From: Roger Dingledine Date: Sun, 9 May 2004 16:32:22 +0000 (+0000) Subject: minor edits to changelog and readme X-Git-Tag: debian-version-0.0.6.2-1~49 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=3b0c72b541bc1ae00c1c84de996ce54415a014d0;p=thirdparty%2Ftor.git minor edits to changelog and readme svn:r1821 --- diff --git a/ChangeLog b/ChangeLog index 64cd7e59fa..7550be7c16 100644 --- a/ChangeLog +++ b/ChangeLog @@ -152,7 +152,8 @@ Changes in version 0.0.2pre24 - 2004-03-03 o Bugfixes: - Fix an assertion failure in dns.c, where we were trying to dequeue a pending dns resolve even if it wasn't pending - - Fix a spurious socks5 warning about still trying to write after the connection is finished. + - Fix a spurious socks5 warning about still trying to write after the + connection is finished. - Hold certain marked_for_close connections open until they're finished flushing, rather than losing bytes by closing them too early. - Correctly report the reason for ending a stream @@ -222,7 +223,8 @@ Changes in version 0.0.2pre21 - 2004-02-18 tor. It even has a man page. - The tor binary gets installed to sbin rather than bin now. - Retry streams where the connected cell hasn't arrived in 15 seconds - - Clean up exit policy handling -- get the default out of the torrc, so we can update it without forcing each server operator to fix + - Clean up exit policy handling -- get the default out of the torrc, + so we can update it without forcing each server operator to fix his/her torrc. - Allow imaps and pop3s in default exit policy o Bugfixes: diff --git a/README b/README index 7e57cac478..8f5b68ba26 100644 --- a/README +++ b/README @@ -29,7 +29,7 @@ Do you want to run a tor server? Then run tor to generate keys. One of the files generated in your DataDirectory is your 'fingerprint' file. Mail it to - arma@mit.edu. + tor-ops@freehaven.net. NOTE: You won't be able to use tor as a client or server in this configuration until you've been added to the directory @@ -41,7 +41,7 @@ Do you want to run a hidden service? edit the bottom part. Then run Tor. It will create each HiddenServiceDir you have configured, and it will create a 'hostname' file which specifies the url (xyz.onion) for that service. You can tell people - the url, and they can connect to it via their Tor proxy. + the url, and they can connect to it via their Tor client. Configuring tsocks: