Commit 7050df72 authored by Roger Dingledine's avatar Roger Dingledine
Browse files

bump to 0.2.0.10-alpha


svn:r12455
parent a5d7ff5f
......@@ -17,6 +17,8 @@ Changes in version 0.2.0.10-alpha - 2007-11-10
to advertise as Guards: they must be in the top 7/8 in terms of
how long we have known about them, and above the median of those
nodes in terms of weighted fractional uptime.
- Make "not enough dir info yet" warnings describe *why* Tor feels
it doesn't have enough directory info yet.
o Major bugfixes:
- Stop servers from crashing if they set a Family option (or
......@@ -57,11 +59,11 @@ Changes in version 0.2.0.10-alpha - 2007-11-10
o Minor features:
- Clients now hold circuitless TLS connections open for 1.5 times
MaxCircuitDirtiness, since it is likely that they'll need to build
a circuit over them within that timeframe. Previously, they held
them open only for KeepalivePeriod.
- Use "If-Modified-Since" to avoid retrieving consensus networkstatuses
that we already have.
MaxCircuitDirtiness (15 minutes), since it is likely that they'll
rebuild a new circuit over them within that timeframe. Previously,
they held them open only for KeepalivePeriod (5 minutes).
- Use "If-Modified-Since" to avoid retrieving consensus
networkstatuses that we already have.
- When we have no consensus, check FallbackNetworkstatusFile (defaults
to $PREFIX/share/tor/fallback-consensus) for a consensus. This way
we start knowing some directory caches.
......@@ -75,8 +77,6 @@ Changes in version 0.2.0.10-alpha - 2007-11-10
- Authorities send back an X-Descriptor-Not-New header in response to
an accepted-but-discarded descriptor upload. Partially implements
fix for bug 535.
- Make "not enough dir info yet" warnings describe *why* Tor feels
it doesn't have enough directory info yet.
- Make the log message for "tls error. breaking." more useful.
- Better log messages about certificate downloads, to attempt to
track down the second incarnation of bug 546.
......@@ -100,18 +100,18 @@ Changes in version 0.2.0.10-alpha - 2007-11-10
o Minor bugfixes:
- Refuse to start if both ORPort and UseBridges are set. Bugfix
on 0.2.0.x.
on 0.2.0.x, suggested by Matt Edman.
- Don't stop fetching descriptors when FetchUselessDescriptors is
set, even if we stop asking for circuits. Bugfix on 0.1.2.x;
reported by tup and ioerror.
- Better log message on vote from unknown authority.
- Don't log "Launching 0 request for 0 router".
- Don't log "Launching 0 request for 0 router" message.
o Minor bugfixes (memory leaks):
- Stop leaking memory every time we parse a v3 certificate. Bugfix
on 0.2.0.1-alpha.
- Stop leaking memory every time we load a v3 certificate. Bugfix
on 0.2.0.1-alpha. Fixes Bug 536
on 0.2.0.1-alpha. Fixes Bug 536.
- Stop leaking a cached networkstatus on exit. Bugfix on
0.2.0.3-alpha.
- Stop leaking voter information every time we free a consensus.
......
......@@ -4,7 +4,7 @@ dnl Copyright (c) 2004-2007, Roger Dingledine, Nick Mathewson
dnl See LICENSE for licensing information
AC_INIT
AM_INIT_AUTOMAKE(tor, 0.2.0.9-alpha-dev)
AM_INIT_AUTOMAKE(tor, 0.2.0.10-alpha)
AM_CONFIG_HEADER(orconfig.h)
AC_CANONICAL_HOST
......
......@@ -5,7 +5,7 @@
;
!include "MUI.nsh"
!define VERSION "0.2.0.9-alpha-dev"
!define VERSION "0.2.0.10-alpha"
!define INSTALLER "tor-${VERSION}-win32.exe"
!define WEBSITE "https://www.torproject.org/"
......
......@@ -456,7 +456,7 @@ rep_hist_get_weighted_time_known(const char *id, time_t when)
}
/** Return true if we've been measuring MTBFs for long enough to
* prounounce on Stability. */
* pronounce on Stability. */
int
rep_hist_have_measured_enough_stability(void)
{
......
......@@ -227,6 +227,6 @@
#define USING_TWOS_COMPLEMENT
/* Version number of package */
#define VERSION "0.2.0.9-alpha-dev"
#define VERSION "0.2.0.10-alpha"
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment