[tor-commits] [tor/master] edit the changelog one last time

nickm at torproject.org nickm at torproject.org
Wed Dec 31 18:24:16 UTC 2014


commit 6cb1daf062df525224ee7e3f7cd63ee858aacf9f
Author: Nick Mathewson <nickm at torproject.org>
Date:   Wed Dec 31 13:09:09 2014 -0500

    edit the changelog one last time
---
 ChangeLog |  103 ++++++++++++++++++++++++++++---------------------------------
 1 file changed, 48 insertions(+), 55 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index f1d338e..70e42de 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -11,9 +11,9 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
   should now bootstrap in seconds, rather than minutes.
 
   o Major features (relay, infrastructure):
-    - Completely revision of the code that relays use to decide which
-      cell to send next. Formerly, we selected the best circuit to write
-      on each channel, but we didn't select among channels in any
+    - Complete revision of the code that relays use to decide which cell
+      to send next. Formerly, we selected the best circuit to write on
+      each channel, but we didn't select among channels in any
       sophisticated way. Now, we choose the best circuits globally from
       among those whose channels are ready to deliver traffic.
 
@@ -21,18 +21,17 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       high/low watermark mechanism and a global scheduler loop for
       transmission prioritization across all channels as well as among
       circuits on one channel. This schedule is currently tuned to
-      (tolerantly) avoid making changes in the current network
-      performance, but it should form the basis for major circuit
-      performance increases. Code by Andrea; tuning by Rob Jansen;
-      implements ticket 9262.
+      (tolerantly) avoid making changes in network performance, but it
+      should form the basis for major circuit performance increases in
+      the future. Code by Andrea; tuning by Rob Jansen; implements
+      ticket 9262.
 
   o Major features (hidden services):
-    - Make HS port scanning more difficult by sending back REASON_DONE
-      if the exit policy didn't match. Furthermore, immediately close
-      the circuit to slow down port scanning attempts. Closes
-      ticket 13667.
+    - Make HS port scanning more difficult by immediately closing the
+      circuit when a user attempts to connect to a nonexistent port.
+      Closes ticket 13667.
     - Add a HiddenServiceStatistics option that allows Tor relays to
-      gather and publish statistics the overall size and volume of
+      gather and publish statistics about the overall size and volume of
       hidden service usage. Specifically, when this option is turned on,
       an HSDir will publish an approximate number of hidden services
       that have published descriptors to it the past 24 hours. Also, if
@@ -44,7 +43,7 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       feature is currently disabled by default. Implements feature 13192.
 
   o Major bugfixes (client, automap):
-    - Repair automapping with IPv6 addresses; this automapping should
+    - Repair automapping with IPv6 addresses. This automapping should
       have worked previously, but one piece of debugging code that we
       inserted to detect a regression actually caused the regression to
       manifest itself again. Fixes bug 13811 and bug 12831; bugfix on
@@ -58,6 +57,11 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       point would make the other introduction points get marked as
       having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
 
+  o Directory authority changes:
+    - Remove turtles as a directory authority.
+    - Add longclaw as a new (v3) directory authority. This implements
+      ticket 13296. This keeps the directory authority count at 9.
+
   o Major removed features:
     - Tor clients no longer support connecting to hidden services
       running on Tor 0.2.2.x and earlier; the Support022HiddenServices
@@ -70,7 +74,7 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       Resolves ticket 13315.
 
   o Minor features (controller):
-    - Add a "SIGNAL HEARTBEAT" Tor controller command that tells Tor to
+    - Add a "SIGNAL HEARTBEAT" controller command that tells Tor to
       write an unscheduled heartbeat message to the log. Implements
       feature 9503.
 
@@ -83,9 +87,9 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       circuits until we have successfully built a circuit. This makes
       hidden services come up faster when the network is re-enabled.
       Patch from "akwizgran". Closes ticket 13447.
-    - Inform Tor controller about nature of a failure to retrieve hidden
-      service descriptor by sending reason string with "HS_DESC FAILED"
-      controller event. Implements feature 13212.
+    - When we fail to a retrieve hidden service descriptor, send the
+      controller an "HS_DESC FAILED" controller event. Implements
+      feature 13212.
     - New HiddenServiceDirGroupReadable option to cause hidden service
       directories and hostname files to be created group-readable. Patch
       from "anon", David Stainton, and "meejah". Closes ticket 11291.
@@ -105,16 +109,16 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
 
   o Minor bugfixes (preventative security, C safety):
     - When reading a hexadecimal, base-32, or base-64 encoded value from
-      a string, always overwrite the complete output buffer. This
-      prevents some bugs where we would look at (but fortunately, not
-      reveal) uninitialized memory on the stack. Fixes bug 14013; bugfix
-      on all versions of Tor.
+      a string, always overwrite the whole output buffer. This prevents
+      some bugs where we would look at (but fortunately, not reveal)
+      uninitialized memory on the stack. Fixes bug 14013; bugfix on all
+      versions of Tor.
     - Clear all memory targetted by tor_addr_{to,from}_sockaddr(), not
       just the part that's used. This makes it harder for data leak bugs
       to occur in the event of other programming failures. Resolves
       ticket 14041.
 
-  o Minor bugfixes (client, micordescriptors):
+  o Minor bugfixes (client, microdescriptors):
     - Use a full 256 bits of the SHA256 digest of a microdescriptor when
       computing which microdescriptors to download. This keeps us from
       erroneous download behavior if two microdescriptor digests ever
@@ -159,12 +163,11 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
 
   o Minor bugfixes (logging):
     - Downgrade warnings about RSA signature failures to info log level.
-      Emit a warning when extra info document is found incompatible with
-      a corresponding router descriptor. Fixes bug 9812; bugfix
+      Emit a warning when an extra info document is found incompatible
+      with a corresponding router descriptor. Fixes bug 9812; bugfix
       on 0.0.6rc3.
-    - Log the circuit ID correctly in
-      connection_ap_handshake_attach_circuit(). Fixes bug 13701; bugfix
-      on 0.0.6.
+    - Make connection_ap_handshake_attach_circuit() log the circuit ID
+      correctly. Fixes bug 13701; bugfix on 0.0.6.
 
   o Minor bugfixes (misc):
     - Stop allowing invalid address patterns like "*/24" that contain
@@ -203,24 +206,20 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       available. If the consensus does not contain Exits, Tor will only
       build internal circuits. In this case, relevant statuses will
       contain the word "internal" as indicated in the Tor control-
-      spec.txt. When bootstrap completes, Tor will be ready to handle an
-      application requesting an internal circuit to hidden services at
-      ".onion" addresses. If a future consensus contains Exits, exit
+       spec.txt. When bootstrap completes, Tor will be ready to build
+      internal circuits. If a future consensus contains Exits, exit
       circuits may become available. Fixes part of bug 13718; bugfix on
       0.2.4.10-alpha. Patch by "teor".
     - Decrease minimum consensus interval to 10 seconds when
       TestingTorNetwork is set, or 5 seconds for the first consensus.
-      Fix assumptions throughout the code that assume larger interval
-      values. This assists in quickly bootstrapping a testing Tor
-      network. Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha.
-      Patch by "teor".
+      Fix assumptions throughout the code that assume larger intervals.
+      Fixes bugs 13718 and 13823; bugfix on 0.2.0.3-alpha. Patch
+      by "teor".
     - Avoid excluding guards from path building in minimal test
-      networks, when we're in a test network, and excluding guards would
+      networks, when we're in a test network and excluding guards would
       exclude all relays. This typically occurs in incredibly small tor
-      networks, and those using TestingAuthVoteGuard * This fix only
-      applies to minimal, testing tor networks, so it's no less secure.
-      Fixes part of bug 13718; bugfix on 0.1.1.11-alpha. Patch
-      by "teor".
+      networks, and those using "TestingAuthVoteGuard *". Fixes part of
+      bug 13718; bugfix on 0.1.1.11-alpha. Patch by "teor".
 
   o Code simplification and refactoring:
     - Stop using can_complete_circuits as a global variable; access it
@@ -230,11 +229,10 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       Closes ticket 13172.
     - Combine the functions used to parse ClientTransportPlugin and
       ServerTransportPlugin into a single function. Closes ticket 6456.
-    - Add inline functions and convenience macros for quick lookup of
-      state component of channel_t structure. Refactor various parts of
-      codebase to use convenience macros instead of checking state
-      member of channel_t directly. Fixes issue 7356.
-    - Document all members of was_router_added_t enum and rename
+    - Add inline functions and convenience macros for inspecting channel
+      state. Refactor the code to use convenience macros instead of
+      checking channel state directly. Fixes issue 7356.
+    - Document all members of was_router_added_t and rename
       ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less
       confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644.
     - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL
@@ -243,11 +241,6 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       implementation, so that we can add a new digest256map
       type trivially.
 
-  o Directory authority changes:
-    - Remove turtles as a directory authority.
-    - Add longclaw as a new (v3) directory authority. This implements
-      ticket 13296. This keeps the directory authority count at 9.
-
   o Documentation:
     - Document the bridge-authority-only 'networkstatus-bridges' file.
       Closes ticket 13713; patch from "tom".
@@ -255,12 +248,12 @@ Changes in version 0.2.6.2-alpha - 2014-12-31
       manpage. Resolves issue 13707.
     - Stop suggesting that users specify relays by nickname: it isn't a
       good idea. Also, properly cross-reference how to specify relays in
-      all parts of the manual for options that take a list of relays.
-      Closes ticket 13381.
-    - Clarify HiddenServiceDir option description in manpage to make it
-      clear that relative paths are taken with respect to the current
-      working directory of Tor instance. Also clarify that this behavior
-      is not guaranteed to remain indefinitely. Fixes issue 13913.
+      all parts of manual documenting options that take a list of
+      relays. Closes ticket 13381.
+    - Clarify the HiddenServiceDir option description in manpage to make
+      it clear that relative paths are taken with respect to the current
+      working directory. Also clarify that this behavior is not
+      guaranteed to remain indefinitely. Fixes issue 13913.
 
   o Testing:
     - New tests for many parts of channel, relay, and circuitmux





More information about the tor-commits mailing list