[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.3.3] Start an 0.3.3.3-alpha changelog
commit 2286c92803785285949461fda85ed95539d93685
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date: Thu Feb 22 09:24:47 2018 -0500
Start an 0.3.3.3-alpha changelog
---
ChangeLog | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++
changes/bug24769 | 7 -------
changes/bug24978 | 7 -------
changes/bug25120 | 4 ----
changes/bug25223 | 4 ----
changes/ticket24343 | 6 ------
changes/ticket25071 | 4 ----
changes/ticket25202 | 4 ----
changes/ticket25323 | 4 ----
9 files changed, 50 insertions(+), 40 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index e572f3d12..106360549 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,53 @@
+Changes in version 0.3.3.3-alpha - 2018-02-2?
+ Tor 0.3.3.3-alpha is the third alpha release for the 0.3.3.x series.
+
+ (TROVE BLURB HERE.)
+
+ Additionally, it fixes several minor bugs and annoyances from
+ earlier releases.
+
+ o Minor features (compatibility, OpenSSL):
+ - Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
+ Previous versions of Tor would not have worked with OpenSSL 1.1.1,
+ since they neither disabled TLS 1.3 nor enabled any of the
+ ciphersuites it requires. Here we enable the TLS 1.3 ciphersuites.
+ Closes ticket 24978.
+
+ o Minor features (logging):
+ - Clarify the log messages produced when getrandom() or a related
+ entropy-generation mechanism gives an error. Closes ticket 25120.
+
+ o Minor features (testing):
+ - Add a "make test-rust" target to run the rust tests only. Closes
+ ticket 25071.
+
+ o Minor bugfixes (DoS mitigation):
+ - Add extra safety checks when refilling the circuit creation bucket
+ to ensure we never set a value that is above the allowed burst.
+ Fixes bug 25202; bugfix on 0.3.3.2-alpha.
+ - Make sure we don't modify consensus parameters if we aren't a
+ public relay when a new consensus arrives. Fixes bug 25223; bugfix
+ on 0.3.3.2-alpha.
+
+ o Minor bugfixes (man page, SocksPort):
+ - Remove dead code about the old "SocksSockets" option. To do so,
+ the SocksSocketsGroupWritable option has been renamed to
+ UnixSockssGroupWritable which does the same exact thing. The old
+ option is still usable but will warn that it is deprecated. Fixes
+ bug 24343; bugfix on 0.2.6.3.
+
+ o Minor bugfixes (performance):
+ - Reduce the number of circuits that can be opened at once during
+ the circuit build timeout phase. This is done by increasing the
+ idle timeout to 3 minutes, and lowering the maximum number of
+ concurrent learning circuits to 10. Fixes bug 24769; bugfix
+ on 0.3.1.1-alpha.
+
+ o Code simplification and refactoring:
+ - Update the "rust dependencies" submodule to be an project-level
+ repository, rather than a user repository. Closes ticket 25323.
+
+
Changes in version 0.3.3.2-alpha - 2018-02-10
Tor 0.3.3.2-alpha is the second alpha in the 0.3.3.x series. It
introduces a mechanism to handle the high loads that many relay
diff --git a/changes/bug24769 b/changes/bug24769
deleted file mode 100644
index 2893e0ff0..000000000
--- a/changes/bug24769
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (performance):
- - Reduce the number of circuits that can be opened at once during the
- circuit build timeout phase. This is done by increasing the idle timeout
- to 3 minutes, and lowering the maximum number of concurrent learning
- circuits to 10. Fixes bug 24769; bugfix on 0.3.1.1-alpha.
-
-
diff --git a/changes/bug24978 b/changes/bug24978
deleted file mode 100644
index 5dc45c744..000000000
--- a/changes/bug24978
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features (compatibility, OpenSSL):
- - Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
- Previous versions of Tor would not have worked with OpenSSL
- 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the
- ciphersuites it requires. Here we enable the TLS 1.3 ciphersuites.
- Closes ticket 24978.
-
diff --git a/changes/bug25120 b/changes/bug25120
deleted file mode 100644
index 7215756ef..000000000
--- a/changes/bug25120
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (logging):
- - Clarify the log messages produced when getrandom() or a related
- entropy-generation mechanism gives an error. Closes ticket
- 25120.
diff --git a/changes/bug25223 b/changes/bug25223
deleted file mode 100644
index fdd556350..000000000
--- a/changes/bug25223
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Make sure we don't modify consensus parameters if we aren't a public
- relay when a new consensus arrives. Fixes bug 25223; bugfix on
- 0.3.3.2-alpha.
diff --git a/changes/ticket24343 b/changes/ticket24343
deleted file mode 100644
index e62d65eb5..000000000
--- a/changes/ticket24343
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (man page, SocksPort):
- - Remove dead code about the old "SocksSockets" option. To do so, the
- SocksSocketsGroupWritable option has been renamed to
- UnixSockssGroupWritable which does the same exact thing. The old option
- is still usable but will warn that it is deprecated. Fixes bug 24343;
- bugfix on 0.2.6.3.
diff --git a/changes/ticket25071 b/changes/ticket25071
deleted file mode 100644
index 5e2917e10..000000000
--- a/changes/ticket25071
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (testing):
- - Add a "make test-rust" target to run the rust tests only.
- Closes ticket 25071.
-
diff --git a/changes/ticket25202 b/changes/ticket25202
deleted file mode 100644
index ba64abad7..000000000
--- a/changes/ticket25202
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Add extra safety checks when refilling the circuit creation bucket to
- ensure we never set a value that is above the allowed burst. Fixes
- bug 25202; bugfix on 0.3.3.2-alpha.
diff --git a/changes/ticket25323 b/changes/ticket25323
deleted file mode 100644
index 836825de5..000000000
--- a/changes/ticket25323
+++ /dev/null
@@ -1,4 +0,0 @@
- o Code simplification and refactoring:
- - Update the "rust dependencies" submodule to be an project-level
- repository, rather than a user repository. Closes ticket 25323.
-
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits