[or-cvs] r8909: forward-port the 0.1.1.25 changelog (tor/trunk)

arma at seul.org arma at seul.org
Mon Nov 6 03:51:57 UTC 2006


Author: arma
Date: 2006-11-05 22:51:57 -0500 (Sun, 05 Nov 2006)
New Revision: 8909

Modified:
   tor/trunk/ChangeLog
Log:
forward-port the 0.1.1.25 changelog


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2006-11-06 03:36:43 UTC (rev 8908)
+++ tor/trunk/ChangeLog	2006-11-06 03:51:57 UTC (rev 8909)
@@ -396,6 +396,39 @@
       goes) have predicted what we plan to respond to them.
 
 
+Changes in version 0.1.1.25 - 2006-11-04
+  o Major bugfixes:
+    - When a client asks us to resolve (rather than connect to)
+      an address, and we have a cached answer, give them the cached
+      answer. Previously, we would give them no answer at all.
+    - We were building exactly the wrong circuits when we predict
+      hidden service requirements, meaning Tor would have to build all
+      its circuits on demand.
+    - If none of our live entry guards have a high uptime, but we
+      require a guard with a high uptime, try adding a new guard before
+      we give up on the requirement. This patch should make long-lived
+      connections more stable on average.
+    - When testing reachability of our DirPort, don't launch new
+      tests when there's already one in progress -- unreachable
+      servers were stacking up dozens of testing streams.
+
+  o Security bugfixes:
+    - When the user sends a NEWNYM signal, clear the client-side DNS
+      cache too. Otherwise we continue to act on previous information.
+
+  o Minor bugfixes:
+    - Avoid a memory corruption bug when creating a hash table for
+      the first time.
+    - Avoid possibility of controller-triggered crash when misusing
+      certain commands from a v0 controller on platforms that do not
+      handle printf("%s",NULL) gracefully.
+    - Avoid infinite loop on unexpected controller input.
+    - Don't log spurious warnings when we see a circuit close reason we
+      don't recognize; it's probably just from a newer version of Tor.
+    - Add Vidalia to the OS X uninstaller script, so when we uninstall
+      Tor/Privoxy we also uninstall Vidalia.
+
+
 Changes in version 0.1.1.24 - 2006-09-29
   o Major bugfixes:
     - Allow really slow clients to not hang up five minutes into their



More information about the tor-commits mailing list