[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-commits] [tor/master] fold 17135 into changelog



commit 458ccd38dda51babe6787ef9bc361136ead1d53b
Author: Nick Mathewson <nickm@xxxxxxxxxxxxxx>
Date:   Thu Sep 24 11:56:00 2015 -0400

    fold 17135 into changelog
---
 ChangeLog        |   14 ++++++++------
 changes/bug17135 |    7 -------
 2 files changed, 8 insertions(+), 13 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 5559e05..d4b1c2e 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -9,17 +9,19 @@ Changes in version 0.2.7.3-rc - 2015-09-2?
   test-full-online", requiring stem and chutney and a network
   connection) raise the coverage to XXX.
 
-  If this is your first time upgrading a relay to Tor 0.2.7, your Tor
-  relay will, by default, generate a new Ed25519 identity key. If you
-  would prefer to keep your Ed25519 identity key offline or encrypted
-  for improved security, you can do so by following the instructions
-  at XXX.
-
   o Major features (security, hidden services):
     - Hidden services are required to use more than one EntryNode, to
       avoid a guard discovery attack. See ticket for more information.
       Fixes ticket 14917.
 
+  o Major features (Ed25519 keys, keypinning):
+    - The key-pinning option on directory authorities is now advisory-
+      only by default. In a future version, or when the AuthDirPinKeys
+      option is set, pins are enforced again. Disabling key-pinning
+      seemed like a good idea so that we can survive the fallout of any
+      usability problems associated with ed25519 keys. Closes
+      ticket 17135.
+
   o Major features (ed25519 performance):
     - Improve the speed of Ed25519 operations and Curve25519 keypair
       generation when built targeting 32 bit x86 platforms with SSE2
diff --git a/changes/bug17135 b/changes/bug17135
deleted file mode 100644
index 0a0c57e..0000000
--- a/changes/bug17135
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major features (Ed25519 keys, keypinning)
-    - The key-pinning option on directory authorities is now
-      advisory-only by default. In a future version, or when the
-      AuthDirPinKeys option is set, pins are enforced again.
-      Disabling key-pinning seemed like a good idea so that we can
-      survive the fallout of any usability problems associated with
-      ed25519 keys. Closes ticket 17135.

_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits