diff options
author | Roger Dingledine <arma@torproject.org> | 2013-09-05 02:32:02 -0400 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2013-09-05 02:32:02 -0400 |
commit | 00fb525b23cf070fb229e1073caae47e6401f1e2 (patch) | |
tree | 46db4e598e2e22a3ccfaa95935f68f25aa9d7dd2 | |
parent | b01028e87ef8d74763297462e89f480d28961ad2 (diff) | |
download | tor-0.2.4.17-rc.tar.gz tor-0.2.4.17-rc.zip |
give it a blurb and touch up the changelog stanzastor-0.2.4.17-rc
-rw-r--r-- | ChangeLog | 19 |
1 files changed, 12 insertions, 7 deletions
@@ -1,4 +1,10 @@ -Changes in version 0.2.4.17-rc - 2013-09-0x +Changes in version 0.2.4.17-rc - 2013-09-05 + Tor 0.2.4.17-rc is the third release candidate for the Tor 0.2.4.x + series. It adds an emergency step to help us tolerate the massive + influx of users: 0.2.4 clients using the new (faster and safer) "NTor" + circuit-level handshakes now effectively jump the queue compared to + the 0.2.3 clients using "TAP" handshakes. This release also fixes a + big bug hindering bridge reachability tests. o Major features: - Relays now process the new "NTor" circuit-level handshake requests @@ -15,20 +21,19 @@ Changes in version 0.2.4.17-rc - 2013-09-0x - Bridges now send AUTH_CHALLENGE cells during their v3 handshakes; previously they did not, which prevented them from receiving successful connections from relays for self-test or bandwidth - testing. Fixes bug 9546; bugfix on 0.2.3.6-alpha. - - When a relay is extending a circuit to a bridge, it needs to send a - NETINFO cell, even when the bridge hasn't sent an AUTH_CHALLENGE - cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha. + testing. Also, when a relay is extending a circuit to a bridge, + it needs to send a NETINFO cell, even when the bridge hasn't sent + an AUTH_CHALLENGE cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha. - If the time to download the next old-style networkstatus is in the future, do not decline to consider whether to download the next microdescriptor networkstatus. Fixes bug 9564; bugfix on 0.2.3.14-alpha. o Minor bugfixes: - - Avoid double-closing the listener socket in our socketpair + - Avoid double-closing the listener socket in our socketpair() replacement (used on Windows) in the case where the addresses on our opened sockets don't match what we expected. Fixes bug 9400; - bugfix on every released Tor version. Found by Coverity. + bugfix on 0.0.2pre7. Found by Coverity. o Minor fixes (config options): - Avoid overflows when the user sets MaxCircuitDirtiness to a |