[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [tor/release-0.2.4] give it a blurb and touch up the changelog stanzas
commit 00fb525b23cf070fb229e1073caae47e6401f1e2
Author: Roger Dingledine <arma@xxxxxxxxxxxxxx>
Date: Thu Sep 5 02:32:02 2013 -0400
give it a blurb and touch up the changelog stanzas
---
ChangeLog | 19 ++++++++++++-------
1 file changed, 12 insertions(+), 7 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index f237e27..1faa2b0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,4 +1,10 @@
-Changes in version 0.2.4.17-rc - 2013-09-0x
+Changes in version 0.2.4.17-rc - 2013-09-05
+ Tor 0.2.4.17-rc is the third release candidate for the Tor 0.2.4.x
+ series. It adds an emergency step to help us tolerate the massive
+ influx of users: 0.2.4 clients using the new (faster and safer) "NTor"
+ circuit-level handshakes now effectively jump the queue compared to
+ the 0.2.3 clients using "TAP" handshakes. This release also fixes a
+ big bug hindering bridge reachability tests.
o Major features:
- Relays now process the new "NTor" circuit-level handshake requests
@@ -15,20 +21,19 @@ Changes in version 0.2.4.17-rc - 2013-09-0x
- Bridges now send AUTH_CHALLENGE cells during their v3 handshakes;
previously they did not, which prevented them from receiving
successful connections from relays for self-test or bandwidth
- testing. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
- - When a relay is extending a circuit to a bridge, it needs to send a
- NETINFO cell, even when the bridge hasn't sent an AUTH_CHALLENGE
- cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
+ testing. Also, when a relay is extending a circuit to a bridge,
+ it needs to send a NETINFO cell, even when the bridge hasn't sent
+ an AUTH_CHALLENGE cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
- If the time to download the next old-style networkstatus is in
the future, do not decline to consider whether to download the
next microdescriptor networkstatus. Fixes bug 9564; bugfix on
0.2.3.14-alpha.
o Minor bugfixes:
- - Avoid double-closing the listener socket in our socketpair
+ - Avoid double-closing the listener socket in our socketpair()
replacement (used on Windows) in the case where the addresses on
our opened sockets don't match what we expected. Fixes bug 9400;
- bugfix on every released Tor version. Found by Coverity.
+ bugfix on 0.0.2pre7. Found by Coverity.
o Minor fixes (config options):
- Avoid overflows when the user sets MaxCircuitDirtiness to a
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits