[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/release-0.3.2] edit changelog a bit



commit 304e2151ac96bad8d5f27c63b070b06683d50665
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Wed Dec 13 12:17:34 2017 -0500

    edit changelog a bit
---
 ChangeLog | 103 ++++++++++++++++++++++++++++++--------------------------------
 1 file changed, 50 insertions(+), 53 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index ba0fcc292..084d14896 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,77 +1,74 @@
 Changes in version 0.3.2.7-rc - 2017-12-1?
-  Tor 0.3.2.7-rc fixes various bugs in earlier versions of Tor, including
-  some that could affect reliability or correctness.
+  Tor 0.3.2.7-rc fixes various bugs in earlier versions of Tor,
+  including some that could affect reliability or correctness.
 
-  This is the first release candidate in the 0.3.2 series.  If we find no
-  new bugs or regression here, then the first stable 0.3.2. release will be
-  nearly identical to this.
+  This is the first release candidate in the 0.3.2 series. If we find no
+  new bugs or regression here, then the first stable 0.3.2. release will
+  be nearly identical to this.
 
   o Major bugfixes (circuit prediction):
-    - Fix circuit prediction logic so that a client doesn't treat a stream as
-      being "handled" by a circuit if that circuit already has isolation
-      settings on it that might make it incompatible with the stream. This
-      change should make Tor clients more responsive by improving their
-      chances of having a pre-created circuit ready for use when a new client
-      request arrives.  Fixes bug 18859; bugfix on 0.2.3.3-alpha.
+    - Fix circuit prediction logic so that a client doesn't treat a port
+      as being "handled" by a circuit if that circuit already has
+      isolation settings on it. This change should make Tor clients more
+      responsive by improving their chances of having a pre-created
+      circuit ready for use when a request arrives. Fixes bug 18859;
+      bugfix on 0.2.3.3-alpha.
 
   o Minor features (logging):
-    - Provide better warnings when the getrandom() syscall fails.
-      Closes ticket 24500.
+    - Provide better warnings when the getrandom() syscall fails. Closes
+      ticket 24500.
 
   o Minor features (portability):
     - Tor now compiles correctly on arm64 with libseccomp-dev installed.
-      (It doesn't yet work with the sandbox enabled.) Closes ticket 24424.
-
-  o Minor bugfix (KIST scheduler):
-    - Downgrade a warning to log info when the monotonic time diff is
-      negative. This can happen on platform not supporting monotonic time. The
-      scheduler recovers from this without any problem. Fixes bug 23696;
-      bugfix on 0.3.2.1-alpha.
+      (It doesn't yet work with the sandbox enabled.) Closes
+      ticket 24424.
 
   o Minor bugfixes (bridge clients, bootstrap):
     - Retry directory downloads when we get our first bridge descriptor
-      during bootstrap or while reconnecting to the network. Keep retrying
-      every time we get a bridge descriptor, until we have a reachable bridge.
-      Fixes bug 24367; bugfix on 0.2.0.3-alpha.
+      during bootstrap or while reconnecting to the network. Keep
+      retrying every time we get a bridge descriptor, until we have a
+      reachable bridge. Fixes part of bug 24367; bugfix on 0.2.0.3-alpha.
     - Stop delaying bridge descriptor fetches when we have cached bridge
       descriptors. Instead, only delay bridge descriptor fetches when we
-      have at least one reachable bridge.
-      Fixes bug 24367; bugfix on 0.2.0.3-alpha.
-    - Stop delaying directory fetches when we have cached bridge descriptors.
-      Instead, only delay bridge descriptor fetches when all our bridges are
-      definitely unreachable.
-      Fixes bug 24367; bugfix on 0.2.0.3-alpha.
+      have at least one reachable bridge. Fixes part of bug 24367;
+      bugfix on 0.2.0.3-alpha.
+    - Stop delaying directory fetches when we have cached bridge
+      descriptors. Instead, only delay bridge descriptor fetches when
+      all our bridges are definitely unreachable. Fixes part of bug
+      24367; bugfix on 0.2.0.3-alpha.
 
   o Minor bugfixes (compilation):
-    - Fix a signed/unsigned comparison warning introduced by our
-      fix to TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
+    - Fix a signed/unsigned comparison warning introduced by our fix to
+      TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
 
   o Minor bugfixes (correctness):
-    - Fix several places in our codebase where a C compiler would be likely
-      to eliminate a check, based on assuming that undefined behavior had not
-      happened elsewhere in the code.  These cases are usually a sign of
-      redundant checking, or dubious arithmetic. Found by Georg Koppen using
-      the "STACK" tool from Wang, Zeldovich, Kaashoek, and
-      Solar-Lezama. Fixes bug 24423; bugfix on various Tor versions.
-
-  o Minor bugfixes (hidden service v3):
-    - Fix a race between the circuit close and free where the service would
-      launch a new intro circuit after the close, and then fail to register it
-      before the free of the previously closed circuit. This was making the
-      service unable to find the established intro circuit and thus not upload
-      its descriptor. It can make a service unavailable for up to 24 hours.
-      Fixes bug 23603; bugfix on 0.3.2.1-alpha.
-
-  o Minor bugfixes (scheduler):
-    - Properly set the scheduler state of an unopened channel in the KIST
-      scheduler main loop. This prevents a harmless but annoying log warning.
-      Fixes bug 24502; bugfix on 0.3.2.4-alpha.
+    - Fix several places in our codebase where a C compiler would be
+      likely to eliminate a check, based on assuming that undefined
+      behavior had not happened elsewhere in the code. These cases are
+      usually a sign of redundant checking or dubious arithmetic. Found
+      by Georg Koppen using the "STACK" tool from Wang, Zeldovich,
+      Kaashoek, and Solar-Lezama. Fixes bug 24423; bugfix on various
+      Tor versions.
+
+  o Minor bugfixes (onion service v3):
+    - Fix a race where an onion service would launch a new intro circuit
+      after closing an old one, but fail to register it before freeing
+      the previously closed circuit. This bug was making the service
+      unable to find the established intro circuit and thus not upload
+      its descriptor, thus making a service unavailable for up to 24
+      hours. Fixes bug 23603; bugfix on 0.3.2.1-alpha.
 
   o Minor bugfixes (scheduler, KIST):
-    - Avoid a possible integer overflow when computing the available space on
-      the TCP buffer of a channel. This has no security implications but can
-      make KIST not behave properly by allowing more cells on a already
+    - Properly set the scheduler state of an unopened channel in the
+      KIST scheduler main loop. This prevents a harmless but annoying
+      log warning. Fixes bug 24502; bugfix on 0.3.2.4-alpha.
+    - Avoid a possible integer overflow when computing the available
+      space on the TCP buffer of a channel. This had no security
+      implications; but could make KIST allow too many cells on a
       saturated connection. Fixes bug 24590; bugfix on 0.3.2.1-alpha.
+    - Downgrade to "info" a harmless warning about the monotonic time
+      moving backwards: This can happen on platform not supporting
+      monotonic time. Fixes bug 23696; bugfix on 0.3.2.1-alpha.
 
 
 Changes in version 0.3.2.6-alpha - 2017-12-01

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits