[or-cvs] r10959: clean up the changelog before release (tor/trunk)

arma at seul.org arma at seul.org
Sun Jul 29 01:07:35 UTC 2007


Author: arma
Date: 2007-07-28 21:07:35 -0400 (Sat, 28 Jul 2007)
New Revision: 10959

Modified:
   tor/trunk/ChangeLog
Log:
clean up the changelog before release


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-07-29 00:05:47 UTC (rev 10958)
+++ tor/trunk/ChangeLog	2007-07-29 01:07:35 UTC (rev 10959)
@@ -1,23 +1,23 @@
 Changes in version 0.2.0.3-alpha - 2007-??-??
-  o Removed features:
-    - Stop allowing address masks that do not correspond to bit prefixes.
-      We have warned about these for a really long time; now it's time
-      to reject them. (Patch from croup.)
-
-  o Minor features:
-    - Create listener connections before we setuid to the configured User and
-      Group.  This way, you can choose port values under 1024, start Tor as
-      root, and have Tor bind those ports before it changes to another UID.
-    - tor-gencert creates all files as readable to the file creator only, and
-      write-protects the authority identity key.
+  o Major features:
+    - Create listener connections before we setuid to the configured
+      User and Group. Now you can choose port values under 1024, start
+      Tor as root, and have Tor bind those ports before it changes to
+      another UID.
     - New ConstrainedSockets option to set SO_SNDBUF and SO_RCVBUF on TCP
-      sockets.  (Patch from coderman.)
-    - When dumping memory usage, list bytes used in buffer memory free-lists.
+      sockets. Hopefully useful for Tor servers running on "vserver"
+      accounts. (Patch from coderman.)
 
-  o Minor features (directory authority):
-    - Fail quickly and (relatively) harmlessly if we generate a network
-      status document that is somehow malformed.
+  o Security fixes:
+    - Directory authorities now call routers Fast if their bandwidth is
+      at least 100KB/s, and consider their bandwidth adequate to be a
+      Guard if it is at least 250KB/s, no matter the medians. This fix
+      complements proposal 107. [Bugfix on 0.1.2.x]
 
+  o Major bugfixes (directory):
+    - Rewrite directory tokenization code to never run off the end of
+      a string. Fixes bug 455. Patch from croup. [Bugfix on 0.1.2.x]
+
   o Minor features (controller):
     - Add a SOURCE_ADDR field to STREAM NEW events so that controllers can
       match requests to applications. (Patch from Robert Hogan.)
@@ -26,19 +26,27 @@
     - Add a RESOLVE command to launch hostname lookups. (Original patch
       from Robert Hogan.)
     - Add GETINFO status/enough-dir-info to let controllers tell whether
-      Tor has downloaded sufficient directory information. (Patch from Tup.)
+      Tor has downloaded sufficient directory information. (Patch
+      from Tup.)
     - You can now use the ControlSocket option to tell Tor to listen for
-      controller connections on Unix domain sockets on systems that support
-      them.  (Patch from Peter Palfrader.)
-    - STREAM NEW events are generated for DNSPort requests and for tunneled
-      directory connections. (Patch from Robert Hogan.)
-    - New GETINFO address-mappings/* command to get address mappings with
-      expiry information.  addr-mappings/* is now deprecated.
+      controller connections on Unix domain sockets on systems that
+      support them. (Patch from Peter Palfrader.)
+    - STREAM NEW events are generated for DNSPort requests and for
+      tunneled directory connections. (Patch from Robert Hogan.)
+    - New "GETINFO address-mappings/*" command to get address mappings
+      with expiry information. "addr-mappings/*" is now deprecated.
       (Patch from Tup.)
 
-  o Minor features (IPv6):
+  o Minor features (misc):
     - Merge in some (as-yet-unused) IPv6 address manipulation code. (Patch
       from croup.)
+    - The tor-gencert tool now creates all files as readable to the file
+      creator only, and write-protects the authority identity key.
+    - When dumping memory usage, list bytes used in buffer memory
+      free-lists.
+    - Directory authorities now fail quickly and (relatively) harmlessly
+      if they generate a network status document that is somehow
+      malformed.
 
   o Performance improvements:
     - Be more aggressive with freeing buffer RAM or putting it on the
@@ -46,29 +54,18 @@
     - If exit bandwidth ever exceeds one third of total bandwidth, then
       use the correct formula to weight exit nodes when choosing paths.
       (Based on patch from Mike Perry.)
-
-  o Performance improvements (win32):
     - Use Critical Sections rather than Mutexes for synchronizing threads
       on win32; Mutexes are heavier-weight, and designed for synchronizing
       between processes.
 
-  o Deprecated features:
+  o Deprecated and removed features:
     - RedirectExits is now deprecated.
+    - Stop allowing address masks that do not correspond to bit prefixes.
+      We have warned about these for a really long time; now it's time
+      to reject them. (Patch from croup.)
 
-  o Security fixes:
-    - Directory authorities now call routers Fast if their bandwidth is
-      at least 100KB/s, and consider their bandwidth adequate to be a
-      Guard if it is at least 250KB/s. This fix complements proposal
-      107. [Bugfix on 0.1.2.x]
-
-  o Major bugfixes (directory):
-    - Fix a crash bug when router descriptors end at a 4096-byte boundary
-      on disk.  [Bugfix on 0.1.2.x]
-    - Rewrite directory tokenization code to never run off the end of
-      a string.  Fixes bug 455. Patch from croup. [Bugfix on 0.1.2.x]
-
   o Minor bugfixes (directory):
-    - Fix another crash bug related to extra-info caching.  (Bug found by
+    - Fix another crash bug related to extra-info caching. (Bug found by
       Peter Palfrader.) [Bugfix on 0.2.0.2-alpha]
     - Directories no longer return a "304 not modified" when they don't
       have the networkstatus the client asked for. Also fix a memory
@@ -82,21 +79,22 @@
     - Fix a crash when DNSPort is set more than once. (Patch from Robert
       Hogan.) [Bugfix on 0.2.0.2-alpha]
     - Add DNSPort connections to the global connection list, so that we
-      can time them out correctly. (Bug found by mwenge) [Bugfix on
-      0.2.0.2-alpha]
+      can time them out correctly. (Bug found by Robert Hogan.) [Bugfix
+      on 0.2.0.2-alpha]
     - Fix a dangling reference that could lead to a crash when DNSPort is
-      changed or closed (Patch from Robert Hogan.) [Bugfix on 0.2.0.2-alpha]
+      changed or closed (Patch from Robert Hogan.) [Bugfix on
+      0.2.0.2-alpha]
 
-  o Minor bugfixes (controller)
-    - Provide DNS expiry times in GMT, not in local time.  For backward
+  o Minor bugfixes (controller):
+    - Provide DNS expiry times in GMT, not in local time. For backward
       compatibility, ADDRMAP events only provide GMT expiry in an extended
-      field.  "GETINFO address-mappings" always does the right thing.
+      field. "GETINFO address-mappings" always does the right thing.
     - Use CRLF line endings properly in NS events.
 
   o Minor bugfixes (misc):
     - Choose perfectly fairly among routers when choosing by bandwidth and
-      weighting by fraction of bandwidth provided by exits.  Previously,
-      we would choose with only approximate fairness, and correct ourselves
+      weighting by fraction of bandwidth provided by exits. Previously, we
+      would choose with only approximate fairness, and correct ourselves
       if we ran off the end of the list. [Bugfix on 0.1.2.x]
 
 



More information about the tor-commits mailing list