Copy changes/* into the ChangeLog file for 0.2.5.9

This commit is contained in:
Nick Mathewson 2014-10-19 12:50:12 -04:00
parent f77d8901fc
commit c82aaaa48a
5 changed files with 28 additions and 16 deletions

View File

@ -1,3 +1,31 @@
Changes in version 0.2.5.9 - 2014-10-2x
Tor 0.2.5.9, the first stable release in the 0.2.5 branch, XXXXX WRITEME
XXXXX DO NOT RELEASE WITHOUT FINISHING THIS PARAGRAPH. XXXXX
Below are the changes since 0.2.5.8-rc; see the ReleaseNotes file for a
list of changes since the 0.2.4 branch.
o Major security fixes:
- Disable support for SSLv3. All versions of OpenSSL in use with
Tor today support TLS 1.0 or later, so we can safely turn off
support for this old (and insecure) protocol. Fixes bug 13426.
o Minor bugfixes:
- Disable sandbox name resolver cache when running tor-resolve:
tor-resolve doesn't use the sandbox code, and turning it on was
breaking attempts to do tor-resolve on a non-default server on
Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
o Compilation fixes:
- Build and run correctly on systems like OpenBSD-current that
have patched OpenSSL to remove get_cipher_by_char and/or its
implementations. Fixes issue 13325.
o Downgraded warnings:
- Downgrade the severity of the 'unexpected sendme cell from client' from
'warn' to 'protocol warning'. Closes ticket 8093.
Changes in version 0.2.5.8-rc - 2014-09-22
Tor 0.2.5.8-rc is the second release candidate for the Tor 0.2.5.x
series. It fixes a bug that affects consistency and speed when

View File

@ -1,5 +0,0 @@
o Minor bugfixes:
- Disable sandbox name resolver cache when running tor-resolve:
tor-resolve doesn't use the sandbox code, and turning it on was
breaking attempts to do tor-resolve on a non-default server on
Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.

View File

@ -1,4 +0,0 @@
o Compilation fixes:
- Build and run correctly on systems like OpenBSD-current that
have patched OpenSSL to remove get_cipher_by_char and/or its
implementations. Fixes issue 13325.

View File

@ -1,3 +0,0 @@
o Downgraded warnings:
- Downgrade the severity of the 'unexpected sendme cell from client' from
'warn' to 'protocol warning'. Closes ticket 8093.

View File

@ -1,4 +0,0 @@
o Major security fixes:
- Disable support for SSLv3. All versions of OpenSSL in use with
Tor today support TLS 1.0 or later, so we can safely turn off
support for this old (and insecure) protocol. Fixes bug 13426.