[tor-commits] [tor/release-0.2.6] Fold stuff into 0.2.6 releasenotes and add a blurb

nickm at torproject.org nickm at torproject.org
Tue Mar 24 13:34:38 UTC 2015


commit 97ca0257e1a383aa5621f23b15671f8e32769d76
Author: Nick Mathewson <nickm at torproject.org>
Date:   Tue Mar 24 09:34:30 2015 -0400

    Fold stuff into 0.2.6 releasenotes and add a blurb
---
 ReleaseNotes |   30 ++++++++++++++++++++++++++----
 1 file changed, 26 insertions(+), 4 deletions(-)

diff --git a/ReleaseNotes b/ReleaseNotes
index 06cc09c..403303e 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -4,9 +4,18 @@ of Tor. If you want to see more detailed descriptions of the changes in
 each development snapshot, see the ChangeLog file.
 
 
-Changes in version 0.2.6.???
+Changes in version 0.2.6.6 - 2015-0?-??
 
-  Write a blurb here.
+  Tor 0.2.6.6 is the first stable release in the 0.2.6 series.
+
+  It adds numerous safety, security, correctness, and performance
+  improvements. Client programs can be configured to use more kinds
+  of sockets, AutomapHosts works better, the multithreading backend
+  is improved, cell transmission is refactored, test coverage is
+  much higher, more denial-of-service attacks are handled, guard
+  selection is improved to handle long-term guards better, pluggable
+  transports should work a bit better, and some annoying hidden
+  service performance bugs should be addressed.
 
   o New compiler and system requirements:
     - Tor 0.2.6.x requires that your compiler support more of the C99
@@ -201,6 +210,13 @@ Changes in version 0.2.6.???
       circuits through that guard. Fixes bug 9819; bugfix on
       0.2.1.1-alpha. Reported by "skruffy".
 
+  o Major bugfixes (pluggable transports):
+    - Initialize the extended OR Port authentication cookie before
+      launching pluggable transports. This prevents a race condition
+      that occured when server-side pluggable transports would cache the
+      authentication cookie before it has been (re)generated. Fixes bug
+      15240; bugfix on 0.2.5.1-alpha.
+
   o Major bugfixes (relay, stability, possible security):
     - Fix a bug that could lead to a relay crashing with an assertion
       failure if a buffer of exactly the wrong layout is passed to
@@ -276,6 +292,12 @@ Changes in version 0.2.6.???
       minutes to 30 seconds (or from one hour to 10 minutes if
       AvoidDiskWrites is set). Closes ticket 12485.
 
+  o Minor features (heartbeat):
+    - On relays, report how many connections we negotiated using each
+      version of the Tor link protocols. This information will let us
+      know if removing support for very old versions of the Tor
+      protocols is harming the network. Closes ticket 15212.
+
   o Minor features (hidden service):
     - Make Sybil attacks against hidden services harder by changing the
       minimum time required to get the HSDir flag from 25 hours up to 96
@@ -814,8 +836,8 @@ Changes in version 0.2.6.???
       ticket 14202.
     - Remove a test for a long-defunct broken version-one
       directory server.
-
-  o Code simplification and refactoring:
+    - Refactor main loop to extract the 'loop' part. This makes it
+      easier to run Tor under Shadow. Closes ticket 15176.
     - Stop using can_complete_circuits as a global variable; access it
       with a function instead.
     - Avoid using operators directly as macro arguments: this lets us



More information about the tor-commits mailing list