diff options
author | Nick Mathewson <nickm@torproject.org> | 2014-04-25 11:37:38 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2014-04-25 11:37:38 -0400 |
commit | 4641086a1f863e895ee817934d6c466c60ef0334 (patch) | |
tree | 13c3c88f9d65b8e375c00f68a6f80e42ba0b873a | |
parent | 4af83dc37744e2b3b4e62f6efe8993806d57fe42 (diff) | |
download | tor-4641086a1f863e895ee817934d6c466c60ef0334.tar.gz tor-4641086a1f863e895ee817934d6c466c60ef0334.zip |
Write a release blurb
-rw-r--r-- | ChangeLog | 14 |
1 files changed, 11 insertions, 3 deletions
@@ -1,7 +1,15 @@ Changes in version 0.2.5.4-alpha - 2014-04-25 - This release includes several security and performance improvements - for clients and relays, including blacklisting authority signing keys - that were used while susceptible to the OpenSSL "heartbleed" bug, + Tor 0.2.5.4-alpha includes several security and performance + improvements for clients and relays, including blacklisting authority + signing keys that were used while susceptible to the OpenSSL + "heartbleed" bug, fixing two expensive functions on busy relays, + improved TLS ciphersuite preference lists, support run-time hardening + on compilers that support AddressSanitizer, and more work on the Linux + sandbox code. + + There are also several usability fixes for clients (especially clients + that use bridges), two new TransPort protocols supported (one on + OpenBSD, one on FreeBSD), and various other bugfixes. This release marks end-of-line for Tor 0.2.2.x; those Tor versions have accumulated many known flaws; everyone should upgrade. |