Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
T
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Gaba
Tor
Commits
7d6562fa
Commit
7d6562fa
authored
11 years ago
by
Nick Mathewson
Browse files
Options
Downloads
Patches
Plain Diff
ChangeLog: spell-check, prefer "relay" to "node" or "server"
parent
767a3280
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
ChangeLog
+13
-13
13 additions, 13 deletions
ChangeLog
with
13 additions
and
13 deletions
ChangeLog
+
13
−
13
View file @
7d6562fa
...
...
@@ -28,7 +28,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
the sandbox can now run a test network for multiple hours without
crashing. (Previous crash reasons included: reseeding the OpenSSL
PRNG, seeding the Libevent PRNG, using the wrong combination of
CLOEXEC and NONBLOCK at the same place and time, having
server
CLOEXEC and NONBLOCK at the same place and time, having
onion
keys, being an authority, receiving a HUP, or using IPv6.) The
sandbox is still experimental, and more bugs will probably turn
up. To try it, enable "Sandbox 1" on a Linux host.
...
...
@@ -39,7 +39,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
11465.
o Major bugfixes (TLS cipher selection):
- Generate the
server
's preference list for ciphersuites
- Generate the
relay
's preference list for ciphersuites
automatically based on uniform criteria, and considering all
OpenSSL ciphersuites with acceptable strength and forward secrecy.
(The sort order is: prefer AES to 3DES; break ties by preferring
...
...
@@ -48,12 +48,12 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
preferring AES256 to AES128.) This resolves bugs #11513, #11492,
#11498, #11499. Bugs reported by 'cypherpunks'. Bugfix on
0.2.4.8-alpha.
-
Server
s now trust themselves to have a better view than clients of
which TLS ciphersuites to choose. (Thanks to #11513, the
server
-
Relay
s now trust themselves to have a better view than clients of
which TLS ciphersuites to choose. (Thanks to #11513, the
relay
list is now well-considered, whereas the client list has been
chosen mainly for anti-fingerprinting purposes.) Resolves ticket
11528.
- Update the list of TLS cip
e
hrsuites that a client advertises to
- Update the list of TLS ciph
e
rsuites that a client advertises to
match those advertised by Firefox 28. This enables selection of
(fast) GCM ciphersuites, disables some strange old ciphers, and
disables the ECDH (not to be confused with ECDHE) ciphersuites.
...
...
@@ -109,7 +109,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
new external IP address the next time we run our routine checks.
If our IP address has changed, then publish a new descriptor with
the new IP address. Resolves ticket 2454.
- Warn less verbosely when receiving a m
is
formed
- Warn less verbosely when receiving a m
al
formed
ESTABLISH_RENDEZVOUS cell. Fixes ticket 11279.
- When we run out of usable circuit IDs on a channel, log only one
warning for the whole channel, and include a description of how
...
...
@@ -140,7 +140,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
intermittent "microdesc_free() called but md was still referenced"
warnings. We now log more information about the likely error case,
to try to figure out why we might be cleaning a microdescriptor as
old if it's still referenced by a live node.
old if it's still referenced by a live node
_t object
.
o Minor bugfixes (logging):
- Log only one message when we start logging in an unsafe way.
...
...
@@ -149,7 +149,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
- Using the Linux seccomp2 sandbox no longer prevents stack-trace
logging on crashes or errors. Fixes part 11465; bugfix on
0.2.5.1-alpha.
- Only report the first fatal boostrap error on a given OR
- Only report the first fatal boo
t
strap error on a given OR
connection. This prevents controllers from declaring that a
connection has failed because of "DONE" or other junk reasons.
Fixes bug 10431; bugfix on 0.2.1.1-alpha.
...
...
@@ -169,7 +169,7 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
connection_mark_for_close() directly. Fixes bug #11304; bugfix on
0.2.4.4-alpha.
- When closing all connections on setting DisableNetwork to 1, use
connection_or_close_normally() rather than closing
orcon
ns out
connection_or_close_normally() rather than closing
OR connectio
ns out
from under the channel layer. Fixes bug #11306; bugfix on
0.2.4.4-alpha.
...
...
@@ -222,14 +222,14 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
- Fix a bug where a client-side Tor with pluggable transports would
take 60 seconds to bootstrap if a config re-read was triggered at
just the right timing during bootstrap. Refixes bug 11156; bugfix
just the right timing during bootstrap. Re
-
fixes bug 11156; bugfix
on 0.2.5.3-alpha.
- Avoid 60-second delays in the bootstrapping process when Tor is
launching for a second time while using bridges. Fixes bug 9229;
bugfix on 0.2.0.3-alpha.
o Minor bugfixes (DNS):
- When receing a DNS query for an unsupported type, reply with no
- When recei
vi
ng a DNS query for an unsupported type, reply with no
answer rather than with a NOTIMPL error. This behavior isn't
correct either, but it will break fewer client programs, we hope.
Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch from
...
...
@@ -266,11 +266,11 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
o Deprecated versions:
- Tor 0.2.2.x has reached end-of-life; it has received no patches or
attention for some while. Directory authorities no longer accept
descriptors from
Tor
relays running any version of Tor prior to
descriptors from relays running any version of Tor prior to
Tor 0.2.3.16-alpha. Resolves ticket 11149.
o Testing:
- New macros in test.h to simplify writ
t
ing mock-functions for unit
- New macros in test.h to simplify writing mock-functions for unit
tests. Part of ticket 11507. Patch from Dana Koch.
- Complete tests for the status.c module. Resolves ticket 11507.
Patch from Dana Koch.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment