light cleanup, give them new blurbs

This commit is contained in:
Roger Dingledine 2018-05-22 15:03:00 -04:00
parent 37b7eadb57
commit 78fcfc7bcd
2 changed files with 51 additions and 51 deletions

View File

@ -2,16 +2,15 @@ Changes in version 0.3.3.6 - 2018-05-22
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
backports several important fixes from the 0.3.4.1-alpha.
The Tor 0.3.3 series includes several important features, including
improved denial-of-service resistance, controller support and other
improvements for v3 onion services, and official support for embedding
Tor within other applications. It also include our first non-trivial
module written in the Rust programming language. (Rust is still not
enabled by default when building Tor.) And as usual, there are
numerous other smaller bugfixes, features, and improvements.
The Tor 0.3.3 series includes controller support and other improvements
for v3 onion services, official support for embedding Tor within
other applications, and our first non-trivial module written in the
Rust programming language. (Rust is still not enabled by default when
building Tor.) And as usual, there are numerous other smaller bugfixes,
features, and improvements.
Below are the changes since 0.3.3.5-rc. For a list of all changes
since 0.3.2, see the ReleaseNotes file.
since 0.3.2.10, see the ReleaseNotes file.
o Major bugfixes (security, directory authority, denial-of-service):
- Fix a bug that could have allowed an attacker to force a
@ -41,8 +40,9 @@ Changes in version 0.3.3.6 - 2018-05-22
Fixes bug 25761; bugfix on 0.3.2.1.
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
- Impose a limit on circuit cell queue size. The limit can be controlled by
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
- Impose a limit on circuit cell queue size. The limit can be
controlled by a consensus parameter. Fixes bug 25226; bugfix on
0.2.4.14-alpha.
o Minor features (compatibility, backport from 0.3.4.1-alpha):
- Avoid some compilation warnings with recent versions
@ -715,12 +715,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
o Major features (IPv6, directory documents):
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
consensus. This information makes it easier for IPv6 clients to
bootstrap and choose reachable entry guards. Implements 23826.
bootstrap and choose reachable entry guards. Implements ticket 23826.
- Add consensus method 28, which removes IPv6 ORPorts from
microdescriptors. Now that the consensus contains IPv6 ORPorts,
they are redundant in microdescs. This change will be used by Tor
clients on 0.2.8.x and later. (That is to say, with all Tor
clients having IPv6 bootstrap and guard support.) Implements 23828.
microdescriptors. Now that the consensus contains IPv6 ORPorts, they
are redundant in microdescs. This change will be used by Tor clients
on 0.2.8.x and later. (That is to say, with all Tor clients that
have IPv6 bootstrap and guard support.) Implements ticket 23828.
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
set by different numbers of authorities. Fixes 23870
on 0.2.4.1-alpha.
@ -804,8 +804,8 @@ Changes in version 0.3.3.1-alpha - 2018-01-25
- Where possible, the tor_free() macro now only evaluates its input
once. Part of ticket 24337.
- Check that microdesc ed25519 ids are non-zero in
node_get_ed25519_id() before returning them. Implements 24001,
patch by "aruna1234".
node_get_ed25519_id() before returning them. Implements ticket
24001, patch by "aruna1234".
o Minor features (directory authority):
- Make the "Exit" flag assignment only depend on whether the exit

View File

@ -6,15 +6,14 @@ Changes in version 0.3.3.6 - 2018-05-22
Tor 0.3.3.6 is the first stable release in the 0.3.3 series. It
backports several important fixes from the 0.3.4.1-alpha.
The Tor 0.3.3 series includes several important features, including
controller support and other
improvements for v3 onion services, and official support for embedding
Tor within other applications. It also include our first non-trivial
module written in the Rust programming language. (Rust is still not
enabled by default when building Tor.) And as usual, there are
numerous other smaller bugfixes, features, and improvements.
The Tor 0.3.3 series includes controller support and other improvements
for v3 onion services, official support for embedding Tor within
other applications, and our first non-trivial module written in the
Rust programming language. (Rust is still not enabled by default when
building Tor.) And as usual, there are numerous other smaller bugfixes,
features, and improvements.
Below are the changes since the 0.3.2 series. For a list of only the changes
Below are the changes since 0.3.2.10. For a list of only the changes
since 0.3.3.5-rc, see the ChangeLog file.
o New system requirements:
@ -42,12 +41,12 @@ Changes in version 0.3.3.6 - 2018-05-22
o Major features (IPv6, directory documents):
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
consensus. This information makes it easier for IPv6 clients to
bootstrap and choose reachable entry guards. Implements 23826.
bootstrap and choose reachable entry guards. Implements ticket 23826.
- Add consensus method 28, which removes IPv6 ORPorts from
microdescriptors. Now that the consensus contains IPv6 ORPorts,
they are redundant in microdescs. This change will be used by Tor
clients on 0.2.8.x and later. (That is to say, with all Tor
clients having IPv6 bootstrap and guard support.) Implements 23828.
microdescriptors. Now that the consensus contains IPv6 ORPorts, they
are redundant in microdescs. This change will be used by Tor clients
on 0.2.8.x and later. (That is to say, with all Tor clients that
have IPv6 bootstrap and guard support.) Implements ticket 23828.
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
set by different numbers of authorities. Fixes 23870
on 0.2.4.1-alpha.
@ -128,8 +127,9 @@ Changes in version 0.3.3.6 - 2018-05-22
occurred. Fixes bug 24767; bugfix on 0.0.6.
o Major bugfixes (relay, denial of service, backport from 0.3.4.1-alpha):
- Impose a limit on circuit cell queue size. The limit can be controlled by
a consensus parameter. Fixes bug 25226; bugfix on 0.2.4.14-alpha.
- Impose a limit on circuit cell queue size. The limit can be
controlled by a consensus parameter. Fixes bug 25226; bugfix on
0.2.4.14-alpha.
o Minor features (cleanup):
- Tor now deletes the CookieAuthFile and ExtORPortCookieAuthFile
@ -164,8 +164,8 @@ Changes in version 0.3.3.6 - 2018-05-22
- Where possible, the tor_free() macro now only evaluates its input
once. Part of ticket 24337.
- Check that microdesc ed25519 ids are non-zero in
node_get_ed25519_id() before returning them. Implements 24001,
patch by "aruna1234".
node_get_ed25519_id() before returning them. Implements ticket
24001, patch by "aruna1234".
o Minor features (directory authority):
- When directory authorities are unable to add signatures to a