[or-cvs] r16743: {tor} a date and blurb for 0.2.0.31 (tor/branches/tor-0_2_0-patches)
arma at seul.org
arma at seul.org
Wed Sep 3 23:56:07 UTC 2008
Author: arma
Date: 2008-09-03 19:56:06 -0400 (Wed, 03 Sep 2008)
New Revision: 16743
Modified:
tor/branches/tor-0_2_0-patches/ChangeLog
tor/branches/tor-0_2_0-patches/ReleaseNotes
Log:
a date and blurb for 0.2.0.31
Modified: tor/branches/tor-0_2_0-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_2_0-patches/ChangeLog 2008-09-03 22:28:04 UTC (rev 16742)
+++ tor/branches/tor-0_2_0-patches/ChangeLog 2008-09-03 23:56:06 UTC (rev 16743)
@@ -1,4 +1,4 @@
-Changes in version 0.2.0.31 - 2008-09-??
+Changes in version 0.2.0.31 - 2008-09-03
o Major bugfixes:
- Make sure that two circuits can never exist on the same connection
with the same circuit ID, even if one is marked for close. This
Modified: tor/branches/tor-0_2_0-patches/ReleaseNotes
===================================================================
--- tor/branches/tor-0_2_0-patches/ReleaseNotes 2008-09-03 22:28:04 UTC (rev 16742)
+++ tor/branches/tor-0_2_0-patches/ReleaseNotes 2008-09-03 23:56:06 UTC (rev 16743)
@@ -3,6 +3,53 @@
of Tor. If you want to see more detailed descriptions of the changes in
each development snapshot, see the ChangeLog file.
+Changes in version 0.2.0.31 - 2008-09-03
+ Tor 0.2.0.31 addresses two potential anonymity issues, starts to fix
+ a big bug we're seeing where in rare cases traffic from one Tor stream
+ gets mixed into another stream, and fixes a variety of smaller issues.
+
+ o Major bugfixes:
+ - Make sure that two circuits can never exist on the same connection
+ with the same circuit ID, even if one is marked for close. This
+ is conceivably a bugfix for bug 779. Bugfix on 0.1.0.4-rc.
+ - Relays now reject risky extend cells: if the extend cell includes
+ a digest of all zeroes, or asks to extend back to the relay that
+ sent the extend cell, tear down the circuit. Ideas suggested
+ by rovv.
+ - If not enough of our entry guards are available so we add a new
+ one, we might use the new one even if it overlapped with the
+ current circuit's exit relay (or its family). Anonymity bugfix
+ pointed out by rovv.
+
+ o Minor bugfixes:
+ - Recover 3-7 bytes that were wasted per memory chunk. Fixes bug
+ 794; bug spotted by rovv. Bugfix on 0.2.0.1-alpha.
+ - Correctly detect the presence of the linux/netfilter_ipv4.h header
+ when building against recent kernels. Bugfix on 0.1.2.1-alpha.
+ - Pick size of default geoip filename string correctly on windows.
+ Fixes bug 806. Bugfix on 0.2.0.30.
+ - Make the autoconf script accept the obsolete --with-ssl-dir
+ option as an alias for the actually-working --with-openssl-dir
+ option. Fix the help documentation to recommend --with-openssl-dir.
+ Based on a patch by "Dave". Bugfix on 0.2.0.1-alpha.
+ - Disallow session resumption attempts during the renegotiation
+ stage of the v2 handshake protocol. Clients should never be trying
+ session resumption at this point, but apparently some did, in
+ ways that caused the handshake to fail. Bug found by Geoff Goodell.
+ Bugfix on 0.2.0.20-rc.
+ - When using the TransPort option on OpenBSD, and using the User
+ option to change UID and drop privileges, make sure to open
+ /dev/pf before dropping privileges. Fixes bug 782. Patch from
+ Christopher Davis. Bugfix on 0.1.2.1-alpha.
+ - Try to attach connections immediately upon receiving a RENDEZVOUS2
+ or RENDEZVOUS_ESTABLISHED cell. This can save a second or two
+ on the client side when connecting to a hidden service. Bugfix
+ on 0.0.6pre1. Found and fixed by Christian Wilms; resolves bug 743.
+ - When closing an application-side connection because its circuit is
+ getting torn down, generate the stream event correctly. Bugfix on
+ 0.1.2.x. Anonymous patch.
+
+
Changes in version 0.2.0.30 - 2008-07-15
This new stable release switches to a more efficient directory
distribution design, adds features to make connections to the Tor
More information about the tor-commits
mailing list