[or-cvs] r11563: clean up changelog before release (tor/trunk)

arma at seul.org arma at seul.org
Fri Sep 21 20:19:38 UTC 2007


Author: arma
Date: 2007-09-21 16:19:38 -0400 (Fri, 21 Sep 2007)
New Revision: 11563

Modified:
   tor/trunk/ChangeLog
Log:
clean up changelog before release


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-09-21 20:02:50 UTC (rev 11562)
+++ tor/trunk/ChangeLog	2007-09-21 20:19:38 UTC (rev 11563)
@@ -3,31 +3,49 @@
     - Set up moria1 and tor26 as the first v3 directory authorities. See
       doc/spec/dir-spec.txt for details on the new directory design.
 
-  o Major features (bridges):
+  o Major bugfixes (crashes):
+    - Fix possible segfaults in functions called from
+      rend_process_relay_cell(). Bugfix on 0.1.2.x.
+
+  o Major bugfixes (bridges):
+    - Fix a bug that made servers send a "404 Not found" in response to
+      attempts to fetch their server descriptor. This caused Tor servers
+      to take many minutes to establish reachability for their DirPort,
+      and it totally crippled bridges. Bugfix on 0.2.0.5-alpha.
     - Make "UpdateBridgesFromAuthority" torrc option work: when bridge
       users configure that and specify a bridge with an identity
       fingerprint, now they will lookup the bridge descriptor at the
       default bridge authority via a one-hop tunnel, but once circuits
       are established they will switch to a three-hop tunnel for later
-      connections to the bridge authority.
+      connections to the bridge authority. Bugfix in 0.2.0.3-alpha.
 
+  o Major bugfixes (hidden services):
+    - Hidden services were choosing introduction points uniquely by
+      hexdigest, but when constructing the hidden service descriptor
+      they merely wrote the (potentially ambiguous) nickname.
+    - Clients now use the v2 intro format for hidden service
+      connections: they specify their chosen rendezvous point by identity
+      digest rather than by (potentially ambiguous) nickname. Both
+      are bugfixes on 0.1.2.x, and they could speed up hidden service
+      connections dramatically. Thanks to Karsten Loesing.
+
   o Minor features (security):
-    - As a client, do not believe any server that tells us that any address
-      maps to an internal address space.
+    - As a client, do not believe any server that tells us that an
+      address maps to an internal address space.
     - Make it possible to enable HashedControlPassword and
       CookieAuthentication at the same time.
 
   o Minor features (guard nodes):
-    - Tag every guard node in our state file with the version that we believe
-      added it, or with our own version if we add it.  This way, if a user
-      temporarily runs an old version of Tor and then switches back to a new
-      one, she doesn't automatically lose her guards.
+    - Tag every guard node in our state file with the version that
+      we believe added it, or with our own version if we add it. This way,
+      if a user temporarily runs an old version of Tor and then switches
+      back to a new one, she doesn't automatically lose her guards.
 
   o Minor features (speed):
     - When implementing AES counter mode, update only the portions of the
       counter buffer that need to change, and don't keep separate
-      network-order and host-order counters when they are the same (i.e., on
-      big-endian hosts.)
+      network-order and host-order counters when they are the same (i.e.,
+      on big-endian hosts.)
 
   o Minor features (controller):
     - Accept LF instead of CRLF on controller, since some software has a
@@ -39,9 +57,9 @@
   o Removed features:
      - Routers no longer include bandwidth-history lines in their
        descriptors; this information is already available in extra-info
-       documents, and including it in router descriptors took up 60% (!) of
-       compressed router descriptor downloads.  Completes implementation of
-       proposal 104.
+       documents, and including it in router descriptors took up 60%
+       (!) of compressed router descriptor downloads. Completes
+       implementation of proposal 104.
      - Remove the contrib scripts ExerciseServer.py, PathDemo.py,
        and TorControl.py, as they use the old v0 controller protocol,
        and are obsoleted by TorFlow anyway.
@@ -51,48 +69,32 @@
      - On OSX, stop warning the user that kqueue support in libevent is
       "experimental", since it seems to have worked fine for ages.
 
-  o Major bugfixes:
-    - Fix possible segfaults in functions called from
-      rend_process_relay_cell().  Bugfix on 0.1.2.x.
-    - Hidden services were choosing introduction points uniquely by
-      hexdigest, but when constructing the hidden service descriptor
-      they merely wrote the (potentially ambiguous) nickname.
-      Bugfix on 0.1.2.x.
-    - Clients now use the v2 intro format for hidden service
-      connections: they specify their chosen rendezvous point by identity
-      digest rather than by (potentially ambiguous) nickname. These
-      changes could speed up hidden service connections dramatically.
-      Bugfix on 0.1.2.x.
-    - Fix a bug that made servers send a "404 Not found" in response to
-      attempts to fetch their server descriptor. This caused Tor servers
-      to take many minutes to establish reachability for their DirPort,
-      and it totally crippled bridges. Bugfix on 0.2.0.5-alpha.
-
   o Minor bugfixes:
     - When generating information telling us how to extend to a given
-      router, do not try to include the nickname if it is absent.  Fixes
-      bug 467.  Bugfix on 0.2.0.3-alpha
-    - Fix a user-triggerable segfault in expand_filename().  (There isn't
-      a way to trigger this remotely.) Bugfix on 0.1.2.x.
+      router, do not try to include the nickname if it is absent. Fixes
+      bug 467. Bugfix on 0.2.0.3-alpha.
+    - Fix a user-triggerable (but not remotely-triggerable) segfault
+      in expand_filename(). Bugfix on 0.1.2.x.
     - Fix a memory leak when freeing incomplete requests from DNSPort.
-      (Found by Niels Provos with valgrind.)  Bugfix on 0.2.0.1-alpha
+      Found by Niels Provos with valgrind. Bugfix on 0.2.0.1-alpha.
     - Don't try to access (or alter) the state file when running
       --list-fingerprint or --verify-config or --hash-password. (Resolves
-      bug 499.)  Bugfix on 0.1.2.x
+      bug 499.) Bugfix on 0.1.2.x.
     - Servers used to decline to publish their DirPort if their
       BandwidthRate, RelayBandwidthRate, or MaxAdvertisedBandwidth
       were below a threshold. Now they only look at BandwidthRate and
-      RelayBandwidthRate.  Bugfix on ????
-    - Remove an optimization in the AES counter-mode code that assumed that
-      the counter never exceeded 2^68.  When the counter can be set
-      arbitrarily as an IV (as it is by Karsten's new hidden services code),
-      this assumption no longer holds.  Bugfix on 0.1.2.x.
+      RelayBandwidthRate. Bugfix on 0.1.2.x.
+    - Remove an optimization in the AES counter-mode code that assumed
+      that the counter never exceeded 2^68. When the counter can be set
+      arbitrarily as an IV (as it is by Karsten's new hidden services
+      code), this assumption no longer holds. Bugfix on 0.1.2.x.
     - Resume listing "AUTHORITY" flag for authorities in network status.
       Bugfix on 0.2.0.3-alpha; reported by Alex de Joode.
 
   o Code simplifications and refactoring:
-    - Revamp file-writing logic so we don't need to have the entire contents
-      of a file in memory at once before we write to disk.  Tor, meet stdio.
+    - Revamp file-writing logic so we don't need to have the entire
+      contents of a file in memory at once before we write to disk. Tor,
+      meet stdio.
     - Turn "descriptor store" into a full-fledged type.
     - Move all NT services code into a separate source file.
     - Unify all code that computes medians, percentile elements, etc.



More information about the tor-commits mailing list