fold in changes entries

This commit is contained in:
Roger Dingledine 2013-09-30 00:55:01 -04:00
parent 8fd9644f17
commit 63bef6c6ab
4 changed files with 27 additions and 22 deletions

View File

@ -1,3 +1,30 @@
Changes in version 0.2.4.18-rc - 2013-10-??
Tor 0.2.4.18-rc is the fourth release candidate for the Tor 0.2.4.x
series. [...]
o Minor bugfixes:
- Always call circuit_n_chan_done(chan, 0) from channel_closed(),
so we can't leak pending circuits in some cases where
run_connection_housekeeping() calls connection_or_close_normally().
Fixes bug 9776; bugfix on 0.2.4.17.
o Minor features:
- Clients no longer send timestamps in their NETINFO cells. These were
not used for anything, and they provided one small way for clients
to be distinguished from each other as they moved from network to
network or behind NAT. Implements part of proposal 222.
- Clients now round timestamps in INTRODUCE cells down to the nearest
10 minutes. If a new Support022HiddenServices option is set to 0, or
if it's set to "auto" and the feature is disabled in the consensus,
the timestamp is sent as 0 instead. Implements part of proposal 222.
- Stop sending timestamps in AUTHENTICATE cells. This is not such
a big deal from a security point of view, but it achieves no actual
good purpose, and isn't needed. Implements part of proposal 222.
- Reduce down accuracy of timestamps in hidden service descriptors.
Implements part of proposal 222.
- Update to the September 4 2013 Maxmind GeoLite Country database.
Changes in version 0.2.4.17-rc - 2013-09-05
Tor 0.2.4.17-rc is the third release candidate for the Tor 0.2.4.x
series. It adds an emergency step to help us tolerate the massive

View File

@ -1,5 +0,0 @@
o Normal bugfixes:
- Always call circuit_n_chan_done(chan, 0) from channel_closed(), so we
can't leak pending circuits in some cases where
run_connection_housekeeping() calls connection_or_close_normally().
Fixes bug #9776; bugfix on 0.2.4.17.

View File

@ -1,3 +0,0 @@
o Minor features:
- Update to the September 4 2013 Maxmind GeoLite Country database.

View File

@ -1,14 +0,0 @@
o Minor features (security, timestamp avoidance, proposal 222):
- Clients no longer send timestamps in their NETINFO cells. These were
not used for anything, and they provided one small way for clients
to be distinguished from each other as they moved from network to
network or behind NAT. Implements part of proposal 222.
- Clients now round timestamps in INTRODUCE cells down to the nearest
10 minutes. If a new Support022HiddenServices option is set to 0,
or if it's set to "auto" and the feature is disabled in the consensus,
the timestamp is sent as 0 instead. Implements part of proposal 222.
- Stop sending timestamps in AUTHENTICATE cells. This is not such
a big deal from a security point of view, but it achieves no actual
good purpose, and isn't needed. Implements part of proposal 222.
- Reduce down accuracy of timestamps in hidden service descriptors.
Implements part of proposal 222.