remove some duplicate changelog entries from the upcoming 0.2.1.1-alpha

release


svn:r15155
This commit is contained in:
Roger Dingledine 2008-06-12 00:08:25 +00:00
parent ff89c0bc39
commit 72cf0206d0

104
ChangeLog
View File

@ -1,87 +1,41 @@
Changes in version 0.2.1.1-alpha - 2008-??-?? Changes in version 0.2.1.1-alpha - 2008-??-??
o Major bugfixes:
- When we switched to using v3 directories, we threw away the part of
the "do we have enough directory info?" calculation that checked
how many relays we believed to still be running based on our own
experience. So if we went offline, we never gave up trying to make
new circuits; worse, when we came back online we didn't recognize
that we should give all the relays another chance. Bugfix on
0.2.0.9-alpha; fixes bugs 648 and 675.
o Minor bugfixes: o Minor bugfixes:
- Stop giving double-close warn when we reject an address for client DNS. - Stop giving double-close warn when we reject an address for
- On Windows, correctly detect errors when listing the contents of a client DNS.
directory. Fix from lodger. (Bugfix on 0.1.2.x.)
- Fix the implementation of ClientDNSRejectInternalAddresses so that it
actually works, and doesn't warn about every single reverse lookup.
Fixes the other part of bug 617. Bugfix on 0.2.0.1-alpha.
- Keep address policies from leaking: start their refcount at 1, not
2. Bugfix on 0.2.0.16-alpha.
- Free authority certificates on exit, so they don't look like memory
leaks. Bugfix on 0.2.0.19-alpha.
- Free static hashtables for policy maps and for TLS connections on
shutdown, so they don't look like memory leaks. Bugfix on 0.2.0.x.
- Make relay cells written on a connection count as non-padding when - Make relay cells written on a connection count as non-padding when
tracking how long a connection has been in use. Bugfix on tracking how long a connection has been in use. Bugfix on
0.2.0.1-alpha. Spotted by lodger. 0.2.0.1-alpha. Spotted by lodger.
- Reduce the default smartlist size from 32 to 16; it turns out that - Reduce the default smartlist size from 32 to 16; it turns out that
most smartlists hold around 8-12 elements tops. most smartlists hold around 8-12 elements tops.
- Avoid allocating extra space when computing consensuses on
64-bit platforms. Bug spotted by aakova.
- Use recursive pthread mutexes in order to avoid deadlock when
logging debug-level messages to a controller. Bug spotted by
nwf, bugfix on 0.2.0.16-alpha.
- Warn less verbosely about clock skew from netinfo cells from
untrusted sources. Fixes bug 663.
- Non-exit relays no longer allow DNS requests. Fixes bug 619.
Patch from Lodger.
- Make controller stream events for DNS requests more consistent,
by adding "new stream" events for DNS requests, and removing
spurious "stream closed" events" for cached reverse resolves.
Patch from mwenge. Fixes bug 646.
- Correctly notify one-hop connections when a circuit build has
failed. Possible fix for bug 669. Found by lodger.
- When we choose to abandon a new entry guard because we think our - When we choose to abandon a new entry guard because we think our
older ones might be better, close any circuits pending on that older ones might be better, close any circuits pending on that
new entry guard connection. Bugfix on 0.1.2.8-beta; found by lodger. new entry guard connection. Bugfix on 0.1.2.8-beta; found by lodger.
- Detect address changes correctly on non-directory mirror
servers. Fix for bug 652.
- Authorities correctly free policies on bad servers on
exit. Fixes bug 672.
- When tunneling an encrypted directory connection, and its first circuit
fails do not leave it unattached and ask the controller to deal. Fixes
the second part of bug 681.
- Make bridge authorities correctly clean extrainfo store from time to
time. Bugfix on 0.2.0.x.
- Stop reloading the router list from disk for no reason when we - Stop reloading the router list from disk for no reason when we
run out of reachable directory mirrors. Once upon a time reloading run out of reachable directory mirrors. Once upon a time reloading
it would set the 'is_running' flag back to 1 for them. It hasn't it would set the 'is_running' flag back to 1 for them. It hasn't
done that for a long time. done that for a long time.
- In very rare situations new hidden service descriptors were published - In very rare situations new hidden service descriptors were
earlier than 30 seconds after the last change to the service, with the published earlier than 30 seconds after the last change to the
30 seconds being the current voodoo saying that a descriptor is stable. service, with the 30 seconds being the current voodoo saying that
- While setting up a hidden service, some valid introduction circuits a descriptor is stable.
were overlooked and given up. This might be the reason for the long
delay in making a hidden service available. Bugfix on 0.2.0.13-alpha.
o Minor features: o Minor features:
- Allow separate log levels to be configured for different logging - Allow separate log levels to be configured for different logging
domains. For example, this allows one to log all notices, warnings, or domains. For example, this allows one to log all notices, warnings,
errors, plus all memory management messages of level debug or higher, or errors, plus all memory management messages of level debug or
with: Log [MM] debug-err [*] notice-err file /var/log/tor. higher, with: Log [MM] debug-err [*] notice-err file /var/log/tor.
- Add a malloc_good_size implementation to OpenBSD_malloc_linux.c, - Add a malloc_good_size implementation to OpenBSD_malloc_linux.c,
to avoid unused RAM in buffer chunks and memory pools. to avoid unused RAM in buffer chunks and memory pools.
- Downgrade "sslv3 alert handshake failure" message to INFO.
- Add a couple of extra warnings to --enable-gcc-warnings for GCC 4.3, - Add a couple of extra warnings to --enable-gcc-warnings for GCC 4.3,
and stop using a warning that had become unfixably verbose under GCC and stop using a warning that had become unfixably verbose under
4.3. GCC 4.3.
- Start using OpenSSL's RAND_poll() for better (and more portable) - Resume using OpenSSL's RAND_poll() for better (and more portable)
cross-platform entropy collection again. We used to use it, then cross-platform entropy collection again. We used to use it, then
stopped using it because of a bug that could crash systems that called stopped using it because of a bug that could crash systems that
RAND_poll when they had a lot of fds open. It looks like the bug got called RAND_poll when they had a lot of fds open. It looks like the
fixed in late 2006. Our new behavior is to call RAND_poll() at bug got fixed in late 2006. Our new behavior is to call RAND_poll()
startup, and to call RAND_poll() when we reseed later only if we at startup, and to call RAND_poll() when we reseed later only if
have a non-buggy OpenSSL version. we have a non-buggy OpenSSL version.
- Speed up parsing and cut down on memory fragmentation by using - Speed up parsing and cut down on memory fragmentation by using
stack-style allocations for parsing directory objects. Previously, stack-style allocations for parsing directory objects. Previously,
this accounted for over 40% of allocations from within Tor's code this accounted for over 40% of allocations from within Tor's code
@ -92,8 +46,8 @@ Changes in version 0.2.1.1-alpha - 2008-??-??
output to messages of warning and error severity. output to messages of warning and error severity.
- Use a Bloom filter rather than a digest-based set to track which - Use a Bloom filter rather than a digest-based set to track which
descriptors we need to keep around when we're cleaning out old descriptors we need to keep around when we're cleaning out old
router descriptors. This speeds up the computation significantly, and router descriptors. This speeds up the computation significantly,
may reduce fragmentation. and may reduce fragmentation.
- Make dumpstats() log the fullness and size of openssl-internal - Make dumpstats() log the fullness and size of openssl-internal
buffers. buffers.
- Servers support a new URL scheme for consensus downloads that - Servers support a new URL scheme for consensus downloads that
@ -101,33 +55,23 @@ Changes in version 0.2.1.1-alpha - 2008-??-??
The server then only sends the consensus if the client will The server then only sends the consensus if the client will
trust it. Otherwise a 404 error is sent back. Clients use trust it. Otherwise a 404 error is sent back. Clients use
this new scheme when the server supports it. this new scheme when the server supports it.
- Add a new V3AuthUseLegacyKey option to make it easier for authorities
to change their identity keys if they have to.
- If the user has applied the experimental SSL_MODE_RELEASE_BUFFERS - If the user has applied the experimental SSL_MODE_RELEASE_BUFFERS
patch to their OpenSSL, turn it on to save memory on servers. This patch to their OpenSSL, turn it on to save memory on servers. This
patch will (with any luck) get included in a mainline distribution patch will (with any luck) get included in a mainline distribution
before too long. before too long.
- Add a "PURPOSE=" argument to "STREAM NEW" events, as suggested by
Robert Hogan. Fixes the first part of bug 681.
- Make bridge authorities never serve extrainfo docs.
- Allow comments in geoip file.
- New configure/torrc options (--enable-geoip-stats, - New configure/torrc options (--enable-geoip-stats,
DirRecordUsageByCountry) to record how many IPs we've served directory DirRecordUsageByCountry) to record how many IPs we've served
info to in each country code, how many status documents total directory info to in each country code, how many status documents
we've sent to each country code, and what share of the total total we've sent to each country code, and what share of the total
directory requests we should expect to see. directory requests we should expect to see.
- Never use OpenSSL compression: it wastes RAM and CPU trying to - Never use OpenSSL compression: it wastes RAM and CPU trying to
compress cells, which are basically all encrypted, compressed, or compress cells, which are basically all encrypted, compressed, or
both. both.
o Minor features (security):
- Reject requests for reverse-dns lookup of names in a private
address space. Patch from Lodger.
o Code simplifications and refactoring: o Code simplifications and refactoring:
- Refactor code using connection_ap_handshake_attach_circuit() to - Refactor code using connection_ap_handshake_attach_circuit() to
allow that function to mark connections for close. Part of a fix for allow that function to mark connections for close. Part of a fix
bug 617. Bugfix on 0.2.0.1-alpha. for bug 617. Bugfix on 0.2.0.1-alpha.
- Add a macro to implement the common pattern of iterating through - Add a macro to implement the common pattern of iterating through
two parallel lists in lockstep. two parallel lists in lockstep.