mark r17887 as needing a backport:

some windowses let you exploit them if you can hand them the
argument to inet_addr().


svn:r18367
This commit is contained in:
Roger Dingledine 2009-02-02 09:20:48 +00:00
parent c283368f60
commit 3040f3760e
1 changed files with 1 additions and 9 deletions

View File

@ -3,21 +3,13 @@
description of the patch.)
Backport for 0.2.0:
o r17891: Fix a fun OpenBSD warning.
o r17892: Fix another fun OpenBSD warning.
o r17920: bridge relays don't fetch descriptors much
- r17887: Don't accept 1.2.3 as a valid IP address.
Backport for 0.2.0 once better tested:
Xo r16621: Make some DNS code more robust (partial; see also libevent
approach). (Also maybe r16674)
[Partially backported. Instead of the basic name checking, I backported
r17171 instead, to be even more resistant to poisoning.]
- r17208,r17209,r7211,r17212,r17214: Avoid gotterdammerung when an
authority has an expired certificate.
- r17886: Don't remove routerinfos as unlisted unless we have a
consensus.
- r17887: Don't accept 1.2.3 as a valid IP address.
o r17917, r17993: tors that haven't run lately take 10+ minutes to start
- r17924: Close streams when an exit hands us a local IP.
- r18210: Call crypto_global_init() with hardwareaccel flag set right in
all cases.