[tor-commits] [tor/master] Rewrap the changelog

nickm at torproject.org nickm at torproject.org
Wed Jun 5 13:29:31 UTC 2019


commit d2de899bf4f954e0886b88f4ee2562a13f49a716
Author: Nick Mathewson <nickm at torproject.org>
Date:   Wed Jun 5 09:24:42 2019 -0400

    Rewrap the changelog
---
 ChangeLog | 128 ++++++++++++++++++++++++++++++++------------------------------
 1 file changed, 66 insertions(+), 62 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index f3eac65d5..6387d6dbb 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,82 +1,84 @@
 Changes in version 0.4.1.2-alpha - 2019-06-05
-  Tor 0.4.1.2-alpha resolves numerous bugs--some of them from the previous
-  alpha, and some much older. It also contains minor testing improvements,
-  and an improvement to the security of our authenticated sendme
-  implementation.
+  Tor 0.4.1.2-alpha resolves numerous bugs--some of them from the
+  previous alpha, and some much older. It also contains minor testing
+  improvements, and an improvement to the security of our authenticated
+  sendme implementation.
 
   o Major bugfixes (bridges):
-    - Consider our directory information to have changed when our list of
-      bridges changes. Previously, Tor would not re-compute the status of its
-      directory information when bridges changed, and therefore would not
-      realize that it was no longer able to build circuits. Fixes part of bug
-      29875.
-    - Do not count previously configured working bridges towards our total of
-      working bridges. Previously, when Tor's list of bridges changed, it
-      would think that the old bridges were still usable, and delay fetching
-      router descriptors for the new ones.  Fixes part of bug 29875; bugfix
-      on 0.3.0.1-alpha.
+    - Consider our directory information to have changed when our list
+      of bridges changes. Previously, Tor would not re-compute the
+      status of its directory information when bridges changed, and
+      therefore would not realize that it was no longer able to build
+      circuits. Fixes part of bug 29875.
+    - Do not count previously configured working bridges towards our
+      total of working bridges. Previously, when Tor's list of bridges
+      changed, it would think that the old bridges were still usable,
+      and delay fetching router descriptors for the new ones. Fixes part
+      of bug 29875; bugfix on 0.3.0.1-alpha.
 
   o Major bugfixes (Flow Control, SENDME):
-    - The decrement of the stream-level package window was done in a log_debug()
-      statement meaning that if the debug logs were not enabled, the decrement
-      would never happen and thus the window would be out of sync with the other
-      end point. Fixes bug 30628; bugfix on 0.4.1.1-alpha.
+    - The decrement of the stream-level package window was done in a
+      log_debug() statement meaning that if the debug logs were not
+      enabled, the decrement would never happen and thus the window
+      would be out of sync with the other end point. Fixes bug 30628;
+      bugfix on 0.4.1.1-alpha.
 
   o Major bugfixes (Onion service reachability):
-    - Properly clean up the introduction point map and associated state when
-      circuits change purpose from onion service circuits to pathbias,
-      measurement, or other circuit types. This should fix some instances of
-      introduction point failure. Fixes bug 29034; bugfix on 0.3.2.1-alpha.
+    - Properly clean up the introduction point map and associated state
+      when circuits change purpose from onion service circuits to
+      pathbias, measurement, or other circuit types. This should fix
+      some instances of introduction point failure. Fixes bug 29034;
+      bugfix on 0.3.2.1-alpha.
 
   o Minor features (authenticated SENDME):
-    - Ensure that there is enough randomness on every circuit
-      to prevent an attacker from successfully predicting what SENDME cells
-      they will need to send: at a random interval, if we have not send
-      randomness already, leave some extra space at the end of a cell that
-      we can fill with random bytes.  Closes ticket 26846.
+    - Ensure that there is enough randomness on every circuit to prevent
+      an attacker from successfully predicting what SENDME cells they
+      will need to send: at a random interval, if we have not send
+      randomness already, leave some extra space at the end of a cell
+      that we can fill with random bytes. Closes ticket 26846.
 
   o Minor features (continuous integration):
-    - When running coverage builds on Travis, we now set TOR_TEST_RNG_SEED,
-      to avoid RNG-based coverage differences.
-      Part of ticket 28878.
+    - When running coverage builds on Travis, we now set
+      TOR_TEST_RNG_SEED, to avoid RNG-based coverage differences. Part
+      of ticket 28878.
 
   o Minor features (maintenance):
-    - Add a new "make autostyle" target that developers can use to
-      apply all automatic Tor style and consistency conversions to the
+    - Add a new "make autostyle" target that developers can use to apply
+      all automatic Tor style and consistency conversions to the
       codebase. Closes ticket 30539.
 
   o Minor features (testing):
     - The circuitpadding tests now use a reproducible RNG implementation,
       so that if a test fails, we can learn why. Part of ticket 28878.
     - Tor's tests now support an environment variable, TOR_TEST_RNG_SEED,
-      to set the RNG seed for tests that use a reproducible RNG.
-      Part of ticket 28878.
+      to set the RNG seed for tests that use a reproducible RNG. Part of
+      ticket 28878.
     - When running tests in coverage mode, take additional care to make
-      our coverage deterministic, so that we can accurately track changes in
-      code coverage. Closes ticket 30519.
+      our coverage deterministic, so that we can accurately track
+      changes in code coverage. Closes ticket 30519.
 
   o Minor bugfixes (configuration, proxies):
-    - Fix a bug that prevented us from supporting SOCKS5 proxies that want
-      authentication along with configured (but unused!)
+    - Fix a bug that prevented us from supporting SOCKS5 proxies that
+      want authentication along with configured (but unused!)
       ClientTransportPlugins. Fixes bug 29670; bugfix on 0.2.6.1-alpha.
 
   o Minor bugfixes (controller):
     - POSTDESCRIPTOR requests should work again. Previously, they were
-      broken if a "purpose=" flag was specified.  Fixes bug 30580;
-      bugfix on 0.4.1.1-alpha.
+      broken if a "purpose=" flag was specified. Fixes bug 30580; bugfix
+      on 0.4.1.1-alpha.
     - Repair the HSFETCH command so that it works again. Previously, it
-      expected a body when it shouldn't have. Fixes bug 30646; bugfix on
-      0.4.1.1-alpha.
+      expected a body when it shouldn't have. Fixes bug 30646; bugfix
+      on 0.4.1.1-alpha.
 
   o Minor bugfixes (developer tooling):
-    - Fix pre-push hook to refrain from rejecting fixup and squash commits
-      when pushing to non-upstream git remote. Fixes bug 30286; bugfix on
-      0.4.0.1-alpha.
+    - Fix pre-push hook to refrain from rejecting fixup and squash
+      commits when pushing to non-upstream git remote. Fixes bug 30286;
+      bugfix on 0.4.0.1-alpha.
 
   o Minor bugfixes (directory authority):
-    - Move the "bandwidth-file-headers" line in directory authority votes
-      so that it conforms to dir-spec.txt. Fixes bug 30316; bugfix on
-      0.3.5.1-alpha.
+    - Move the "bandwidth-file-headers" line in directory authority
+      votes so that it conforms to dir-spec.txt. Fixes bug 30316; bugfix
+      on 0.3.5.1-alpha.
 
   o Minor bugfixes (NetBSD):
     - Fix usage of minherit() on NetBSD and other platforms that define
@@ -85,27 +87,29 @@ Changes in version 0.4.1.2-alpha - 2019-06-05
 
   o Minor bugfixes (out-of-memory handler):
     - When purging the DNS cache because of an out-of-memory condition,
-      try purging just the older entries at first.  Previously, we would
+      try purging just the older entries at first. Previously, we would
       purge the whole thing. Fixes bug 29617; bugfix on 0.3.5.1-alpha.
 
   o Minor bugfixes (portability):
-    - Avoid crashing in our tor_vasprintf() implementation on systems that
-      define neither vasprintf() nor _vscprintf(). (This bug has been here
-      long enough that we question whether people are running Tor on such
-      systems, but we're applying the fix out of caution.) Fixes bug 30561;
-      bugfix on 0.2.8.2-alpha. Found and fixed by Tobias Stoeckmann.
+    - Avoid crashing in our tor_vasprintf() implementation on systems
+      that define neither vasprintf() nor _vscprintf(). (This bug has
+      been here long enough that we question whether people are running
+      Tor on such systems, but we're applying the fix out of caution.)
+      Fixes bug 30561; bugfix on 0.2.8.2-alpha. Found and fixed by
+      Tobias Stoeckmann.
 
   o Minor bugfixes (shutdown, libevent, memory safety):
-    - Avoid use-after-free bugs when shutting down, by making sure that we
-      shut down libevent only after shutting down all of its users. We
-      believe these are harmless in practice, since they only occur on the
-      shutdown path, and do not involve any attacker-controlled data. Fixes
-      bug 30629; bugfix on 0.4.1.1-alpha.
+    - Avoid use-after-free bugs when shutting down, by making sure that
+      we shut down libevent only after shutting down all of its users.
+      We believe these are harmless in practice, since they only occur
+      on the shutdown path, and do not involve any attacker-controlled
+      data. Fixes bug 30629; bugfix on 0.4.1.1-alpha.
 
   o Minor bugfixes (static analysis):
-    - Fix several spurious Coverity warnings about the unit tests, to lower our
-      chances of missing any real warnings in the future. Fixes bug 30150;
-      bugfix on 0.3.5.1-alpha and various other Tor versions.
+    - Fix several spurious Coverity warnings about the unit tests, to
+      lower our chances of missing any real warnings in the future.
+      Fixes bug 30150; bugfix on 0.3.5.1-alpha and various other
+      Tor versions.
 
   o Testing:
     - Specify torrc paths (with empty files) when launching tor in





More information about the tor-commits mailing list