From 57942415ef12da43556b71d7e3398d5373570b66 Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Mon, 29 Sep 2008 06:54:32 +0000 Subject: [PATCH] changelog cleanups. give 0.2.1.6-alpha a deadline. svn:r16995 --- ChangeLog | 77 ++++++++++++++++++++++++++++--------------------------- 1 file changed, 39 insertions(+), 38 deletions(-) diff --git a/ChangeLog b/ChangeLog index b3eb32ed8..3d7deefd6 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,21 +1,21 @@ -Changes in version 0.2.1.6-alpha - 2008-09-xx +Changes in version 0.2.1.6-alpha - 2008-09-29 o Major features: - Implement proposal 121: make it possible to build hidden services - that only certain clients are allowed to connect to. This is - enforced at several points, so that unauthorized clients are - unable to send INTRODUCE cells to the service, or even (depending - on the type of authentication) to learn introduction points. This - feature raises the bar for certain kinds of active attacks against - hidden services. Code by Karsten Loesing. - - Relays now store and serve v2 hidden service descriptors by default - (i.e. new default value for HidServDirectoryV2 is 1). This is the - last step in proposal 114, which aims to make hidden service - connections more reliable. - - Allow node restrictions to work include country codes. The syntax - to exclude nodes an a country with country code XX is "ExcludeNodes - {XX}". Patch from Robert Hogan. - - Allow ExitNodes list to include IP ranges and country codes, just like - the Exclude*Nodes lists. Patch from Robert Hogan. + that only certain clients are allowed to connect to. This is + enforced at several points, so that unauthorized clients are unable + to send INTRODUCE cells to the service, or even (depending on the + type of authentication) to learn introduction points. This feature + raises the bar for certain kinds of active attacks against hidden + services. Code by Karsten Loesing. + - Relays now store and serve v2 hidden service descriptors by default, + i.e., the new default value for HidServDirectoryV2 is 1. This is + the last step in proposal 114, which aims to make hidden service + lookups more reliable. + - Allow node restrictions to include country codes. The syntax to + exclude nodes in a country with country code XX is "ExcludeNodes + {XX}". Patch from Robert Hogan. + - Allow ExitNodes list to include IP ranges and country codes, just + like the Exclude*Nodes lists. Patch from Robert Hogan. o Major bugfixes: - Fix a bug when parsing ports in tor_addr_port_parse() that caused @@ -23,12 +23,12 @@ Changes in version 0.2.1.6-alpha - 2008-09-xx relay. Fixes bug 809. Bugfix on 0.2.1.5-alpha. - When extending a circuit to a hidden service directory to upload a rendezvous descriptor using a BEGIN_DIR cell, almost 1/6 of all - requests failed, because the router descriptor has not been - downloaded yet. In these cases, do not attempt to upload the - rendezvous descriptor, but wait until the router descriptor is - downloaded and retry. Likewise, do not attempt to fetch a rendezvous - descriptor from a hidden service directory for which the router - descriptor has not yet been downloaded. Fixes bug 767. Bugfix + requests failed, because the router descriptor had not been + downloaded yet. In these cases, we now wait until the router + descriptor is downloaded, and then retry. Likewise, clients + now skip over a hidden service directory if they don't yet have + its router descriptor, rather than futilely requesting it and + putting mysterious complaints in the logs. Fixes bug 767. Bugfix on 0.2.0.10-alpha. - When fetching v0 and v2 rendezvous service descriptors in parallel, we were failing the whole hidden service request when the v0 @@ -60,18 +60,19 @@ Changes in version 0.2.1.6-alpha - 2008-09-xx the user knows what they were asking for. Fixes bug 752. Bugfix on 0.0.9rc5. Diagnosed by BarkerJr. - If we are not using BEGIN_DIR cells, don't attempt to contact hidden - service directories with non-open dir port. Bugfix on 0.2.0.10-alpha. + service directories if they have no advertised dir port. Bugfix + on 0.2.0.10-alpha. - If we overrun our per-second write limits a little, count this as - having used up our write allocation for the second, and choke outgoing - directory writes. Previously, we had only counted this when we - had met our limits precisely. Fixes bug 824. Patch from by rovv. + having used up our write allocation for the second, and choke + outgoing directory writes. Previously, we had only counted this when + we had met our limits precisely. Fixes bug 824. Patch from by rovv. Bugfix on 0.2.0.x (??). - - Avoid a 0/0 calculation when calculating router uptime at directory - authorities. Bugfix on 0.2.0.8-alpha. + - Avoid a "0 divided by 0" calculation when calculating router uptime + at directory authorities. Bugfix on 0.2.0.8-alpha. o Minor bugfixes (controller): - - Make DNS resolved events into "CLOSED", not "FAILED". Bugfix on - 0.1.2.5-alpha. Fix by Robert Hogan. Resolves bug 807. + - Make DNS resolved events into "CLOSED", not "FAILED". Bugfix on + 0.1.2.5-alpha. Fix by Robert Hogan. Resolves bug 807. o Minor features: - Update to the "September 1 2008" ip-to-country file. @@ -85,19 +86,19 @@ Changes in version 0.2.1.6-alpha - 2008-09-xx port. Use "getinfo dir/status-vote/current/consensus" to fetch it. - Better logging about stability/reliability calculations on directory servers. - - Drop the requirement to have an open dir port for storing and serving - v2 hidden service descriptors. - - Authorities now serve a /tor/dbg-stability.txt URL to help debug - WFU and MTBF calculations. + - Drop the requirement to have an open dir port for storing and + serving v2 hidden service descriptors. + - Directory authorities now serve a /tor/dbg-stability.txt URL to + help debug WFU and MTBF calculations. - Implement most of Proposal 152: allow specialized servers to permit single-hop circuits, and clients to use those servers to build - single-hop circuits when using a specialized controller. Patch - from Josh Albrecht. Resolves "Bug" 768. + single-hop circuits when using a specialized controller. Patch + from Josh Albrecht. Resolves feature request 768. o Code simplifications and refactoring: - Revise the connection_new functions so that a more typesafe variant exists. This will work better with Coverity, and let us find any - actual mistakes we're making here. + actual mistakes we're making here. - Refactor unit testing logic so that dmalloc can be used sensibly with unit tests to check for memory leaks. - Move all hidden-service related fields from connection and circuit @@ -354,7 +355,7 @@ Changes in version 0.2.0.29-rc - 2008-07-08 O_CREAT flag. Fortify was complaining, and correctly so. Fixes bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19. - Correctly detect transparent proxy support on Linux hosts that - require in.h to be included before netfilter_ipv4.h. Patch + require in.h to be included before netfilter_ipv4.h. Patch from coderman. - Disallow session resumption attempts during the renegotiation stage of the v2 handshake protocol. Clients should never be trying