[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.3.1] Edit changelog.
commit efc306c59aa9ee1a32d1979df731f25904852709
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Tue Sep 5 09:27:41 2017 -0400
Edit changelog.
---
ChangeLog | 60 +++++++++++++++++++++++++++++++-----------------------------
1 file changed, 31 insertions(+), 29 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 816844a0e..b67742876 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,51 +1,53 @@
Changes in version 0.3.1.6-rc - 2017-09-05
Tor 0.3.1.6-rc fixes a few small bugs and annoyances in the 0.3.1
- release series.
+ release series, including a bug that produced weird behavior on
+ Windows directory caches.
This is the first release candidate in the Tor 0.3.1 series. If we
find no new bugs or regressions here, the first stable 0.3.1 release
will be nearly identical to it.
o Major bugfixes (windows, directory cache):
- - On windows, do not try to delete cached consensus documents and
- diffs, until they unmapped from memory. Allow the diff storage
- directory to grow larger in order to handle files that might need
- to stay around longer. Fixes bug 22752; bugfix on 0.3.1.1-alpha.
+ - On Windows, do not try to delete cached consensus documents and
+ diffs before they are unmapped from memory--Windows won't allow
+ that. Instead, allow the consensus cache directory to grow larger,
+ to hold files that might need to stay around longer. Fixes bug
+ 22752; bugfix on 0.3.1.1-alpha.
o Minor features (directory authority):
- - Improve the message that authorities report to relays when the
- RSA/Ed25519 key pair they present conflicts with a previously
- pinned key. Closes ticket 22348.
+ - Improve the message that authorities report to relays that present
+ RSA/Ed25519 keypairs that conflict with previously pinned keys.
+ Closes ticket 22348.
o Minor features (geoip):
- Update geoip and geoip6 to the August 3 2017 Maxmind GeoLite2
Country database.
o Minor features (testing):
- - Add a couple more tests for compression backend initialization.
- Closes ticket 22286.
+ - Add more tests for compression backend initialization. Closes
+ ticket 22286.
o Minor bugfixes (directory cache):
- - Fix a memory leak in the code that recovers space in the consensus
- directory cache. Fixes bug 23139; bugfix on 0.3.1.1-alpha.
+ - Fix a memory leak when recovering space in the consensus cache.
+ Fixes bug 23139; bugfix on 0.3.1.1-alpha.
o Minor bugfixes (hidden service):
- - A service is allowed to open a maximum number of circuits for a
- specific period of time. That value was lower than it should be (8
- vs 12) in the normal case of 3 introduction points. Fixes bug
- 22159; bugfix on 0.3.0.5-rc.
- - Fix a BUG alert during HSv3 descriptor decoding that could trigger
- with a specially crafted descriptor. Fixes bug 23233; bugfix on
- 0.3.0.1-alpha. Bug found by "haxxpop".
- - Rate limit the log if we ever go above the maximum number of
+ - Increase the number of circuits that a service is allowed to
+ open over a specific period of time. The value was lower than it
+ should be (8 vs 12) in the normal case of 3 introduction points.
+ Fixes bug 22159; bugfix on 0.3.0.5-rc.
+ - Fix a BUG warning during HSv3 descriptor decoding that could be
+ cause by a specially crafted descriptor. Fixes bug 23233; bugfix
+ on 0.3.0.1-alpha. Bug found by "haxxpop".
+ - Rate-limit the log messages if we exceed the maximum number of
allowed intro circuits. Fixes bug 22159; bugfix on 0.3.1.1-alpha.
o Minor bugfixes (logging, relay):
- - Remove a log_warn() that has been forgotten when an introduction
- point successfully established a hidden service prop224 circuit
- with a client.
- - Three other log_warn() for an introduction point have been changed
- to protocol warning because they can be failure from the network
+ - Remove a forgotten debugging message when an introduction point
+ successfully establishes a hidden service prop224 circuit with
+ a client.
+ - Change three other log_warn() for an introduction point to
+ protocol warnings, because they can be failure from the network
and are not relevant to the operator. Fixes bug 23078; bugfix on
0.3.0.1-alpha and 0.3.0.2-alpha.
@@ -58,12 +60,12 @@ Changes in version 0.3.1.6-rc - 2017-09-05
o Minor bugfixes (robustness, error handling):
- Improve our handling of the cases where OpenSSL encounters a
memory error while encoding keys and certificates. We haven't
- observed these happening in the wild, but if they do happen, we
- now detect and respond better. Fixes bug 19418; bugfix on all
- versions of Tor. Reported by Guido Vranken.
+ observed these errors in the wild, but if they do happen, we now
+ detect and respond better. Fixes bug 19418; bugfix on all versions
+ of Tor. Reported by Guido Vranken.
o Minor bugfixes (stability):
- - Avoid crashing on double-free when unable to load or process an
+ - Avoid crashing on a double-free when unable to load or process an
included file. Fixes bug 23155; bugfix on 0.3.1.1-alpha. Found
with the clang static analyzer.
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits