[or-cvs] cleanup and additions to 0.1.1.9-alpha changelog

arma at seul.org arma at seul.org
Sun Nov 13 05:27:02 UTC 2005


Update of /home2/or/cvsroot/tor
In directory moria:/home/arma/work/onion/cvs/tor

Modified Files:
	ChangeLog 
Log Message:
cleanup and additions to 0.1.1.9-alpha changelog


Index: ChangeLog
===================================================================
RCS file: /home2/or/cvsroot/tor/ChangeLog,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -d -r1.118 -r1.119
--- ChangeLog	1 Nov 2005 06:49:24 -0000	1.118
+++ ChangeLog	13 Nov 2005 05:26:59 -0000	1.119
@@ -1,8 +1,8 @@
 Changes in version 0.1.1.9-alpha - 2005-11-01
   o Usability improvements:
     - Start calling it FooListenAddress rather than FooBindAddress,
-      since none of our users know what it means to bind an address or
-      port. Warn if you use the old name in your config.
+      since none of our users know what it means to bind an address
+      or port.
     - Reduce clutter in server logs. We're going to try to make
       them actually usable now. New config option ProtocolWarnings that
       lets you hear about how _other Tors_ are breaking the protocol. Off
@@ -13,15 +13,12 @@
     - Make directory servers return better http 404 error messages
       instead of a generic "Servers unavailable".
     - Check for even more Windows version flags when writing the platform
-      string for servers, and note any we do not recognize.
-    - Clean up all the OpenSSL memory when exiting, so we can detect
+      string in server descriptors, and note any we don't recognize.
+    - Clean up more of the OpenSSL memory when exiting, so we can detect
       memory leaks better.
     - Make directory authorities be non-versioning, non-naming by
       default. Now we can add new directory servers without requiring
       their operators to pay close attention.
-    - Start making directory caches retain old routerinfos, so soon
-      clients can start asking by digest of descriptor rather than by
-      fingerprint of server.
 
   o Performance improvements:
     - Directory servers now silently throw away new descriptors that
@@ -39,8 +36,13 @@
     - Make circ->onionskin a pointer, not a static array. moria2 was using
       125000 circuit_t's after it had been up for a few weeks, which
       translates to 20+ megs of wasted space.
+    - The private half of our EDH handshake keys are now chosen out
+      of 320 bits, not 1024 bits. (Suggested by Ian Goldberg.)
 
   o Security improvements:
+    - Start making directory caches retain old routerinfos, so soon
+      clients can start asking by digest of descriptor rather than by
+      fingerprint of server.
     - Add half our entropy from RAND_poll in OpenSSL.  This knows how
       to use egd (if present), openbsd weirdness (if present), vms/os2
       weirdness (if we ever port there), and more in the future.
@@ -49,13 +51,16 @@
     - Do round-robin writes of at most 16 kB per write. This might be
       more fair on loaded Tor servers, and it might resolve our Windows
       crash bug. It might also slow things down.
+    - When we were cannibalizing a circuit with a particular exit
+      node in mind, we weren't checking to see if that exit node was
+      already present earlier in the circuit. Oops.
     - When a Tor server's IP changes (e.g. from a dyndns address),
       upload a new descriptor so clients will learn too.
     - Really busy servers were keeping enough circuits open on stable
       connections that they were wrapping around the circuit_id
       space. (It's only two bytes.) This exposed a bug where we would
       feel free to reuse a circuit_id even if it still exists but has
-      been marked for close. Try to fix this bug.
+      been marked for close. Try to fix this bug. Some bug remains.
     - If we would close a stream early (e.g. it asks for a .exit that
       we know would refuse it) but the LeaveStreamsUnattached config
       option is set by the controller, then don't close it.
@@ -69,8 +74,8 @@
       we do.
     - When providing content-type application/octet-stream for
       server descriptors using .z, we were leaving out the
-      content-encoding header. Oops. (Everything tolerated this just fine,
-      but that doesn't mean we need to be part of the problem.)
+      content-encoding header. Oops. (Everything tolerated this just
+      fine, but that doesn't mean we need to be part of the problem.)
     - Fix a potential seg fault in getconf and getinfo using version 1
       of the controller protocol.
     - Avoid crash: do not check whether DirPort is reachable when we



More information about the tor-commits mailing list