commit 411049d0d44963b8d9ec6f96c8dc62a106d6cc30
Author: Nick Mathewson <ni...@torproject.org>
Date:   Thu Apr 30 15:30:20 2015 -0400

    reformat 0.2.7.1-alpha changelog
---
 ChangeLog |  247 ++++++++++++++++++++++++++++++-------------------------------
 1 file changed, 121 insertions(+), 126 deletions(-)

diff --git a/ChangeLog b/ChangeLog
index 6a86744..250fb2e 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,67 +1,94 @@
 Changes in version 0.2.7.1-alpha - 2015-05-??
   Tor 0.2.7.1-alpha is the first alpha release in its series.
 
+  o New system requirements:
+    - Tor no longer includes workarounds for Libevent versions before
+      1.3e. Libevent 2.0 or later is recommended. Closes ticket 15248.
+
   o Major features (controller):
     - Add the ADD_ONION and DEL_ONION commands that allows the creation
       and management of hidden services via the controller. Closes
       ticket 6411.
     - New "GETINFO onions/current" and "GETINFO onions/detached" to get
-      information about hidden services created via the controller.
-      Part of ticket 6411.
-    - New HSFETCH command to launch a request for a hidden service descriptor.
-      Closes ticket 14847.
+      information about hidden services created via the controller. Part
+      of ticket 6411.
+    - New HSFETCH command to launch a request for a hidden service
+      descriptor. Closes ticket 14847.
 
   o Major bugfixes (hidden services):
-    - Revert commit that made directory authority assign the HSDir flag to
-      relay without a DirPort which is bad because relay can't handle
+    - Revert commit that made directory authority assign the HSDir flag
+      to relay without a DirPort which is bad because relay can't handle
       BEGIN_DIR cells. Fixes bug 15850; bugfix on tor-0.2.6.3-alpha.
 
-  o Minor features (HS popularity countermeasure):
-    - To avoid leaking HS popularity, don't cycle the introduction point
-      when we've handled a fixed number of INTRODUCE2 cells but instead
-      cycle it when a random value of introductions is reached thus making
-      it more difficult for an attacker to find out the amount of clients
-      that has passed through the introduction point for a specific HS.
-      Closes ticket 15745.
+  o Minor features (clock-jump tolerance):
+    - Recover better when our clock jumps back many hours, like might
+      happen for Tails or Whonix users who start with a very wrong
+      hardware clock, use Tor to discover a more accurate time, and then
+      fix their clock. Resolves part of ticket 8766. [I'd call this a
+      major feature if it actually fixed all of the issues.]
 
   o Minor features (command-line interface):
-    - Make --hash-password imply --hush to prevent unnecessary noise. Closes
-      ticket 15542.
+    - Make --hash-password imply --hush to prevent unnecessary noise.
+      Closes ticket 15542.
+    - Print a warning whenever we find a relative file path being used
+      as torrc option. Resolves issue 14018.
+    - The "--hash-password" option now implies "--hush" to avoid
+      needless noise. Closes ticket 15542. Patch from "cypherpunks".
+
+  o Minor features (controller):
+    - Controllers can now use GETINFO hs/client/desc/id/... to retrieve
+      items from the client's hidden service descriptor cache. Closes
+      ticket 14845.
 
-  o Minor features (controller)
-    - Controllers can now use GETINFO hs/client/desc/id/... to
-      retrieve items from the client's hidden service descriptor
-      cache. Closes ticket 14845.
+  o Minor features (controller):
+    - Add DirAuthority lines for default directory authorities to output
+      of the GETINFO config/defaults controller command if not already
+      present. Implements ticket 14840.
+    - Implement a new controller command "status/fresh-relay-descs" to
+      fetch a descriptor/extrainfo pair that was generated on demand
+      just for the controller's use. Implements ticket 14784.
 
   o Minor features (DoS-resistance):
     - Make it harder for attackers to overwhelm hidden services with
       introductions, by blocking multiple introduction requests on the
       same circuit. Resolves ticket 15515.
 
+  o Minor features (geoip):
+    - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
+    - Update geoip6 to the April 8 2015 Maxmind GeoLite2
+      Country database.
+
+  o Minor features (HS popularity countermeasure):
+    - To avoid leaking HS popularity, don't cycle the introduction point
+      when we've handled a fixed number of INTRODUCE2 cells but instead
+      cycle it when a random value of introductions is reached thus
+      making it more difficult for an attacker to find out the amount of
+      clients that has passed through the introduction point for a
+      specific HS. Closes ticket 15745.
+
   o Minor features (logging):
     - Include the Tor version in all LD_BUG log messages, since people
       tend to cut and paste those into the bugtracker. Implements
       ticket 15026.
 
   o Minor features (pluggable transports):
-    - When launching managed pluggable transports, setup a valid open stdin
-      in the child process that can be used to detect if tor has terminated.
-      The "TOR_PT_EXIT_ON_STDIN_CLOSE" enviornment variable can be used by
-      implementations to detect this new behavior. Resolves ticket 15435.
+    - When launching managed pluggable transports, setup a valid open
+      stdin in the child process that can be used to detect if tor has
+      terminated. The "TOR_PT_EXIT_ON_STDIN_CLOSE" enviornment variable
+      can be used by implementations to detect this new behavior.
+      Resolves ticket 15435.
     - When launching managed pluggable transports on linux systems,
-      attempt to have the kernel deliver a SIGTERM on tor exit if
-      the pluggable transport process is still running. Resolves
+      attempt to have the kernel deliver a SIGTERM on tor exit if the
+      pluggable transport process is still running. Resolves
       ticket 15471.
 
-
   o Minor features (testing):
-    - Add make rule `check-changes` to verify the format of changes files.
-      Closes ticket 15180.
-    - Add unit tests for control_event_is_interesting().
-      Add a compile-time check that the number of events doesn't exceed
-      the capacity of control_event_t.event_mask.
-      Closes ticket 15431, checks for bugs similar to 13085.
-      Patch by "teor".
+    - Add make rule `check-changes` to verify the format of changes
+      files. Closes ticket 15180.
+    - Add unit tests for control_event_is_interesting(). Add a compile-
+      time check that the number of events doesn't exceed the capacity
+      of control_event_t.event_mask. Closes ticket 15431, checks for
+      bugs similar to 13085. Patch by "teor".
     - Commandline argument tests moved to Stem. Resolves ticket 14806.
     - Integrate the ntor, backtrace and zero lengths keys tests into the
       automake test suite. Closes ticket 15344.
@@ -73,60 +100,35 @@ Changes in version 0.2.7.1-alpha - 2015-05-??
     - Add a test to verify that the compiler does not eliminate our
       memwipe() implementation. Closes ticket 15377.
 
-  o Minor features (controller):
-    - Add DirAuthority lines for default directory authorities to output
-      of the GETINFO config/defaults controller command if not already
-      present.  Implements ticket 14840.
-    - Implement a new controller command "status/fresh-relay-descs" to
-      fetch a descriptor/extrainfo pair that was generated on demand
-      just for the controller's use. Implements ticket 14784.
-
-  o Minor features (command-line interface):
-    - Print a warning whenever we find a relative
-      file path being used as torrc option. Resolves issue 14018.
-    - The "--hash-password" option now implies "--hush" to avoid needless
-      noise. Closes ticket 15542. Patch from "cypherpunks".
-
-  o Minor features (clock-jump tolerance):
-    - Recover better when our clock jumps back many hours, like might
-      happen for Tails or Whonix users who start with a very wrong
-      hardware clock, use Tor to discover a more accurate time, and then
-      fix their clock. Resolves part of ticket 8766.
-      [I'd call this a major feature if it actually fixed all of the issues.]
-
-  o Minor features (geoip):
-    - Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
-    - Update geoip6 to the April 8 2015 Maxmind GeoLite2 Country database.
-
-  o Minor bugfixes (statistics):
-    - Disregard the ConnDirectionStatistics torrc options when Tor is
-      not a relay since in that mode of operation no sensible data is
-      being collected and because Tor might run into measurement hiccups
-      when running as a client for some time, then becoming a relay. Fixes
-      bug 15604; bugfix on 0.2.2.35.
-
   o Minor bugfixes (build):
-    - Improve out-of-tree builds by making non-standard rules work and clean up
-      additional files and directories. Fixes bug 15053; bugfix on
-      0.2.7.0-alpha.
+    - Improve out-of-tree builds by making non-standard rules work and
+      clean up additional files and directories. Fixes bug 15053; bugfix
+      on 0.2.7.0-alpha.
 
   o Minor bugfixes (command-line interface):
     - When "--quiet" is provided along with "--validate-config", do not
-      write anything to stdout on success. Fixes bug 14994; bugfix on
-      0.2.3.3-alpha.
+      write anything to stdout on success. Fixes bug 14994; bugfix
+      on 0.2.3.3-alpha.
     - When complaining about bad arguments to "--dump-config", use
       stderr, not stdout.
 
   o Minor bugfixes (configuration, unit tests):
     - Only add the default fallback directories when the DirAuthorities,
       AlternateDirAuthority, and FallbackDir directory config options
-      are set to their defaults.
-      The default fallback directory list is currently empty, this fix
-      will only change tor's behaviour when it has default fallback
-      directories.
-      Includes unit tests for consider_adding_dir_servers().
-      Fixes bug 15642; bugfix on 90f6071d8dc0 in 0.2.4.7-alpha.
-      Patch by "teor".
+      are set to their defaults. The default fallback directory list is
+      currently empty, this fix will only change tor's behaviour when it
+      has default fallback directories. Includes unit tests for
+      consider_adding_dir_servers(). Fixes bug 15642; bugfix on
+      90f6071d8dc0 in 0.2.4.7-alpha. Patch by "teor".
+
+  o Minor bugfixes (correctness):
+    - Remove side-effects from tor_assert() calls. This was harmless,
+      because we never disable assertions, but it is bad style and
+      unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36,
+      and 0.2.0.10.
+    - For correctness, avoid modifying a constant string in
+      handle_control_postdescriptor. Fixes bug 15546; bugfix
+      on 0.1.1.16-rc.
 
   o Minor bugfixes (hidden service):
     - Remove an extraneous newline character from the end of hidden
@@ -135,61 +137,55 @@ Changes in version 0.2.7.1-alpha - 2015-05-??
   o Minor bugfixes (interface):
     - Print usage information for --dump-config when it is used without
       an argument. Also, fix the error message to use different wording
-      and add newline at the end. Fixes bug 15541; bugfix on 0.2.5.1-alpha.
+      and add newline at the end. Fixes bug 15541; bugfix
+      on 0.2.5.1-alpha.
 
   o Minor bugfixes (logs):
     - When building Tor under Clang, do not include an extra set of
-      parentheses in log messages that include function names.
-      Fixes bug 15269; bugfix on every released version of Tor when
-      compiled with recent enough Clang.
-
-  o Minor bugfixes (test networks)
-    - When self-testing reachability, use ExtendAllowPrivateAddresses
-      to determine if local/private addresses imply reachability.
-      The previous fix used TestingTorNetwork, which implies
+      parentheses in log messages that include function names. Fixes bug
+      15269; bugfix on every released version of Tor when compiled with
+      recent enough Clang.
+
+  o Minor bugfixes (network):
+    - When attempting to use fallback technique for network interface
+      lookup, disregard loopback and multicast addresses since they are
+      unsuitable for public communications.
+
+  o Minor bugfixes (statistics):
+    - Disregard the ConnDirectionStatistics torrc options when Tor is
+      not a relay since in that mode of operation no sensible data is
+      being collected and because Tor might run into measurement hiccups
+      when running as a client for some time, then becoming a relay.
+      Fixes bug 15604; bugfix on 0.2.2.35.
+
+  o Minor bugfixes (test networks):
+    - When self-testing reachability, use ExtendAllowPrivateAddresses to
+      determine if local/private addresses imply reachability. The
+      previous fix used TestingTorNetwork, which implies
       ExtendAllowPrivateAddresses, but this excluded rare configs where
       ExtendAllowPrivateAddresses is set but TestingTorNetwork is not.
-      Fixes bug 15771; bugfix on 0.2.6.1-alpha.
-      Patch by "teor", issue discovered by CJ Ess.
+      Fixes bug 15771; bugfix on 0.2.6.1-alpha. Patch by "teor", issue
+      discovered by CJ Ess.
 
   o Minor bugfixes (testing):
-    - Set the severity correctly when testing get_interface_addresses_ifaddrs()
-      and get_interface_addresses_win32(), so that the tests fail gracefully
+    - Set the severity correctly when testing
+      get_interface_addresses_ifaddrs() and
+      get_interface_addresses_win32(), so that the tests fail gracefully
       instead of triggering an assertion. Fixes bug 15759; bugfix on
       0.2.6.3-alpha. Reported by Nicolas Derive.
-    - Check for matching value in server response in ntor_ref.py.
-      Fixes bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
+    - Check for matching value in server response in ntor_ref.py. Fixes
+      bug 15591; bugfix on 0.2.4.8-alpha. Reported and fixed
       by "joelanders".
 
-  o Minor bugfixes (correctness):
-    - Remove side-effects from tor_assert() calls. This was harmless,
-      because we never disable assertions, but it is bad style and
-      unnecessary. Fixes bug 15211; bugfix on 0.2.5.5, 0.2.2.36, and
-      0.2.0.10.
-    - For correctness, avoid modifying a constant string in
-      handle_control_postdescriptor. Fixes bug 15546; bugfix on
-      0.1.1.16-rc.
-
-  o Minor bugfixes (network):
-    - When attempting to use fallback technique for network interface
-      lookup, disregard loopback and multicast addresses since they are
-      unsuitable for public communications.
-
   o Code simplification and refactoring:
-    - Move the hacky fallback code out of get_interface_address6()
-      into separate function and get it covered with unit-tests. Resolves
+    - Move the hacky fallback code out of get_interface_address6() into
+      separate function and get it covered with unit-tests. Resolves
       ticket 14710.
     - Refactor hidden service client-side cache lookup to intelligently
       report its various failure cases, and disentangle failure cases
       involving a lack of introduction points. Closes ticket 14391.
-    - Use our own Base64 encoder instead of OpenSSL's, to allow more control
-      over the output. Part of ticket 15652.
-
-  o Removed code:
-    - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code and
-      always use the internal Base64 decoder. The internal decoder has been
-      part of tor since tor-0.2.0.10-alpha, and no one should be using the
-      OpenSSL one. Part of ticket 15652.
+    - Use our own Base64 encoder instead of OpenSSL's, to allow more
+      control over the output. Part of ticket 15652.
 
   o Documentation:
     - Improve the descriptions of statistics-related torrc options in
@@ -201,22 +197,21 @@ Changes in version 0.2.7.1-alpha - 2015-05-??
       Previously, we had used "router descriptor", "server descriptor",
       and "relay descriptor" interchangeably. Part of ticket 14987.
 
-  o New system requirements:
-    - Tor no longer includes workarounds for Libevent versions before 1.3e.
-      Libevent 2.0 or later is recommended. Closes ticket 15248.
-
   o Removed code:
+    - Remove `USE_OPENSSL_BASE64` and the corresponding fallback code
+      and always use the internal Base64 decoder. The internal decoder
+      has been part of tor since tor-0.2.0.10-alpha, and no one should
+      be using the OpenSSL one. Part of ticket 15652.
     - Remove the 'tor_strclear()' function; use memwipe() instead.
       Closes ticket 14922.
 
   o Removed features:
-    - Remove the (seldom-used) DynamicDHGroups feature. For
-      anti-fingerprinting we now recommend pluggable transports; for
-      forward-secrecy in TLS, we now use the P-256 group.
-      Closes ticket 13736.
+    - Remove the (seldom-used) DynamicDHGroups feature. For anti-
+      fingerprinting we now recommend pluggable transports; for forward-
+      secrecy in TLS, we now use the P-256 group. Closes ticket 13736.
     - Remove the undocumented "--digests" command-line option. It
-      complicated our build process, caused subtle build issues
-      on multiple platforms, and is now redundant since we started
+      complicated our build process, caused subtle build issues on
+      multiple platforms, and is now redundant since we started
       including git version identifiers. Closes ticket 14742.
     - Tor no longer contains workarounds for stat files generated by
       super-old versions of Tor that didn't choose guards sensibly.

_______________________________________________
tor-commits mailing list
tor-commits@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to