[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.3.3] a few more changelog fixes
commit 35956bce4957ebe2d68204d8fbee1a0cb9a0a480
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date: Tue May 22 15:47:18 2018 -0400
a few more changelog fixes
---
ChangeLog | 28 ++++++++++++----------------
ReleaseNotes | 31 ++++++++++++-------------------
2 files changed, 24 insertions(+), 35 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 717776f7c..ac4d095a7 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -163,7 +163,7 @@ Changes in version 0.3.3.5-rc - 2018-04-15
- Revert a misformatting issue in the ExitPolicy documentation.
Fixes bug 25582; bugfix on 0.3.3.1-alpha.
- o Minor bugfixes (exit node DNS retries):
+ o Minor bugfixes (exit relay DNS retries):
- Re-attempt timed-out DNS queries 3 times before failure, since our
timeout is 5 seconds for them, but clients wait 10-15. Also allow
slightly more timeouts per resolver when an exit has multiple
@@ -235,15 +235,17 @@ Changes in version 0.3.3.4-alpha - 2018-03-29
circuit from the controller to become a multihop circuit. Fixes
bug 24903; bugfix on 0.2.5.2-alpha.
- o Minor bugfixes (networking):
- - Tor will no longer reject IPv6 address strings from TorBrowser
+ o Major bugfixes (networking):
+ - Tor will no longer reject IPv6 address strings from Tor Browser
when they are passed as hostnames in SOCKS5 requests. Fixes bug
25036, bugfix on Tor 0.3.1.2.
+
+ o Minor bugfixes (networking):
- string_is_valid_hostname() will not consider IP strings to be
valid hostnames. Fixes bug 25055; bugfix on Tor 0.2.5.5.
o Minor bugfixes (onion service v3):
- - Avoid an assertion failure when the next the next onion service
+ - Avoid an assertion failure when the next onion service
descriptor rotation type is out of sync with the consensus's
valid-after time. Instead, log a warning message with extra
information, so we can better hunt down the cause of this
@@ -750,7 +752,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
experience with Rust, and plan future Rust integration work.
Implementation by Chelsea Komlo. Closes ticket 22840.
- o Major features (storage, configuration):
+ o Minor features (storage, configuration):
- Users can store cached directory documents somewhere other than
the DataDirectory by using the CacheDirectory option. Similarly,
the storage location for relay's keys can be overridden with the
@@ -787,10 +789,10 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
o Minor feature (IPv6):
- Make IPv6-only clients wait for microdescs for relays, even if we
were previously using descriptors (or were using them as a bridge)
- and have a cached descriptor for them. Implements 23827.
+ and have a cached descriptor for them. Implements ticket 23827.
- When a consensus has IPv6 ORPorts, make IPv6-only clients use
them, rather than waiting to download microdescriptors.
- Implements 23827.
+ Implements ticket 23827.
o Minor features (cleanup):
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
@@ -807,12 +809,6 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
node_get_ed25519_id() before returning them. Implements ticket
24001, patch by "aruna1234".
- o Minor features (directory authority):
- - Make the "Exit" flag assignment only depend on whether the exit
- policy allows connections to ports 80 and 443. Previously relays
- would get the Exit flag if they allowed connections to one of
- these ports and also port 6667. Resolves ticket 23637.
-
o Minor features (embedding):
- Tor can now start with a preauthenticated control connection
created by the process that launched it. This feature is meant for
@@ -823,7 +819,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
- On most errors that would cause Tor to exit, it now tries to
return from the tor_main() function, rather than calling the
system exit() function. Most users won't notice a difference here,
- but it should make a significant for programs that run Tor inside
+ but it should be significant for programs that run Tor inside
a separate thread: they should now be able to survive Tor's exit
conditions rather than having Tor shut down the entire process.
Closes ticket 23848.
@@ -923,7 +919,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
SIO_IDEAL_SEND_BACKLOG_QUERY. Closes ticket 22798. Patch
from Vort.
- o Minor features (relay):
+ o Major features (relay):
- Implement an option, ReducedExitPolicy, to allow an Tor exit relay
operator to use a more reasonable ("reduced") exit policy, rather
than the default one. If you want to run an exit node without
@@ -1083,7 +1079,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
adding very little except for unit test.
o Code simplification and refactoring (circuit rendezvous):
- - Split the client-size rendezvous circuit lookup into two
+ - Split the client-side rendezvous circuit lookup into two
functions: one that returns only established circuits and another
that returns all kinds of circuits. Closes ticket 23459.
diff --git a/ReleaseNotes b/ReleaseNotes
index bccaae234..e57f970e4 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -82,7 +82,7 @@ Changes in version 0.3.3.6 - 2018-05-22
experience with Rust, and plan future Rust integration work.
Implementation by Chelsea Komlo. Closes ticket 22840.
- o Major features (storage, configuration):
+ o Minor features (storage, configuration):
- Users can store cached directory documents somewhere other than
the DataDirectory by using the CacheDirectory option. Similarly,
the storage location for relay's keys can be overridden with the
@@ -170,10 +170,6 @@ Changes in version 0.3.3.6 - 2018-05-22
o Minor features (directory authority):
- When directory authorities are unable to add signatures to a
pending consensus, log the reason why. Closes ticket 24849.
- - Make the "Exit" flag assignment only depend on whether the exit
- policy allows connections to ports 80 and 443. Previously relays
- would get the Exit flag if they allowed connections to one of
- these ports and also port 6667. Resolves ticket 23637.
o Minor features (embedding):
- Tor can now start with a preauthenticated control connection
@@ -185,7 +181,7 @@ Changes in version 0.3.3.6 - 2018-05-22
- On most errors that would cause Tor to exit, it now tries to
return from the tor_main() function, rather than calling the
system exit() function. Most users won't notice a difference here,
- but it should make a significant for programs that run Tor inside
+ but it should be significant for programs that run Tor inside
a separate thread: they should now be able to survive Tor's exit
conditions rather than having Tor shut down the entire process.
Closes ticket 23848.
@@ -256,10 +252,10 @@ Changes in version 0.3.3.6 - 2018-05-22
o Minor features (IPv6):
- Make IPv6-only clients wait for microdescs for relays, even if we
were previously using descriptors (or were using them as a bridge)
- and have a cached descriptor for them. Implements 23827.
+ and have a cached descriptor for them. Implements ticket 23827.
- When a consensus has IPv6 ORPorts, make IPv6-only clients use
them, rather than waiting to download microdescriptors.
- Implements 23827.
+ Implements ticket 23827.
o Minor features (log messages):
- Improve log message in the out-of-memory handler to include
@@ -302,7 +298,7 @@ Changes in version 0.3.3.6 - 2018-05-22
SIO_IDEAL_SEND_BACKLOG_QUERY. Closes ticket 22798. Patch
from Vort.
- o Minor features (relay):
+ o Major features (relay):
- Implement an option, ReducedExitPolicy, to allow an Tor exit relay
operator to use a more reasonable ("reduced") exit policy, rather
than the default one. If you want to run an exit node without
@@ -402,7 +398,7 @@ Changes in version 0.3.3.6 - 2018-05-22
but we forgot to say so in the man page. Fixes bug 26052; bugfix
on 0.3.2.6-alpha.
- o Minor bugfixes (exit node DNS retries):
+ o Minor bugfixes (exit relay DNS retries):
- Re-attempt timed-out DNS queries 3 times before failure, since our
timeout is 5 seconds for them, but clients wait 10-15. Also allow
slightly more timeouts per resolver when an exit has multiple
@@ -467,15 +463,17 @@ Changes in version 0.3.3.6 - 2018-05-22
runs "make test-network-all". Fixes bug 24677; bugfix on
0.2.9.3-alpha. Patch by "ffmancera".
- o Minor bugfixes (networking):
- - Tor will no longer reject IPv6 address strings from TorBrowser
+ o Major bugfixes (networking):
+ - Tor will no longer reject IPv6 address strings from Tor Browser
when they are passed as hostnames in SOCKS5 requests. Fixes bug
25036, bugfix on Tor 0.3.1.2.
+
+ o Minor bugfixes (networking):
- string_is_valid_hostname() will not consider IP strings to be
valid hostnames. Fixes bug 25055; bugfix on Tor 0.2.5.5.
o Minor bugfixes (onion service v3):
- - Avoid an assertion failure when the next the next onion service
+ - Avoid an assertion failure when the next onion service
descriptor rotation type is out of sync with the consensus's
valid-after time. Instead, log a warning message with extra
information, so we can better hunt down the cause of this
@@ -533,11 +531,6 @@ Changes in version 0.3.3.6 - 2018-05-22
code was not expecting to need to free() what it was given. Fixes
bug 25127; bugfix on 0.3.2.1-alpha.
- o Minor bugfixes (scheduler, KIST):
- - Avoid adding the same channel twice in the KIST scheduler pending
- list, which would waste CPU cycles. Fixes bug 24700; bugfix
- on 0.3.2.1-alpha.
-
o Minor bugfixes (spelling):
- Use the "misspell" tool to detect and fix typos throughout the
source code. Fixes bug 23650; bugfix on various versions of Tor.
@@ -619,7 +612,7 @@ Changes in version 0.3.3.6 - 2018-05-22
adding very little except for unit test.
o Code simplification and refactoring (circuit rendezvous):
- - Split the client-size rendezvous circuit lookup into two
+ - Split the client-side rendezvous circuit lookup into two
functions: one that returns only established circuits and another
that returns all kinds of circuits. Closes ticket 23459.
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits