[or-cvs] r15186: make some of the 0.2.1.1-alpha changelog items more prominen (tor/trunk)

arma at seul.org arma at seul.org
Fri Jun 13 05:13:23 UTC 2008


Author: arma
Date: 2008-06-13 01:13:22 -0400 (Fri, 13 Jun 2008)
New Revision: 15186

Modified:
   tor/trunk/ChangeLog
Log:
make some of the 0.2.1.1-alpha changelog items more prominent


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-06-13 05:12:27 UTC (rev 15185)
+++ tor/trunk/ChangeLog	2008-06-13 05:13:22 UTC (rev 15186)
@@ -1,15 +1,28 @@
 Changes in version 0.2.1.1-alpha - 2008-06-13
   o Major features:
-    - Modify the list of ciphers advertised by OpenSSL in client mode
-      to even more closely resemble a common web browser.  We cheat a
-      little so that we can advertise ciphers that the locally
-      installed OpenSSL doesn't know about.
+    - More work on making our TLS handshake blend in: modify the list
+      of ciphers advertised by OpenSSL in client mode to even more
+      closely resemble a common web browser. We cheat a little so that
+      we can advertise ciphers that the locally installed OpenSSL doesn't
+      know about.
     - Start sending "bootstrap phase" status events to the controller,
       so it can keep the user informed of progress fetching directory
       information and establishing circuits. Also inform the controller
       if we think we're stuck at a particular bootstrap phase. Implements
       proposal 137.
+    - Resume using OpenSSL's RAND_poll() for better (and more portable)
+      cross-platform entropy collection again. We used to use it, then
+      stopped using it because of a bug that could crash systems that
+      called RAND_poll when they had a lot of fds open. It looks like the
+      bug got fixed in late 2006. Our new behavior is to call RAND_poll()
+      at startup, and to call RAND_poll() when we reseed later only if
+      we have a non-buggy OpenSSL version.
 
+  o Major bugfixes:
+    - When we choose to abandon a new entry guard because we think our
+      older ones might be better, close any circuits pending on that
+      new entry guard connection. Bugfix on 0.1.2.8-beta; found by lodger.
+
   o Memory fixes and improvements:
     - Add a malloc_good_size implementation to OpenBSD_malloc_linux.c,
       to avoid unused RAM in buffer chunks and memory pools.
@@ -29,65 +42,45 @@
       patch to their OpenSSL, turn it on to save memory on servers. This
       patch will (with any luck) get included in a mainline distribution
       before too long.
+    - Never use OpenSSL compression: it wastes RAM and CPU trying to
+      compress cells, which are basically all encrypted, compressed,
+      or both.
 
   o Minor bugfixes:
-    - Stop giving double-close warn when we reject an address for
-      client DNS.
-    - Make relay cells written on a connection count as non-padding when
-      tracking how long a connection has been in use. Bugfix on
-      0.2.0.1-alpha.  Spotted by lodger.
-    - When we choose to abandon a new entry guard because we think our
-      older ones might be better, close any circuits pending on that
-      new entry guard connection. Bugfix on 0.1.2.8-beta; found by lodger.
     - Stop reloading the router list from disk for no reason when we
       run out of reachable directory mirrors. Once upon a time reloading
       it would set the 'is_running' flag back to 1 for them. It hasn't
       done that for a long time.
     - In very rare situations new hidden service descriptors were
       published earlier than 30 seconds after the last change to the
-      service, with the 30 seconds being the current voodoo saying that
-      a descriptor is stable.
+      service. (We currently think that a hidden service descriptor
+      that's been stable for 30 seconds is worth publishing.)
 
   o Minor features:
     - Allow separate log levels to be configured for different logging
-      domains.  For example, this allows one to log all notices, warnings,
+      domains. For example, this allows one to log all notices, warnings,
       or errors, plus all memory management messages of level debug or
       higher, with: Log [MM] debug-err [*] notice-err file /var/log/tor.
     - Add a couple of extra warnings to --enable-gcc-warnings for GCC 4.3,
       and stop using a warning that had become unfixably verbose under
       GCC 4.3.
-    - Resume using OpenSSL's RAND_poll() for better (and more portable)
-      cross-platform entropy collection again. We used to use it, then
-      stopped using it because of a bug that could crash systems that
-      called RAND_poll when they had a lot of fds open. It looks like the
-      bug got fixed in late 2006. Our new behavior is to call RAND_poll()
-      at startup, and to call RAND_poll() when we reseed later only if
-      we have a non-buggy OpenSSL version.
-    - Lots of new unit tests.
     - New --hush command-line option similar to --quiet. While --quiet
       disables all logging to the console on startup, --hush limits the
       output to messages of warning and error severity.
     - Servers support a new URL scheme for consensus downloads that
       allows the client to specify which authorities are trusted.
       The server then only sends the consensus if the client will trust
-      it. Otherwise a 404 error is sent back. Clients can use this
-      new scheme when the server supports it. Implements proposal 134;
-      disabled for now though.
+      it. Otherwise a 404 error is sent back. Clients use this
+      new scheme when the server supports it (meaning it's running
+      0.2.1.1-alpha or later). Implements proposal 134.
     - New configure/torrc options (--enable-geoip-stats,
       DirRecordUsageByCountry) to record how many IPs we've served
       directory info to in each country code, how many status documents
       total we've sent to each country code, and what share of the total
       directory requests we should expect to see.
-    - Never use OpenSSL compression: it wastes RAM and CPU trying to
-      compress cells, which are basically all encrypted, compressed, or
-      both.
     - Use the TLS1 hostname extension to more closely resemble browser
       behavior.
-
-  o Code simplifications and refactoring:
-    - Refactor code using connection_ap_handshake_attach_circuit() to
-      allow that function to mark connections for close. Part of a fix
-      for bug 617. Bugfix on 0.2.0.1-alpha.
+    - Lots of new unit tests.
     - Add a macro to implement the common pattern of iterating through
       two parallel lists in lockstep.
 



More information about the tor-commits mailing list