fix a few grammar things, and deprecate 'servers' and 'nodes'

also clarify a few explanations. so far so good!
This commit is contained in:
Roger Dingledine 2014-03-19 19:03:21 -04:00
parent 1dc000f7df
commit 39342b66c0

View File

@ -1,21 +1,20 @@
Changes in version 0.2.5.3-alpha - 2014-03-?? Changes in version 0.2.5.3-alpha - 2014-03-??
Tor 0.2.5.3-alpha includes all the fixes from 0.2.4.21. It contains Tor 0.2.5.3-alpha includes all the fixes from 0.2.4.21. It contains
two new anti-DoS features for Tor nodes, resolves a bug that kept two new anti-DoS features for Tor relays, resolves a bug that kept
SOCKS5 support for IPv6 from working, fixes several annoying usability SOCKS5 support for IPv6 from working, fixes several annoying usability
issues for bridge users, and removes more old code for unused issues for bridge users, and removes more old code for unused
directory formats. directory formats.
The Tor 0.2.5.x release series is now in patch-freeze: no feature The Tor 0.2.5.x release series is now in patch-freeze: no feature
patches not already written will be considered for inclusion in patches not already written will be considered for inclusion in 0.2.5.x.
0.2.5.x.
o Major features (server security, DoS-resistance): o Major features (relay security, DoS-resistance):
- When deciding whether we have run out of memory and we need to - When deciding whether we have run out of memory and we need to
close circuits, also consider memory allocated in buffers for close circuits, also consider memory allocated in buffers for
streams attached to each circuit. streams attached to each circuit.
This change, which extends an anti-DoS feature introduced in This change, which extends an anti-DoS feature introduced in
0.2.4.13-alpha and improved in 0.2.4.14-alpha, lets Tor exit nodes 0.2.4.13-alpha and improved in 0.2.4.14-alpha, lets Tor exit relays
better resist more memory-based DoS attacks than before. Since the better resist more memory-based DoS attacks than before. Since the
MaxMemInCellQueues option now applies to all queues, it is renamed MaxMemInCellQueues option now applies to all queues, it is renamed
to MaxMemInQueues. This feature fixes bug 10169. to MaxMemInQueues. This feature fixes bug 10169.
@ -28,9 +27,9 @@ Changes in version 0.2.5.3-alpha - 2014-03-??
table positions are derived from a randomized cryptographic key, table positions are derived from a randomized cryptographic key,
and an attacker cannot predict which entries will collide. Closes and an attacker cannot predict which entries will collide. Closes
ticket 4900. ticket 4900.
- Decrease the lower limit of MaxMemInQueues to 256 MBytes, to - Decrease the lower limit of MaxMemInQueues to 256 MBytes (but leave
better support Raspberry Pi users. Fixes bug 9686; bugfix on the default at 8GBytes), to better support Raspberry Pi users. Fixes
0.2.4.14-alpha. bug 9686; bugfix on 0.2.4.14-alpha.
o Minor features (bridges, pluggable transports): o Minor features (bridges, pluggable transports):
- Bridges now write the SHA1 digest of their identity key - Bridges now write the SHA1 digest of their identity key
@ -43,8 +42,9 @@ Changes in version 0.2.5.3-alpha - 2014-03-??
listener. Also, log the message in the log file too. Resolves listener. Also, log the message in the log file too. Resolves
ticket 11043. ticket 11043.
- Stop giving annoying warning messages when we decide not to launch - Stop giving annoying warning messages when we decide not to launch
a pluggable transport proxy that we don't need. Resolves ticket a pluggable transport proxy that we don't need (because there are
5018; bugfix on 0.2.5.2-alpha. no bridges configured to use it). Resolves ticket 5018; bugfix
on 0.2.5.2-alpha.
o Minor features (other): o Minor features (other):
- Add a new option, PredictedPortsRelevanceTime, to control how long - Add a new option, PredictedPortsRelevanceTime, to control how long
@ -54,7 +54,7 @@ Changes in version 0.2.5.3-alpha - 2014-03-??
- Generate a warning if any ports are listed in the SocksPolicy, - Generate a warning if any ports are listed in the SocksPolicy,
DirPolicy, AuthDirReject, AuthDirInvalid, AuthDirBadDir, or DirPolicy, AuthDirReject, AuthDirInvalid, AuthDirBadDir, or
AuthDirBadExit options. (These options only support address AuthDirBadExit options. (These options only support address
ranges.) Fixes ticket 11108. ranges.) Fixes part of ticket 11108.
- Update geoip and geoip6 to the February 7 2014 Maxmind GeoLite2 - Update geoip and geoip6 to the February 7 2014 Maxmind GeoLite2
Country database. Country database.
@ -79,49 +79,47 @@ Changes in version 0.2.5.3-alpha - 2014-03-??
- Raise a control port warning when we fail to connect to all of - Raise a control port warning when we fail to connect to all of
our bridges. Previously, we didn't inform the controller, and our bridges. Previously, we didn't inform the controller, and
the bootstrap process would stall. Fixes bug 11069; bugfix on the bootstrap process would stall. Fixes bug 11069; bugfix on
tor-0.2.1.2-alpha. 0.2.1.2-alpha.
- Exit immediately when a process-owning controller exits. - Exit immediately when a process-owning controller exits.
Previously, tor relays would wait for a little while after their Previously, tor relays would wait for a little while after their
controller exited, as if they had gotten an INT signal--but this controller exited, as if they had gotten an INT signal -- but this
was problematic, since there was no feedback for the user. To do a was problematic, since there was no feedback for the user. To do a
clean shutdown, controllers should send an INT signal and give Tor clean shutdown, controllers should send an INT signal and give Tor
a chance to clean up. Fix for bug 10449; bugfix on 0.2.2.28-beta. a chance to clean up. Fixes bug 10449; bugfix on 0.2.2.28-beta.
- Improve the log message when we can't connect to a hidden service - Improve the log message when we can't connect to a hidden service
because all of the hidden service directory nodes hosting its because all of the hidden service directory nodes hosting its
descriptor are excluded. Improves on our fix for bug 10722, which descriptor are excluded. Improves on our fix for bug 10722, which
was a bugfix on 0.2.0.10-alpha. was a bugfix on 0.2.0.10-alpha.
- Fix a bug where we would attempt to connect to bridges before our - Stop attempting to connect to bridges before our pluggable
pluggable transports were configured, which resulted in some transports are configured (harmless but resulted in some erroneous
erroneous log messages. Fixes bug 11156; bugfix on 0.2.3.2-alpha. log messages). Fixes bug 11156; bugfix on 0.2.3.2-alpha.
o Minor bugfixes (servers): o Minor bugfixes (relays and bridges):
- Non-exit servers no longer launch mock DNS requests to check for - Non-exit relays no longer launch mock DNS requests to check for
DNS hijacking. This has been unnecessary since 0.2.1.7-alpha, when DNS hijacking. This has been unnecessary since 0.2.1.7-alpha, when
non-exit servers stopped servicing DNS requests. Fixes bug 965; non-exit relays stopped servicing DNS requests. Fixes bug 965;
bugfix on 0.2.1.7-alpha. Patch from Matt Pagan. bugfix on 0.2.1.7-alpha. Patch from Matt Pagan.
- Avoid crashing on a malformed resolv.conf file when running a - Avoid crashing on a malformed resolv.conf file when running a
server using Libevent 1. Fixes bug 8788; bugfix on 0.1.1.23. relay using Libevent 1. Fixes bug 8788; bugfix on 0.1.1.23.
- Give the correct URL in the warning message when trying to run a - Give the correct URL in the warning message when trying to run a
Tor relay on an ancient version of Windows. Fixes bug 9393. relay on an ancient version of Windows. Fixes bug 9393.
- Bridges now never collect statistics that were designed for - Bridges now never collect statistics that were designed for
relays. Fix for bug 5824; bugfix on 0.2.3.8-alpha. relays. Fixes bug 5824; bugfix on 0.2.3.8-alpha.
- Bridges now report complete directory request statistics. Related - Bridges now report complete directory request statistics. Related
to bug 5824; bugfix on 0.2.2.1-alpha. to bug 5824; bugfix on 0.2.2.1-alpha.
o Minor bugfixes (backtrace support): o Minor bugfixes (backtrace support):
- Support automatic backtraces on more platforms by using the - Support automatic backtraces on more platforms by using the
-fasynchronous-unwind-tables compiler option. This option is "-fasynchronous-unwind-tables" compiler option. This option is
needed for platforms like 32-bit Intel where -fomit-frame-pointer needed for platforms like 32-bit Intel where "-fomit-frame-pointer"
is on by default and table generation is not. This doesn't yet is on by default and table generation is not. This doesn't yet
add Windows support yet; only Linux, OSX, and some BSDs are add Windows support; only Linux, OSX, and some BSDs are affected.
affected. Reported by 'cypherpunks'; fixes bug 11047; bugfix on Reported by 'cypherpunks'; fixes bug 11047; bugfix on 0.2.5.2-alpha.
0.2.5.2-alpha.
- Avoid strange behavior if two threads hit failed assertions at the - Avoid strange behavior if two threads hit failed assertions at the
same time and both try to log backtraces at once. (Previously, if same time and both try to log backtraces at once. (Previously, if
this had happened, both threads would have stored their this had happened, both threads would have stored their intermediate
intermediate results in the same buffer, and generated junk results in the same buffer, and generated junk outputs.) Reported by
outputs.) Reported by "cypherpunks". Fixes bug 11048; bugfix on "cypherpunks". Fixes bug 11048; bugfix on 0.2.5.2-alpha.
0.2.5.2-alpha.
- Fix a compiler warning in format_number_sigsafe(). Bugfix on - Fix a compiler warning in format_number_sigsafe(). Bugfix on
0.2.5.2-alpha; patch from Nick Hopper. 0.2.5.2-alpha; patch from Nick Hopper.
@ -132,10 +130,10 @@ Changes in version 0.2.5.3-alpha - 2014-03-??
o Documentation: o Documentation:
- Explain that SocksPolicy, DirPolicy, and similar options don't - Explain that SocksPolicy, DirPolicy, and similar options don't
take port arguments. Fixes ticket 11108. take port arguments. Fixes the other part of ticket 11108.
- Fix the manpage's description of HiddenServiceAuthorizeClient - Fix the manpage's description of HiddenServiceAuthorizeClient:
description: it should have given the maximum client name length the maximum client name length is 16, not 19. Fixes bug 11118;
as 16, not 19. Fixes bug 11118; bugfix on 0.2.1.6-alpha. bugfix on 0.2.1.6-alpha.
- Fix a comment about the rend_server_descriptor_t.protocols field - Fix a comment about the rend_server_descriptor_t.protocols field
to more accurately describe its range. Also, make that field to more accurately describe its range. Also, make that field
unsigned, to more accurately reflect its usage. Fixes bug 9099; unsigned, to more accurately reflect its usage. Fixes bug 9099;
@ -151,8 +149,8 @@ Changes in version 0.2.5.3-alpha - 2014-03-??
o Test infrastructure: o Test infrastructure:
- Update to the latest version of tinytest. - Update to the latest version of tinytest.
- Improve the tinytest implementation of string operation tests so - Improve the tinytest implementation of string operation tests so
that comparisons NULL strings no longer crash the tests; they now that comparisons with NULL strings no longer crash the tests; they
just fail, normally. Fixes bug 9004; bugfix on 0.2.2.4-alpha. now just fail, normally. Fixes bug 9004; bugfix on 0.2.2.4-alpha.
Changes in version 0.2.4.21 - 2014-02-28 Changes in version 0.2.4.21 - 2014-02-28