[or-cvs] r13732: a blurb for 0.2.0.20-rc (tor/trunk)
arma at seul.org
arma at seul.org
Tue Feb 26 03:11:38 UTC 2008
Author: arma
Date: 2008-02-25 22:11:37 -0500 (Mon, 25 Feb 2008)
New Revision: 13732
Modified:
tor/trunk/ChangeLog
Log:
a blurb for 0.2.0.20-rc
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2008-02-26 02:58:36 UTC (rev 13731)
+++ tor/trunk/ChangeLog 2008-02-26 03:11:37 UTC (rev 13732)
@@ -1,4 +1,14 @@
+Changes in version 0.2.0.21-rc - 2008-0?-??
+
+
Changes in version 0.2.0.20-rc - 2008-02-24
+ Tor 0.2.0.20-rc is the first release candidate for the 0.2.0 series. It
+ makes more progress towards normalizing Tor's TLS handshake, makes
+ hidden services work better again, helps relays bootstrap if they don't
+ know their IP address, adds optional support for linking in openbsd's
+ allocator or tcmalloc, allows really fast relays to scale past 15000
+ sockets, and fixes a bunch of minor bugs reported by Veracode.
+
o Major features:
- Enable the revised TLS handshake based on the one designed by
Steven Murdoch in proposal 124, as revised in proposal 130. It
@@ -50,7 +60,7 @@
with Tor's memory allocation patterns. Pass
--enable-openbsd-malloc to get the replacement malloc code.
- Add a --with-tcmalloc option to the configure script to link
- against tcmalloc (if present). Does not yet search for
+ against tcmalloc (if present). Does not yet search for
non-system include paths.
- Stop imposing an arbitrary maximum on the number of file descriptors
used for busy servers. Bug reported by Olaf Selke; patch from
@@ -67,7 +77,7 @@
o Minor bugfixes (memory leaks and code problems):
- We were leaking a file descriptor if Tor started with a zero-length
cached-descriptors file. Patch by freddy77; bugfix on 0.1.2.
- - Detect size overflow in zlib code.
+ - Detect size overflow in zlib code. Reported by Dan Kaminsky.
- We were comparing the raw BridgePassword entry with a base64'ed
version of it, when handling a "/tor/networkstatus-bridges"
directory request. Now compare correctly. Noticed by Veracode.
@@ -75,7 +85,7 @@
Should fix bug 537.
- Alter the code that tries to recover from unhandled write
errors, to not try to flush onto a socket that's given us
- unhandled errors. Bugfix on 0.1.2.x.
+ unhandled errors. Bugfix on 0.1.2.x.
- Make Unix controlsockets work correctly on OpenBSD. Patch from
tup. Bugfix on 0.2.0.3-alpha.
@@ -88,7 +98,7 @@
address if the connection appears to be coming from the same /24
network; it was producing too many wrong guesses.
- Make the new hidden service code respect the SafeLogging setting.
- Bugfix on 0.2.0.x. Patch from Karsten.
+ Bugfix on 0.2.0.x. Patch from Karsten.
- When starting as an authority, do not overwrite all certificates
cached from other authorities. Bugfix on 0.2.0.x. Fixes bug 606.
- If we're trying to flush the last bytes on a connection (for
More information about the tor-commits
mailing list