summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2011-04-08 16:30:39 -0400
committerRoger Dingledine <arma@torproject.org>2011-04-08 16:30:39 -0400
commitc111adb5fe757ea9baf9aaca151af7e8cd5e5808 (patch)
treee887f7f0bd56abe5e19c897dd711d0c21a947d26
parent7cee98f5fdaedda4acc80768b9c9751e48025129 (diff)
downloadtor-0.2.2.24-alpha.tar.gz
tor-0.2.2.24-alpha.zip
add a blurb for 0.2.2.24-alphator-0.2.2.24-alpha
-rw-r--r--ChangeLog21
1 files changed, 13 insertions, 8 deletions
diff --git a/ChangeLog b/ChangeLog
index 8d47e3d684..9c9ccc3fd0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,12 +1,10 @@
-Changes in version 0.2.2.24-alpha - 2011-04-0?
+Changes in version 0.2.2.24-alpha - 2011-04-08
+ Tor 0.2.2.24-alpha fixes a variety of bugs, including a big bug that
+ prevented Tor clients from effectively using "multihomed" bridges,
+ that is, bridges that listen on multiple ports or IP addresses so users
+ can continue to use some of their addresses even if others get blocked.
+
o Major bugfixes:
- - Directory authorities now use data collected from their own
- uptime observations when choosing whether to assign the HSDir flag
- to relays, instead of trusting the uptime value the relay reports in
- its descriptor. This change helps prevent an attack where a small
- set of nodes with frequently-changing identity keys can blackhole
- a hidden service. (Only authorities need upgrade; others will be
- fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709.
- Fix a bug where bridge users who configure the non-canonical
address of a bridge automatically switch to its canonical
address. If a bridge listens at more than one address, it should be
@@ -18,6 +16,13 @@ Changes in version 0.2.2.24-alpha - 2011-04-0?
to use bridge A if it's still reachable. While this behavior is
a feature if your goal is connectivity, in some scenarios it's a
dangerous bug. Bugfix on Tor 0.2.0.1-alpha; fixes bug 2511.
+ - Directory authorities now use data collected from their own
+ uptime observations when choosing whether to assign the HSDir flag
+ to relays, instead of trusting the uptime value the relay reports in
+ its descriptor. This change helps prevent an attack where a small
+ set of nodes with frequently-changing identity keys can blackhole
+ a hidden service. (Only authorities need upgrade; others will be
+ fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709.
o Minor bugfixes:
- When we restart our relay, we might get a successful connection