Kaynağa Gözat

reflow changelog.

Nick Mathewson 10 yıl önce
ebeveyn
işleme
03ce73327c
1 değiştirilmiş dosya ile 27 ekleme ve 26 silme
  1. 27 26
      ChangeLog

+ 27 - 26
ChangeLog

@@ -3,9 +3,9 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
   improvements for clients and relays, including blacklisting authority
   improvements for clients and relays, including blacklisting authority
   signing keys that were used while susceptible to the OpenSSL
   signing keys that were used while susceptible to the OpenSSL
   "heartbleed" bug, fixing two expensive functions on busy relays,
   "heartbleed" bug, fixing two expensive functions on busy relays,
-  improved TLS ciphersuite preference lists, support for run-time hardening
-  on compilers that support AddressSanitizer, and more work on the Linux
-  sandbox code.
+  improved TLS ciphersuite preference lists, support for run-time
+  hardening on compilers that support AddressSanitizer, and more work on
+  the Linux sandbox code.
 
 
   There are also several usability fixes for clients (especially clients
   There are also several usability fixes for clients (especially clients
   that use bridges), two new TransPort protocols supported (one on
   that use bridges), two new TransPort protocols supported (one on
@@ -52,15 +52,15 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       uniform criteria, and includes all OpenSSL ciphersuites with
       uniform criteria, and includes all OpenSSL ciphersuites with
       acceptable strength and forward secrecy. Previously, we had left
       acceptable strength and forward secrecy. Previously, we had left
       some perfectly fine ciphersuites unsupported due to omission or
       some perfectly fine ciphersuites unsupported due to omission or
-      typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported
-      by 'cypherpunks'. Bugfix on 0.2.4.8-alpha.
+      typo. Resolves bugs 11513, 11492, 11498, 11499. Bugs reported by
+      'cypherpunks'. Bugfix on 0.2.4.8-alpha.
     - Relays now trust themselves to have a better view than clients of
     - Relays now trust themselves to have a better view than clients of
-      which TLS ciphersuites are better than others. (Thanks to bug 11513,
-      the relay list is now well-considered, whereas the client list has
-      been chosen mainly for anti-fingerprinting purposes.) Relays
-      prefer: AES over 3DES; then ECDHE over DHE; then GCM over CBC;
-      then SHA384 over SHA256 over SHA1; and last, AES256 over AES128.
-      Resolves ticket 11528.
+      which TLS ciphersuites are better than others. (Thanks to bug
+      11513, the relay list is now well-considered, whereas the client
+      list has been chosen mainly for anti-fingerprinting purposes.)
+      Relays prefer: AES over 3DES; then ECDHE over DHE; then GCM over
+      CBC; then SHA384 over SHA256 over SHA1; and last, AES256 over
+      AES128. Resolves ticket 11528.
     - Clients now try to advertise the same list of ciphersuites as
     - Clients now try to advertise the same list of ciphersuites as
       Firefox 28. This change enables selection of (fast) GCM
       Firefox 28. This change enables selection of (fast) GCM
       ciphersuites, disables some strange old ciphers, and stops
       ciphersuites, disables some strange old ciphers, and stops
@@ -77,18 +77,18 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
       FreeBSD. To enable it, set "TransProxyType ipfw". Resolves ticket
       10267; patch from "yurivict".
       10267; patch from "yurivict".
     - Support OpenBSD's divert-to rules with the pf firewall for
     - Support OpenBSD's divert-to rules with the pf firewall for
-      transparent proxy ports. To enable it, set "TransProxyType
-      pf-divert". This allows Tor to run a TransPort transparent proxy
-      port on OpenBSD 4.4 or later without root privileges. See the
+      transparent proxy ports. To enable it, set "TransProxyType pf-
+      divert". This allows Tor to run a TransPort transparent proxy port
+      on OpenBSD 4.4 or later without root privileges. See the
       pf.conf(5) manual page for information on configuring pf to use
       pf.conf(5) manual page for information on configuring pf to use
       divert-to rules. Closes ticket 10896; patch from Dana Koch.
       divert-to rules. Closes ticket 10896; patch from Dana Koch.
 
 
   o Minor features (security):
   o Minor features (security):
     - New --enable-expensive-hardening option to enable security
     - New --enable-expensive-hardening option to enable security
       hardening options that consume nontrivial amounts of CPU and
       hardening options that consume nontrivial amounts of CPU and
-      memory. Right now, this includes AddressSanitizer and UbSan,
-      which are supported in newer versions of GCC and Clang. Closes
-      ticket 11477.
+      memory. Right now, this includes AddressSanitizer and UbSan, which
+      are supported in newer versions of GCC and Clang. Closes ticket
+      11477.
 
 
   o Minor features (log verbosity):
   o Minor features (log verbosity):
     - Demote the message that we give when a flushing connection times
     - Demote the message that we give when a flushing connection times
@@ -98,8 +98,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       about downloading descriptors. Previously, we'd log a notice
       about downloading descriptors. Previously, we'd log a notice
       whenever we learned about more routers. Now, we only log a notice
       whenever we learned about more routers. Now, we only log a notice
       at every 5% of progress. Fixes bug 9963.
       at every 5% of progress. Fixes bug 9963.
-    - Warn less verbosely when receiving a malformed ESTABLISH_RENDEZVOUS
-      cell. Fixes ticket 11279.
+    - Warn less verbosely when receiving a malformed
+      ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
     - When we run out of usable circuit IDs on a channel, log only one
     - When we run out of usable circuit IDs on a channel, log only one
       warning for the whole channel, and describe how many circuits
       warning for the whole channel, and describe how many circuits
       there were on the channel. Fixes part of ticket 11553.
       there were on the channel. Fixes part of ticket 11553.
@@ -153,8 +153,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
       just the wrong time. Re-fixes bug 11156; bugfix on 0.2.5.3-alpha.
 
 
   o Minor bugfixes (client, logging during bootstrap):
   o Minor bugfixes (client, logging during bootstrap):
-    - Warn only once if we start logging in an unsafe way. Previously, we
-      complain as many times as we had problems. Fixes bug 9870;
+    - Warn only once if we start logging in an unsafe way. Previously,
+      we complain as many times as we had problems. Fixes bug 9870;
       bugfix on 0.2.5.1-alpha.
       bugfix on 0.2.5.1-alpha.
     - Only report the first fatal bootstrap error on a given OR
     - Only report the first fatal bootstrap error on a given OR
       connection. This stops us from telling the controller bogus error
       connection. This stops us from telling the controller bogus error
@@ -208,15 +208,16 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
       harmless memory leak. Fixes bug 11278; bugfix on 0.2.5.1-alpha.
     - Don't re-initialize a second set of OpenSSL mutexes when starting
     - Don't re-initialize a second set of OpenSSL mutexes when starting
       up. Previously, we'd make one set of mutexes, and then immediately
       up. Previously, we'd make one set of mutexes, and then immediately
-      replace them with another. Fixes bug 11726; bugfix on 0.2.5.3-alpha.
+      replace them with another. Fixes bug 11726; bugfix on
+      0.2.5.3-alpha.
     - Resolve some memory leaks found by coverity in the unit tests, on
     - Resolve some memory leaks found by coverity in the unit tests, on
       exit in tor-gencert, and on a failure to compute digests for our
       exit in tor-gencert, and on a failure to compute digests for our
       own keys when generating a v3 networkstatus vote. These leaks
       own keys when generating a v3 networkstatus vote. These leaks
       should never have affected anyone in practice.
       should never have affected anyone in practice.
 
 
   o Minor bugfixes (hidden service):
   o Minor bugfixes (hidden service):
-    - Only retry attempts to connect to a chosen rendezvous point 8 times,
-      not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
+    - Only retry attempts to connect to a chosen rendezvous point 8
+      times, not 30. Fixes bug 4241; bugfix on 0.1.0.1-rc.
 
 
   o Minor bugfixes (misc code correctness):
   o Minor bugfixes (misc code correctness):
     - Fix various instances of undefined behavior in channeltls.c,
     - Fix various instances of undefined behavior in channeltls.c,
@@ -226,8 +227,8 @@ Changes in version 0.2.5.4-alpha - 2014-04-25
       exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
       exist.) Fixes bug 10363; bugfixes on 0.1.1.1-alpha, 0.1.2.1-alpha,
       0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
       0.2.0.10-alpha, and 0.2.3.6-alpha. Reported by "bobnomnom".
     - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
     - Use the AddressSanitizer and Ubsan sanitizers (in clang-3.4) to
-      fix some miscellaneous errors in our tests and codebase. Fixes
-      bug 11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
+      fix some miscellaneous errors in our tests and codebase. Fixes bug
+      11232. Bugfixes on versions back as far as 0.2.1.11-alpha.
     - Always check return values for unlink, munmap, UnmapViewOfFile;
     - Always check return values for unlink, munmap, UnmapViewOfFile;
       check strftime return values more often. In some cases all we can
       check strftime return values more often. In some cases all we can
       do is report a warning, but this may help prevent deeper bugs from
       do is report a warning, but this may help prevent deeper bugs from