uptime value the relay reports in + its descriptor. This change helps prevent an attack where a small + set of nodes with frequently-changing identity keys can blackhole + a hidden service. (Only authorities need upgrade; others will be + fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709.
o Minor bugfixes: - When we restart our relay, we might get a successful connection