Browse Source

clean up changelog for the 0.2.2.6-alpha release

Roger Dingledine 16 years ago
parent
commit
2bcb90a308
1 changed files with 29 additions and 36 deletions
  1. 29 36
      ChangeLog

+ 29 - 36
ChangeLog

@@ -1,52 +1,45 @@
-Changes in version 0.2.2.6-alpha - 2009-10-??
+Changes in version 0.2.2.6-alpha - 2009-11-17
   o Major features:
   o Major features:
-    - Directory authorities can now create, vote, and serve on multiple
+    - Directory authorities can now create, vote on, and serve multiple
       parallel formats of directory data as part of their voting process.
       parallel formats of directory data as part of their voting process.
-      This is a partial implementation of Proposal 162: "Publish the
-      consensus in multiple flavors."
-    - Directory authorities can now agree on and publish small summaries of
-      router information that clients can use in place of regular server
-      descriptors.  This will eventually allow clients to use far less
-      bandwidth for downloading information about the network.  This begins
-      the implementation of of Proposal 158: "Clients download a consensus +
-      Microdescriptors".
+      Partially implements Proposal 162: "Publish the consensus in
+      multiple flavors".
+    - Directory authorities can now agree on and publish small summaries
+      of router information that clients can use in place of regular
+      server descriptors. This transition will eventually allow clients
+      to use far less bandwidth for downloading information about the
+      network. Begins the implementation of Proposal 158: "Clients
+      download consensus + microdescriptors".
     - The directory voting system is now extensible to use multiple hash
     - The directory voting system is now extensible to use multiple hash
-      algorithms for signatures and resource selection.  Newer formats are
-      signed with SHA256, with a possibility for moving to a better hash
-      algorithm in the future.
+      algorithms for signatures and resource selection. Newer formats
+      are signed with SHA256, with a possibility for moving to a better
+      hash algorithm in the future.
     - New DisableAllSwap option. If set to 1, Tor will attempt to lock all
     - New DisableAllSwap option. If set to 1, Tor will attempt to lock all
-      current and future memory pages. On supported platforms, this should
-      effectively disable any and all attempts to page out memory. Under the
-      hood, DisableAllSwap uses mlockall() on unix-like platforms. Windows is
-      currently unsupported. We believe that this feature works on modern
-      Gnu/Linux distributions. Mac OS X appears to be broken by design. On
-      reasonable *BSD systems it should also be supported but this is untested.
-      This option requires that you start your Tor as root. If you use
-      DisableAllSwap, please consider using the User option to properly reduce
-      the privileges of your Tor.
+      current and future memory pages via mlockall(). On supported
+      platforms (modern Linux and probably BSD but not Windows or OS X),
+      this should effectively disable any and all attempts to page out
+      memory. This option requires that you start your Tor as root --
+      if you use DisableAllSwap, please consider using the User option
+      to properly reduce the privileges of your Tor.
+    - Numerous changes, bugfixes, and workarounds from Nathan Freitas
+      to help Tor build correctly for Android phones.
 
 
   o Major bugfixes:
   o Major bugfixes:
     - Work around a security feature in OpenSSL 0.9.8l that prevents our
     - Work around a security feature in OpenSSL 0.9.8l that prevents our
-      handshake from working unless we explicitly tell OpenSSL that we are
-      using SSL renegotiation safely.  We are, of course, but OpenSSL
-      0.9.8l won't work unless we say we are.
-
-  o Code simplifications and refactorings:
-    - Numerous changes, bugfixes, and workarounds from Nathan Freitas
-      to help Tor build correctly for Android phones.
-    - Begun converting Tor's signature and message digest logic to handle
-      multiple hash algorithms.
+      handshake from working unless we explicitly tell OpenSSL that we
+      are using SSL renegotiation safely. We are, but OpenSSL 0.9.8l
+      won't work unless we say we are.
 
 
   o Minor bugfixes:
   o Minor bugfixes:
     - Fix a crash bug when trying to initialize the evdns module in
     - Fix a crash bug when trying to initialize the evdns module in
-      Libevent 2.
+      Libevent 2. Bugfix on 0.2.1.16-rc.
     - Stop logging at severity 'warn' when some other Tor client tries
     - Stop logging at severity 'warn' when some other Tor client tries
       to establish a circuit with us using weak DH keys. It's a protocol
       to establish a circuit with us using weak DH keys. It's a protocol
       violation, but that doesn't mean ordinary users need to hear about
       violation, but that doesn't mean ordinary users need to hear about
       it. Fixes the bug part of bug 1114. Bugfix on 0.1.0.13.
       it. Fixes the bug part of bug 1114. Bugfix on 0.1.0.13.
     - Do not refuse to learn about authority certs and v2 networkstatus
     - Do not refuse to learn about authority certs and v2 networkstatus
-      documents that are older than the latest consensus.  This bug might
-      have degraded client bootstrapping.  Bugfix on 0.2.0.10-alpha.
+      documents that are older than the latest consensus. This bug might
+      have degraded client bootstrapping. Bugfix on 0.2.0.10-alpha.
       Spotted and fixed by xmux.
       Spotted and fixed by xmux.
     - Fix numerous small code-flaws found by Coverity Scan Rung 3.
     - Fix numerous small code-flaws found by Coverity Scan Rung 3.
     - If all authorities restart at once right before a consensus vote,
     - If all authorities restart at once right before a consensus vote,
@@ -56,8 +49,8 @@ Changes in version 0.2.2.6-alpha - 2009-10-??
     - If your relay can't keep up with the number of incoming create
     - If your relay can't keep up with the number of incoming create
       cells, it would log one warning per failure into your logs. Limit
       cells, it would log one warning per failure into your logs. Limit
       warnings to 1 per minute. Bugfix on 0.0.2pre10; fixes bug 1042.
       warnings to 1 per minute. Bugfix on 0.0.2pre10; fixes bug 1042.
-    - Bridges do not use the default exit policy, but reject *:* by
-      default. Fixes bug 1113.
+    - Bridges now use "reject *:*" as their default exit policy. Bugfix
+      on 0.2.0.3-alpha; fixes bug 1113.
     - Fix a memory leak on directory authorities during voting that was
     - Fix a memory leak on directory authorities during voting that was
       introduced in 0.2.2.1-alpha. Found via valgrind.
       introduced in 0.2.2.1-alpha. Found via valgrind.