[tor-commits] [tor] 02/03: release: ChangeLog/ReleaseNotes fixes

gitolite role git at cupani.torproject.org
Thu Aug 11 14:34:46 UTC 2022


This is an automated email from the git hooks/post-receive script.

dgoulet pushed a commit to branch release-0.4.7
in repository tor.

commit cabfbb4f18cbcb22449d16e0c0a3d6f806c56b02
Author: David Goulet <dgoulet at torproject.org>
AuthorDate: Thu Aug 11 10:29:33 2022 -0400

    release: ChangeLog/ReleaseNotes fixes
    
    Signed-off-by: David Goulet <dgoulet at torproject.org>
---
 ChangeLog    | 31 +++++++++++++++++++------------
 ReleaseNotes | 31 +++++++++++++++++++------------
 2 files changed, 38 insertions(+), 24 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 38c7dd6d22..66e575d1c8 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,6 +1,13 @@
-INSERT SUMMARY BLURP
-
 Changes in version 0.4.7.9 - 2022-08-11
+  This version contains several major fixes aimed at reducing memory pressure on
+  relays and possible side-channel. It also contains a major bugfix related to
+  congestion control also aimed at reducing memory pressure on relays.
+  Finally, there is last one major bugfix related to Vanguard L2 layer node
+  selection.
+
+  We strongly recommend to upgrade to this version especially for Exit relays
+  in order to help the network defend against this ongoing DDoS.
+
   o Major bugfixes (congestion control):
     - Implement RFC3742 Limited Slow Start. Congestion control was
       overshooting the congestion window during slow start, particularly
@@ -13,13 +20,13 @@ Changes in version 0.4.7.9 - 2022-08-11
       on 0.4.7.5-alpha.
 
   o Major bugfixes (relay):
-    - Remove OR connections btrack subsystem entries when the
-      connections closes normally. Before this, we would only close it
-      on error and thus leaking memory for each normal OR connections.
-      Fixes bug 40604; bugfix on 0.4.0.1-alpha.
-    - Stop sending TRUNCATED cell and instead close the circuits which
-      sends a DESTROY cell so every relay in the circuit path can stop
-      queuing cells. Fixes bug 40623; bugfix on 0.1.0.2-rc.
+    - Remove OR connections btrack subsystem entries when the connections
+      close normally. Before this, we would only remove the entry on error and
+      thus leaking memory for each normal OR connections. Fixes bug 40604;
+      bugfix on 0.4.0.1-alpha.
+    - Stop sending TRUNCATED cell and instead close the circuit from which we
+      received a DESTROY cell. This makes every relay in the circuit path to
+      stop queuing cells. Fixes bug 40623; bugfix on 0.1.0.2-rc.
 
   o Major bugfixes (vanguards):
     - We had omitted some checks for whether our vanguards (second layer
@@ -61,9 +68,9 @@ Changes in version 0.4.7.9 - 2022-08-11
       bugfix on 0.3.1.1-alpha.
 
   o Minor bugfixes (relay):
-    - Do not propagate either forward or backward a DESTROY remote
-      reason when closing a circuit so to avoid a possible side channel.
-      Fixes bug 40649; bugfix on 0.1.2.4-alpha.
+    - Do not propagate either forward or backward a DESTROY remote reason when
+      closing a circuit in order to avoid a possible side channel. Fixes bug
+      40649; bugfix on 0.1.2.4-alpha.
 
 
 Changes in version 0.4.7.8 - 2022-06-17
diff --git a/ReleaseNotes b/ReleaseNotes
index 708e7220c3..da8f452df4 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -2,9 +2,16 @@ This document summarizes new features and bugfixes in each stable
 release of Tor. If you want to see more detailed descriptions of the
 changes in each development snapshot, see the ChangeLog file.
 
-INSERT SUMMARY BLURP
-
 Changes in version 0.4.7.9 - 2022-08-11
+  This version contains several major fixes aimed at reducing memory pressure on
+  relays and possible side-channel. It also contains a major bugfix related to
+  congestion control also aimed at reducing memory pressure on relays.
+  Finally, there is last one major bugfix related to Vanguard L2 layer node
+  selection.
+
+  We strongly recommend to upgrade to this version especially for Exit relays
+  in order to help the network defend against this ongoing DDoS.
+
   o Major bugfixes (congestion control):
     - Implement RFC3742 Limited Slow Start. Congestion control was
       overshooting the congestion window during slow start, particularly
@@ -17,13 +24,13 @@ Changes in version 0.4.7.9 - 2022-08-11
       on 0.4.7.5-alpha.
 
   o Major bugfixes (relay):
-    - Remove OR connections btrack subsystem entries when the
-      connections closes normally. Before this, we would only close it
-      on error and thus leaking memory for each normal OR connections.
-      Fixes bug 40604; bugfix on 0.4.0.1-alpha.
-    - Stop sending TRUNCATED cell and instead close the circuits which
-      sends a DESTROY cell so every relay in the circuit path can stop
-      queuing cells. Fixes bug 40623; bugfix on 0.1.0.2-rc.
+    - Remove OR connections btrack subsystem entries when the connections
+      close normally. Before this, we would only remove the entry on error and
+      thus leaking memory for each normal OR connections. Fixes bug 40604;
+      bugfix on 0.4.0.1-alpha.
+    - Stop sending TRUNCATED cell and instead close the circuit from which we
+      received a DESTROY cell. This makes every relay in the circuit path to
+      stop queuing cells. Fixes bug 40623; bugfix on 0.1.0.2-rc.
 
   o Major bugfixes (vanguards):
     - We had omitted some checks for whether our vanguards (second layer
@@ -65,9 +72,9 @@ Changes in version 0.4.7.9 - 2022-08-11
       bugfix on 0.3.1.1-alpha.
 
   o Minor bugfixes (relay):
-    - Do not propagate either forward or backward a DESTROY remote
-      reason when closing a circuit so to avoid a possible side channel.
-      Fixes bug 40649; bugfix on 0.1.2.4-alpha.
+    - Do not propagate either forward or backward a DESTROY remote reason when
+      closing a circuit in order to avoid a possible side channel. Fixes bug
+      40649; bugfix on 0.1.2.4-alpha.
 
 
 Changes in version 0.4.7.8 - 2022-06-17

-- 
To stop receiving notification emails like this one, please contact
the administrator of this repository.


More information about the tor-commits mailing list