diff options
author | Roger Dingledine <arma@torproject.org> | 2011-04-08 16:30:39 -0400 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2011-04-08 16:30:39 -0400 |
commit | c111adb5fe757ea9baf9aaca151af7e8cd5e5808 (patch) | |
tree | e887f7f0bd56abe5e19c897dd711d0c21a947d26 | |
parent | 7cee98f5fdaedda4acc80768b9c9751e48025129 (diff) | |
download | tor-0.2.2.24-alpha.tar.gz tor-0.2.2.24-alpha.zip |
add a blurb for 0.2.2.24-alphator-0.2.2.24-alpha
-rw-r--r-- | ChangeLog | 21 |
1 files changed, 13 insertions, 8 deletions
@@ -1,12 +1,10 @@ -Changes in version 0.2.2.24-alpha - 2011-04-0? +Changes in version 0.2.2.24-alpha - 2011-04-08 + Tor 0.2.2.24-alpha fixes a variety of bugs, including a big bug that + prevented Tor clients from effectively using "multihomed" bridges, + that is, bridges that listen on multiple ports or IP addresses so users + can continue to use some of their addresses even if others get blocked. + o Major bugfixes: - - Directory authorities now use data collected from their own - uptime observations when choosing whether to assign the HSDir flag - to relays, instead of trusting the uptime value the relay reports in - its descriptor. This change helps prevent an attack where a small - set of nodes with frequently-changing identity keys can blackhole - a hidden service. (Only authorities need upgrade; others will be - fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709. - Fix a bug where bridge users who configure the non-canonical address of a bridge automatically switch to its canonical address. If a bridge listens at more than one address, it should be @@ -18,6 +16,13 @@ Changes in version 0.2.2.24-alpha - 2011-04-0? to use bridge A if it's still reachable. While this behavior is a feature if your goal is connectivity, in some scenarios it's a dangerous bug. Bugfix on Tor 0.2.0.1-alpha; fixes bug 2511. + - Directory authorities now use data collected from their own + uptime observations when choosing whether to assign the HSDir flag + to relays, instead of trusting the uptime value the relay reports in + its descriptor. This change helps prevent an attack where a small + set of nodes with frequently-changing identity keys can blackhole + a hidden service. (Only authorities need upgrade; others will be + fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709. o Minor bugfixes: - When we restart our relay, we might get a successful connection |