[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/master] checkpoint: fold in changes files
commit d5bb0d778931b2006d27e7e34a0ea99011657610
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date: Mon Oct 24 02:56:35 2011 -0400
checkpoint: fold in changes files
---
ChangeLog | 88 +++++++++++++++++++++++
changes/bug1297b | 8 --
changes/bug2003 | 8 --
changes/bug2430 | 4 -
changes/bug3335 | 11 ---
changes/bug3512 | 6 --
changes/bug3825a | 8 --
changes/bug4094 | 3 -
changes/bug4201 | 5 --
changes/bug4212 | 13 ----
changes/bug4251 | 8 --
changes/bug4259 | 4 -
changes/dont-warn-about-rfc1918-socksport-addrs | 7 --
changes/geoip-october2011 | 3 -
changes/prop176 | 8 --
changes/remove_TRACK_SERVED_TIME | 4 -
changes/ticket4200 | 5 --
changes/windows_8 | 5 --
18 files changed, 88 insertions(+), 110 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 2640775..d1bb44d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,91 @@
+Changes in version 0.2.3.6-alpha - 2011-10-??
+ o Major features:
+ - Implement a new handshake protocol for authenticating Tors to
+ each other over TLS. It should be more resistant to fingerprinting
+ than previous protocols, and should require less TLS hacking for
+ future Tor implementations. Implements Proposal 185.
+ - Allow variable-length padding cells to disguise the length of
+ Tor's TLS records. Implements part of Proposal 184.
+
+ o Major bugfixes (hidden services):
+ - Don't launch a useless circuit after failing to use one of a
+ hidden service's introduction points. Previously, we would
+ launch a new introduction circuit, but not set the hidden service
+ which that circuit was intended to connect to, so it would never
+ actually be used. A different piece of code would then create a
+ new introduction circuit correctly, so this bug was harmless until
+ it caused an assertion in the client-side part of the #3825 fix
+ to fail. Bug reported by katmagic and found by Sebastian Hahn.
+ Bugfix on 0.2.1.13-alpha; fixes bug 4212.
+ - When one of a hidden service's introduction points appears to be
+ unreachable, stop trying it. Previously, we would keep trying
+ to build circuits to the introduction point until we lost the
+ descriptor, usually because the user gave up and restarted Tor.
+ Partly fixes bug 3825.
+ - When an attempt to connect to a hidden service ends, consider
+ refetching its hidden service descriptors from each of the HSDir
+ relays responsible for them immediately. Previously, we would not
+ consider refetching the service's descriptors from each HSDir for
+ 15 minutes after the last fetch; this behaviour was inconvenient
+ if the hidden service was not running during the first attempt,
+ for example. Bugfix on 0.2.0.18-alpha; fixes bug 3335.
+
+ o Major bugfixes (other):
+ - Don't update the AccountingSoftLimitHitAt state file entry whenever
+ tor gets started. This prevents a wrong average bandwidth
+ estimate, which would cause relays to always start a new accounting
+ interval at the earliest possible moment. Fixes bug 2003; bugfix
+ on 0.2.2.7-alpha. Reported by BryonEldridge, who also helped
+ immensely in tracking this bug down.
+ - Fix a crash bug when changing node restrictions while a DNS lookup
+ is in-progress. Fixes bug 4259; bugfix on 0.2.2.25-alpha. Bugfix
+ by "Tey'".
+
+ o Minor bugfixes (on 0.2.3.x):
+ - Fix a bug in configure.in that kept it from building a configure
+ script with autoconf versions earlier than 2.61. Fixes bug 2430;
+ bugfix on 0.2.3.1-alpha.
+ - Don't warn users that they are exposing a client port to the
+ Internet if they have specified an RFC1918 address. Previously,
+ we would warn if the user had specified any non-loopback
+ address. Bugfix on 0.2.3.3-alpha. Fixes bug 4018; reported by Tas.
+
+ o Minor bugfixes (on 0.2.2.x and earlier):
+ - When one of a hidden service's introduction points times out,
+ consider trying it again during the next attempt to connect to
+ the HS. Previously, we would not try it again unless a newly
+ fetched descriptor contained it. Required by fixes for bugs
+ 1297 and 3825.
+ - Rephrase the log message emitted if the TestSocks check is
+ successful. Patch from Fabian Keil; fixes bug 4094.
+ - Bridges now skip DNS self-tests, to act a little more stealthily.
+ Fixes bug 4201; bugfix on 0.2.0.3-alpha, which first introduced
+ bridges. Patch by "warms0x".
+ - When a hidden service turns an extra service-side introduction
+ circuit into a general-purpose circuit, free the rend_data and
+ intro_key fields first, so we won't leak memory if the circuit
+ is cannibalized for use as another service-side introduction
+ circuit. Bugfix on 0.2.1.7-alpha; fixes bug 4251.
+
+ o Minor features:
+ - The next version of Windows will be called Windows 8, and it has
+ a major version of 6, minor version of 2. Correctly identify that
+ version instead of calling it "Very recent version". Resolves
+ ticket 4153; reported by funkstar.
+ - The bridge authority now writes statistics on how many bridge
+ descriptors it gave out in total, and how many unique descriptors
+ it gave out. Implements ticket 4200.
+ - Update to the October 4 2011 Maxmind GeoLite Country database.
+
+ o Code simplifications and refactoring:
+ - Remove the ability to define TRACK_SERVED_TIME. The feature
+ wasn't used and is now outdated that microdescriptors are around.
+ - Rename Tor functions that turn strings into addresses, so that
+ "parse" indicates that no hostname resolution occurs, and
+ "lookup" indicates that hostname resolution may occur. This
+ should help prevent mistakes in the future. Fixes bug 3512.
+
+
Changes in version 0.2.3.5-alpha - 2011-09-28
Tor 0.2.3.5-alpha fixes two bugs that make it possible to enumerate
bridge relays; fixes an assertion error that many users started hitting
diff --git a/changes/bug1297b b/changes/bug1297b
deleted file mode 100644
index 6b0169d..0000000
--- a/changes/bug1297b
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes:
-
- - When one of a hidden service's introduction points times out,
- consider trying it again during the next attempt to connect to
- the HS. Previously, we would not try it again unless a newly
- fetched descriptor contained it. Required by fixes for bugs
- 1297 and 3825.
-
diff --git a/changes/bug2003 b/changes/bug2003
deleted file mode 100644
index f1298dd..0000000
--- a/changes/bug2003
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes:
- - Don't update the AccountingSoftLimitHitAt state file entry whenever
- tor gets started. This prevents a wrong average bandwidth estimate,
- which would cause relays to always start a new accounting interval at
- the earliest possible moment. Fixes bug 2003; bugfix on 0.2.2.7-alpha.
- Reported by BryonEldridge, who also helped immensely in tracking this
- bug down. Thanks!
-
diff --git a/changes/bug2430 b/changes/bug2430
deleted file mode 100644
index 3908856..0000000
--- a/changes/bug2430
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes:
- - Fix a bug in configure.in that kept it from building a configure
- script with autoconf versions earlier than 2.61. Fixes bug 2430;
- bugfix on 0.2.3.1-alpha.
diff --git a/changes/bug3335 b/changes/bug3335
deleted file mode 100644
index 7e1e898..0000000
--- a/changes/bug3335
+++ /dev/null
@@ -1,11 +0,0 @@
- o Major bugfixes:
-
- - When an attempt to connect to a hidden service ends, consider
- refetching its hidden service descriptors from each of the HSDir
- relays responsible for them immediately. Previously, we would
- not consider refetching the service's descriptors from each
- HSDir for 15 minutes after the last fetch; this behaviour was
- inconvenient if the hidden service was not running during the
- first attempt, for example. Bugfix on 0.2.0.18-alpha; fixes bug
- 3335.
-
diff --git a/changes/bug3512 b/changes/bug3512
deleted file mode 100644
index 73eb20e..0000000
--- a/changes/bug3512
+++ /dev/null
@@ -1,6 +0,0 @@
- o Code simplifications and refactoring:
- - Rename Tor functions that turn strings into addresses, so that
- "parse" indicates that no hostname resolution occurs, and
- "lookup" indicates that hostname resolution may occur. This
- should help prevent mistakes in the future. Fixes bug 3512.
-
diff --git a/changes/bug3825a b/changes/bug3825a
deleted file mode 100644
index 6606e36..0000000
--- a/changes/bug3825a
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes:
-
- - When one of a hidden service's introduction points appears to be
- unreachable, stop trying it. Previously, we would keep trying
- to build circuits to the introduction point until we lost the
- descriptor, usually because the user gave up and restarted Tor.
- Partly fixes bug 3825.
-
diff --git a/changes/bug4094 b/changes/bug4094
deleted file mode 100644
index 9c40d41..0000000
--- a/changes/bug4094
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes:
- - Rephrase the log message emitted if the TestSocks check is
- successful. Patch from Fabian Keil; fixes bug 4094.
diff --git a/changes/bug4201 b/changes/bug4201
deleted file mode 100644
index 6f7d715..0000000
--- a/changes/bug4201
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes:
- - Bridges now skip DNS self-tests, to act a little more stealthily.
- Fixes bug 4201; bugfix on 0.2.0.3-alpha, which first introduced
- bridges. Patch by "warms0x".
-
diff --git a/changes/bug4212 b/changes/bug4212
deleted file mode 100644
index 6222a59..0000000
--- a/changes/bug4212
+++ /dev/null
@@ -1,13 +0,0 @@
- o Major bugfixes:
-
- - Don't launch a useless circuit after failing to use one of a
- hidden service's introduction points. Previously, we would
- launch a new introduction circuit, but not set the hidden
- service which that circuit was intended to connect to, so it
- would never actually be used. A different piece of code would
- then create a new introduction circuit correctly, so this bug
- was harmless until it caused an assertion in the client-side
- part of the #3825 fix to fail. Bug reported by katmagic and
- found by Sebastian Hahn. Bugfix on 0.2.1.13-alpha; fixes bug
- 4212.
-
diff --git a/changes/bug4251 b/changes/bug4251
deleted file mode 100644
index 303c9e6..0000000
--- a/changes/bug4251
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes:
-
- - When a hidden service turns an extra service-side introduction
- circuit into a general-purpose circuit, free the rend_data and
- intro_key fields first, so they won't be leaked if the circuit
- is cannibalized for use as another service-side introduction
- circuit. Bugfix on 0.2.1.7-alpha; fixes bug 4251.
-
diff --git a/changes/bug4259 b/changes/bug4259
deleted file mode 100644
index bfccd3a..0000000
--- a/changes/bug4259
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes:
- - Fix a crash bug when changing node restrictions while a DNS lookup
- is in-progress. Fixes bug 4259; bugfix on 0.2.2.25-alpha. Bugfix
- by "Tey'".
diff --git a/changes/dont-warn-about-rfc1918-socksport-addrs b/changes/dont-warn-about-rfc1918-socksport-addrs
deleted file mode 100644
index 9482599..0000000
--- a/changes/dont-warn-about-rfc1918-socksport-addrs
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes:
-
- - Don't warn users that they are exposing a client port to the
- Internet if they have specified an RFC1918 address. Previously,
- we would warn if the user had specified any non-loopback
- address. Bugfix on 0.2.3.3-alpha. Fixes bug 4018; reported by Tas.
-
diff --git a/changes/geoip-october2011 b/changes/geoip-october2011
deleted file mode 100644
index d5b6910..0000000
--- a/changes/geoip-october2011
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Update to the October 4 2011 Maxmind GeoLite Country database.
-
diff --git a/changes/prop176 b/changes/prop176
deleted file mode 100644
index faedc1a..0000000
--- a/changes/prop176
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major features
- - Implement a new handshake protocol for authenticating Tors to
- each other over TLS. It should be more resistant to fingerprinting
- than previous protocols, and should require less TLS hacking for
- future Tor implementations. Implements Proposal 185.
- - Allow variable-length padding cells to disguise the length of
- Tor's TLS records. Implements part of Proposal 184.
-
diff --git a/changes/remove_TRACK_SERVED_TIME b/changes/remove_TRACK_SERVED_TIME
deleted file mode 100644
index cd5d380..0000000
--- a/changes/remove_TRACK_SERVED_TIME
+++ /dev/null
@@ -1,4 +0,0 @@
- o Removed features:
- - Remove the ability to define TRACK_SERVED_TIME. The feature wasn't used
- and is now outdated that microdescriptors are around.
-
diff --git a/changes/ticket4200 b/changes/ticket4200
deleted file mode 100644
index 71bc04f..0000000
--- a/changes/ticket4200
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features:
- - The bridge authority now writes statistics on how many bridge
- descriptors it gave out in total, and how many unique descriptors
- it gave out. Implements ticket 4200.
-
diff --git a/changes/windows_8 b/changes/windows_8
deleted file mode 100644
index 405e4fa..0000000
--- a/changes/windows_8
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes:
- - The next version of Windows will be called Windows 8, and it has a major
- version of 6, minor version of 2. Correctly identify that version instead
- of calling it "Very recent version". Fixes bug 4153; reported by funkstar.
-
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits