summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2019-01-16 11:47:18 -0500
committerNick Mathewson <nickm@torproject.org>2019-01-16 11:47:18 -0500
commite38e26d3103c4acd73b2aa531fca0fd2db58ce7a (patch)
treee84beaee923fae5b41186a5536ff57462a8e80c6
parent554f076f916c6da331e30b84b23f680f89940918 (diff)
downloadtor-e38e26d3103c4acd73b2aa531fca0fd2db58ce7a.tar.gz
tor-e38e26d3103c4acd73b2aa531fca0fd2db58ce7a.zip
More line edits to changelog. Thanks, seborn!
-rw-r--r--ChangeLog75
1 files changed, 37 insertions, 38 deletions
diff --git a/ChangeLog b/ChangeLog
index a98e9999a8..0be9ac5700 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -14,7 +14,7 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
configuration options starting with "Dormant". Implements tickets
2149 and 28335.
- The client's memory of whether it is "dormant", and how long it
- has spend idle, persists across invocations. Implements
+ has spent idle, persists across invocations. Implements
ticket 28624.
- There is a DormantOnFirstStartup option that integrators can use
if they expect that in many cases, Tor will be installed but
@@ -27,9 +27,9 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
progress than previously possible, with the improvements of ticket
27169. Closes tickets 27167 and 27103. Addresses ticket 27308.
- When reporting bootstrap progress, treat connecting to a proxy or
- pluggable transport as separate from having successfully using
- that proxy or pluggable transport to connect to a relay. Closes
- tickets 27100 and 28884.
+ pluggable transport as separate from having successfully used that
+ proxy or pluggable transport to connect to a relay. Closes tickets
+ 27100 and 28884.
o Major features (circuit padding):
- Implement preliminary support for the circuit padding portion of
@@ -45,16 +45,16 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
o Major features (refactoring):
- Tor now uses an explicit list of its own subsystems when
initializing and shutting down. Previously, these systems were
- managed implicitly though various places throughout the codebase.
- (There still some subsystems using the old system.) Closes
+ managed implicitly in various places throughout the codebase.
+ (There may still be some subsystems using the old system.) Closes
ticket 28330.
o Minor features (bootstrap reporting):
- When reporting bootstrap progress, stop distinguishing between
- situations where it seems that only internal paths are available
- and situations where it seems that external paths are available.
- Previously, Tor would often erroneously report that it had only
- internal paths. Closes ticket 27402.
+ situations where only internal paths are available and situations
+ where external paths are available. Previously, Tor would often
+ erroneously report that it had only internal paths. Closes
+ ticket 27402.
o Minor features (continuous integration):
- Log Python version during each Travis CI job. Resolves
@@ -81,9 +81,8 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
relay's descriptor is so old that the relay should upload again
soon. Relays treat this flag as a signal to upload a new
descriptor. This flag will eventually let us remove the
- 'published' date from routerstatus entries, and make our our
- consensus diffs much smaller. Closes ticket 26770; implements
- proposal 293.
+ 'published' date from routerstatus entries, and make our consensus
+ diffs much smaller. Closes ticket 26770; implements proposal 293.
o Minor features (fallback directory mirrors):
- Update the fallback whitelist based on operator opt-ins and opt-
@@ -112,14 +111,14 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
Patch by Neel Chauhan.
o Minor features (log messages):
- - Improve log message in v3 onion services service that could print
- out negative revision counters. Closes ticket 27707. Patch
+ - Improve log message in v3 onion services that could print out
+ negative revision counters. Closes ticket 27707. Patch
by "ffmancera".
o Minor features (memory usage):
- Save memory by storing microdescriptor family lists with a more
compact representation. Closes ticket 27359.
- - Tor clients now use mmap() to read consensus files from disk, sot
+ - Tor clients now use mmap() to read consensus files from disk, so
that they no longer need keep the full text of a consensus in
memory when parsing it or applying a diff. Closes ticket 27244.
@@ -130,10 +129,10 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
o Minor features (performance):
- Cache the results of summarize_protocol_flags(), so that we don't
- have to parse the same Avoid parsing the same protocol-versions
- string over and over. This should save us a huge number of malloc
- calls on startup, and may reduce memory fragmentation with some
- allocators. Closes ticket 27225.
+ have to parse the same protocol-versions string over and over.
+ This should save us a huge number of malloc calls on startup, and
+ may reduce memory fragmentation with some allocators. Closes
+ ticket 27225.
- Remove a needless memset() call from get_token_arguments, thereby
speeding up the tokenization of directory objects by about 20%.
Closes ticket 28852.
@@ -148,7 +147,7 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
- Add support for emitting STATUS updates to Tor's control port from
a pluggable transport process. Closes ticket 28846.
- Add support for logging to Tor's logging subsystem from a
- pluggable transport process. Closes ticket 28180
+ pluggable transport process. Closes ticket 28180.
o Minor features (process management):
- Add a new process API for handling child processes. This new API
@@ -203,12 +202,12 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
21900; bugfix on 0.2.1.10-alpha.
o Minor bugfixes (guards):
- - In count_acceptable_nodes() we now treat the minimum number of
- nodes as at one bridge or guard node, and two non-guard nodes for
- a circuit. Previously, we had added up the sum of all nodes with a
- descriptor, but that could cause us to build failing circuits when
- we had either too many bridges, or not enough guard nodes. Fixes
- bug 25885; bugfix on 0.3.6.1-alpha. Patch by Neel Chauhan.
+ - In count_acceptable_nodes(), the minimum number is now one bridge
+ or guard node, and two non-guard nodes for a circuit. Previously,
+ we had added up the sum of all nodes with a descriptor, but that
+ could cause us to build failing circuits when we had either too
+ many bridges or not enough guard nodes. Fixes bug 25885; bugfix on
+ 0.3.6.1-alpha. Patch by Neel Chauhan.
o Minor bugfixes (IPv6):
- Fix tor_ersatz_socketpair on IPv6-only systems. Previously, the
@@ -229,22 +228,22 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
bug 23082; bugfix on 0.2.0.10-alpha.
o Minor bugfixes (onion service v3, client):
- - Avoid a BUG() stacktrace in case a SOCKS connection is found
- waiting for the descriptor while we do have it in the cache. There
- is a rare case when this can happen. Now, tor will recover and
- retry the descriptor. Fixes bug 28669; bugfix on 0.3.2.4-alpha.
+ - Stop logging a "BUG()" warning and stacktrace when we find a SOCKS
+ connection waiting for a descriptor that we actually have in the
+ cache. It turns out that this can actually happen, though it is
+ rare. Now, tor will recover and retry the descriptor. Fixes bug
+ 28669; bugfix on 0.3.2.4-alpha.
o Minor bugfixes (periodic events):
- Refrain from calling routerlist_remove_old_routers() from
- check_descriptor_callback(). Instead, create a new periodic event
- that will run once every hour even if Tor is not configured as
- onion router. Fixes bug 27929; bugfix on 0.2.8.1-alpha.
+ check_descriptor_callback(). Instead, create a new hourly periodic
+ event. Fixes bug 27929; bugfix on 0.2.8.1-alpha.
o Minor bugfixes (pluggable transports):
- Make sure that data is continously read from standard output and
standard error pipes of a pluggable transport child-process, to
- avoid deadlocking when the a pipe's buffer is full. Fixes bug
- 26360; bugfix on 0.2.3.6-alpha.
+ avoid deadlocking when a pipe's buffer is full. Fixes bug 26360;
+ bugfix on 0.2.3.6-alpha.
o Minor bugfixes (unit tests):
- Instead of relying on hs_free_all() to clean up all onion service
@@ -261,7 +260,7 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
o Code simplification and refactoring:
- Reimplement NETINFO cell parsing and generation to rely on
trunnel-generated wire format handling code. Closes ticket 27325.
- - Remove unnecessarily unsafe code from the Rust macro cstr!. Closes
+ - Remove unnecessary unsafe code from the Rust macro "cstr!". Closes
ticket 28077.
- Rework SOCKS wire format handling to rely on trunnel-generated
parsing/generation code. Resolves ticket 27620.
@@ -276,7 +275,7 @@ Changes in version 0.4.0.1-alpha - 2019-01-18
o Documentation:
- Mention that you cannot add a new onion service if Tor is already
running with Sandbox enabled. Closes ticket 28560.
- - Improve ControlPort deocumentation mention that it accepts
+ - Improve ControlPort documentation. Mention that it accepts
address:port pairs, and can be used multiple times. Closes
ticket 28805.
- Document the exact output of "tor --version". Closes ticket 28889.