[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/release-0.2.2] add a blurb for 0.2.2.24-alpha



commit c111adb5fe757ea9baf9aaca151af7e8cd5e5808
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date:   Fri Apr 8 16:30:39 2011 -0400

    add a blurb for 0.2.2.24-alpha
---
 ChangeLog |   21 +++++++++++++--------
 1 files changed, 13 insertions(+), 8 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 8d47e3d..9c9ccc3 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,12 +1,10 @@
-Changes in version 0.2.2.24-alpha - 2011-04-0?
+Changes in version 0.2.2.24-alpha - 2011-04-08
+  Tor 0.2.2.24-alpha fixes a variety of bugs, including a big bug that
+  prevented Tor clients from effectively using "multihomed" bridges,
+  that is, bridges that listen on multiple ports or IP addresses so users
+  can continue to use some of their addresses even if others get blocked.
+
   o Major bugfixes:
-    - Directory authorities now use data collected from their own
-      uptime observations when choosing whether to assign the HSDir flag
-      to relays, instead of trusting the uptime value the relay reports in
-      its descriptor. This change helps prevent an attack where a small
-      set of nodes with frequently-changing identity keys can blackhole
-      a hidden service. (Only authorities need upgrade; others will be
-      fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709.
     - Fix a bug where bridge users who configure the non-canonical
       address of a bridge automatically switch to its canonical
       address. If a bridge listens at more than one address, it should be
@@ -18,6 +16,13 @@ Changes in version 0.2.2.24-alpha - 2011-04-0?
       to use bridge A if it's still reachable. While this behavior is
       a feature if your goal is connectivity, in some scenarios it's a
       dangerous bug. Bugfix on Tor 0.2.0.1-alpha; fixes bug 2511.
+    - Directory authorities now use data collected from their own
+      uptime observations when choosing whether to assign the HSDir flag
+      to relays, instead of trusting the uptime value the relay reports in
+      its descriptor. This change helps prevent an attack where a small
+      set of nodes with frequently-changing identity keys can blackhole
+      a hidden service. (Only authorities need upgrade; others will be
+      fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709.
 
   o Minor bugfixes:
     - When we restart our relay, we might get a successful connection

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits