[or-cvs] [tor/master] clean up changelog for the 0.2.2.6-alpha release

arma at seul.org arma at seul.org
Tue Nov 17 12:03:34 UTC 2009


Author: Roger Dingledine <arma at torproject.org>
Date: Tue, 17 Nov 2009 07:02:17 -0500
Subject: clean up changelog for the 0.2.2.6-alpha release
Commit: 2bcb90a308859126489bf63e3d2598901fcefcfc

---
 ChangeLog |   65 +++++++++++++++++++++++++++---------------------------------
 1 files changed, 29 insertions(+), 36 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index dd05eb5..d3fd6c0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,52 +1,45 @@
-Changes in version 0.2.2.6-alpha - 2009-10-??
+Changes in version 0.2.2.6-alpha - 2009-11-17
   o Major features:
-    - Directory authorities can now create, vote, and serve on multiple
+    - Directory authorities can now create, vote on, and serve multiple
       parallel formats of directory data as part of their voting process.
-      This is a partial implementation of Proposal 162: "Publish the
-      consensus in multiple flavors."
-    - Directory authorities can now agree on and publish small summaries of
-      router information that clients can use in place of regular server
-      descriptors.  This will eventually allow clients to use far less
-      bandwidth for downloading information about the network.  This begins
-      the implementation of of Proposal 158: "Clients download a consensus +
-      Microdescriptors".
+      Partially implements Proposal 162: "Publish the consensus in
+      multiple flavors".
+    - Directory authorities can now agree on and publish small summaries
+      of router information that clients can use in place of regular
+      server descriptors. This transition will eventually allow clients
+      to use far less bandwidth for downloading information about the
+      network. Begins the implementation of Proposal 158: "Clients
+      download consensus + microdescriptors".
     - The directory voting system is now extensible to use multiple hash
-      algorithms for signatures and resource selection.  Newer formats are
-      signed with SHA256, with a possibility for moving to a better hash
-      algorithm in the future.
+      algorithms for signatures and resource selection. Newer formats
+      are signed with SHA256, with a possibility for moving to a better
+      hash algorithm in the future.
     - New DisableAllSwap option. If set to 1, Tor will attempt to lock all
-      current and future memory pages. On supported platforms, this should
-      effectively disable any and all attempts to page out memory. Under the
-      hood, DisableAllSwap uses mlockall() on unix-like platforms. Windows is
-      currently unsupported. We believe that this feature works on modern
-      Gnu/Linux distributions. Mac OS X appears to be broken by design. On
-      reasonable *BSD systems it should also be supported but this is untested.
-      This option requires that you start your Tor as root. If you use
-      DisableAllSwap, please consider using the User option to properly reduce
-      the privileges of your Tor.
+      current and future memory pages via mlockall(). On supported
+      platforms (modern Linux and probably BSD but not Windows or OS X),
+      this should effectively disable any and all attempts to page out
+      memory. This option requires that you start your Tor as root --
+      if you use DisableAllSwap, please consider using the User option
+      to properly reduce the privileges of your Tor.
+    - Numerous changes, bugfixes, and workarounds from Nathan Freitas
+      to help Tor build correctly for Android phones.
 
   o Major bugfixes:
     - Work around a security feature in OpenSSL 0.9.8l that prevents our
-      handshake from working unless we explicitly tell OpenSSL that we are
-      using SSL renegotiation safely.  We are, of course, but OpenSSL
-      0.9.8l won't work unless we say we are.
-
-  o Code simplifications and refactorings:
-    - Numerous changes, bugfixes, and workarounds from Nathan Freitas
-      to help Tor build correctly for Android phones.
-    - Begun converting Tor's signature and message digest logic to handle
-      multiple hash algorithms.
+      handshake from working unless we explicitly tell OpenSSL that we
+      are using SSL renegotiation safely. We are, but OpenSSL 0.9.8l
+      won't work unless we say we are.
 
   o Minor bugfixes:
     - Fix a crash bug when trying to initialize the evdns module in
-      Libevent 2.
+      Libevent 2. Bugfix on 0.2.1.16-rc.
     - Stop logging at severity 'warn' when some other Tor client tries
       to establish a circuit with us using weak DH keys. It's a protocol
       violation, but that doesn't mean ordinary users need to hear about
       it. Fixes the bug part of bug 1114. Bugfix on 0.1.0.13.
     - Do not refuse to learn about authority certs and v2 networkstatus
-      documents that are older than the latest consensus.  This bug might
-      have degraded client bootstrapping.  Bugfix on 0.2.0.10-alpha.
+      documents that are older than the latest consensus. This bug might
+      have degraded client bootstrapping. Bugfix on 0.2.0.10-alpha.
       Spotted and fixed by xmux.
     - Fix numerous small code-flaws found by Coverity Scan Rung 3.
     - If all authorities restart at once right before a consensus vote,
@@ -56,8 +49,8 @@ Changes in version 0.2.2.6-alpha - 2009-10-??
     - If your relay can't keep up with the number of incoming create
       cells, it would log one warning per failure into your logs. Limit
       warnings to 1 per minute. Bugfix on 0.0.2pre10; fixes bug 1042.
-    - Bridges do not use the default exit policy, but reject *:* by
-      default. Fixes bug 1113.
+    - Bridges now use "reject *:*" as their default exit policy. Bugfix
+      on 0.2.0.3-alpha; fixes bug 1113.
     - Fix a memory leak on directory authorities during voting that was
       introduced in 0.2.2.1-alpha. Found via valgrind.
 
-- 
1.5.6.5



More information about the tor-commits mailing list