[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/master] Auto-reformat the changelog for 0.2.6.2-alpha



commit 0f5303f08a4c703431259799200e36b1c8cb9eda
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Mon Dec 22 10:03:19 2014 -0500

    Auto-reformat the changelog for 0.2.6.2-alpha
---
 ChangeLog |  263 ++++++++++++++++++++++++++-----------------------------------
 1 file changed, 110 insertions(+), 153 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 2ce2b53..87a0b3d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,46 +1,55 @@
 Changes in version 0.2.6.2-alpha - 2014-12-??
-
   Tor 0.2.6.2-alpha is the second alpha release in the 0.2.6.x series.
 
+  o Major features (relay, infrastructure): - Implement a new inter-cmux
+  comparison API, a global high/low watermark mechanism and a global
+  scheduler loop for transmission prioritization across all channels as
+  well as among circuits on one channel. This schedule is currently
+  tuned to (tolerantly) avoid making changes in the current network
+  performance, but it should form the basis major circuit performance
+  increases. Code by Andrea; implements ticket 9262.
+
+  o Testing: - New tests for many parts of channel, relay, and circuit
+  mux functionality. Code by Andrea; part of 9262.
+
   o Major features (hidden services):
     - Add a HiddenServiceStatistics option that allows Tor relays to
       gather and publish statistics about hidden service usage, to
       better understand the size and volume of the hidden service
-      network. Specifically, if a Tor relay is an HSDir it will
-      publish the approximate number of hidden services that have
-      published descriptors to it the past 24 hours. Also, if a relay
-      has acted as a hidden service rendezvous point, it will publish
-      the approximate amount of rendezvous cells it has relayed the
-      past 24 hours. The statistics themselves are obfuscated so that
-      the exact values cannot be derived. For more details see
-      proposal 238 "Better hidden service stats from Tor relays". This
-      feature is currently disabled by default. Implements feature 13192.
-
- o Major features (relay, infrastructure):
-   - Implement a new inter-cmux comparison API, a global high/low watermark
-     mechanism and a global scheduler loop for transmission prioritization
-     across all channels as well as among circuits on one channel. This
-     schedule is currently tuned to (tolerantly) avoid making changes
-     in the current network performance, but it should form the basis
-     major circuit performance increases.  Code by Andrea; implements
-     ticket 9262.
-
- o Testing:
-   - New tests for many parts of channel, relay, and circuit mux
-     functionality.  Code by Andrea; part of 9262.
+      network. Specifically, if a Tor relay is an HSDir it will publish
+      the approximate number of hidden services that have published
+      descriptors to it the past 24 hours. Also, if a relay has acted as
+      a hidden service rendezvous point, it will publish the approximate
+      amount of rendezvous cells it has relayed the past 24 hours. The
+      statistics themselves are obfuscated so that the exact values
+      cannot be derived. For more details see proposal 238 "Better
+      hidden service stats from Tor relays". This feature is currently
+      disabled by default. Implements feature 13192.
 
   o Major bugfixes:
-    - When closing an introduction circuit that was opened in
-      parallel, don't mark the introduction point as
-      unreachable. Previously, the first successful connection to an
-      introduction point would make the other uintroduction points get
-      marked as having timed out. Fixes bug 13698; bugfix on 0.0.6rc2.
+    - When closing an introduction circuit that was opened in parallel,
+      don't mark the introduction point as unreachable. Previously, the
+      first successful connection to an introduction point would make
+      the other uintroduction points get marked as having timed out.
+      Fixes bug 13698; bugfix on 0.0.6rc2.
 
   o Minor feature:
-    - When re-enabling the network, don't try to build introduction circuits
-      until we have successfully built a circuit.  This makes hidden services
-      come up faster when the network is re-enabled. Patch from
-      "akwizgran". Closes ticket 13447.
+    - When re-enabling the network, don't try to build introduction
+      circuits until we have successfully built a circuit. This makes
+      hidden services come up faster when the network is re-enabled.
+      Patch from "akwizgran". Closes ticket 13447.
+
+  o Minor features:
+    - OS X uses ipfw (FreeBSD) or pf (OpenBSD). Update the transparent
+      proxy option checks to allow for both ipfw and pf on OS X. Closes
+      ticket 14002.
+    - Update geoip to the November 15 2014 Maxmind GeoLite2
+      Country database.
+    - Update geoip6 to the November 15 2014 Maxmind GeoLite2
+      Country database.
+    - Validate hostnames in SOCKS5 requests more strictly. If SafeSocks
+      is enabled, reject requests with IP addresses as hostnames.
+      Resolves ticket 13315.
 
   o Minor features (controller):
     - Add a "SIGNAL HEARTBEAT" Tor controller command that provokes
@@ -48,144 +57,96 @@ Changes in version 0.2.6.2-alpha - 2014-12-??
       feature 9503.
 
   o Minor features (hidden services):
-    - Inform Tor controller about nature of failure to retrieve
-      hidden service descriptor by sending reason string with HS_DESC
-      FAILED controller event. Implements feature 13212.
-
-  o Minor features (hidden services):
+    - Inform Tor controller about nature of failure to retrieve hidden
+      service descriptor by sending reason string with HS_DESC FAILED
+      controller event. Implements feature 13212.
     - New HiddenServiceDirGroupReadable option to cause hidden service
-      directories and hostname files to be created group-readable.
-      Patch from "anon", David Stainton, and "meejah".
-      Closes ticket 11291.
-
-  o Minor features:
-    - OS X uses ipfw (FreeBSD) or pf (OpenBSD). Update the transparent
-      proxy option checks to allow for both ipfw and pf on OS X.
-      Closes ticket 14002.
-
-  o Minor features:
-    - Update geoip to the November 15 2014 Maxmind GeoLite2 Country database.
-
-  o Minor features:
-    - Update geoip6 to the November 15 2014 Maxmind GeoLite2 Country database.
+      directories and hostname files to be created group-readable. Patch
+      from "anon", David Stainton, and "meejah". Closes ticket 11291.
 
-  o Minor features:
-    - Validate hostnames in SOCKS5 requests more strictly. If SafeSocks
-      is enabled, reject requests with IP addresses as hostnames. Resolves
-      ticket 13315.
+  o Minor bugfixes:
+    - Silence clang warnings under --enable-expensive-hardening,
+      including: implicit truncation of 64 bit values to 32 bit; const
+      char assignment to self; tautological compare; and additional
+      parentheses around equality tests. Fixes bug 13577; bugfix
+      on 0.2.5.4-alpha.
+    - Stop allowing invalid address patterns containing both a wildcard
+      address and a bit prefix length. This affects all our address-
+      range parsing code. Fixes bug 7484; bugfix on 0.0.2pre14.
+    - The address of an array in the middle of a structure will always
+      be non-NULL. clang recognises this and complains. Disable the
+      tautologous and redundant check to silence this warning. Fixes bug
+      14001; bugfix on 0.2.1.2-alpha.
+    - Use a full 256 bits of the SHA256 digest of a microdescriptor when
+      computing which microdescriptors to download. This keeps us from
+      erroneous download behavior if two microdescriptor digests ever
+      have the same first 160 bits. Fixes part of bug 13399; bugfix
+      on 0.2.3.1-alpha.
+    - Reset a router's status if its microdescriptor digest changes,
+      even if the first 160 bits remain the same. Fixes part of bug
+      13399; bugfix on 0.2.3.1-alpha.
+    - Use circuit_has_opened() instead of
+      rend_client_rendcirc_has_opened() when a rendezvous circuit is
+      opened because circuit_has_opened() jobs is to call a specialized
+      function depending on the circuit purpose. Furthermore, a
+      controller event will be triggered here where the former did not.
+      Fixes bug 13936; bugfix on 0.1.1.5-alpha.
 
   o Minor bugfixes (hidden services):
     - Pre-check directory permissions for new hidden-services to avoid
       at least one case of "Bug: Acting on config options left us in a
       broken state. Dying." Fixes bug 13942; bugfix on 0.0.6pre1.
-
-  o Minor bugfixes (hidden services):
-    - When adding a new hidden-service (for example, via SETCONF) Tor
-      no longer logs a congratulations for running a relay. Fixes bug
+    - When adding a new hidden-service (for example, via SETCONF) Tor no
+      longer logs a congratulations for running a relay. Fixes bug
       13941; bugfix on 0.2.6.1-alpha.
-
-  o Minor bugfixes (hidden services):
     - When fetching hidden service descriptors, check not only for
-      whether we got the hidden service we had in mind, but also
-      whether we got the particular descriptors we wanted. This
-      prevents a class of inefficient but annoying DoS attacks by
-      hidden service directories. Fixes bug 13214; bugfix on
-      0.2.1.6-alpha. Reported by "special".
-
-  o Minor bugfixes (logging):
-    - Downgrade warnings about RSA signature failures to info log
-      level. Emit a warning when extra info document is found 
-      incompatible with a corresponding router descriptor. Fixes bug
-      9812; bugfix on 0.0.6rc3.
+      whether we got the hidden service we had in mind, but also whether
+      we got the particular descriptors we wanted. This prevents a class
+      of inefficient but annoying DoS attacks by hidden service
+      directories. Fixes bug 13214; bugfix on 0.2.1.6-alpha. Reported
+      by "special".
 
   o Minor bugfixes (logging):
+    - Downgrade warnings about RSA signature failures to info log level.
+      Emit a warning when extra info document is found incompatible with
+      a corresponding router descriptor. Fixes bug 9812; bugfix
+      on 0.0.6rc3.
     - Log the circuit identifier correctly in
-      connection_ap_handshake_attach_circuit().  Fixes bug 13701;
-      bugfix on 0.0.6.
-
-  o Minor bugfixes:
-    - Silence clang warnings under --enable-expensive-hardening, including:
-      implicit truncation of 64 bit values to 32 bit;
-      const char assignment to self;
-      tautological compare; and
-      additional parentheses around equality tests.
-      Fixes bug 13577; bugfix on 0.2.5.4-alpha.
-
-  o Minor bugfixes:
-    - Stop allowing invalid address patterns containing both a wildcard
-      address and a bit prefix length. This affects all our
-      address-range parsing code. Fixes bug 7484; bugfix on 0.0.2pre14.
-
-  o Minor bugfixes:
-    - The address of an array in the middle of a structure will
-      always be non-NULL. clang recognises this and complains.
-      Disable the tautologous and redundant check to silence
-      this warning.
-      Fixes bug 14001; bugfix on 0.2.1.2-alpha.
-
-  o Minor bugfixes:
-    - Use a full 256 bits of the SHA256 digest of a microdescriptor when
-      computing which microdescriptors to download.  This keeps us from
-      erroneous download behavior if two microdescriptor digests ever have
-      the same first 160 bits. Fixes part of bug 13399; bugfix on
-      0.2.3.1-alpha.
-
-    - Reset a router's status if its microdescriptor digest changes,
-      even if the first 160 bits remain the same.  Fixes part of bug
-      13399; bugfix on 0.2.3.1-alpha.
-
-  o Minor bugfixes:
-    - Use circuit_has_opened() instead of rend_client_rendcirc_has_opened()
-      when a rendezvous circuit is opened because circuit_has_opened() jobs
-      is to call a specialized function depending on the circuit purpose.
-      Furthermore, a controller event will be triggered here where the
-      former did not. Fixes bug 13936; bugfix on 0.1.1.5-alpha.
+      connection_ap_handshake_attach_circuit(). Fixes bug 13701; bugfix
+      on 0.0.6.
 
   o Code Simplification and Refactoring:
-    - Stop using can_complete_circuits as a global variable; access it with
-      a function instead.
+    - Stop using can_complete_circuits as a global variable; access it
+      with a function instead.
 
   o Code simplification and refactoring:
-
     - Remove our old, non-weighted bandwidth-based node selection code.
       Previously, we used it as a fallback when we couldn't perform
-      weighted bandwidth-based node selection.  But that would only
+      weighted bandwidth-based node selection. But that would only
       happen in the cases where we had no consensus, or when we had a
-      consensus generated by buggy or ancient directory authorities.  In
+      consensus generated by buggy or ancient directory authorities. In
       either case, it's better to use the more modern, better maintained
       algorithm, with reasonable defaults for the weights. Closes
       ticket 13126.
-
-  o Code simplification and refactoring:
     - Avoid using operators directly as macro arguments: this lets us
-      apply coccinelle transformations to our codebase more
-      directly. Closes ticket 13172.
-
-  o Code simplification and refactoring:
+      apply coccinelle transformations to our codebase more directly.
+      Closes ticket 13172.
     - Combine the functions used to parse ClientTransportPlugin and
       ServerTransportPlugin into a single function. Closes ticket 6456.
 
-  o Testing:
-    - New tests for parse_transport_line(). Part of ticket 6456.
-
   o Code simplifications and refactoring:
     - Add inline functions and convenience macros for quick lookup of
       state component of channel_t structure. Refactor various parts of
       codebase to use convenience macros instead of checking state
       member of channel_t directly. Fixes issue 7356.
-
-  o Code simplifications and refactoring:
-    - Document all members of was_router_added_t enum and rename 
+    - Document all members of was_router_added_t enum and rename
       ROUTER_WAS_NOT_NEW to ROUTER_IS_ALREADY_KNOWN to make it less
       confusable with ROUTER_WAS_TOO_OLD. Fixes issue 13644.
-
-  o Code simplifications and refactoring:
     - In connection_exit_begin_conn(), use END_CIRC_REASON_TORPROTOCOL
       constant instead of hardcoded value. Fixes issue 13840.
-
-  o Code simplifications and refactoring:
     - Refactor our generic strmap and digestmap types into a single
-      implementation, so that we can add a new digest256map type trivially.
+      implementation, so that we can add a new digest256map
+      type trivially.
 
   o Directory authority changes:
     - Remove turtles as a directory authority.
@@ -193,31 +154,27 @@ Changes in version 0.2.6.2-alpha - 2014-12-??
       ticket 13296. This keeps the directory authority count at 9.
 
   o Documentation:
-    - Document the bridge-authority-only 'networkstatus-bridges'
-      file. Closes ticket 13713; patch from "tom".
-
-  o Documentation:
-    - Fix typo in PredictedPortsRelevanceTime option description in 
+    - Document the bridge-authority-only 'networkstatus-bridges' file.
+      Closes ticket 13713; patch from "tom".
+    - Fix typo in PredictedPortsRelevanceTime option description in
       manpage. Resolves issue 13707.
-
-  o Documentation:
     - Stop suggesting that users specify nodes by nickname: it isn't a
-      good idea. Also, properly cross-reference how to specify nodes
-      in all parts of the manual for options that take a list of
-      nodes. Closes ticket 13381.
+      good idea. Also, properly cross-reference how to specify nodes in
+      all parts of the manual for options that take a list of nodes.
+      Closes ticket 13381.
 
   o Removed features:
-    - Tor clients no longer support connecting to hidden services running on
-      Tor 0.2.2.x and earlier; the Support022HiddenServices option has been
-      removed.  (There shouldn't be any hidden services running these
-      versions on the network.)  Closes ticket 7803.
+    - Tor clients no longer support connecting to hidden services
+      running on Tor 0.2.2.x and earlier; the Support022HiddenServices
+      option has been removed. (There shouldn't be any hidden services
+      running these versions on the network.) Closes ticket 7803.
 
   o Testing:
-    - In the unit tests, use 'chgrp' to change the group of the unit test
-      temporary directory to the current user, so that the sticky bit doesn't
-      interfere with tests that check directory groups. Closes 13678.
-
-
+    - New tests for parse_transport_line(). Part of ticket 6456.
+    - In the unit tests, use 'chgrp' to change the group of the unit
+      test temporary directory to the current user, so that the sticky
+      bit doesn't interfere with tests that check directory groups.
+      Closes 13678.
 
 
 Changes in version 0.2.6.1-alpha - 2014-10-30

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits