[or-cvs] r12093: put the release blurbs in the changelog file, so they can be (tor/trunk)

arma at seul.org arma at seul.org
Mon Oct 22 08:52:01 UTC 2007


Author: arma
Date: 2007-10-22 04:52:01 -0400 (Mon, 22 Oct 2007)
New Revision: 12093

Modified:
   tor/trunk/ChangeLog
Log:
put the release blurbs in the changelog file, so they can be
kept for posterity, and so we can unclutter the download page.


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-10-22 07:30:35 UTC (rev 12092)
+++ tor/trunk/ChangeLog	2007-10-22 08:52:01 UTC (rev 12093)
@@ -120,6 +120,12 @@
 
 
 Changes in version 0.2.0.8-alpha - 2007-10-12
+  This eighth development snapshot fixes a crash bug that's been bothering
+  us since February 2007, lets bridge authorities store a list of bridge
+  descriptors they've seen, gets v3 directory voting closer to working,
+  starts caching v3 directory consensus documents on directory mirrors,
+  and fixes a variety of smaller issues including some minor memory leaks.
+
   o Major features (router descriptor cache):
     - Store routers in a file called cached-descriptors instead of in
       cached-routers. Initialize cached-descriptors from cached-routers
@@ -258,6 +264,10 @@
 
 
 Changes in version 0.2.0.7-alpha - 2007-09-21
+  This seventh development snapshot makes bridges work again, makes bridge
+  authorities work for the first time, fixes two huge performance flaws
+  in hidden services, and fixes a variety of minor issues.
+
   o New directory authorities:
     - Set up moria1 and tor26 as the first v3 directory authorities. See
       doc/spec/dir-spec.txt for details on the new directory design.
@@ -361,6 +371,16 @@
 
 
 Changes in version 0.1.2.17 - 2007-08-30
+  Tor 0.1.2.17 features a new Vidalia version in the Windows and OS
+  X bundles. Vidalia 0.0.14 makes authentication required for the
+  ControlPort in the default configuration, which addresses important
+  security risks. Everybody who uses Vidalia (or another controller)
+  should upgrade.
+
+  In addition, this Tor update fixes major load balancing problems with
+  path selection, which should speed things up a lot once many people
+  have upgraded.
+
   o Major bugfixes (security):
     - We removed support for the old (v0) control protocol. It has been
       deprecated since Tor 0.1.1.1-alpha, and keeping it secure has
@@ -422,6 +442,17 @@
 
 
 Changes in version 0.2.0.6-alpha - 2007-08-26
+  This sixth development snapshot features a new Vidalia version in the
+  Windows and OS X bundles. Vidalia 0.0.14 makes authentication required for
+  the ControlPort in the default configuration, which addresses important
+  security risks.
+
+  In addition, this snapshot fixes major load balancing problems
+  with path selection, which should speed things up a lot once many
+  people have upgraded. The directory authorities also use a new
+  mean-time-between-failure approach to tracking which servers are stable,
+  rather than just looking at the most recent uptime.
+
   o New directory authorities:
     - Set up Tonga as the default bridge directory authority.
 
@@ -475,6 +506,12 @@
 
 
 Changes in version 0.2.0.5-alpha - 2007-08-19
+  This fifth development snapshot fixes compilation on Windows again;
+  fixes an obnoxious client-side bug that slowed things down and put
+  extra load on the network; gets us closer to using the v3 directory
+  voting scheme; makes it easier for Tor controllers to use cookie-based
+  authentication; and fixes a variety of other bugs.
+
   o Removed features:
     - Version 1 directories are no longer generated in full. Instead,
       authorities generate and serve "stub" v1 directories that list
@@ -553,12 +590,22 @@
 
 
 Changes in version 0.1.2.16 - 2007-08-01
+  Tor 0.1.2.16 fixes a critical security vulnerability that allows a
+  remote attacker in certain situations to rewrite the user's torrc
+  configuration file. This can completely compromise anonymity of users
+  in most configurations, including those running the Vidalia bundles,
+  TorK, etc. Or worse.
+
   o Major security fixes:
     - Close immediately after missing authentication on control port;
       do not allow multiple authentication attempts.
 
 
 Changes in version 0.2.0.4-alpha - 2007-08-01
+  This fourth development snapshot fixes a critical security vulnerability
+  for most users, specifically those running Vidalia, TorK, etc. Everybody
+  should upgrade to either 0.1.2.16 or 0.2.0.4-alpha.
+
   o Major security fixes:
     - Close immediately after missing authentication on control port;
       do not allow multiple authentication attempts.
@@ -581,6 +628,11 @@
 
 
 Changes in version 0.2.0.3-alpha - 2007-07-29
+  This third development snapshot introduces new experimental
+  blocking-resistance features and a preliminary version of the v3
+  directory voting design, and includes many other smaller features
+  and bugfixes.
+
   o Major features:
     - The first pieces of our "bridge" design for blocking-resistance
       are implemented. People can run bridge directory authorities;
@@ -710,6 +762,10 @@
 
 
 Changes in version 0.1.2.15 - 2007-07-17
+  Tor 0.1.2.15 fixes several crash bugs, fixes some anonymity-related
+  problems, fixes compilation on BSD, and fixes a variety of other
+  bugs. Everybody should upgrade.
+
   o Major bugfixes (compilation):
     - Fix compile on FreeBSD/NetBSD/OpenBSD. Oops.
 
@@ -782,6 +838,11 @@
 
 
 Changes in version 0.2.0.1-alpha - 2007-06-01
+  This early development snapshot provides new features for people running
+  Tor as both a client and a server (check out the new RelayBandwidth
+  config options); lets Tor run as a DNS proxy; and generally moves us
+  forward on a lot of fronts.
+
   o Major features, server usability:
     - New config options RelayBandwidthRate and RelayBandwidthBurst:
       a separate set of token buckets for relayed traffic. Right now
@@ -980,6 +1041,10 @@
 
 
 Changes in version 0.1.2.14 - 2007-05-25
+  Tor 0.1.2.14 changes the addresses of two directory authorities (this
+  change especially affects those who serve or use hidden services),
+  and fixes several other crash- and security-related bugs.
+
   o Directory authority changes:
     - Two directory authorities (moria1 and moria2) just moved to new
       IP addresses. This change will particularly affect those who serve
@@ -1035,6 +1100,15 @@
 
 
 Changes in version 0.1.2.13 - 2007-04-24
+  Tor 0.1.2.13, the first stable release of the 0.1.2.x branch, is
+  finally ready.
+
+  This release features some major anonymity fixes, such as safer path
+  selection; better client performance; faster bootstrapping, better
+  address detection, and better DNS support for servers; write limiting as
+  well as read limiting to make servers easier to run; and a huge pile of
+  other features and bug fixes. The bundles also ship with Vidalia 0.0.11.
+
   o Minor fixes:
     - Fix a memory leak when we ask for "all" networkstatuses and we
       get one we don't recognize.



More information about the tor-commits mailing list