[or-cvs] r13732: a blurb for 0.2.0.20-rc (tor/trunk)

arma at seul.org arma at seul.org
Tue Feb 26 03:11:38 UTC 2008


Author: arma
Date: 2008-02-25 22:11:37 -0500 (Mon, 25 Feb 2008)
New Revision: 13732

Modified:
   tor/trunk/ChangeLog
Log:
a blurb for 0.2.0.20-rc


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-02-26 02:58:36 UTC (rev 13731)
+++ tor/trunk/ChangeLog	2008-02-26 03:11:37 UTC (rev 13732)
@@ -1,4 +1,14 @@
+Changes in version 0.2.0.21-rc - 2008-0?-??
+
+
 Changes in version 0.2.0.20-rc - 2008-02-24
+  Tor 0.2.0.20-rc is the first release candidate for the 0.2.0 series. It
+  makes more progress towards normalizing Tor's TLS handshake, makes
+  hidden services work better again, helps relays bootstrap if they don't
+  know their IP address, adds optional support for linking in openbsd's
+  allocator or tcmalloc, allows really fast relays to scale past 15000
+  sockets, and fixes a bunch of minor bugs reported by Veracode.
+
   o Major features:
     - Enable the revised TLS handshake based on the one designed by
       Steven Murdoch in proposal 124, as revised in proposal 130. It
@@ -50,7 +60,7 @@
       with Tor's memory allocation patterns. Pass
       --enable-openbsd-malloc to get the replacement malloc code.
     - Add a --with-tcmalloc option to the configure script to link
-      against tcmalloc (if present).  Does not yet search for
+      against tcmalloc (if present). Does not yet search for
       non-system include paths.
     - Stop imposing an arbitrary maximum on the number of file descriptors
       used for busy servers. Bug reported by Olaf Selke; patch from
@@ -67,7 +77,7 @@
   o Minor bugfixes (memory leaks and code problems):
     - We were leaking a file descriptor if Tor started with a zero-length
       cached-descriptors file. Patch by freddy77; bugfix on 0.1.2.
-    - Detect size overflow in zlib code.
+    - Detect size overflow in zlib code. Reported by Dan Kaminsky.
     - We were comparing the raw BridgePassword entry with a base64'ed
       version of it, when handling a "/tor/networkstatus-bridges"
       directory request. Now compare correctly. Noticed by Veracode.
@@ -75,7 +85,7 @@
       Should fix bug 537.
     - Alter the code that tries to recover from unhandled write
       errors, to not try to flush onto a socket that's given us
-      unhandled errors.  Bugfix on 0.1.2.x.
+      unhandled errors. Bugfix on 0.1.2.x.
     - Make Unix controlsockets work correctly on OpenBSD. Patch from
       tup. Bugfix on 0.2.0.3-alpha.
 
@@ -88,7 +98,7 @@
       address if the connection appears to be coming from the same /24
       network; it was producing too many wrong guesses.
     - Make the new hidden service code respect the SafeLogging setting.
-      Bugfix on 0.2.0.x.  Patch from Karsten.
+      Bugfix on 0.2.0.x. Patch from Karsten.
     - When starting as an authority, do not overwrite all certificates
       cached from other authorities. Bugfix on 0.2.0.x. Fixes bug 606.
     - If we're trying to flush the last bytes on a connection (for



More information about the tor-commits mailing list