Changes in version 0.2.1.5-alpha - 2008-08-31
+ Tor 0.2.1.5-alpha moves us closer to handling IPv6 destinations, puts
+ in a lot of the infrastructure for adding authorization to hidden
+ services, lays the groundwork for having clients read their load
+ balancing information out of the networkstatus consensus rather than
+ the individual router descriptors, addresses two potential anonymity
+ issues, and fixes a variety of smaller issues.
+
o Major features:
- Convert many internal address representations to optionally hold
IPv6 addresses.
Changes in version 0.2.1.4-alpha - 2008-08-04
+ Tor 0.2.1.4-alpha fixes a pair of crash bugs in 0.2.1.3-alpha.
+
o Major bugfixes:
- The address part of exit policies was not correctly written
to router descriptors. This generated router descriptors that failed
Changes in version 0.2.1.3-alpha - 2008-08-03
+ Tor 0.2.1.3-alpha implements most of the pieces to prevent
+ infinite-length circuit attacks (see proposal 110); fixes a bug that
+ might cause exit relays to corrupt streams they send back; allows
+ address patterns (e.g. 255.128.0.0/16) to appear in ExcludeNodes and
+ ExcludeExitNodes config options; and fixes a big pile of bugs.
+
o Bootstrapping bugfixes (on 0.2.1.x-alpha):
- Send a bootstrap problem "warn" event on the first problem if the
reason is NO_ROUTE (that is, our network is down).
Changes in version 0.2.0.29-rc - 2008-07-08
+ Tor 0.2.0.29-rc fixes two big bugs with using bridges, fixes more
+ hidden-service performance bugs, and fixes a bunch of smaller bugs.
+
o Major bugfixes:
- If you have more than one bridge but don't know their keys,
you would only launch a request for the descriptor of the first one