[tor-commits] [tor/master] reflow changelog.

nickm at torproject.org nickm at torproject.org
Sat Apr 26 01:51:35 UTC 2014


commit 03ce73327ce07499df563919764ea020f880da6b
Author: Nick Mathewson <nickm at torproject.org>
Date:   Fri Apr 25 21:51:31 2014 -0400

    reflow changelog.
---
 ChangeLog |   53 +++++++++++++++++++++++++++--------------------------
 1 file changed, 27 insertions(+), 26 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 0af644f..e4387e1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -3,9 +3,9 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
   improvements for clients and relays, including blacklisting authority
   signing keys that were used while susceptible to the OpenSSL
   "heartbleed" bug, fixing two expensive functions on busy relays,
-  improved TLS ciphersuite preference lists, support for run-time hardening
-  on compilers that support AddressSanitizer, and more work on the Linux
-  sandbox code.
+  improved TLS ciphersuite preference lists, support for run-time
+  hardening on compilers that support AddressSanitizer, and more work on
+  the Linux sandbox code.
 
   There are also several usability fixes for clients (especially clients
   that use bridges), two new TransPort protocols supported (one on
@@ -52,15 +52,15 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       uniform criteria, and includes all OpenSSL ciphersuites with
       acceptable strength and forward secrecy. Previously, we had left
       some perfectly fine ciphersuites unsupported due to omission or
-      typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported
-      by 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
+      typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
+      'cypherpunks'. Bugfix on 0.2.4.8-alpha.
     - Relays now trust themselves to have a better view than clients of
-      which TLS ciphersuites are better than others. (Thanks to bug 11513,
-      the relay list is now well-considered, whereas the client list has
-      been chosen mainly for anti-fingerprinting purposes.) Relays
-      prefer: AES over 3DES; then ECDHE over DHE; then GCM over CBC;
-      then SHA384 over SHA256 over SHA1; and last, AES256 over AES128.
-      Resolves ticket 11528.
+      which TLS ciphersuites are better than others. (Thanks to bug
+      11513, the relay list is now well-considered, whereas the client
+      list has been chosen mainly for anti-fingerprinting purposes.)
+      Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
+      CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
+      AES128. Resolves ticket 11528.
     - Clients now try to advertise the same list of ciphersuites as
       Firefox 28. This change enables selection of (fast) GCM
       ciphersuites, disables some strange old ciphers, and stops
@@ -77,18 +77,18 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
       10267; patch from "yurivict".
     - Support OpenBSD's divert-to rules with the pf firewall for
-      transparent proxy ports. To enable it, set "TransProxyType
-      pf-divert". This allows Tor to run a TransPort transparent proxy
-      port on OpenBSD 4.4 or later without root privileges. See the
+      transparent proxy ports. To enable it, set "TransProxyType pf-
+      divert". This allows Tor to run a TransPort transparent proxy port
+      on OpenBSD 4.4 or later without root privileges. See the
       pf.conf(5) manual page for information on configuring pf to use
       divert-to rules. Closes ticket 10896; patch from Dana Koch.
 
   o Minor features (security):
     - New --enable-expensive-hardening option to enable security
       hardening options that consume nontrivial amounts of CPU and
-      memory. Right now, this includes AddressSanitizer and UbSan,
-      which are supported in newer versions of GCC and Clang. Closes
-      ticket 11477.
+      memory. Right now, this includes AddressSanitizer and UbSan, which
+      are supported in newer versions of GCC and Clang. Closes ticket
+      11477.
 
   o Minor features (log verbosity):
     - Demote the message that we give when a flushing connection times
@@ -98,8 +98,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       about downloading descriptors. Previously, we'd log a notice
       whenever we learned about more routers. Now, we only log a notice
       at every 5% of progress. Fixes bug 9963.
-    - Warn less verbosely when receiving a malformed ESTABLISH_RENDEZVOUS
-      cell. Fixes ticket 11279.
+    - Warn less verbosely when receiving a malformed
+      ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
     - When we run out of usable circuit IDs on a channel, log only one
       warning for the whole channel, and describe how many circuits
       there were on the channel. Fixes part of ticket 11553.
@@ -153,8 +153,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
 
   o Minor bugfixes (client, logging during bootstrap):
-    - Warn only once if we start logging in an unsafe way. Previously, we
-      complain as many times as we had problems. Fixes bug 9870;
+    - Warn only once if we start logging in an unsafe way. Previously,
+      we complain as many times as we had problems. Fixes bug 9870;
       bugfix on 0.2.5.1-alpha.
     - Only report the first fatal bootstrap error on a given OR
       connection. This stops us from telling the controller bogus error
@@ -208,15 +208,16 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
     - Don't re-initialize a second set of OpenSSL mutexes when starting
       up. Previously, we'd make one set of mutexes, and then immediately
-      replace them with another. Fixes bug 11726; bugfix on 0.2.5.3-alpha.
+      replace them with another. Fixes bug 11726; bugfix on
+      0.2.5.3-alpha.
     - Resolve some memory leaks found by coverity in the unit tests, on
       exit in tor-gencert, and on a failure to compute digests for our
       own keys when generating a v3 networkstatus vote. These leaks
       should never have affected anyone in practice.
 
   o Minor bugfixes (hidden service):
-    - Only retry attempts to connect to a chosen rendezvous point 8 times,
-      not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
+    - Only retry attempts to connect to a chosen rendezvous point 8
+      times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
 
   o Minor bugfixes (misc code correctness):
     - Fix various instances of undefined behavior in channeltls.c,
@@ -226,8 +227,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
       0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
     - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
-      fix some miscellaneous errors in our tests and codebase. Fixes
-      bug 11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
+      fix some miscellaneous errors in our tests and codebase. Fixes bug
+      11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
     - Always check return values for unlink, munmap, UnmapViewOfFile;
       check strftime return values more often. In some cases all we can
       do is report a warning, but this may help prevent deeper bugs from



More information about the tor-commits mailing list