Browse Source

Proofreading step by seborn (thx)

Nick Mathewson 6 years ago
parent
commit
e2411e76d8
1 changed files with 14 additions and 14 deletions
  1. 14 14
      ChangeLog

+ 14 - 14
ChangeLog

@@ -19,12 +19,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
 
   o Major features (IPv6, directory documents):
     - Add consensus method 27, which adds IPv6 ORPorts to the microdesc
-      consensus. This information it easier for IPv6 clients to
+      consensus. This information makes it easier for IPv6 clients to
       bootstrap and choose reachable entry guards. Implements 23826.
     - Add consensus method 28, which removes IPv6 ORPorts from
-      microdescriptors. Now that there are the consensus contains IPv6
+      microdescriptors. Now that the consensus contains IPv6
       ORPorts, they are redundant in microdescs. This change will be
-      used by tor clients on 0.2.8.x and later. (That is to say, with
+      used by Tor clients on 0.2.8.x and later. (That is to say, with
       all Tor clients having IPv6 bootstrap and guard support.)
       Implements 23828.
     - Expand the documentation for AuthDirHasIPv6Connectivity when it is
@@ -32,8 +32,8 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
       on 0.2.4.1-alpha.
 
   o Major features (onion service v3, control port):
-    - The control port now supports command and events for v3 onion
-      services: It is now possible to create ephemeral v3 services using
+    - The control port now supports commands and events for v3 onion
+      services. It is now possible to create ephemeral v3 services using
       ADD_ONION. Additionally, several events (HS_DESC, HS_DESC_CONTENT,
       CIRC and CIRC_MINOR) and commands (GETINFO, HSPOST, ADD_ONION and
       DEL_ONION) have been extended to support v3 onion services. Closes
@@ -44,7 +44,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
       service circuits to a list of nodes. The option HSLayer2Guards
       pins the second hop, and the option HSLayer3Guards pins the third
       hop. These options are for use in conjunction with experiments
-      with a "vanguards" for preventing guard enumeration attacks.
+      with "vanguards" for preventing guard enumeration attacks.
       Closes ticket 13837.
 
   o Major features (rust, portability, experimental):
@@ -67,7 +67,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
       include the IPv6 address of the rendezvous point, if it has one.
       Current v3 onion services running 0.3.2 ignore IPv6 addresses, but
       in future Tor versions, IPv6-only v3 single onion services will be
-      able to IPv6 addresses to connect directly to the rendezvous
+      able to use IPv6 addresses to connect directly to the rendezvous
       point. Closes ticket 23577. Patch by Neel Chauhan.
 
   o Major bugfixes (onion services, retry behavior):
@@ -281,7 +281,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
       flush. Fixes bug 23571; bugfix on 0.2.4.7-alpha. Also fixes
       bug 7267.
     - Do not attempt to launch self-reachability tests when entering
-      hibernation. Fixes a base of bug 12062; bugfix on 0.0.9pre5.
+      hibernation. Fixes a case of bug 12062; bugfix on 0.0.9pre5.
     - Resolve several bugs related to descriptor fetching on bridge
       clients with bandwidth accounting enabled. (This combination is
       not recommended!) Fixes a case of bug 12062; bugfix
@@ -346,7 +346,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
     - Remove duplicate code in node_has_curve25519_onion_key() and
       node_get_curve25519_onion_key(), and add a check for a zero
       microdesc curve25519 onion key. Closes ticket 23966, patch by
-      "aruna1234" and "teor".
+      "aruna1234" and teor.
     - Rewrite channel_rsa_id_group_set_badness to reduce temporary
       memory allocations with large numbers of OR connections (e.g.
       relays). Closes ticket 24119.
@@ -363,12 +363,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
       introduced in ticket 23577 to access the curve25519 public keys
       rather than accessing it directly. Closes ticket 23760. Patch by
       Neel Chauhan.
-    - Add a function to log channels' scheduler state changes to aide
+    - Add a function to log channels' scheduler state changes to aid
       debugging efforts. Closes ticket 24531.
 
   o Documentation:
     - Add documentation on how to build tor with Rust dependencies
-      without having to beonline. Closes ticket 22907; bugfix
+      without having to be online. Closes ticket 22907; bugfix
       on 0.3.0.3-alpha.
     - Clarify the behavior of RelayBandwidth{Rate,Burst} with client
       traffic. Closes ticket 24318.
@@ -378,13 +378,13 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
       expected to set MyFamily and ContactInfo correctly. Closes
       ticket 24526.
 
-  o Code simplification and refactoring  (channels):
-    - Remove the incoming and outgoing channel queues: These were never
+  o Code simplification and refactoring (channels):
+    - Remove the incoming and outgoing channel queues. These were never
       used, but still took up a step in our fast path.
     - The majority of the channel unit tests have been rewritten and the
       code coverage has now been raised to 83.6% for channel.c. Closes
       ticket 23709.
-    - Remove other dead code from the a lot the channel subsystem: All
+    - Remove other dead code from the channel subsystem: All
       together, this cleanup has removed more than 1500 lines of code
       overall and adding very little except for unit test.