[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r9246: interim tweaks (in tor/trunk: . doc src/or)



Author: arma
Date: 2007-01-02 22:45:53 -0500 (Tue, 02 Jan 2007)
New Revision: 9246

Modified:
   tor/trunk/ChangeLog
   tor/trunk/doc/dir-voting.txt
   tor/trunk/doc/tor-spec-v2.txt
   tor/trunk/doc/tor.1.in
   tor/trunk/src/or/hibernate.c
Log:
interim tweaks


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-01-02 21:47:33 UTC (rev 9245)
+++ tor/trunk/ChangeLog	2007-01-03 03:45:53 UTC (rev 9246)
@@ -1,4 +1,4 @@
-Changes in version 0.1.2.5-xxxx - 200?-??-??
+Changes in version 0.1.2.5-alpha - 2007-01-03
   o Major features:
     - Enable "BEGIN_DIR" cells: prefer to connect to the directory
       server via TLS so we do encrypted directory requests rather than
@@ -99,15 +99,16 @@
       schedule. Now the first connect attempt will wait a full 10
       seconds before switching to a new circuit. Perhaps this will help
       a lot. Based on observations from Mike Perry.
+    - Fix a bug on the Windows implementation of tor_mmap_file() that
+      would prevent the cached-routers file from ever loading (reported
+      by John Kimble).
 
   o Minor bugfixes:
-    - Fix a bug when a PF socket is first used. (Patch from Fabian Keil.)
+    - Fix a bug when a BSD-style PF socket is first used. (Patch from
+      Fabian Keil.)
     - Fix an assert failure when a directory authority sets
       AuthDirRejectUnlisted and then receives a descriptor from an
       unlisted router (reported by seeess).
-    - Fix a bug on the Windows implementation of tor_mmap_file that
-      would prevent the cached-routers file from ever loading (reported
-      by John Kimble).
     - Fix a bug in 0.1.2.2-alpha that prevented clients from asking
       to resolve an address at a given exit node even when they ask for
       it by name.

Modified: tor/trunk/doc/dir-voting.txt
===================================================================
--- tor/trunk/doc/dir-voting.txt	2007-01-02 21:47:33 UTC (rev 9245)
+++ tor/trunk/doc/dir-voting.txt	2007-01-03 03:45:53 UTC (rev 9246)
@@ -78,7 +78,7 @@
 
 2.1. Vote specifications
 
-  Votes in v2.1 are just like v2 network status documents.  We add these
+  Votes in v2.1 are similar to v2 network status documents.  We add these
   fields to the preamble:
 
      "vote-status" -- the word "vote".

Modified: tor/trunk/doc/tor-spec-v2.txt
===================================================================
--- tor/trunk/doc/tor-spec-v2.txt	2007-01-02 21:47:33 UTC (rev 9245)
+++ tor/trunk/doc/tor-spec-v2.txt	2007-01-03 03:45:53 UTC (rev 9246)
@@ -5,13 +5,13 @@
                               Roger Dingledine
                                Nick Mathewson
 
-Note: This document aims to specify Tor as implemented in 0.1.2.1-alpha-dev
+Note: This document aims to specify Tor as implemented in 0.2.1.0-alpha-dev
 and later.  Future versions of Tor will implement improved protocols, and
 compatibility is not guaranteed.
 
 THIS DOCUMENT IS UNSTABLE.  Right now, we're revising the protocol to remove
 a few long-standing limitations.  For the most stable current version of the
-protocol, see tor-spec-v0.txt; current versions of Tor are backward-compatible.
+protocol, see tor-spec.txt; current versions of Tor are backward-compatible.
 
 This specification is not a design document; most design criteria
 are not examined.  For more information on why Tor acts as it does,
@@ -271,7 +271,7 @@
    VERSIONS cells are used to introduce parameters and characteristics of
    Tor clients and servers when connections are established.
 
-4, Connection management
+4. Connection management
 
    Upon establishing a TLS connection, both parties immediately begin
    negotiating a connection protocol version and other connection parameters.
@@ -298,18 +298,18 @@
    a TLS connection has been established, the parties check whether the
    other side has an obsolete certificate (organizationName equal to "Tor"
    or "TOR").  If the other party presented an obsolete certificate,
-   we assume a v0 connection.  Otherwise, both parties send VERSIONS
+   we assume a v1 connection.  Otherwise, both parties send VERSIONS
    cells listing all their supported versions.  Upon receiving the
    other party's VERSIONS cell, the implementation begins using the
    highest-valued version common to both cells.  If the first cell from
-   the other party is _not_ a VERSIONS cell, we assume a v0 protocol.
+   the other party is _not_ a VERSIONS cell, we assume a v1 protocol.
 
    Implementations MUST discard cells that are not the first cells sent on a
    connection.
 
 4.2. MITM-prevention and time checking
 
-   If we negotiate a v1 connection or higher, the first cell we send SHOULD
+   If we negotiate a v2 connection or higher, the first cell we send SHOULD
    be a NETINFO cell.  Implementations SHOULD NOT send NETINFO cells at other
    times.
 

Modified: tor/trunk/doc/tor.1.in
===================================================================
--- tor/trunk/doc/tor.1.in	2007-01-02 21:47:33 UTC (rev 9245)
+++ tor/trunk/doc/tor.1.in	2007-01-03 03:45:53 UTC (rev 9246)
@@ -109,7 +109,7 @@
 care about this.)  Tor will use this server as an authority for hidden
 service information if the "hs" flag is set, or if the "v1" flag is set and
 the "no-hs" flag is \fBnot\fP set.  If a flag "orport=\fBport\fR" is given,
-Tor will consider use the given port to open encrypted tunnels to the
+Tor will use the given port when opening encrypted tunnels to the
 dirserver.
 If no \fBdirserver\fP line is given, Tor will use the default
 directory servers.  NOTE: this option is intended
@@ -964,7 +964,7 @@
 .LP
 .TP
 .B \fIDataDirectory\fP/bw_accounting
-Used to track bandwidth accounting values (when the current period starts and ends; how much has been read and written so far this period).  Soon to be obsoleted by state.  Only used when bandwidth accounting is enabled.
+Used to track bandwidth accounting values (when the current period starts and ends; how much has been read and written so far this period).  This file is obsolete, and the data is now stored in the 'state' file as well.  Only used when bandwidth accounting is enabled.
 .LP
 .TP
 .B \fIDataDirectory\fP/control_auth_cookie

Modified: tor/trunk/src/or/hibernate.c
===================================================================
--- tor/trunk/src/or/hibernate.c	2007-01-02 21:47:33 UTC (rev 9245)
+++ tor/trunk/src/or/hibernate.c	2007-01-03 03:45:53 UTC (rev 9246)
@@ -546,7 +546,7 @@
   uint64_t expected;
   static time_t last_recorded;
 
-  /* First, update bw_accounting. Until 0.1.2.5-x, this was the only place
+  /* First, update bw_accounting. Until 0.1.2.5-alpha, this was the only place
    * we stored this information. The format is:
    * Version\nTime\nTime\nRead\nWrite\nSeconds\nExpected-Rate\n */