[or-cvs] r11941: rearrange the 0.1.2.18 changelog (tor/branches/tor-0_1_2-patches)
arma at seul.org
arma at seul.org
Mon Oct 15 06:08:54 UTC 2007
Author: arma
Date: 2007-10-15 02:08:54 -0400 (Mon, 15 Oct 2007)
New Revision: 11941
Modified:
tor/branches/tor-0_1_2-patches/ChangeLog
Log:
rearrange the 0.1.2.18 changelog
Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog 2007-10-15 05:41:02 UTC (rev 11940)
+++ tor/branches/tor-0_1_2-patches/ChangeLog 2007-10-15 06:08:54 UTC (rev 11941)
@@ -1,7 +1,17 @@
-Changes in version 0.1.2.18 - 2007-??-??
- o Major bugfixes:
+Changes in version 0.1.2.18 - 2007-10-??
+ o Major bugfixes (crashes):
+ - If a connection is shut down abruptly because of something that
+ happened inside connection_flushed_some(), do not call
+ connection_finished_flushing(). Should fix bug 451:
+ "connection_stop_writing: Assertion conn->write_event failed"
+ Bugfix on 0.1.2.7-alpha.
- Fix possible segfaults in functions called from
rend_process_relay_cell().
+
+ o Major bugfixes (other):
+ - Stop publishing a new server descriptor just because we get a
+ HUP signal. This led (in a roundabout way) to some servers getting
+ dropped from the networkstatus lists for a few hours each day.
- Hidden services were choosing introduction points uniquely by
hexdigest, but when constructing the hidden service descriptor
they merely wrote the (potentially ambiguous) nickname.
@@ -9,16 +19,9 @@
connections: they specify their chosen rendezvous point by identity
digest rather than by (potentially ambiguous) nickname. These
changes could speed up hidden service connections dramatically.
- - If a connection is shut down abruptly because of something that
- happened inside connection_flushed_some(), do not call
- connection_finished_flushing(). Should fix bug 451. Bugfix on
- 0.1.2.7-alpha.
- When looking for a circuit to cannibalize, consider family as well
- as identity. Fixes bug 438. Bugfix on 0.1.0.x (which introduced
+ as identity. Fixes bug 438. Bugfix on 0.1.0.x (which introduced
circuit cannibalization).
- - Stop publishing a new server descriptor just because we get a
- HUP signal. This led (in a roundabout way) to some servers getting
- dropped from the networkstatus lists for a few hours each day.
o Minor bugfixes:
- Don't try to access (or alter) the state file when running
@@ -35,17 +38,17 @@
- Fix a minor memory leak whenever a controller sends the PROTOCOLINFO
command. Bugfix on 0.1.2.17.
- When loading bandwidth history, do not believe any information in
- the future. Fixes bug 434.
+ the future. Fixes bug 434.
- When loading entry guard information, do not believe any information
in the future.
- - When we have our clock set far in the future and generate an onion key,
- then re-set our clock to be correct, we should not stop the onion
- key from getting rotated.
- - On some platforms, accept() can return a broken address. Detect
- this more quietly, and deal accordingly. (Fixes bug 483.)
+ - When we have our clock set far in the future and generate an
+ onion key, then re-set our clock to be correct, we should not stop
+ the onion key from getting rotated.
+ - On some platforms, accept() can return a broken address. Detect
+ this more quietly, and deal accordingly. Fixes bug 483.
- It's not actually an error to find a non-pending entry in the DNS
- cache when canceling a pending resolve. Don't log unless stuff
- is fishy. Resolves bug 463.
+ cache when canceling a pending resolve. Don't log unless stuff
+ is fishy. Resolves bug 463.
Changes in version 0.1.2.17 - 2007-08-30
More information about the tor-commits
mailing list