[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r8860: clean changelog, bump to 0.1.2.3-alpha (in tor/trunk: . contrib src/win32)
- To: or-cvs@xxxxxxxxxxxxx
- Subject: [or-cvs] r8860: clean changelog, bump to 0.1.2.3-alpha (in tor/trunk: . contrib src/win32)
- From: arma@xxxxxxxx
- Date: Sun, 29 Oct 2006 21:55:18 -0500 (EST)
- Delivered-to: archiver@seul.org
- Delivered-to: or-cvs-outgoing@seul.org
- Delivered-to: or-cvs@seul.org
- Delivery-date: Sun, 29 Oct 2006 21:55:28 -0500
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-cvs@xxxxxxxxxxxxx
Author: arma
Date: 2006-10-29 21:55:17 -0500 (Sun, 29 Oct 2006)
New Revision: 8860
Modified:
tor/trunk/ChangeLog
tor/trunk/configure.in
tor/trunk/contrib/tor.nsi.in
tor/trunk/src/win32/orconfig.h
Log:
clean changelog, bump to 0.1.2.3-alpha
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/ChangeLog 2006-10-30 02:55:17 UTC (rev 8860)
@@ -1,13 +1,13 @@
-Changes in version 0.1.2.3-alpha - 2006-10-??
+Changes in version 0.1.2.3-alpha - 2006-10-29
o Minor features:
- - If most authorities set a BadExit flag for a server, do not consider
- it as a general-purpose exit. Only consider authorities that
- advertise themselves as listing bad exits.
- - Start making it possible for servers to publish less often: never
+ - Prepare for servers to publish descriptors less often: never
discard a descriptor simply for being too old until either it is
recommended by no authorities, or until we get a better one for
the same router. Make caches consider retaining old recommended
routers for even longer.
+ - If most authorities set a BadExit flag for a server, clients
+ don't think of it as a general-purpose exit. Clients only consider
+ authorities that advertise themselves as listing bad exits.
- Directory servers now provide 'Pragma: no-cache' and 'Expires'
headers for content, so that we can work better in the presence of
caching HTTP proxies.
@@ -17,38 +17,41 @@
o Minor features, controller:
- Add a REASON field to CIRC events; for backward compatibility, this
field is sent only to controllers that have enabled the extended
- event format. Also, add additional reason codes to explain why a
- given circuit has been destroyed or truncated. (Patches from Mike
- Perry)
+ event format. Also, add additional reason codes to explain why
+ a given circuit has been destroyed or truncated. (Patches from
+ Mike Perry)
- Add a REMOTE_REASON field to extended CIRC events to tell the
controller about why a remote OR told us to close a circuit.
+ - Stream events also now have REASON and REMOTE_REASON fields,
+ working much like those for circuit events.
- There's now a GETINFO ns/... field so that controllers can ask Tor
- about the current state of a router.
- - Stream events also have REASON and REMOTE_REASON fields, working
- much like those for circuit events.
- - NS events to inform a controller when our opinion of a router's
- status has changed.
+ about the current status of a router.
+ - A new event type "NS" to inform a controller when our opinion of
+ a router's status has changed.
- Add a GETINFO events/names and GETINFO features/names so controllers
can tell which events and features are supported.
- A new CLEARDNSCACHE signal to allow controllers to clear the
client-side DNS cache without expiring circuits.
- - When the controller does a "GETINFO network-status", tell it
- about even those routers whose descriptors are very old, and use
- long nicknames where appropriate.
o Security bugfixes:
- When the user sends a NEWNYM signal, clear the client-side DNS
cache too. Otherwise we continue to act on previous information.
o Minor bugfixes:
+ - Avoid sending junk to controllers or segfaulting when a controller
+ uses EVENT_NEW_DESC with verbose nicknames.
+ - Stop triggering asserts if the controller tries to extend hidden
+ service circuits (reported by mwenge).
+ - Avoid infinite loop on unexpected controller input.
+ - When the controller does a "GETINFO network-status", tell it
+ about even those routers whose descriptors are very old, and use
+ long nicknames where appropriate.
- Change NT service functions to be loaded on demand. This lets us
build with MinGW without breaking Tor for Windows 98 users.
- Do DirPort reachability tests less often, since a single test
chews through many circuits before giving up.
- In the hidden service example in torrc.sample, stop recommending
esoteric and discouraged hidden service options.
- - Avoid sending junk to controllers or segfaulting when a controller
- uses EVENT_NEW_DESC with verbose nicknames.
- When stopping an NT service, wait up to 10 sec for it to actually
stop. (Patch from Matt Edman; resolves bug 295.)
- Fix handling of verbose nicknames with ORCONN controller events:
@@ -56,8 +59,6 @@
not requested.
- When reporting verbose nicknames in entry_guards_getinfo(), avoid
printing a duplicate "$" in the keys we send (reported by mwenge).
- - Stop triggering asserts if the controller tries to extend hidden
- service circuits (reported by mwenge).
- Correctly set maximum connection limit on Cygwin. (This time
for sure!)
- Try to detect Windows correctly when cross-compiling.
@@ -70,20 +71,17 @@
unhandleable requests will now get an error rather than timing out.
- Resolve two memory leaks when rebuilding the on-disk router cache
(reported by fookoowa).
- - Avoid infinite loop on unexpected controller input.
- Clean up minor code warnings suggested by the MIPSpro C compiler,
and reported by some Centos users.
- Controller signals now work on non-Unix platforms that don't define
SIGUSR1 and SIGUSR2 the way we expect.
-
+ - Patch from Michael Mohr to contrib/cross.sh, so it checks more
+ values before failing, and always enables eventdns.
- Libevent-1.2 exports, but does not define in its headers, strlcpy.
Try to fix this in configure.in by checking for most functions
before we check for libevent.
- - Patch from Michael Mohr to cross.sh, so it checks more values
- before failing, and always enables eventdns.
-
Changes in version 0.1.2.2-alpha - 2006-10-07
o Major features:
- Make our async eventdns library on-by-default for Tor servers,
Modified: tor/trunk/configure.in
===================================================================
--- tor/trunk/configure.in 2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/configure.in 2006-10-30 02:55:17 UTC (rev 8860)
@@ -4,7 +4,7 @@
dnl See LICENSE for licensing information
AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.1.2.2-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.1.2.3-alpha)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST
Modified: tor/trunk/contrib/tor.nsi.in
===================================================================
--- tor/trunk/contrib/tor.nsi.in 2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/contrib/tor.nsi.in 2006-10-30 02:55:17 UTC (rev 8860)
@@ -31,7 +31,7 @@
!include "MUI.nsh"
-!define VERSION "0.1.2.2-alpha-dev"
+!define VERSION "0.1.2.3-alpha"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "http://tor.eff.org/"
Modified: tor/trunk/src/win32/orconfig.h
===================================================================
--- tor/trunk/src/win32/orconfig.h 2006-10-30 02:54:44 UTC (rev 8859)
+++ tor/trunk/src/win32/orconfig.h 2006-10-30 02:55:17 UTC (rev 8860)
@@ -224,5 +224,5 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
-#define VERSION "0.1.2.2-alpha-dev"
+#define VERSION "0.1.2.3-alpha"