[or-cvs] r17779: {tor} last cleanups (tor/trunk)

arma at seul.org arma at seul.org
Thu Dec 25 21:02:51 UTC 2008


Author: arma
Date: 2008-12-25 16:02:50 -0500 (Thu, 25 Dec 2008)
New Revision: 17779

Modified:
   tor/trunk/ChangeLog
Log:
last cleanups


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-12-25 20:32:49 UTC (rev 17778)
+++ tor/trunk/ChangeLog	2008-12-25 21:02:50 UTC (rev 17779)
@@ -1,9 +1,15 @@
 Changes in version 0.2.1.9-alpha - 2008-12-25
+  o New directory authorities:
+    - gabelmoo (the authority run by Karsten Loesing) now has a new
+      IP address.
+
   o Security fixes:
     - Never use a connection with a mismatched address to extend a
       circuit, unless that connection is canonical. A canonical
       connection is one whose address is authenticated by the router's
       identity key, either in a NETINFO cell or in a router descriptor.
+    - Avoid a possible memory corruption bug when receiving hidden service
+      descriptors. Bugfix on 0.2.1.6-alpha.
 
   o Major bugfixes:
     - Fix a logic error that would automatically reject all but the first
@@ -13,10 +19,12 @@
       "connecting" and it receives an "end" relay cell, the exit relay
       would silently ignore the end cell and not close the stream. If
       the client never closes the circuit, then the exit relay never
-      closes the TCP connection. Bug introduced in Tor 0.1.2.1-alpha;
+      closes the TCP connection. Bug introduced in 0.1.2.1-alpha;
       reported by "wood".
-    - Avoid a possible memory corruption bug when receiving hidden service
-      descriptors.  Bugfix on 0.2.1.6-alpha.
+    - When we can't initialize DNS because the network is down, do not
+      automatically stop Tor from starting. Instead, retry failed
+      dns_inits() every 10 minutes, and change the exit policy to reject
+      *:* until one succeeds. Fixes bug 691.
 
   o Minor features:
     - Give a better error message when an overzealous init script says
@@ -25,16 +33,12 @@
     - When a directory authority gives us a new guess for our IP address,
       log which authority we used. Hopefully this will help us debug
       the recent complaints about bad IP address guesses.
-    - When we can't initialize DNS because the network is down, do not
-      automatically stop Tor from starting. Instead, we retry failed
-      dns_inits() every 10 minutes, and change the exit policy to reject
-      *:* until one succeeds. Fixes bug 691.
     - Detect svn revision properly when we're using git-svn.
     - Try not to open more than one descriptor-downloading connection
       to an authority at once. This should reduce load on directory
       authorities. Fixes bug 366.
     - Add cross-certification to newly generated certificates, so that
-      a signing key is enough information to use to look up a certificate.
+      a signing key is enough information to look up a certificate.
       Partial implementation of proposal 157.
     - Start serving certificates by <identity digest, signing key digest>
       pairs. Partial implementation of proposal 157.
@@ -44,8 +48,8 @@
       messages to that length ourselves, rather than relying on the
       system to do it for us.
     - Optimize out calls to time(NULL) that occur for every IO operation,
-      or for every cell. On systems where time() is a slow syscalls,
-      this will be slightly helpful.
+      or for every cell. On systems where time() is a slow syscall,
+      this fix will be slightly helpful.
     - Exit servers can now answer resolve requests for ip6.arpa addresses.
     - When we download a descriptor that we then immediately (as
       a directory authority) reject, do not retry downloading it right
@@ -60,8 +64,8 @@
     - New CONSENSUS_ARRIVED event to note when a new consensus has
       been fetched and validated.
     - When we realize that another process has modified our cached
-      descriptors, print out a more useful error message rather than
-      triggering an assertion. Fixes bug 885. Patch from Karsten.
+      descriptors file, print out a more useful error message rather
+      than triggering an assertion. Fixes bug 885. Patch from Karsten.
     - Add an internal-use-only __ReloadTorrcOnSIGHUP option for
       controllers to prevent SIGHUP from reloading the
       configuration. Fixes bug 856.
@@ -80,13 +84,13 @@
       user if lower values are given in the configuration. Bugfix on
       0.1.1.17-rc. Patch by Sebastian.
     - Fix a race condition when freeing keys shared between main thread
-      and CPU workers that could result in a memory leak.  Bugfix on
-      0.1.0.1-rc.  Fixes bug 889.
+      and CPU workers that could result in a memory leak. Bugfix on
+      0.1.0.1-rc. Fixes bug 889.
 
   o Minor bugfixes (hidden services):
-    - Do not throw away existing introduction points on SIGHUP; bugfix on
-      0.0.6pre1; also, do not stall hidden services because of
-      introduction points thrown away; bugfix on 0.2.1.7-alpha. Spotted
+    - Do not throw away existing introduction points on SIGHUP (bugfix on
+      0.0.6pre1); also, do not stall hidden services because we're
+      throwing away introduction points; bugfix on 0.2.1.7-alpha. Spotted
       by John Brooks. Patch by Karsten. Fixes bug 874.
     - Fix a memory leak when we decline to add a v2 rendezvous
       descriptor to the cache because we already had a v0 descriptor



More information about the tor-commits mailing list