[or-cvs] r11172: clean up 0.1.2.17 changelog (tor/branches/tor-0_1_2-patches)
arma at seul.org
arma at seul.org
Sun Aug 19 02:53:49 UTC 2007
Author: arma
Date: 2007-08-18 22:53:49 -0400 (Sat, 18 Aug 2007)
New Revision: 11172
Modified:
tor/branches/tor-0_1_2-patches/ChangeLog
Log:
clean up 0.1.2.17 changelog
Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog 2007-08-19 02:51:54 UTC (rev 11171)
+++ tor/branches/tor-0_1_2-patches/ChangeLog 2007-08-19 02:53:49 UTC (rev 11172)
@@ -1,29 +1,28 @@
Changes in version 0.1.2.17 - 2007-08-xx
- o Removed features:
- - We removed support for the old (v0) control protocol. It has been
+ o Removed features (security):
+ - We removed support for the old (v0) control protocol. It has been
deprecated since Tor 0.1.1.1-alpha, and keeping it safe and secure
has been more of a headache than it's worth.
o Minor features (controller):
- - Add a PROTOCOLINFO controller command. Like AUTHENTICATE, it is valid
- before any authentication has been received. It tells a controller
- what kind of authentication is expected, and what protocol is spoken.
- Implements proposal 119.
+ - Add a PROTOCOLINFO controller command. Like AUTHENTICATE, it
+ is valid before any authentication has been received. It tells
+ a controller what kind of authentication is expected, and what
+ protocol is spoken. Implements proposal 119.
o Minor bugfixes (performance):
- - Save on most routerlist_assert_ok() calls in routerlist.c,
- thus greatly speeding up loading cached-routers from disk on
- startup (backport from trunk).
+ - Save on most routerlist_assert_ok() calls in routerlist.c, thus
+ greatly speeding up loading cached-routers from disk on startup.
- Disable sentinel-based debugging for buffer code: we squashed all
- the bugs that this was supposed to detect a long time ago, and
- now its only effect is to change our buffer sizes from nice
- powers of two (which platform mallocs tend to like) to values
- slightly over powers of two (which make some platform mallocs sad).
- - If exit bandwidth ever exceeds one third of total bandwidth, then
- use the correct formula to weight exit nodes when choosing paths.
- (Based on patch from Mike Perry.)
+ the bugs that this was supposed to detect a long time ago, and now
+ its only effect is to change our buffer sizes from nice powers of
+ two (which platform mallocs tend to like) to values slightly over
+ powers of two (which make some platform mallocs sad).
o Minor bugfixes (misc):
+ - If exit bandwidth ever exceeds one third of total bandwidth, then
+ use the correct formula to weight exit nodes when choosing paths.
+ Based on patch from Mike Perry.
- Choose perfectly fairly among routers when choosing by bandwidth and
weighting by fraction of bandwidth provided by exits. Previously, we
would choose with only approximate fairness, and correct ourselves
@@ -33,8 +32,8 @@
where no controller could authenticate. Now we exit.
- If we require CookieAuthentication, stop generating a new cookie
every time we change any piece of our config.
- - Terminate multi-line control events properly. (Original patch
- from tup.)
+ - Terminate multi-line control events properly. Original patch
+ from tup.
Changes in version 0.1.2.16 - 2007-08-01
More information about the tor-commits
mailing list