light cleanup, give them new blurbs
This commit is contained in:
parent
37b7eadb57
commit
78fcfc7bcd
34
ChangeLog
34
ChangeLog
|
@ -2,16 +2,15 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
|
||||
backports several important fixes from the 0.3.4.1-alpha.
|
||||
|
||||
The Tor 0.3.3 series includes several important features, including
|
||||
improved denial-of-service resistance, controller support and other
|
||||
improvements for v3 onion services, and official support for embedding
|
||||
Tor within other applications. It also include our first non-trivial
|
||||
module written in the Rust programming language. (Rust is still not
|
||||
enabled by default when building Tor.) And as usual, there are
|
||||
numerous other smaller bugfixes, features, and improvements.
|
||||
The Tor 0.3.3 series includes controller support and other improvements
|
||||
for v3 onion services, official support for embedding Tor within
|
||||
other applications, and our first non-trivial module written in the
|
||||
Rust programming language. (Rust is still not enabled by default when
|
||||
building Tor.) And as usual, there are numerous other smaller bugfixes,
|
||||
features, and improvements.
|
||||
|
||||
Below are the changes since 0.3.3.5-rc. For a list of all changes
|
||||
since 0.3.2, see the ReleaseNotes file.
|
||||
since 0.3.2.10, see the ReleaseNotes file.
|
||||
|
||||
o Major bugfixes (security, directory authority, denial-of-service):
|
||||
- Fix a bug that could have allowed an attacker to force a
|
||||
|
@ -41,8 +40,9 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
Fixes bug 25761; bugfix on 0.3.2.1.
|
||||
|
||||
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
||||
- Impose a limit on circuit cell queue size. The limit can be controlled by
|
||||
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
|
||||
- Impose a limit on circuit cell queue size. The limit can be
|
||||
controlled by a consensus parameter. Fixes bug 25226; bugfix on
|
||||
0.2.4.14-alpha.
|
||||
|
||||
o Minor features (compatibility, backport from 0.3.4.1-alpha):
|
||||
- Avoid some compilation warnings with recent versions
|
||||
|
@ -715,12 +715,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
|
|||
o Major features (IPv6, directory documents):
|
||||
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
|
||||
consensus. This information makes it easier for IPv6 clients to
|
||||
bootstrap and choose reachable entry guards. Implements 23826.
|
||||
bootstrap and choose reachable entry guards. Implements ticket 23826.
|
||||
- Add consensus method 28, which removes IPv6 ORPorts from
|
||||
microdescriptors. Now that the consensus contains IPv6 ORPorts,
|
||||
they are redundant in microdescs. This change will be used by Tor
|
||||
clients on 0.2.8.x and later. (That is to say, with all Tor
|
||||
clients having IPv6 bootstrap and guard support.) Implements 23828.
|
||||
microdescriptors. Now that the consensus contains IPv6 ORPorts, they
|
||||
are redundant in microdescs. This change will be used by Tor clients
|
||||
on 0.2.8.x and later. (That is to say, with all Tor clients that
|
||||
have IPv6 bootstrap and guard support.) Implements ticket 23828.
|
||||
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
|
||||
set by different numbers of authorities. Fixes 23870
|
||||
on 0.2.4.1-alpha.
|
||||
|
@ -804,8 +804,8 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
|
|||
- Where possible, the tor_free() macro now only evaluates its input
|
||||
once. Part of ticket 24337.
|
||||
- Check that microdesc ed25519 ids are non-zero in
|
||||
node_get_ed25519_id() before returning them. Implements 24001,
|
||||
patch by "aruna1234".
|
||||
node_get_ed25519_id() before returning them. Implements ticket
|
||||
24001, patch by "aruna1234".
|
||||
|
||||
o Minor features (directory authority):
|
||||
- Make the "Exit" flag assignment only depend on whether the exit
|
||||
|
|
34
ReleaseNotes
34
ReleaseNotes
|
@ -6,15 +6,14 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
|
||||
backports several important fixes from the 0.3.4.1-alpha.
|
||||
|
||||
The Tor 0.3.3 series includes several important features, including
|
||||
controller support and other
|
||||
improvements for v3 onion services, and official support for embedding
|
||||
Tor within other applications. It also include our first non-trivial
|
||||
module written in the Rust programming language. (Rust is still not
|
||||
enabled by default when building Tor.) And as usual, there are
|
||||
numerous other smaller bugfixes, features, and improvements.
|
||||
The Tor 0.3.3 series includes controller support and other improvements
|
||||
for v3 onion services, official support for embedding Tor within
|
||||
other applications, and our first non-trivial module written in the
|
||||
Rust programming language. (Rust is still not enabled by default when
|
||||
building Tor.) And as usual, there are numerous other smaller bugfixes,
|
||||
features, and improvements.
|
||||
|
||||
Below are the changes since the 0.3.2 series. For a list of only the changes
|
||||
Below are the changes since 0.3.2.10. For a list of only the changes
|
||||
since 0.3.3.5-rc, see the ChangeLog file.
|
||||
|
||||
o New system requirements:
|
||||
|
@ -42,12 +41,12 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
o Major features (IPv6, directory documents):
|
||||
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
|
||||
consensus. This information makes it easier for IPv6 clients to
|
||||
bootstrap and choose reachable entry guards. Implements 23826.
|
||||
bootstrap and choose reachable entry guards. Implements ticket 23826.
|
||||
- Add consensus method 28, which removes IPv6 ORPorts from
|
||||
microdescriptors. Now that the consensus contains IPv6 ORPorts,
|
||||
they are redundant in microdescs. This change will be used by Tor
|
||||
clients on 0.2.8.x and later. (That is to say, with all Tor
|
||||
clients having IPv6 bootstrap and guard support.) Implements 23828.
|
||||
microdescriptors. Now that the consensus contains IPv6 ORPorts, they
|
||||
are redundant in microdescs. This change will be used by Tor clients
|
||||
on 0.2.8.x and later. (That is to say, with all Tor clients that
|
||||
have IPv6 bootstrap and guard support.) Implements ticket 23828.
|
||||
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
|
||||
set by different numbers of authorities. Fixes 23870
|
||||
on 0.2.4.1-alpha.
|
||||
|
@ -128,8 +127,9 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
occurred. Fixes bug 24767; bugfix on 0.0.6.
|
||||
|
||||
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
|
||||
- Impose a limit on circuit cell queue size. The limit can be controlled by
|
||||
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
|
||||
- Impose a limit on circuit cell queue size. The limit can be
|
||||
controlled by a consensus parameter. Fixes bug 25226; bugfix on
|
||||
0.2.4.14-alpha.
|
||||
|
||||
o Minor features (cleanup):
|
||||
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
|
||||
|
@ -164,8 +164,8 @@ Changes in version 0.3.3.6 - 2018-05-22
|
|||
- Where possible, the tor_free() macro now only evaluates its input
|
||||
once. Part of ticket 24337.
|
||||
- Check that microdesc ed25519 ids are non-zero in
|
||||
node_get_ed25519_id() before returning them. Implements 24001,
|
||||
patch by "aruna1234".
|
||||
node_get_ed25519_id() before returning them. Implements ticket
|
||||
24001, patch by "aruna1234".
|
||||
|
||||
o Minor features (directory authority):
|
||||
- When directory authorities are unable to add signatures to a
|
||||
|
|
Loading…
Reference in New Issue