[or-cvs] r9420: reformat the 0.1.2.7-alpha changelog a bit (tor/trunk)

arma at seul.org arma at seul.org
Fri Jan 26 07:54:17 UTC 2007


Author: arma
Date: 2007-01-26 02:54:16 -0500 (Fri, 26 Jan 2007)
New Revision: 9420

Modified:
   tor/trunk/ChangeLog
Log:
reformat the 0.1.2.7-alpha changelog a bit


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-01-26 06:44:38 UTC (rev 9419)
+++ tor/trunk/ChangeLog	2007-01-26 07:54:16 UTC (rev 9420)
@@ -1,10 +1,5 @@
-Changes in version 0.1.2.7-alpha - 2007-??-??
-  o Major bugfixes:
-    - Fix a crash bug in the presence of DNS hijacking (reported by Andrew
-      Del Vecchio).
-    - Previously, we would cache up to 16 old networkstatus documents
-      indefinitely, if they came from nontrusted authorities.  Now we
-      discard them if they are more than 10 days old.
+Changes in version 0.1.2.7-alpha - 2007-01-26
+  o Major bugfixes (rate limiting):
     - Servers decline directory requests much more aggressively when
       they're low on bandwidth. Otherwise they end up queueing more and
       more directory responses, which can't be good for latency.
@@ -13,13 +8,20 @@
     - If our system clock jumps back in time, don't publish a negative
       uptime in the descriptor. Also, don't let the global rate limiting
       buckets go absurdly negative.
+    - Flush local controller connection buffers periodically as we're
+      writing to them, so we avoid queueing 4+ megabytes of data before
+      trying to flush.
+
+  o Major bugfixes (other):
+    - Fix a crash bug in the presence of DNS hijacking (reported by Andrew
+      Del Vecchio).
+    - Previously, we would cache up to 16 old networkstatus documents
+      indefinitely, if they came from nontrusted authorities. Now we
+      discard them if they are more than 10 days old.
     - Detect and reject malformed DNS responses containing circular
       pointer loops.
     - Fix a memory leak when sending a 503 response for a networkstatus
       request.
-    - Flush local controller connection buffers periodically as we're
-      writing to them, so we avoid queueing 4+ megabytes of data before
-      trying to flush.
 
   o Minor bugfixes:
     - When computing clock skew from directory HTTP headers, consider what
@@ -33,23 +35,23 @@
       days, if the connecting application didn't close them either.
     - Stop using C functions that OpenBSD's linker doesn't like.
     - Detect and reject DNS replies containing IPv4 or IPv6 records with
-      an incorrect number of bytes. (Previously, we would ignore the extra
-      bytes.)
-    - Fix as-yet-unused reverse IPv6 lookup code so it sends nybbles in the
-      correct order.
+      an incorrect number of bytes. (Previously, we would ignore the
+      extra bytes.)
+    - Fix as-yet-unused reverse IPv6 lookup code so it sends nybbles
+      in the correct order.
     - Free memory held in recently-completed DNS lookup attempts on exit.
       This was not a memory leak, but may have been hiding memory leaks.
     - Don't launch requests for descriptors unless we have networkstatuses
-      from at least half of the authorities.  This delays the first download
-      slightly under pathological circumstances, but can prevent us from
-      downloading a bunch of descriptors we don't need.
-    - Do not log IPs with TLS failures for incoming TLS connections.  (Fixes
-      bug 382.)
+      from at least half of the authorities.  This delays the first
+      download slightly under pathological circumstances, but can prevent
+      us from downloading a bunch of descriptors we don't need.
+    - Do not log IPs with TLS failures for incoming TLS
+      connections. (Fixes bug 382.)
 
   o Minor features:
-    - Check for addresses with invalid characters at the exit as well as at
-      the client, and warn less verbosely when they fail.  You can override
-      this by setting ServerDNSAllowNonRFC953Addresses to 1.
+    - Check for addresses with invalid characters at the exit as well
+      as at the client, and warn less verbosely when they fail. You can
+      override this by setting ServerDNSAllowNonRFC953Addresses to 1.
     - Adapt a patch from goodell to let the contrib/exitlist script
       take arguments rather than require direct editing.
     - Inform the server operator when we decide not to advertise a
@@ -57,10 +59,10 @@
       was confusing Zax, so now we're hopefully more helpful.
 
   o Minor features (controller):
-    - Track reasons for OR connection failure; make these reasons available
-      via the controller interface.  (Patch from Mike Perry.)
-    - Add a SOCKS_BAD_HOSTNAME client status event so controllers can learn
-      when clients are sending malformed hostnames to Tor.
+    - Track reasons for OR connection failure; make these reasons
+      available via the controller interface. (Patch from Mike Perry.)
+    - Add a SOCKS_BAD_HOSTNAME client status event so controllers
+      can learn when clients are sending malformed hostnames to Tor.
     - Clean up documentation for controller status events.
 
 



More information about the tor-commits mailing list