[or-cvs] r15954: integrate the 0.2.0.29-rc items into the release notes (tor/trunk)
arma at seul.org
arma at seul.org
Wed Jul 16 00:04:00 UTC 2008
Author: arma
Date: 2008-07-15 20:04:00 -0400 (Tue, 15 Jul 2008)
New Revision: 15954
Modified:
tor/trunk/ChangeLog
tor/trunk/ReleaseNotes
Log:
integrate the 0.2.0.29-rc items into the release notes
Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog 2008-07-16 00:01:52 UTC (rev 15953)
+++ tor/trunk/ChangeLog 2008-07-16 00:04:00 UTC (rev 15954)
@@ -56,9 +56,9 @@
address. Fixes bug 737; bugfix on 0.2.0.22-rc. Reported by goldy.
o Minor bugfixes:
- - Fix a macro/CPP interactions that was confusing some compilers:
+ - Fix a macro/CPP interaction that was confusing some compilers:
some GCCs don't like #if/#endif pairs inside macro arguments.
- Fix for bug 707.
+ Fixes bug 707.
- Fix macro collision between OpenSSL 0.9.8h and Windows headers.
Fixes bug 704; fix from Steven Murdoch.
- When opening /dev/null in finish_daemonize(), do not pass the
Modified: tor/trunk/ReleaseNotes
===================================================================
--- tor/trunk/ReleaseNotes 2008-07-16 00:01:52 UTC (rev 15953)
+++ tor/trunk/ReleaseNotes 2008-07-16 00:04:00 UTC (rev 15954)
@@ -3,10 +3,13 @@
of Tor. If you want to see more detailed descriptions of the changes in
each development snapshot, see the ChangeLog file.
-Changes in version 0.2.0.30 - 2008-07-xx
+Changes in version 0.2.0.30 - 2008-07-15
This new stable release switches to a more efficient directory
- distribution design, adds features to make Tor harder to block,
- allows Tor to act as a DNS proxy,
+ distribution design, adds features to make connections to the Tor
+ network harder to block, allows Tor to act as a DNS proxy, adds separate
+ rate limiting for relayed traffic to make it easier for clients to
+ become relays, fix a variety of potential anonymity problems, and
+ includes the usual huge pile of other features and bug fixes.
o New v3 directory design:
- Tor now uses a new way to learn about and distribute information
@@ -275,6 +278,12 @@
- Reject uploaded descriptors and extrainfo documents if they're
huge. Otherwise we'll cache them all over the network and it'll
clog everything up. Suggested by Aljosha Judmayer.
+ - When a hidden service was trying to establish an introduction point,
+ and Tor *did* manage to reuse one of the preemptively built
+ circuits, it didn't correctly remember which one it used,
+ so it asked for another one soon after, until there were no
+ more preemptive circuits, at which point it launched one from
+ scratch. Bugfix on 0.0.9.x.
o Rate limiting and load balancing improvements:
- When we add data to a write buffer in response to the data on that
@@ -535,6 +544,9 @@
- On Windows, we were preventing other processes from reading
cached-routers while Tor was running. (Reported by janbar)
- Check return values from pthread_mutex functions.
+ - When opening /dev/null in finish_daemonize(), do not pass the
+ O_CREAT flag. Fortify was complaining, and correctly so. Fixes
+ bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
o Controller features:
- The GETCONF command now escapes and quotes configuration values
@@ -654,6 +666,14 @@
- Do not automatically run configure from autogen.sh. This
non-standard behavior tended to annoy people who have built other
programs.
+ - Fix a macro/CPP interaction that was confusing some compilers:
+ some GCCs don't like #if/#endif pairs inside macro arguments.
+ Fixes bug 707.
+ - Fix macro collision between OpenSSL 0.9.8h and Windows headers.
+ Fixes bug 704; fix from Steven Murdoch.
+ - Correctly detect transparent proxy support on Linux hosts that
+ require in.h to be included before netfilter_ipv4.h. Patch
+ from coderman.
o Logging improvements:
- When we haven't had any application requests lately, don't bother
More information about the tor-commits
mailing list