[or-cvs] r13291: bump to 0.2.0.18-alpha (in tor/trunk: . src/win32)
arma at seul.org
arma at seul.org
Sat Jan 26 03:48:04 UTC 2008
Author: arma
Date: 2008-01-25 22:48:03 -0500 (Fri, 25 Jan 2008)
New Revision: 13291
Modified:
tor/trunk/ChangeLog
tor/trunk/configure.in
tor/trunk/src/win32/orconfig.h
Log:
bump to 0.2.0.18-alpha
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2008-01-26 02:48:43 UTC (rev 13290)
+++ tor/trunk/ChangeLog 2008-01-26 03:48:03 UTC (rev 13291)
@@ -1,14 +1,14 @@
-Changes in version 0.2.0.18-alpha - 2008-01-??
+Changes in version 0.2.0.18-alpha - 2008-01-25
o New directory authorities:
- Set up dannenberg (run by CCC) as the sixth v3 directory
authority.
o Major bugfixes:
+ - Fix a major memory leak when attempting to use the v2 TLS
+ handshake code. Bugfix on 0.2.0.x; fixes bug 589.
- We accidentally enabled the under-development v2 TLS handshake
- code, which is causing log entries like "TLS error while
+ code, which was causing log entries like "TLS error while
renegotiating handshake". Disable it again. Resolves bug 590.
- - Fix a major memory leak when attempting to use the v2 TLS
- handshake code. Bugfix on 0.2.0.x; fixes bug 589.
- We were computing the wrong Content-Length: header for directory
responses that need to be compressed on the fly, causing clients
asking for those items to always fail. Bugfix on 0.2.0.x; fixes
@@ -23,13 +23,15 @@
handle more, do another bandwidth test.
- New config options WarnPlaintextPorts and RejectPlaintextPorts so
Tor can warn and/or refuse connections to ports commonly used with
- vulnerable-plaintext protocols.
+ vulnerable-plaintext protocols. Currently we warn on ports 23,
+ 109, 110, and 143, but we don't reject any.
o Minor bugfixes:
- When we setconf ClientOnly to 1, close any current OR and Dir
listeners. Reported by mwenge.
- When we get a consensus that's been signed by more people than
- we expect, don't log about it; it's not a big deal.
+ we expect, don't log about it; it's not a big deal. Reported
+ by Kyle Williams.
o Minor features:
- Don't answer "/tor/networkstatus-bridges" directory requests if
Modified: tor/trunk/configure.in
===================================================================
--- tor/trunk/configure.in 2008-01-26 02:48:43 UTC (rev 13290)
+++ tor/trunk/configure.in 2008-01-26 03:48:03 UTC (rev 13291)
@@ -4,7 +4,7 @@
dnl See LICENSE for licensing information
AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.2.0.17-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.2.0.18-alpha)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST
Modified: tor/trunk/src/win32/orconfig.h
===================================================================
--- tor/trunk/src/win32/orconfig.h 2008-01-26 02:48:43 UTC (rev 13290)
+++ tor/trunk/src/win32/orconfig.h 2008-01-26 03:48:03 UTC (rev 13291)
@@ -227,6 +227,6 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
-#define VERSION "0.2.0.17-alpha-dev"
+#define VERSION "0.2.0.18-alpha"
More information about the tor-commits
mailing list