From c111adb5fe757ea9baf9aaca151af7e8cd5e5808 Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Fri, 8 Apr 2011 16:30:39 -0400 Subject: add a blurb for 0.2.2.24-alpha --- ChangeLog | 21 +++++++++++++-------- 1 file changed, 13 insertions(+), 8 deletions(-) diff --git a/ChangeLog b/ChangeLog index 8d47e3d684..9c9ccc3fd0 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,12 +1,10 @@ -Changes in version 0.2.2.24-alpha - 2011-04-0? +Changes in version 0.2.2.24-alpha - 2011-04-08 + Tor 0.2.2.24-alpha fixes a variety of bugs, including a big bug that + prevented Tor clients from effectively using "multihomed" bridges, + that is, bridges that listen on multiple ports or IP addresses so users + can continue to use some of their addresses even if others get blocked. + o Major bugfixes: - - Directory authorities now use data collected from their own - uptime observations when choosing whether to assign the HSDir flag - to relays, instead of trusting the uptime value the relay reports in - its descriptor. This change helps prevent an attack where a small - set of nodes with frequently-changing identity keys can blackhole - a hidden service. (Only authorities need upgrade; others will be - fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709. - Fix a bug where bridge users who configure the non-canonical address of a bridge automatically switch to its canonical address. If a bridge listens at more than one address, it should be @@ -18,6 +16,13 @@ Changes in version 0.2.2.24-alpha - 2011-04-0? to use bridge A if it's still reachable. While this behavior is a feature if your goal is connectivity, in some scenarios it's a dangerous bug. Bugfix on Tor 0.2.0.1-alpha; fixes bug 2511. + - Directory authorities now use data collected from their own + uptime observations when choosing whether to assign the HSDir flag + to relays, instead of trusting the uptime value the relay reports in + its descriptor. This change helps prevent an attack where a small + set of nodes with frequently-changing identity keys can blackhole + a hidden service. (Only authorities need upgrade; others will be + fine once they do.) Bugfix on 0.2.0.10-alpha; fixes bug 2709. o Minor bugfixes: - When we restart our relay, we might get a successful connection -- cgit v1.2.3-54-g00ecf