From e50da3327f7c76c3f7254ff530ca37d43e228521 Mon Sep 17 00:00:00 2001 From: Nick Mathewson Date: Wed, 8 Nov 2017 10:38:44 -0500 Subject: [PATCH] small edits to changelog --- ChangeLog | 37 +++++++++++++++++-------------------- 1 file changed, 17 insertions(+), 20 deletions(-) diff --git a/ChangeLog b/ChangeLog index 7833490bf6..2e796dd04c 100644 --- a/ChangeLog +++ b/ChangeLog @@ -3,15 +3,13 @@ Changes in version 0.3.2.4-alpha - 2017-11-08 It fixes several bugs introduced in earlier releases, including stability and reliability fixes on earlier versions of Tor. - o Major bugfixes (Exit nodes): - - Fix an issue causing high-bandwidth exit nodes to fail a majority - or all of their DNS requests, making them basically unsuitable for - regular usage in Tor circuits. The problem is related to - libevent's DNS handling, but we can work around it in Tor. Fixes - bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced - eventdns. Credit goes to Dhalgren for identifying and finding a - workaround to this bug and to gamambel, arthuredelstein and arma - in helping to track it down and analyze it. + o Major bugfixes (exit nodes, DNS): + - Fix an issue causing DNS to fail on high-bandwidth exit nodes, + making them enarly unusable for regular. Fixes bugs 21394 and + 18580; bugfix on 0.1.2.2-alpha, which introduced eventdns. Thanks + to Dhalgren for identifying and finding a workaround to this bug + and to Moritz, Arthur Edelstein and Roger for helping to track it + down and analyze it. o Minor features (logging, scheduler): - Introduce a SCHED_BUG() function to log extra information about @@ -22,7 +20,7 @@ Changes in version 0.3.2.4-alpha - 2017-11-08 - The ClientDNSRejectInternalAddresses flag can once again be set in non-testing Tor networks, so long as they do not use the default directory authorities. This change also removes the deprecation of - this flag in 0.2.9.2-alpha. Closes ticket 21031. + this flag from 0.2.9.2-alpha. Closes ticket 21031. o Minor features (testing): - Our fuzzing tests now test the encrypted portions of the v3 hidden @@ -42,15 +40,15 @@ Changes in version 0.3.2.4-alpha - 2017-11-08 on 0.3.2.1-alpha. o Minor bugfixes (logging, relay): - - Downgrade a warning to a protocol warning in the case the ed25519 - key is not consistent between the descriptor and micro descriptor - of a relay. This can happen for instance if the relay has been - flagged NoEdConsensus. Fixes bug 24025; bugfix on 0.3.2.1-alpha. + - Give only a protocol warning when the ed25519 key is not + consistent between the descriptor and micro descriptor of a relay. + This can happen, for instance, if the relay has been flagged + NoEdConsensus. Fixes bug 24025; bugfix on 0.3.2.1-alpha. o Minor bugfixes (manpage, hidden service): - - Mention that the HiddenServiceNumIntroductionPoints option is 0-10 - for v2 service and 0-20 for v3 service. Fixes bug 24115; bugfix - on 0.3.2.1-alpha. + - Document that the HiddenServiceNumIntroductionPoints option is + 0-10 for v2 service and 0-20 for v3 service. Fixes bug 24115; + bugfix on 0.3.2.1-alpha. o Minor bugfixes (memory leak): - Fix a minor memory-leak-at-exit in the KIST scheduler. This bug @@ -64,9 +62,8 @@ Changes in version 0.3.2.4-alpha - 2017-11-08 - Cache some needed onion service client information instead of continuously computing it over and over again. Fixes bug 23623; bugfix on 0.3.2.1-alpha. - - Properly retry HSv3 descriptor fetches in the case where we were - initially missing required directory information. Fixes bug 23762; - bugfix on 0.3.2.1-alpha. + - Properly retry HSv3 descriptor fetches when missing required + directory information. Fixes bug 23762; bugfix on 0.3.2.1-alpha. o Minor bugfixes (relay, crash): - Avoid a crash when transitioning from client mode to bridge mode.