[tor-commits] [tor/release-0.2.4] start to migrate recent changes

arma at torproject.org arma at torproject.org
Fri Nov 15 22:09:30 UTC 2013


commit f503f3043673e6eb550c722b74e57b49d4443ae7
Author: Roger Dingledine <arma at torproject.org>
Date:   Fri Nov 15 17:08:45 2013 -0500

    start to migrate recent changes
---
 ChangeLog        |   24 ++++++++++++++++++++++++
 changes/bug6055  |    6 ------
 changes/bug9645a |    5 -----
 changes/bug9731  |    3 ---
 changes/bug9780  |    8 --------
 5 files changed, 24 insertions(+), 22 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 2647723..59311cb 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -2,10 +2,34 @@ Changes in version 0.2.4.18-rc - 2013-10-??
   Tor 0.2.4.18-rc is the fourth release candidate for the Tor 0.2.4.x
   series. [...]
 
+  o Major enhancements:
+    - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
+      (OpenSSL before 1.0.1 didn't have TLS 1.1 or 1.2. OpenSSL from 1.0.1
+      through 1.0.1d had bugs that prevented renegotiation from working
+      with TLS 1.1 or 1.2, so we disabled them to solve bug 6033.) Fix for
+      issue #6055.
+
   o Major bugfixes:
     - Stop trying to bootstrap all our directory information from
       only our first guard. Discovered while fixing bug 9946; bugfix
       on 0.2.4.8-alpha.
+    - No longer stop reading or writing on cpuworker connections when
+      our rate limiting buckets go empty. Now we should handle circuit
+      handshake requests more promptly. Resolves bug 9731.
+
+  o Minor bugfixes:
+    - If we are unable to save a microdescriptor to the journal, do not
+      drop it from memory and then reattempt downloading it. Fixes bug
+      9645; bugfix on 0.2.2.6-alpha.
+
+  o Minor bugfixes (performance, fingerprinting):
+    - Our default TLS ecdhe groups were backwards: we meant to be using
+      P224 for relays (for performance win) and P256 for bridges (since
+      it is more common in the wild). Instead we had it backwards. After
+      reconsideration, we decided that the default should be P256 on all
+      hosts, since its security is probably better, and since P224 is
+      reportedly used quite little in the wild.  Found by "skruffy" on
+      IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.
 
   o Minor bugfixes (on 0.2.4.x):
     - Correctly log long IPv6 exit policies, instead of truncating them
diff --git a/changes/bug6055 b/changes/bug6055
deleted file mode 100644
index 0073007..0000000
--- a/changes/bug6055
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major enhancements:
-    - Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
-      (OpenSSL before 1.0.1 didn't have TLS 1.1 or 1.2. OpenSSL from 1.0.1
-      through 1.0.1d had bugs that prevented renegotiation from working
-      with TLS 1.1 or 1.2, so we disabled them to solve bug 6033.) Fix for
-      issue #6055.
diff --git a/changes/bug9645a b/changes/bug9645a
deleted file mode 100644
index 2daba65..0000000
--- a/changes/bug9645a
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - If we are unable to save a microdescriptor to the journal, do not
-      drop it from memory and then reattempt downloading it. Fixes bug
-      9645; bugfix on 0.2.2.6-alpha.
-
diff --git a/changes/bug9731 b/changes/bug9731
deleted file mode 100644
index 828496a..0000000
--- a/changes/bug9731
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Major bugfixes:
-    - Do not apply connection_consider_empty_read/write_buckets to
-      cpuworker connections.
diff --git a/changes/bug9780 b/changes/bug9780
deleted file mode 100644
index 3cb51bd..0000000
--- a/changes/bug9780
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (performance, fingerprinting):
-    - Our default TLS ecdhe groups were backwards: we meant to be using
-      P224 for relays (for performance win) and P256 for bridges (since
-      it is more common in the wild). Instead we had it backwards. After
-      reconsideration, we decided that the default should be P256 on all
-      hosts, since its security is probably better, and since P224 is
-      reportedly used quite little in the wild.  Found by "skruffy" on
-      IRC. Fix for bug 9780; bugfix on 0.2.4.8-alpha.



More information about the tor-commits mailing list