瀏覽代碼

ChangeLog: spell-check, prefer "relay" to "node" or "server"

Nick Mathewson 10 年之前
父節點
當前提交
7d6562fafa
共有 1 個文件被更改,包括 13 次插入13 次删除
  1. 13 13
      ChangeLog

+ 13 - 13
ChangeLog

@@ -28,7 +28,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       the sandbox can now run a test network for multiple hours without
       crashing. (Previous crash reasons included: reseeding the OpenSSL
       PRNG, seeding the Libevent PRNG, using the wrong combination of
-      CLOEXEC and NONBLOCK at the same place and time, having server
+      CLOEXEC and NONBLOCK at the same place and time, having onion
       keys, being an authority, receiving a HUP, or using IPv6.) The
       sandbox is still experimental, and more bugs will probably turn
       up. To try it, enable "Sandbox 1" on a Linux host.
@@ -39,7 +39,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       11465.
 
   o Major bugfixes (TLS cipher selection):
-    - Generate the server's preference list for ciphersuites
+    - Generate the relay's preference list for ciphersuites
       automatically based on uniform criteria, and considering all
       OpenSSL ciphersuites with acceptable strength and forward secrecy.
       (The sort order is: prefer AES to 3DES; break ties by preferring
@@ -48,12 +48,12 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       preferring AES256 to AES128.) This resolves bugs #11513, #11492,
       #11498, #11499. Bugs reported by 'cypherpunks'. Bugfix on
       0.2.4.8-alpha.
-    - Servers now trust themselves to have a better view than clients of
-      which TLS ciphersuites to choose. (Thanks to #11513, the server
+    - Relays now trust themselves to have a better view than clients of
+      which TLS ciphersuites to choose. (Thanks to #11513, the relay
       list is now well-considered, whereas the client list has been
       chosen mainly for anti-fingerprinting purposes.) Resolves ticket
       11528.
-    - Update the list of TLS cipehrsuites that a client advertises to
+    - Update the list of TLS ciphersuites that a client advertises to
       match those advertised by Firefox 28. This enables selection of
       (fast) GCM ciphersuites, disables some strange old ciphers, and
       disables the ECDH (not to be confused with ECDHE) ciphersuites.
@@ -109,7 +109,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       new external IP address the next time we run our routine checks.
       If our IP address has changed, then publish a new descriptor with
       the new IP address. Resolves ticket 2454.
-    - Warn less verbosely when receiving a misformed
+    - Warn less verbosely when receiving a malformed
       ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
     - When we run out of usable circuit IDs on a channel, log only one
       warning for the whole channel, and include a description of how
@@ -140,7 +140,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       intermittent "microdesc_free() called but md was still referenced"
       warnings. We now log more information about the likely error case,
       to try to figure out why we might be cleaning a microdescriptor as
-      old if it's still referenced by a live node.
+      old if it's still referenced by a live node_t object.
 
   o Minor bugfixes (logging):
     - Log only one message when we start logging in an unsafe way.
@@ -149,7 +149,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
     - Using the Linux seccomp2 sandbox no longer prevents stack-trace
       logging on crashes or errors. Fixes part 11465; bugfix on
       0.2.5.1-alpha.
-    - Only report the first fatal boostrap error on a given OR
+    - Only report the first fatal bootstrap error on a given OR
       connection. This prevents controllers from declaring that a
       connection has failed because of "DONE" or other junk reasons.
       Fixes bug 10431; bugfix on 0.2.1.1-alpha.
@@ -169,7 +169,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       connection_mark_for_close() directly. Fixes bug #11304; bugfix on
       0.2.4.4-alpha.
     - When closing all connections on setting DisableNetwork to 1, use
-      connection_or_close_normally() rather than closing orconns out
+      connection_or_close_normally() rather than closing OR connections out
       from under the channel layer. Fixes bug #11306; bugfix on
       0.2.4.4-alpha.
 
@@ -222,14 +222,14 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
       sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
     - Fix a bug where a client-side Tor with pluggable transports would
       take 60 seconds to bootstrap if a config re-read was triggered at
-      just the right timing during bootstrap. Refixes bug 11156; bugfix
+      just the right timing during bootstrap. Re-fixes bug 11156; bugfix
       on 0.2.5.3-alpha.
     - Avoid 60-second delays in the bootstrapping process when Tor is
       launching for a second time while using bridges. Fixes bug 9229;
       bugfix on 0.2.0.3-alpha.
 
   o Minor bugfixes (DNS):
-    - When receing a DNS query for an unsupported type, reply with no
+    - When receiving a DNS query for an unsupported type, reply with no
       answer rather than with a NOTIMPL error. This behavior isn't
       correct either, but it will break fewer client programs, we hope.
       Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch from
@@ -266,11 +266,11 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
   o Deprecated versions:
     - Tor 0.2.2.x has reached end-of-life; it has received no patches or
       attention for some while. Directory authorities no longer accept
-      descriptors from Tor relays running any version of Tor prior to
+      descriptors from relays running any version of Tor prior to
       Tor 0.2.3.16-alpha. Resolves ticket 11149.
 
   o Testing:
-    - New macros in test.h to simplify writting mock-functions for unit
+    - New macros in test.h to simplify writing mock-functions for unit
       tests. Part of ticket 11507. Patch from Dana Koch.
     - Complete tests for the status.c module. Resolves ticket 11507.
       Patch from Dana Koch.