Browse Source

some cleanups. more probably remain, but hey, it's an alpha.
time to put out the bugfix release.


svn:r9309

Roger Dingledine 18 years ago
parent
commit
794fedb0ad
3 changed files with 36 additions and 30 deletions
  1. 20 23
      ChangeLog
  2. 15 6
      doc/control-spec.txt
  3. 1 1
      src/or/dns.c

+ 20 - 23
ChangeLog

@@ -1,5 +1,21 @@
-Changes in version 0.1.2.6-alpha - 2007-??-??
-  o Minor features (controller):
+Changes in version 0.1.2.6-alpha - 2007-01-09
+  o Major bugfixes:
+    - Fix an assert error introduced in 0.1.2.5-alpha: if a single TLS
+      connection handles more than 4 gigs in either direction, we assert.
+    - Fix an assert error introduced in 0.1.2.5-alpha: if you're an
+      advertised exit node, somebody might try to exit from you when
+      you're bootstrapping and before you've built your descriptor yet.
+
+  o Minor bugfixes:
+    - Warn if we (as a server) find that we've resolved an address that we
+      weren't planning to resolve.
+    - Warn that using select() on any libevent version before 1.1 will be
+      unnecessarily slow (even for select()).
+    - Flush ERR-level controller status events just like we currently
+      flush ERR-level log events, so that a Tor shutdown doesn't prevent
+      the controller from learning about current events.
+
+  o Minor features (more controller status events):
     - Implement EXTERNAL_ADDRESS server status event so controllers can
     - Implement EXTERNAL_ADDRESS server status event so controllers can
       learn when our address changes.
       learn when our address changes.
     - Implement BAD_SERVER_DESCRIPTOR server status event so controllers
     - Implement BAD_SERVER_DESCRIPTOR server status event so controllers
@@ -27,27 +43,8 @@ Changes in version 0.1.2.6-alpha - 2007-??-??
       about changes to DNS server status.
       about changes to DNS server status.
 
 
   o Minor features (directory):
   o Minor features (directory):
-    - Authorities do not recommend exits as guards if this would shift
-      excess load to the exit nodes.
-
-  o Major bugfixes:
-    - Fix an assert error introduced in 0.1.2.5-alpha: if a single TLS
-      connection handles more than 4 gigs in either direction, we assert.
-    - Fix an assert error introduced in 0.1.2.5-alpha: if you're an
-      advertised exit node, somebody might try to exit from you when
-      you're bootstrapping and before you've built your descriptor yet.
-
-  o Minor bugfixes:
-    - Restore a warning message if we accidentally resolve an address that
-      we weren't planning to resolve.
-    - Prevent an (unlikely) bug on 32-bit architectures that could make
-      directories send 503s incorrectly when BandwidthBurst plus 2 times
-      BandwidthRate was over to 2 GB.
-    - Warn that using select() on any libevent version before 1.1 will be
-      unnecessarily slow (even for select()).
-    - Flush ERR-level status events just like we currently flush ERR-level
-      log events, so that a Tor shutdown doesn't prevent the controller from
-      learning about current events.
+    - Authorities no longer recommend exits as guards if this would shift
+      too much load to the exit nodes.
 
 
 
 
 Changes in version 0.1.2.5-alpha - 2007-01-06
 Changes in version 0.1.2.5-alpha - 2007-01-06

+ 15 - 6
doc/control-spec.txt

@@ -1089,11 +1089,12 @@ do for each. -RD]
   Actions for STATUS_CLIENT severity WARN events can be as follows:
   Actions for STATUS_CLIENT severity WARN events can be as follows:
 
 
      DANGEROUS_SOCKS
      DANGEROUS_SOCKS
-     "PROTOCOL=SOCKS4/SOCKS4a/SOCKS5"
+     "PROTOCOL=SOCKS4/SOCKS5"
      "ADDRESS=IP:port"
      "ADDRESS=IP:port"
-       A connection was made to Tor's SOCKS port that used a raw IP
-       address.  If the client application got this address from
-       gethostbyname(), it's leaking target addresses via DNS.
+       A connection was made to Tor's SOCKS port using one of the SOCKS
+       approaches that doesn't support hostnames -- only raw IP addresses.
+       If the client application got this address from gethostbyname(),
+       it may be leaking target addresses via DNS.
 
 
      SOCKS_UNKNOWN_PROTOCOL
      SOCKS_UNKNOWN_PROTOCOL
        "DATA=string"
        "DATA=string"
@@ -1102,7 +1103,13 @@ do for each. -RD]
        using Tor as an HTTP proxy?   The DATA is the first few characters
        using Tor as an HTTP proxy?   The DATA is the first few characters
        sent to Tor on the SOCKS port.
        sent to Tor on the SOCKS port.
 
 
-     BAD_HOSTNAME
+     SOCKS_BAD_HOSTNAME
+     [unimplemented]
+     // Some application gave us a funny-looking hostname. Perhaps
+     // it is broken? In any case it won't work with Tor and the user
+     // should know.
+
+     UNRECOGNIZED_ROUTER
      [unimplemented]
      [unimplemented]
      // a nickname we asked for is unavailable. no need for this
      // a nickname we asked for is unavailable. no need for this
      // quite yet, since no end-user controllers let you configure that.
      // quite yet, since no end-user controllers let you configure that.
@@ -1118,7 +1125,7 @@ do for each. -RD]
      "HOSTNAME=NAME"
      "HOSTNAME=NAME"
      "METHOD=CONFIGURED/DIRSERV/RESOLVED/INTERFACE/GETHOSTNAME"
      "METHOD=CONFIGURED/DIRSERV/RESOLVED/INTERFACE/GETHOSTNAME"
        Our best idea for our externally visible IP has changed to 'IP'.
        Our best idea for our externally visible IP has changed to 'IP'.
-       If 'NAME' is present, we got the new IP by resolving 'NAME'.  If the
+       If 'HOSTNAME' is present, we got the new IP by resolving 'NAME'.  If the
        method is 'CONFIGURED', the IP was given verbatim as a configuration
        method is 'CONFIGURED', the IP was given verbatim as a configuration
        option.  If the method is 'RESOLVED', we resolved the Address
        option.  If the method is 'RESOLVED', we resolved the Address
        configuration option to get the IP.  If the method is 'GETHOSTNAME',
        configuration option to get the IP.  If the method is 'GETHOSTNAME',
@@ -1163,6 +1170,7 @@ do for each. -RD]
      "STATUS=" "UP" / "DOWN"
      "STATUS=" "UP" / "DOWN"
      "ERR=" message
      "ERR=" message
         One of our nameservers has changed status.
         One of our nameservers has changed status.
+        // actually notice
 
 
      NAMESERVER_ALL_DOWN
      NAMESERVER_ALL_DOWN
         All of our nameservers have gone down.
         All of our nameservers have gone down.
@@ -1185,6 +1193,7 @@ do for each. -RD]
      ACCEPTED_SERVER_DESCRIPTOR
      ACCEPTED_SERVER_DESCRIPTOR
      "DIRAUTH=addr:port"
      "DIRAUTH=addr:port"
         A single directory authority accepted our descriptor.
         A single directory authority accepted our descriptor.
+        // actually notice
 
 
   Actions for STATUS_SERVER severity ERR events can be as follows:
   Actions for STATUS_SERVER severity ERR events can be as follows:
 
 

+ 1 - 1
src/or/dns.c

@@ -186,7 +186,7 @@ evdns_log_cb(int warn, const char *msg)
      * nameservers have failed' if we're completely out of nameservers;
      * nameservers have failed' if we're completely out of nameservers;
      * otherwise, the situation is tolerable. */
      * otherwise, the situation is tolerable. */
     warn = 0;
     warn = 0;
-    control_event_server_status(LOG_WARN,
+    control_event_server_status(LOG_NOTICE,
                                 "NAMESERVER_STATUS NS=%s STATUS=DOWN ERR=%s",
                                 "NAMESERVER_STATUS NS=%s STATUS=DOWN ERR=%s",
                                 ns, escaped(err));
                                 ns, escaped(err));
     tor_free(ns);
     tor_free(ns);