Copy changes/* into the ChangeLog file for 0.2.5.9
This commit is contained in:
parent
f77d8901fc
commit
c82aaaa48a
28
ChangeLog
28
ChangeLog
|
@ -1,3 +1,31 @@
|
||||||
|
Changes in version 0.2.5.9 - 2014-10-2x
|
||||||
|
Tor 0.2.5.9, the first stable release in the 0.2.5 branch, XXXXX WRITEME
|
||||||
|
XXXXX DO NOT RELEASE WITHOUT FINISHING THIS PARAGRAPH. XXXXX
|
||||||
|
|
||||||
|
Below are the changes since 0.2.5.8-rc; see the ReleaseNotes file for a
|
||||||
|
list of changes since the 0.2.4 branch.
|
||||||
|
|
||||||
|
o Major security fixes:
|
||||||
|
- Disable support for SSLv3. All versions of OpenSSL in use with
|
||||||
|
Tor today support TLS 1.0 or later, so we can safely turn off
|
||||||
|
support for this old (and insecure) protocol. Fixes bug 13426.
|
||||||
|
|
||||||
|
o Minor bugfixes:
|
||||||
|
- Disable sandbox name resolver cache when running tor-resolve:
|
||||||
|
tor-resolve doesn't use the sandbox code, and turning it on was
|
||||||
|
breaking attempts to do tor-resolve on a non-default server on
|
||||||
|
Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
|
||||||
|
|
||||||
|
o Compilation fixes:
|
||||||
|
- Build and run correctly on systems like OpenBSD-current that
|
||||||
|
have patched OpenSSL to remove get_cipher_by_char and/or its
|
||||||
|
implementations. Fixes issue 13325.
|
||||||
|
|
||||||
|
o Downgraded warnings:
|
||||||
|
- Downgrade the severity of the 'unexpected sendme cell from client' from
|
||||||
|
'warn' to 'protocol warning'. Closes ticket 8093.
|
||||||
|
|
||||||
|
|
||||||
Changes in version 0.2.5.8-rc - 2014-09-22
|
Changes in version 0.2.5.8-rc - 2014-09-22
|
||||||
Tor 0.2.5.8-rc is the second release candidate for the Tor 0.2.5.x
|
Tor 0.2.5.8-rc is the second release candidate for the Tor 0.2.5.x
|
||||||
series. It fixes a bug that affects consistency and speed when
|
series. It fixes a bug that affects consistency and speed when
|
||||||
|
|
|
@ -1,5 +0,0 @@
|
||||||
o Minor bugfixes:
|
|
||||||
- Disable sandbox name resolver cache when running tor-resolve:
|
|
||||||
tor-resolve doesn't use the sandbox code, and turning it on was
|
|
||||||
breaking attempts to do tor-resolve on a non-default server on
|
|
||||||
Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
|
|
|
@ -1,4 +0,0 @@
|
||||||
o Compilation fixes:
|
|
||||||
- Build and run correctly on systems like OpenBSD-current that
|
|
||||||
have patched OpenSSL to remove get_cipher_by_char and/or its
|
|
||||||
implementations. Fixes issue 13325.
|
|
|
@ -1,3 +0,0 @@
|
||||||
o Downgraded warnings:
|
|
||||||
- Downgrade the severity of the 'unexpected sendme cell from client' from
|
|
||||||
'warn' to 'protocol warning'. Closes ticket 8093.
|
|
|
@ -1,4 +0,0 @@
|
||||||
o Major security fixes:
|
|
||||||
- Disable support for SSLv3. All versions of OpenSSL in use with
|
|
||||||
Tor today support TLS 1.0 or later, so we can safely turn off
|
|
||||||
support for this old (and insecure) protocol. Fixes bug 13426.
|
|
Loading…
Reference in New Issue