aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2018-01-25 11:37:01 -0500
committerNick Mathewson <nickm@torproject.org>2018-01-25 11:37:01 -0500
commite2411e76d82b8ed812f7a431791fc725a18de0af (patch)
treeb1b03825e263b791d94325786c5b09c99e3af78c
parente6de89f19573c70dc062556a0a6568e8a1a8fcc0 (diff)
downloadtor-e2411e76d82b8ed812f7a431791fc725a18de0af.tar.gz
tor-e2411e76d82b8ed812f7a431791fc725a18de0af.zip
Proofreading step by seborn (thx)
-rw-r--r--ChangeLog28
1 files changed, 14 insertions, 14 deletions
diff --git a/ChangeLog b/ChangeLog
index ddf959b96a..7a89aca6b4 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -19,12 +19,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
o Major features (IPv6, directory documents):
- Add consensus method 27, which adds IPv6 ORPorts to the microdesc
- consensus. This information it easier for IPv6 clients to
+ consensus. This information makes it easier for IPv6 clients to
bootstrap and choose reachable entry guards. Implements 23826.
- Add consensus method 28, which removes IPv6 ORPorts from
- microdescriptors. Now that there are the consensus contains IPv6
+ microdescriptors. Now that the consensus contains IPv6
ORPorts, they are redundant in microdescs. This change will be
- used by tor clients on 0.2.8.x and later. (That is to say, with
+ used by Tor clients on 0.2.8.x and later. (That is to say, with
all Tor clients having IPv6 bootstrap and guard support.)
Implements 23828.
- Expand the documentation for AuthDirHasIPv6Connectivity when it is
@@ -32,8 +32,8 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
on 0.2.4.1-alpha.
o Major features (onion service v3, control port):
- - The control port now supports command and events for v3 onion
- services: It is now possible to create ephemeral v3 services using
+ - The control port now supports commands and events for v3 onion
+ services. It is now possible to create ephemeral v3 services using
ADD_ONION. Additionally, several events (HS_DESC, HS_DESC_CONTENT,
CIRC and CIRC_MINOR) and commands (GETINFO, HSPOST, ADD_ONION and
DEL_ONION) have been extended to support v3 onion services. Closes
@@ -44,7 +44,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
service circuits to a list of nodes. The option HSLayer2Guards
pins the second hop, and the option HSLayer3Guards pins the third
hop. These options are for use in conjunction with experiments
- with a "vanguards" for preventing guard enumeration attacks.
+ with "vanguards" for preventing guard enumeration attacks.
Closes ticket 13837.
o Major features (rust, portability, experimental):
@@ -67,7 +67,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
include the IPv6 address of the rendezvous point, if it has one.
Current v3 onion services running 0.3.2 ignore IPv6 addresses, but
in future Tor versions, IPv6-only v3 single onion services will be
- able to IPv6 addresses to connect directly to the rendezvous
+ able to use IPv6 addresses to connect directly to the rendezvous
point. Closes ticket 23577. Patch by Neel Chauhan.
o Major bugfixes (onion services, retry behavior):
@@ -281,7 +281,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
flush. Fixes bug 23571; bugfix on 0.2.4.7-alpha. Also fixes
bug 7267.
- Do not attempt to launch self-reachability tests when entering
- hibernation. Fixes a base of bug 12062; bugfix on 0.0.9pre5.
+ hibernation. Fixes a case of bug 12062; bugfix on 0.0.9pre5.
- Resolve several bugs related to descriptor fetching on bridge
clients with bandwidth accounting enabled. (This combination is
not recommended!) Fixes a case of bug 12062; bugfix
@@ -346,7 +346,7 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
- Remove duplicate code in node_has_curve25519_onion_key() and
node_get_curve25519_onion_key(), and add a check for a zero
microdesc curve25519 onion key. Closes ticket 23966, patch by
- "aruna1234" and "teor".
+ "aruna1234" and teor.
- Rewrite channel_rsa_id_group_set_badness to reduce temporary
memory allocations with large numbers of OR connections (e.g.
relays). Closes ticket 24119.
@@ -363,12 +363,12 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
introduced in ticket 23577 to access the curve25519 public keys
rather than accessing it directly. Closes ticket 23760. Patch by
Neel Chauhan.
- - Add a function to log channels' scheduler state changes to aide
+ - Add a function to log channels' scheduler state changes to aid
debugging efforts. Closes ticket 24531.
o Documentation:
- Add documentation on how to build tor with Rust dependencies
- without having to beonline. Closes ticket 22907; bugfix
+ without having to be online. Closes ticket 22907; bugfix
on 0.3.0.3-alpha.
- Clarify the behavior of RelayBandwidth{Rate,Burst} with client
traffic. Closes ticket 24318.
@@ -378,13 +378,13 @@ Changes in version 0.3.3.1-alpha - 2018-01-25:
expected to set MyFamily and ContactInfo correctly. Closes
ticket 24526.
- o Code simplification and refactoring (channels):
- - Remove the incoming and outgoing channel queues: These were never
+ o Code simplification and refactoring (channels):
+ - Remove the incoming and outgoing channel queues. These were never
used, but still took up a step in our fast path.
- The majority of the channel unit tests have been rewritten and the
code coverage has now been raised to 83.6% for channel.c. Closes
ticket 23709.
- - Remove other dead code from the a lot the channel subsystem: All
+ - Remove other dead code from the channel subsystem: All
together, this cleanup has removed more than 1500 lines of code
overall and adding very little except for unit test.