Browse Source

bump to 0.2.0.18-alpha

svn:r13291
Roger Dingledine 17 years ago
parent
commit
ea0afb6c39
3 changed files with 10 additions and 8 deletions
  1. 8 6
      ChangeLog
  2. 1 1
      configure.in
  3. 1 1
      src/win32/orconfig.h

+ 8 - 6
ChangeLog

@@ -1,14 +1,14 @@
-Changes in version 0.2.0.18-alpha - 2008-01-??
+Changes in version 0.2.0.18-alpha - 2008-01-25
   o New directory authorities:
   o New directory authorities:
     - Set up dannenberg (run by CCC) as the sixth v3 directory
     - Set up dannenberg (run by CCC) as the sixth v3 directory
       authority.
       authority.
 
 
   o Major bugfixes:
   o Major bugfixes:
-    - We accidentally enabled the under-development v2 TLS handshake
-      code, which is causing log entries like "TLS error while
-      renegotiating handshake". Disable it again. Resolves bug 590.
     - Fix a major memory leak when attempting to use the v2 TLS
     - Fix a major memory leak when attempting to use the v2 TLS
       handshake code. Bugfix on 0.2.0.x; fixes bug 589.
       handshake code. Bugfix on 0.2.0.x; fixes bug 589.
+    - We accidentally enabled the under-development v2 TLS handshake
+      code, which was causing log entries like "TLS error while
+      renegotiating handshake". Disable it again. Resolves bug 590.
     - We were computing the wrong Content-Length: header for directory
     - We were computing the wrong Content-Length: header for directory
       responses that need to be compressed on the fly, causing clients
       responses that need to be compressed on the fly, causing clients
       asking for those items to always fail. Bugfix on 0.2.0.x; fixes
       asking for those items to always fail. Bugfix on 0.2.0.x; fixes
@@ -23,13 +23,15 @@ Changes in version 0.2.0.18-alpha - 2008-01-??
       handle more, do another bandwidth test.
       handle more, do another bandwidth test.
     - New config options WarnPlaintextPorts and RejectPlaintextPorts so
     - New config options WarnPlaintextPorts and RejectPlaintextPorts so
       Tor can warn and/or refuse connections to ports commonly used with
       Tor can warn and/or refuse connections to ports commonly used with
-      vulnerable-plaintext protocols.
+      vulnerable-plaintext protocols. Currently we warn on ports 23,
+      109, 110, and 143, but we don't reject any.
 
 
   o Minor bugfixes:
   o Minor bugfixes:
     - When we setconf ClientOnly to 1, close any current OR and Dir
     - When we setconf ClientOnly to 1, close any current OR and Dir
       listeners. Reported by mwenge.
       listeners. Reported by mwenge.
     - When we get a consensus that's been signed by more people than
     - When we get a consensus that's been signed by more people than
-      we expect, don't log about it; it's not a big deal.
+      we expect, don't log about it; it's not a big deal. Reported
+      by Kyle Williams.
 
 
   o Minor features:
   o Minor features:
     - Don't answer "/tor/networkstatus-bridges" directory requests if
     - Don't answer "/tor/networkstatus-bridges" directory requests if

+ 1 - 1
configure.in

@@ -4,7 +4,7 @@ dnl Copyright (c) 2004-2007, Roger Dingledine, Nick Mathewson
 dnl See LICENSE for licensing information
 dnl See LICENSE for licensing information
 
 
 AC_INIT
 AC_INIT
-AM_INIT_AUTOMAKE(tor, 0.2.0.17-alpha-dev)
+AM_INIT_AUTOMAKE(tor, 0.2.0.18-alpha)
 AM_CONFIG_HEADER(orconfig.h)
 AM_CONFIG_HEADER(orconfig.h)
 
 
 AC_CANONICAL_HOST
 AC_CANONICAL_HOST

+ 1 - 1
src/win32/orconfig.h

@@ -227,6 +227,6 @@
 #define USING_TWOS_COMPLEMENT
 #define USING_TWOS_COMPLEMENT
 
 
 /* Version number of package */
 /* Version number of package */
-#define VERSION "0.2.0.17-alpha-dev"
+#define VERSION "0.2.0.18-alpha"