[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r12363: cleanups in the changelog, plus ask nickm a question (tor/trunk)



Author: arma
Date: 2007-11-03 18:06:56 -0400 (Sat, 03 Nov 2007)
New Revision: 12363

Modified:
   tor/trunk/ChangeLog
Log:
cleanups in the changelog, plus ask nickm a question


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-11-03 21:40:50 UTC (rev 12362)
+++ tor/trunk/ChangeLog	2007-11-03 22:06:56 UTC (rev 12363)
@@ -1,4 +1,4 @@
-Changes in version 0.2.0.10-alpha - 2007-1?-??
+Changes in version 0.2.0.10-alpha - 2007-11-0?
   o Major features:
     - Separate "SOCKS_COMMAND_CONNECT_DIR" into two flags in
       edge_connection_t: want_onehop if it must attach to a circuit with
@@ -17,28 +17,29 @@
 
   o New requirements:
     - Drop support for OpenSSL version 0.9.6.  Just about nobody was using
-      it, it had no AES, and it hasn't seen any security patches since 2004.
+      it, it had no AES, and it hasn't seen any security patches since
+      2004.
 
   o Minor features:
-    - Directory authorities now decide whether routers are stable enough to
-      be guards based not on their MTBF or their uptime, but on their
-      fractional uptime: the fraction of the time that they are online.
-      (No router counts as having uptime until we've known about it for
-      at least 24 hours.)
+    - Directory authorities now decide whether routers are stable
+      enough to be guards based not on their MTBF or their uptime, but
+      on their fractional uptime: the fraction of the time that they
+      are online. (No router counts as having uptime until we've known
+      about it for at least 24 hours.)
     - Clients new hold circuitless TLS connections open for 1.5 times
       MaxCircuitDirtiness, since it is likely that they'll need to build
-      a circuit over them within that timeframe.  Previously, they held them
-      open only for KeepalivePeriod.
+      a circuit over them within that timeframe. Previously, they held
+      them open only for KeepalivePeriod.
     - Use "If-Modified-Since" to avoid retrieving consensus networkstatuses
       that we already have.
     - When we have no consensus, check FallbackNetworkstatusFile (defaults
       to $PREFIX/share/tor/fallback-consensus) for a consensus.  This way
       we start knowing some directory caches.
     - When we receive a consensus from the future, warn about skew.
-    - Improve skew reporting: try to give the user a better log message about
-      how skewed they are, and how much this matters.
-    - When we have a certificate for an authority, believe that certificate's
-      claims about the authority's IP address.
+    - Improve skew reporting: try to give the user a better log message
+      about how skewed they are, and how much this matters.
+    - When we have a certificate for an authority, believe that
+      certificate's claims about the authority's IP address.
     - New --quiet command-line option to suppress the default console log.
       Good in combination with --hash-password.
     - Authorities send back an X-Descriptor-Not-New header in response to
@@ -47,13 +48,14 @@
     - Make the "not enough dir info yet" message better.
 
   o Minor features (controller):
-    - When reporting clock skew, and we only have a lower bound on the amount
-      of skew, amount anyway, marked as a lower bound.
+    - When reporting clock skew, and we only have a lower bound on
+      the amount of skew, amount anyway, marked as a lower bound.
+      [XXX Nick: what does this mean??]
 
-  - Utilities:
+  o Utilities:
     - Update linux-tor-prio.sh script to allow QoS based on the uid of
-      the Tor prossess.  See comments in scripts.  (Patch from Marco Bonetti
-      with tweaks from Mike Perry.)
+      the Tor process. Patch from Marco Bonetti with tweaks from Mike
+      Perry.
 
   o Minor bugfixes:
     - Refuse to start if both ORPort and UseBridges are set. Bugfix
@@ -67,8 +69,8 @@
       on 0.2.0.1-alpha.  Fixes Bug 536
     - Stop leaking a cached networkstatus on exit.  Bugfix on
       0.2.0.3-alpha.
-    - Stop leaking voter information every time we free a consensus.  Bugfix
-      on 0.2.0.3-alpha.
+    - Stop leaking voter information every time we free a consensus.
+      Bugfix on 0.2.0.3-alpha.
     - Stop leaking signed data every time we check a voter signature.
       Bugfix on 0.2.0.3-alpha.
     - Stop leaking a signature every time we fail to parse a consensus or
@@ -83,7 +85,8 @@
     - Run correctly on platforms where rlim_t is larger than unsigned
       long.
     - Run correctly on platforms where the real limit for number of
-      open files is OPEN_FILES, not rlim_max from getrlimit(RLIMIT_NOFILES)
+      open files is OPEN_FILES, not rlim_max from
+      getrlimit(RLIMIT_NOFILES).
 
 
 Changes in version 0.2.0.9-alpha - 2007-10-24