[or-cvs] r17207: {tor} minor changelog cleanups. declare that friday is when we rel (tor/trunk)

arma at seul.org arma at seul.org
Fri Nov 7 05:11:42 UTC 2008


Author: arma
Date: 2008-11-07 00:11:41 -0500 (Fri, 07 Nov 2008)
New Revision: 17207

Modified:
   tor/trunk/ChangeLog
Log:
minor changelog cleanups. declare that friday is when we release it.


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-11-07 04:38:58 UTC (rev 17206)
+++ tor/trunk/ChangeLog	2008-11-07 05:11:41 UTC (rev 17207)
@@ -1,4 +1,4 @@
-Changes in version 0.2.1.7-alpha - 2008-11-xx
+Changes in version 0.2.1.7-alpha - 2008-11-07
   o Security fixes:
     - The "ClientDNSRejectInternalAddresses" config option wasn't being
       consistently obeyed: if an exit relay refuses a stream because its
@@ -6,26 +6,26 @@
       the relay said the destination address resolves to, even if it's
       an internal IP address. Bugfix on 0.2.0.7-alpha; patch by rovv.
     - The "User" and "Group" config options did not clear the
-      supplementary group entries for the process. The "User" option
-      has been made more robust, and also now also sets the groups to
-      the specified user's primary group. The "Group" option is now
-      ignored. For more detailed logging on credential switching, set
-      CREDENTIAL_LOG_LEVEL in common/compat.c to LOG_NOTICE or higher;
-      patch by Jacob Appelbaum and Steven Murdoch.
+      supplementary group entries for the Tor process. The "User" option
+      is now more robust, and we now set the groups to the specified
+      user's primary group. The "Group" option is now ignored. For more
+      detailed logging on credential switching, set CREDENTIAL_LOG_LEVEL
+      in common/compat.c to LOG_NOTICE or higher. Patch by Jacob Appelbaum
+      and Steven Murdoch.
 
   o Minor features:
     - Now NodeFamily and MyFamily config options allow spaces in
       identity fingerprints, so it's easier to paste them in.
       Suggested by Lucky Green.
+    - Implement the 0x20 hack to better resist DNS poisoning: set the
+      case on outgoing DNS requests randomly, and reject responses that do
+      not match the case correctly. This logic can be disabled with the
+      ServerDNSRamdomizeCase setting, if you are using one of the 0.3%
+      of servers that do not reliably preserve case in replies. See
+      "Increased DNS Forgery Resistance through 0x20-Bit Encoding"
+      for more info.
     - Preserve case in replies to DNSPort requests in order to support
       the 0x20 hack for resisting DNS poisoning attacks.
-    - Implement the 0x20 hack to better resist DNS poisoning: set the
-      case on outgoing DNS requests randomly, and reject responses
-      that do not match the case correctly.  This logic can be
-      disabled with the ServerDNSRamdomizeCase setting, if you are
-      using one of the 0.3% of servers that do not reliably preserve
-      case in replies.  See "Increased DNS Forgery Resistance through
-      0x20-Bit Encoding" for more info.
 
   o Hidden service performance improvements:
     - When the client launches an introduction circuit, retry with a
@@ -45,20 +45,20 @@
       no pending streams, choose a good general exit rather than one that
       supports "all the pending streams". Bugfix on 0.1.1.x. Fix by rovv.
     - Send a valid END cell back when a client tries to connect to a
-      nonexistent hidden service port.  Bugfix on 0.1.2.15.  Fixes bug
-      840.  Patch from rovv.
+      nonexistent hidden service port. Bugfix on 0.1.2.15. Fixes bug
+      840. Patch from rovv.
     - If a broken client asks a non-exit router to connect somewhere,
       do not even do the DNS lookup before rejecting the connection.
-      Fixes another case of bug 619.  Patch from rovv.
+      Fixes another case of bug 619. Patch from rovv.
     - Fix another case of assuming, when a specific exit is requested,
       that we know more than the user about what hosts it allows.
-      Fixes another case of bug 752.  Patch from rovv.
+      Fixes another case of bug 752. Patch from rovv.
     - Check which hops rendezvous stream cells are associated with to
       prevent possible guess-the-streamid injection attacks from
-      intermediate hops.  Fixes another case of bug 446. Based on patch
+      intermediate hops. Fixes another case of bug 446. Based on patch
       from rovv.
     - Avoid using a negative right-shift when comparing 32-bit
-      addresses.  Possible fix for bug 845 and bug 811.
+      addresses. Possible fix for bug 845 and bug 811.
     - Make the assert_circuit_ok() function work correctly on circuits that
       have already been marked for close.
     - Fix read-off-the-end-of-string error in unit tests when decoding
@@ -138,7 +138,7 @@
     - Add a -p option to tor-resolve for specifying the SOCKS port: some
       people find host:port too confusing.
     - Make TrackHostExit mappings expire a while after their last use, not
-      after their creation.  Patch from Robert Hogan.
+      after their creation. Patch from Robert Hogan.
     - Provide circuit purposes along with circuit events to the controller.
 
   o Minor bugfixes:



More information about the tor-commits mailing list