[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r12464: a blurb for 0.1.2.18; put it in releasenotes too (tor/branches/tor-0_1_2-patches)
Author: arma
Date: 2007-11-10 19:33:04 -0500 (Sat, 10 Nov 2007)
New Revision: 12464
Modified:
tor/branches/tor-0_1_2-patches/ChangeLog
tor/branches/tor-0_1_2-patches/ReleaseNotes
Log:
a blurb for 0.1.2.18; put it in releasenotes too
Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog 2007-11-11 00:30:46 UTC (rev 12463)
+++ tor/branches/tor-0_1_2-patches/ChangeLog 2007-11-11 00:33:04 UTC (rev 12464)
@@ -5,6 +5,11 @@
Changes in version 0.1.2.18 - 2007-10-28
+ Tor 0.1.2.18 fixes many problems including crash bugs, problems with
+ hidden service introduction that were causing huge delays, and a big
+ bug that was causing some servers to disappear from the network status
+ lists for a few hours each day.
+
o Major bugfixes (crashes):
- If a connection is shut down abruptly because of something that
happened inside connection_flushed_some(), do not call
@@ -39,11 +44,11 @@
o Minor bugfixes:
- Don't try to access (or alter) the state file when running
- --list-fingerprint or --verify-config or --hash-password. (Resolves
- bug 499.)
+ --list-fingerprint or --verify-config or --hash-password. Resolves
+ bug 499.
- When generating information telling us how to extend to a given
router, do not try to include the nickname if it is
- absent. (Resolves bug 467.)
+ absent. Resolves bug 467.
- Fix a user-triggerable segfault in expand_filename(). (There isn't
a way to trigger this remotely.)
- When sending a status event to the controller telling it that an
Modified: tor/branches/tor-0_1_2-patches/ReleaseNotes
===================================================================
--- tor/branches/tor-0_1_2-patches/ReleaseNotes 2007-11-11 00:30:46 UTC (rev 12463)
+++ tor/branches/tor-0_1_2-patches/ReleaseNotes 2007-11-11 00:33:04 UTC (rev 12464)
@@ -3,6 +3,74 @@
of Tor. If you want to see more detailed descriptions of the changes in
each development snapshot, see the ChangeLog file.
+Changes in version 0.1.2.18 - 2007-10-28
+ Tor 0.1.2.18 fixes many problems including crash bugs, problems with
+ hidden service introduction that were causing huge delays, and a big
+ bug that was causing some servers to disappear from the network status
+ lists for a few hours each day.
+
+ o Major bugfixes (crashes):
+ - If a connection is shut down abruptly because of something that
+ happened inside connection_flushed_some(), do not call
+ connection_finished_flushing(). Should fix bug 451:
+ "connection_stop_writing: Assertion conn->write_event failed"
+ Bugfix on 0.1.2.7-alpha.
+ - Fix possible segfaults in functions called from
+ rend_process_relay_cell().
+
+ o Major bugfixes (hidden services):
+ - Hidden services were choosing introduction points uniquely by
+ hexdigest, but when constructing the hidden service descriptor
+ they merely wrote the (potentially ambiguous) nickname.
+ - Clients now use the v2 intro format for hidden service
+ connections: they specify their chosen rendezvous point by identity
+ digest rather than by (potentially ambiguous) nickname. These
+ changes could speed up hidden service connections dramatically.
+
+ o Major bugfixes (other):
+ - Stop publishing a new server descriptor just because we get a
+ HUP signal. This led (in a roundabout way) to some servers getting
+ dropped from the networkstatus lists for a few hours each day.
+ - When looking for a circuit to cannibalize, consider family as well
+ as identity. Fixes bug 438. Bugfix on 0.1.0.x (which introduced
+ circuit cannibalization).
+ - When a router wasn't listed in a new networkstatus, we were leaving
+ the flags for that router alone -- meaning it remained Named,
+ Running, etc -- even though absence from the networkstatus means
+ that it shouldn't be considered to exist at all anymore. Now we
+ clear all the flags for routers that fall out of the networkstatus
+ consensus. Fixes bug 529.
+
+ o Minor bugfixes:
+ - Don't try to access (or alter) the state file when running
+ --list-fingerprint or --verify-config or --hash-password. Resolves
+ bug 499.
+ - When generating information telling us how to extend to a given
+ router, do not try to include the nickname if it is
+ absent. Resolves bug 467.
+ - Fix a user-triggerable segfault in expand_filename(). (There isn't
+ a way to trigger this remotely.)
+ - When sending a status event to the controller telling it that an
+ OR address is readable, set the port correctly. (Previously we
+ were reporting the dir port.)
+ - Fix a minor memory leak whenever a controller sends the PROTOCOLINFO
+ command. Bugfix on 0.1.2.17.
+ - When loading bandwidth history, do not believe any information in
+ the future. Fixes bug 434.
+ - When loading entry guard information, do not believe any information
+ in the future.
+ - When we have our clock set far in the future and generate an
+ onion key, then re-set our clock to be correct, we should not stop
+ the onion key from getting rotated.
+ - On some platforms, accept() can return a broken address. Detect
+ this more quietly, and deal accordingly. Fixes bug 483.
+ - It's not actually an error to find a non-pending entry in the DNS
+ cache when canceling a pending resolve. Don't log unless stuff
+ is fishy. Resolves bug 463.
+ - Don't reset trusted dir server list when we set a configuration
+ option. Patch from Robert Hogan.
+
+
Changes in version 0.1.2.17 - 2007-08-30
o Major bugfixes (security):
- We removed support for the old (v0) control protocol. It has been