[or-cvs] r12421: start to muck with the 0.2.0.10-alpha changelog (tor/trunk)

arma at seul.org arma at seul.org
Wed Nov 7 19:38:08 UTC 2007


Author: arma
Date: 2007-11-07 14:38:08 -0500 (Wed, 07 Nov 2007)
New Revision: 12421

Modified:
   tor/trunk/ChangeLog
Log:
start to muck with the 0.2.0.10-alpha changelog


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-11-07 19:10:21 UTC (rev 12420)
+++ tor/trunk/ChangeLog	2007-11-07 19:38:08 UTC (rev 12421)
@@ -1,14 +1,12 @@
-Changes in version 0.2.0.10-alpha - 2007-11-0?
+Changes in version 0.2.0.10-alpha - 2007-11-07
   o Major features:
-    - Separate "SOCKS_COMMAND_CONNECT_DIR" into two flags in
-      edge_connection_t: want_onehop if it must attach to a circuit with
-      only one hop (e.g. for the current tunnelled connections that use
-      begin_dir), and use_begindir if we mean to use a BEGIN_DIR relay
-      command to establish the stream rather than the normal BEGIN. Now
-      we can make anonymized begin_dir connections for (e.g.) more secure
-      hidden service posting and fetching.
-    - Code to implement new hidden service descriptor format (from Karsten
-      Loesing).
+    - Allow tunnelled directory connections to ask for an encrypted
+      "begin_dir" connection or an anonymized "uses a full Tor circuit"
+      connection independently. Now we can make anonymized begin_dir
+      connections for (e.g.) more secure hidden service posting and
+      fetching.
+    - More progress on proposal 114: code from Karsten Loesing to
+      implement new hidden service descriptor format.
     - Raise the default BandwidthRate/BandwidthBurst to 5MB/10MB, to
       accommodate the growing number of servers that use the default
       and are reaching it.
@@ -17,15 +15,20 @@
     - Stop servers from crashing if they set a Family option (or
       maybe in other situations too). Bugfix on 0.2.0.9-alpha; reported
       by Fabian Keil.
+    - Make bridge users work again -- the move to v3 directories in
+      0.2.0.9-alpha had introduced a number of bugs that made bridges
+      no longer work for clients.
     - When the clock jumps forward a lot, do not allow the bandwidth
-      buckets to become negative.  Bugfix on 0.1.2.x; fixes Bug 544.
+      buckets to become negative. Bugfix on 0.1.2.x; fixes bug 544.
+
+  o Major bugfixes (v3 dir, bugfixes on 0.2.0.9-alpha):
     - When the consensus lists a router descriptor that we previously were
       mirroring, but that we considered non-canonical, reload the
-      descriptor as canonical.
-
-  o Major bugfixes (v3 dir, bugfixes on 0.2.0.9-alpha):
+      descriptor as canonical. This fixes bug 543 where Tor servers
+      would start complaining after a few days that they don't have
+      enough directory information to build a circuit.
     - Consider replacing the current consensus when certificates arrive
-      that make the pending consensus valid.  Previously, we were only
+      that make the pending consensus valid. Previously, we were only
       considering replacement when the new certs _didn't_ help.
     - Fix an assert error on startup if we didn't already have the
       consensus and certs cached in our datadirectory: we were caching
@@ -36,7 +39,7 @@
       requests for all of them.
 
   o New requirements:
-    - Drop support for OpenSSL version 0.9.6.  Just about nobody was using
+    - Drop support for OpenSSL version 0.9.6. Just about nobody was using
       it, it had no AES, and it hasn't seen any security patches since
       2004.
 



More information about the tor-commits mailing list