clean up changelog before release

svn:r11563
This commit is contained in:
Roger Dingledine 2007-09-21 20:19:38 +00:00
parent 05b027f4c0
commit 6786ebf4f9
1 changed files with 45 additions and 43 deletions

View File

@ -3,31 +3,49 @@ Changes in version 0.2.0.7-alpha - 2007-09-21
- Set up moria1 and tor26 as the first v3 directory authorities. See
doc/spec/dir-spec.txt for details on the new directory design.
o Major features (bridges):
o Major bugfixes (crashes):
- Fix possible segfaults in functions called from
rend_process_relay_cell(). Bugfix on 0.1.2.x.
o Major bugfixes (bridges):
- Fix a bug that made servers send a "404 Not found" in response to
attempts to fetch their server descriptor. This caused Tor servers
to take many minutes to establish reachability for their DirPort,
and it totally crippled bridges. Bugfix on 0.2.0.5-alpha.
- Make "UpdateBridgesFromAuthority" torrc option work: when bridge
users configure that and specify a bridge with an identity
fingerprint, now they will lookup the bridge descriptor at the
default bridge authority via a one-hop tunnel, but once circuits
are established they will switch to a three-hop tunnel for later
connections to the bridge authority.
connections to the bridge authority. Bugfix in 0.2.0.3-alpha.
o Major bugfixes (hidden services):
- Hidden services were choosing introduction points uniquely by
hexdigest, but when constructing the hidden service descriptor
they merely wrote the (potentially ambiguous) nickname.
- Clients now use the v2 intro format for hidden service
connections: they specify their chosen rendezvous point by identity
digest rather than by (potentially ambiguous) nickname. Both
are bugfixes on 0.1.2.x, and they could speed up hidden service
connections dramatically. Thanks to Karsten Loesing.
o Minor features (security):
- As a client, do not believe any server that tells us that any address
maps to an internal address space.
- As a client, do not believe any server that tells us that an
address maps to an internal address space.
- Make it possible to enable HashedControlPassword and
CookieAuthentication at the same time.
o Minor features (guard nodes):
- Tag every guard node in our state file with the version that we believe
added it, or with our own version if we add it. This way, if a user
temporarily runs an old version of Tor and then switches back to a new
one, she doesn't automatically lose her guards.
- Tag every guard node in our state file with the version that
we believe added it, or with our own version if we add it. This way,
if a user temporarily runs an old version of Tor and then switches
back to a new one, she doesn't automatically lose her guards.
o Minor features (speed):
- When implementing AES counter mode, update only the portions of the
counter buffer that need to change, and don't keep separate
network-order and host-order counters when they are the same (i.e., on
big-endian hosts.)
network-order and host-order counters when they are the same (i.e.,
on big-endian hosts.)
o Minor features (controller):
- Accept LF instead of CRLF on controller, since some software has a
@ -39,9 +57,9 @@ Changes in version 0.2.0.7-alpha - 2007-09-21
o Removed features:
- Routers no longer include bandwidth-history lines in their
descriptors; this information is already available in extra-info
documents, and including it in router descriptors took up 60% (!) of
compressed router descriptor downloads. Completes implementation of
proposal 104.
documents, and including it in router descriptors took up 60%
(!) of compressed router descriptor downloads. Completes
implementation of proposal 104.
- Remove the contrib scripts ExerciseServer.py, PathDemo.py,
and TorControl.py, as they use the old v0 controller protocol,
and are obsoleted by TorFlow anyway.
@ -51,48 +69,32 @@ Changes in version 0.2.0.7-alpha - 2007-09-21
- On OSX, stop warning the user that kqueue support in libevent is
"experimental", since it seems to have worked fine for ages.
o Major bugfixes:
- Fix possible segfaults in functions called from
rend_process_relay_cell(). Bugfix on 0.1.2.x.
- Hidden services were choosing introduction points uniquely by
hexdigest, but when constructing the hidden service descriptor
they merely wrote the (potentially ambiguous) nickname.
Bugfix on 0.1.2.x.
- Clients now use the v2 intro format for hidden service
connections: they specify their chosen rendezvous point by identity
digest rather than by (potentially ambiguous) nickname. These
changes could speed up hidden service connections dramatically.
Bugfix on 0.1.2.x.
- Fix a bug that made servers send a "404 Not found" in response to
attempts to fetch their server descriptor. This caused Tor servers
to take many minutes to establish reachability for their DirPort,
and it totally crippled bridges. Bugfix on 0.2.0.5-alpha.
o Minor bugfixes:
- When generating information telling us how to extend to a given
router, do not try to include the nickname if it is absent. Fixes
bug 467. Bugfix on 0.2.0.3-alpha
- Fix a user-triggerable segfault in expand_filename(). (There isn't
a way to trigger this remotely.) Bugfix on 0.1.2.x.
router, do not try to include the nickname if it is absent. Fixes
bug 467. Bugfix on 0.2.0.3-alpha.
- Fix a user-triggerable (but not remotely-triggerable) segfault
in expand_filename(). Bugfix on 0.1.2.x.
- Fix a memory leak when freeing incomplete requests from DNSPort.
(Found by Niels Provos with valgrind.) Bugfix on 0.2.0.1-alpha
Found by Niels Provos with valgrind. Bugfix on 0.2.0.1-alpha.
- Don't try to access (or alter) the state file when running
--list-fingerprint or --verify-config or --hash-password. (Resolves
bug 499.) Bugfix on 0.1.2.x
bug 499.) Bugfix on 0.1.2.x.
- Servers used to decline to publish their DirPort if their
BandwidthRate, RelayBandwidthRate, or MaxAdvertisedBandwidth
were below a threshold. Now they only look at BandwidthRate and
RelayBandwidthRate. Bugfix on ????
- Remove an optimization in the AES counter-mode code that assumed that
the counter never exceeded 2^68. When the counter can be set
arbitrarily as an IV (as it is by Karsten's new hidden services code),
this assumption no longer holds. Bugfix on 0.1.2.x.
RelayBandwidthRate. Bugfix on 0.1.2.x.
- Remove an optimization in the AES counter-mode code that assumed
that the counter never exceeded 2^68. When the counter can be set
arbitrarily as an IV (as it is by Karsten's new hidden services
code), this assumption no longer holds. Bugfix on 0.1.2.x.
- Resume listing "AUTHORITY" flag for authorities in network status.
Bugfix on 0.2.0.3-alpha; reported by Alex de Joode.
o Code simplifications and refactoring:
- Revamp file-writing logic so we don't need to have the entire contents
of a file in memory at once before we write to disk. Tor, meet stdio.
- Revamp file-writing logic so we don't need to have the entire
contents of a file in memory at once before we write to disk. Tor,
meet stdio.
- Turn "descriptor store" into a full-fledged type.
- Move all NT services code into a separate source file.
- Unify all code that computes medians, percentile elements, etc.