[or-cvs] r10986: clean up the changelog (tor/trunk)

arma at seul.org arma at seul.org
Mon Jul 30 12:13:33 UTC 2007


Author: arma
Date: 2007-07-30 08:13:32 -0400 (Mon, 30 Jul 2007)
New Revision: 10986

Modified:
   tor/trunk/ChangeLog
Log:
clean up the changelog


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-07-30 08:43:02 UTC (rev 10985)
+++ tor/trunk/ChangeLog	2007-07-30 12:13:32 UTC (rev 10986)
@@ -1,20 +1,26 @@
 Changes in version 0.2.0.3-alpha - 2007-07-29
   o Major features:
+    - The first pieces of our "bridge" design for blocking-resistance
+      are implemented. People can run bridge directory authorities;
+      people can run bridges; and people can configure their Tor clients
+      with a set of bridges to use as the first hop into the Tor network.
+      See http://archives for details.
     - Create listener connections before we setuid to the configured
-      User and Group. Now you can choose port values under 1024, start
-      Tor as root, and have Tor bind those ports before it changes to
-      another UID.
-    - New ConstrainedSockets option to set SO_SNDBUF and SO_RCVBUF on TCP
-      sockets. Hopefully useful for Tor servers running on "vserver"
-      accounts. (Patch from coderman.)
+      User and Group. Now non-Windows users can choose port values
+      under 1024, start Tor as root, and have Tor bind those ports
+      before it changes to another UID. (Windows users could already
+      pick these ports.)
+    - Added a new ConstrainedSockets config option to set SO_SNDBUF and
+      SO_RCVBUF on TCP sockets. Hopefully useful for Tor servers running
+      on "vserver" accounts. (Patch from coderman.)
     - Be even more aggressive about separating local traffic from relayed
       traffic when RelayBandwidthRate is set. (Refines proposal 111.)
 
   o Major features (experimental):
-    - First cut of code for directory authorities to vote on a common
-      network status document rather than each publishing their own
-      opinion.  This code needs more testing and more corner-case handling
-      before it's ready for use.
+    - First cut of code for "v3 dir voting": directory authorities will
+      vote on a common network status document rather than each publishing
+      their own opinion. This code needs more testing and more corner-case
+      handling before it's ready for use.
 
   o Security fixes:
     - Directory authorities now call routers Fast if their bandwidth is
@@ -22,12 +28,13 @@
       Guard if it is at least 250KB/s, no matter the medians. This fix
       complements proposal 107. [Bugfix on 0.1.2.x]
     - Directory authorities now never mark more than 3 servers per IP as
-      Valid and Running.  (Implements proposal 109, by Kevin Bauer and
+      Valid and Running. (Implements proposal 109, by Kevin Bauer and
       Damon McCoy.)
-    - Minor change to organizationName and commonName generation procedures
-      in certificates, to invalidate some earlier censorware approaches.
-      This is not a long-term solution, but applying it will give us a bit of
-      time to look into the epidemiology of countermeasures as they spread.
+    - Minor change to organizationName and commonName generation
+      procedures in TLS certificates during Tor handshakes, to invalidate
+      some earlier censorware approaches. This is not a long-term
+      solution, but applying it will give us a bit of time to look into
+      the epidemiology of countermeasures as they spread.
 
   o Major bugfixes (directory):
     - Rewrite directory tokenization code to never run off the end of
@@ -55,8 +62,9 @@
   o Minor features (misc):
     - Merge in some (as-yet-unused) IPv6 address manipulation code. (Patch
       from croup.)
-    - The tor-gencert tool now creates all files as readable to the file
-      creator only, and write-protects the authority identity key.
+    - The tor-gencert tool for v3 directory authorities now creates all
+      files as readable to the file creator only, and write-protects
+      the authority identity key.
     - When dumping memory usage, list bytes used in buffer memory
       free-lists.
     - When running with dmalloc, dump more stats on hup and on exit.
@@ -64,12 +72,18 @@
       if they generate a network status document that is somehow
       malformed.
 
-  o Performance improvements:
-    - Be more aggressive with freeing buffer RAM or putting it on the
-      free lists.
+  o Traffic load balancing improvements:
     - If exit bandwidth ever exceeds one third of total bandwidth, then
       use the correct formula to weight exit nodes when choosing paths.
       (Based on patch from Mike Perry.)
+    - Choose perfectly fairly among routers when choosing by bandwidth and
+      weighting by fraction of bandwidth provided by exits. Previously, we
+      would choose with only approximate fairness, and correct ourselves
+      if we ran off the end of the list. [Bugfix on 0.1.2.x]
+
+  o Performance improvements:
+    - Be more aggressive with freeing buffer RAM or putting it on the
+      memory free lists.
     - Use Critical Sections rather than Mutexes for synchronizing threads
       on win32; Mutexes are heavier-weight, and designed for synchronizing
       between processes.
@@ -106,18 +120,12 @@
       compatibility, ADDRMAP events only provide GMT expiry in an extended
       field. "GETINFO address-mappings" always does the right thing.
     - Use CRLF line endings properly in NS events.
-    - Terminate multi-line control events properly. (Original patch from tup.)
-      [Bugfix on 0.1.2.x-alpha]
-    - Do not include spaces in SOURCE_ADDR fields in STREAM events. Resolves
-      bug 472.  [Bugfix on 0.2.0.x-alpha]
+    - Terminate multi-line control events properly. (Original patch
+      from tup.) [Bugfix on 0.1.2.x-alpha]
+    - Do not include spaces in SOURCE_ADDR fields in STREAM
+      events. Resolves bug 472. [Bugfix on 0.2.0.x-alpha]
 
-  o Minor bugfixes (misc):
-    - Choose perfectly fairly among routers when choosing by bandwidth and
-      weighting by fraction of bandwidth provided by exits. Previously, we
-      would choose with only approximate fairness, and correct ourselves
-      if we ran off the end of the list. [Bugfix on 0.1.2.x]
 
-
 Changes in version 0.1.2.15 - 2007-07-17
   o Major bugfixes (compilation):
     - Fix compile on FreeBSD/NetBSD/OpenBSD. Oops.



More information about the tor-commits mailing list