-port-v1.4.0
+post-v1.7.0
------------------------
+ - New FAQ. Please send updates and additions!
+ - ovs-ofctl:
+ - "mod-port" command can now control all OpenFlow config flags.
+ - OpenFlow:
+ - Allow general bitwise masking for IPv4 and IPv6 addresses in
+ IPv4, IPv6, and ARP packets. (Previously, only CIDR masks
+ were allowed.)
+ - Allow support for arbitrary Ethernet masks. (Previously, only
+ the multicast bit in the destination address could be individually
+ masked.)
+ - New field OXM_OF_METADATA, to align with OpenFlow 1.1.
+ - The OFPST_QUEUE request now reports an error if a specified port or
+ queue does not exist, or for requests for a specific queue on all
+ ports, if the specified queue does not exist on any port. (Previous
+ versions generally reported an empty set of results.)
+ - Additional protocols are not mirrored and dropped when forward-bpdu is
+ false. For a full list, see the ovs-vswitchd.conf.db man page.
+ - Open vSwitch now sends RARP packets in situations where it previously
+ sent a custom protocol, making it consistent with behavior of QEMU and
+ VMware.
+ - All Open vSwitch programs and log files now show timestamps in UTC,
+ instead the local timezone, by default.
+
+
+v1.7.0 - xx xxx xxxx
+------------------------
+ - kernel modules are renamed. openvswitch_mod.ko is now
+ openvswitch.ko and brcompat_mod.ko is now brcompat.ko.
+ - Increased the number of NXM registers to 8.
+ - Added ability to configure dscp setting for manager and controller
+ connections. By default, these connections have a DSCP value of
+ Internetwork Control (0xc0).
+ - Added the granular link health statistics, 'cfm_health', to an
+ interface.
+ - OpenFlow:
+ - Added support to mask nd_target for ICMPv6 neighbor discovery flows.
+ - Added support for OpenFlow 1.3 port description (OFPMP_PORT_DESC)
+ multipart messages.
+ - ovs-ofctl:
+ - Added the "dump-ports-desc" command to retrieve port
+ information using the new port description multipart messages.
+ - ovs-test:
+ - Added support for spawning ovs-test server from the client.
+ - Now ovs-test is able to automatically create test bridges and ports.
+ - "ovs-dpctl dump-flows" now prints observed TCP flags in TCP flows.
+ - The "coverage/log" command previously available through ovs-appctl
+ has been replaced by "coverage/show". The new command replies with
+ coverage counter values, instead of logging them.
+
+
+v1.6.1 - 25 Jun 2012
+------------------------
+ - Allow OFPP_CONTROLLER as the in_port for packet-out messages.
+
+
+v1.6.0 - 24 Feb 2012
+------------------------
+ *** Internal only release ***
+ - bonding
+ - LACP bonds no longer fall back to balance-slb when negotiations fail.
+ Instead they drop traffic.
+ - The default bond_mode changed from SLB to active-backup, to protect
+ unsuspecting users from the significant risks of SLB bonds (which are
+ documented in vswitchd/INTERNALS).
+ - Load balancing can be disabled by setting the bond-rebalance-interval
+ to zero.
+ - OpenFlow:
+ - Added support for bitwise matching on TCP and UDP ports.
+ See ovs-ofctl(8) for more information.
+ - NXM flow dumps now include times elapsed toward idle and hard
+ timeouts.
+ - Added an OpenFlow extension NXT_SET_ASYNC_CONFIG that allows
+ controllers more precise control over which OpenFlow messages they
+ receive asynchronously.
+ - New "fin_timeout" action.
+ - Added "fin_timeout" support to "learn" action.
+ - New Nicira action NXAST_CONTROLLER that offers additional features
+ over output to OFPP_CONTROLLER.
+ - When QoS settings for an interface do not configure a default queue
+ (queue 0), Open vSwitch now uses a default configuration for that
+ queue, instead of dropping all packets as in previous versions.
+ - Logging:
+ - Logging to console and file will have UTC timestamp as a default for
+ all the daemons. An example of the default format is
+ 2012-01-27T16:35:17Z. ovs-appctl can be used to change the default
+ format as before.
+ - The syntax of commands and options to set log levels was simplified,
+ to make it easier to remember.
+ - New support for limiting the number of flows in an OpenFlow flow
+ table, with configurable policy for evicting flows upon
+ overflow. See the Flow_Table table in ovs-vswitch.conf.db(5)
+ for more information.
+ - New "enable-async-messages" column in the Controller table. If set to
+ false, OpenFlow connections to the controller will initially have all
+ asynchronous messages disabled, overriding normal OpenFlow behavior.
+ - ofproto-provider interface:
+ - "struct rule" has a new member "used" that ofproto implementations
+ should maintain by updating with ofproto_rule_update_used().
+ - ovsdb-client:
+ - The new option --timestamp causes the "monitor" command to print
+ a timestamp with every update.
+ - CFM module CCM broadcasts can now be tagged with an 802.1p priority.
+
+
+v1.5.0 - 01 Jun 2012
+------------------------
+ - OpenFlow:
+ - Added support for querying, modifying, and deleting flows
+ based on flow cookie when using NXM.
+ - Added new NXM_PACKET_IN format.
+ - Added new NXAST_DEC_TTL action.
+ - ovs-ofctl:
+ - Added daemonization support to the monitor and snoop commands.
+ - ovs-vsctl:
+ - The "find" command supports new set relational operators
+ {=}, {!=}, {<}, {>}, {<=}, and {>=}.
+ - ovsdb-tool now uses the typical database and schema installation
+ directories as defaults.
+ - The default MAC learning timeout has been increased from 60 seconds
+ to 300 seconds. The MAC learning timeout is now configurable.
-v1.4.0 - xx xxx xxxx
+v1.4.0 - 30 Jan 2012
------------------------
+ - Compatible with Open vSwitch kernel module included in Linux 3.3.
- New "VLAN splinters" feature to work around buggy device drivers
in old Linux versions. (This feature is deprecated. When
broken device drivers are no longer in widespread use, we will
via "ip_frag" in ovs-ofctl).
- New ovs-ofctl "get-frags" and "set-frags" commands to get and set
fragment handling policy.
- - CAPWAP tunneling now supports an extension to transport a 64-key. By
- default it remains compatible with the old version and other
+ - CAPWAP tunneling now supports an extension to transport a 64-bit key.
+ By default it remains compatible with the old version and other
standards-based implementations.
- Flow setups are now processed in a round-robin manner across ports
to prevent any single client from monopolizing the CPU and conducting