declare that we're putting out 0.2.1.9-alpha next week

svn:r17659
This commit is contained in:
Roger Dingledine 2008-12-17 22:46:00 +00:00
parent 048f2a179b
commit 03f413f5c7
3 changed files with 29 additions and 27 deletions

View File

@ -1,14 +1,14 @@
Changes in version 0.2.1.9-alpha - 200?-??-??
Changes in version 0.2.1.9-alpha - 2008-12-2?
o Major features:
- Never use a connection with a mismatched address to extend a
circuit, unless that connections is canonical. A canonical
circuit, unless that connections is canonical. A canonical
connection is one whose address is authenticated by the router's
identity key, either in a NETINFO cell or in a router descriptor.
o Major bugfixes:
- Fix a logic error that would automatically reject all but the first
configured DNS server. Bugfix on 0.2.1.5-alpha. Possible fix for part
of bug 813/868. Bug spotted by coderman.
configured DNS server. Bugfix on 0.2.1.5-alpha. Possible fix for
part of bug 813/868. Bug spotted by coderman.
- When a stream at an exit relay is in state "resolving" or
"connecting" and it receives an "end" relay cell, the exit relay
would silently ignore the end cell and not close the stream. If
@ -17,45 +17,46 @@ Changes in version 0.2.1.9-alpha - 200?-??-??
reported by "wood".
o Minor features:
- Give a better error message when an overzealous init script says,
"sudo -u username tor --user username". Makes Bug 882 easier
for users to diagnose.
- Give a better error message when an overzealous init script says
"sudo -u username tor --user username". Makes Bug 882 easier for
users to diagnose.
- When a directory authority gives us a new guess for our IP address,
log which authority we used. Hopefully this will help us debug
the recent complaints about bad IP address guesses.
- When we can't initialize DNS because the network is down, do not
automatically stop Tor from starting. Instead, we retry failed
dns_inits() every 10 minutes, and change the exit policy to reject *:*
until one succeeds. Fixes bug 691.
automatically stop Tor from starting. Instead, we retry failed
dns_inits() every 10 minutes, and change the exit policy to reject
*:* until one succeeds. Fixes bug 691.
- Detect svn revision properly when we're using git-svn.
- Try not to open more than one descriptor-downloading connection to an
authority at once. This should reduce load on directory authorities.
Fixes bug 366.
- Try not to open more than one descriptor-downloading connection
to an authority at once. This should reduce load on directory
authorities. Fixes bug 366.
- Add cross-certification to newly generated certificates, so that
a signing key is enough information to use to look up a certificate.
Partial implementation of proposal 157.
- Start serving certificates by <identity digest, signing key digest>
pairs. Partial implementation of proposal 157.
pairs. Partial implementation of proposal 157.
- Clients now never report any stream end reason except 'MISC'.
Implements proposal 148.
o Minor features (controller):
- New CONSENSUS_ARRIVED event to note when a new consensus has
been fetched and validated.
- Finally remove deprecated "EXTENEDED_FORMAT" feature. It has
- Finally remove deprecated "EXTENDED_FORMAT" feature. It has
been called EXTENDED_EVENTS since 0.1.2.4-alpha.
- When we realize that another process has modified our cached
descriptors, print out a more useful error message rather than
triggering an assertion. Fixes bug 885. Patch from Karsten.
- Add an internal-use-only __ReloadTorrcOnSIGHUP option for controllers
to prevent SIGHUP from reloading the configuration. Fixes bug 856.
triggering an assertion. Fixes bug 885. Patch from Karsten.
- Add an internal-use-only __ReloadTorrcOnSIGHUP option for
controllers to prevent SIGHUP from reloading the
configuration. Fixes bug 856.
o Minor bugfixes:
- Resume using the correct "REASON=" stream when telling the
controller why we closed a stream. Bugfix in 0.2.1.1-alpha.
- When a canonical connection appears later in our internal list
than a noncanonical one for a given OR ID, always use the
canonical one. Bugfix on 0.2.0.12-alpha. Fixes bug 805.
canonical one. Bugfix on 0.2.0.12-alpha. Fixes bug 805.
Spotted by rovv.
- Clip the MaxCircuitDirtiness config option to a minimum of 10
seconds. Warn the user if lower values are given in the
@ -66,16 +67,17 @@ Changes in version 0.2.1.9-alpha - 200?-??-??
o Minor bugfixes (hidden services):
- Do not throw away existing introduction points on SIGHUP; bugfix on
0.0.6pre1; also, do not stall hidden services because of introduction
points thrown away; bugfix on 0.2.1.7-alpha. Spotted by John Brooks.
Patch by Karsten. Fixes bug 874.
0.0.6pre1; also, do not stall hidden services because of
introduction points thrown away; bugfix on 0.2.1.7-alpha. Spotted
by John Brooks. Patch by Karsten. Fixes bug 874.
o Code simplifications and refactoring:
- Rename the confusing or_is_obsolete field to the more appropriate
is_bad_for_new_circs, and move it to or_connection_t where it belongs.
is_bad_for_new_circs, and move it to or_connection_t where it
belongs.
- Move edge-only flags from connection_t to edge_connection_t: not
only is this better coding, but on machines of plausible alignment,
it should save 4-8 bytes per connection_t. "Every little bit helps."
it should save 4-8 bytes per connection_t. "Every little bit helps."
Changes in version 0.2.1.8-alpha - 2008-12-08

View File

@ -564,7 +564,7 @@ authdir_wants_to_reject_router(routerinfo_t *ri, const char **msg,
return 0;
}
/** True iff <b>a</b> is more severe than <b>b</b> */
/** True iff <b>a</b> is more severe than <b>b</b>. */
static int
WRA_MORE_SEVERE(was_router_added_t a, was_router_added_t b)
{
@ -577,7 +577,7 @@ WRA_MORE_SEVERE(was_router_added_t a, was_router_added_t b)
}
}
/** As for dirserv_add_descriptor, but accepts multiple documents, and
/** As for dirserv_add_descriptor(), but accepts multiple documents, and
* returns the most severe error that occurred for any one of them. */
was_router_added_t
dirserv_add_multiple_descriptors(const char *desc, uint8_t purpose,

View File

@ -1186,7 +1186,7 @@ typedef struct control_connection_t {
/** Number of bytes currently stored in incoming_cmd. */
uint32_t incoming_cmd_cur_len;
/** A control command that we're reading from the inbuf, but which has not
* yet arrived completely. */
* yet arrived completely. */
char *incoming_cmd;
} control_connection_t;