commit 47d2e4f06ec26a79542865d054f01ea09304f59d Author: Nick Mathewson nickm@torproject.org Date: Wed Apr 26 15:16:41 2017 -0400
Reflow blurb. --- ChangeLog | 8 ++++---- ReleaseNotes | 8 ++++---- 2 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/ChangeLog b/ChangeLog index 7efebf1..39ef538 100644 --- a/ChangeLog +++ b/ChangeLog @@ -4,10 +4,10 @@ Changes in version 0.3.0.6 - 2017-04-26 With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been - Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced + Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced the guard selection and replacement algorithm to behave more robustly - in the presence of unreliable networks, and to resist guard-capture - attacks. + in the presence of unreliable networks, and to resist guard- + capture attacks.
This series also includes numerous other small features and bugfixes, along with more groundwork for the upcoming hidden-services revamp. @@ -15,7 +15,7 @@ Changes in version 0.3.0.6 - 2017-04-26 Per our stable release policy, we plan to support the Tor 0.3.0 release series for at least the next nine months, or for three months after the first stable release of the 0.3.1 series: whichever is - longer. If you need a release with long-term support, we recommend + longer. If you need a release with long-term support, we recommend that you stay with the 0.2.9 series.
Below are the changes since 0.3.0.5-rc. For a list of all changes diff --git a/ReleaseNotes b/ReleaseNotes index a36036c..c5ccfbe 100644 --- a/ReleaseNotes +++ b/ReleaseNotes @@ -9,10 +9,10 @@ Changes in version 0.3.0.6 - 2017-04-26 With the 0.3.0 series, clients and relays now use Ed25519 keys to authenticate their link connections to relays, rather than the old RSA1024 keys that they used before. (Circuit crypto has been - Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced + Curve25519-authenticated since 0.2.4.8-alpha.) We have also replaced the guard selection and replacement algorithm to behave more robustly - in the presence of unreliable networks, and to resist guard-capture - attacks. + in the presence of unreliable networks, and to resist guard- + capture attacks.
This series also includes numerous other small features and bugfixes, along with more groundwork for the upcoming hidden-services revamp. @@ -20,7 +20,7 @@ Changes in version 0.3.0.6 - 2017-04-26 Per our stable release policy, we plan to support the Tor 0.3.0 release series for at least the next nine months, or for three months after the first stable release of the 0.3.1 series: whichever is - longer. If you need a release with long-term support, we recommend + longer. If you need a release with long-term support, we recommend that you stay with the 0.2.9 series.
Below are the changes since 0.2.9.10. For a list of only the changes
tor-commits@lists.torproject.org