pick a more accurate release date
This commit is contained in:
parent
713db8dbfa
commit
e57cb6b976
12
ChangeLog
12
ChangeLog
|
@ -1,6 +1,9 @@
|
|||
Changes in version 0.2.2.19-alpha - 2010-11-21
|
||||
Changes in version 0.2.2.19-alpha - 2010-11-22
|
||||
Yet another OpenSSL security patch broke its compatibility with Tor:
|
||||
Tor 0.2.2.19-alpha makes relays work with OpenSSL 0.9.8p and 1.0.0.b.
|
||||
|
||||
o Major bugfixes:
|
||||
- Resolve an incompatibility with openssl 0.9.8p and openssl 1.0.0b:
|
||||
- Resolve an incompatibility with OpenSSL 0.9.8p and OpenSSL 1.0.0b:
|
||||
No longer set the tlsext_host_name extension on server SSL objects;
|
||||
but continue to set it on client SSL objects. Our goal in setting
|
||||
it was to imitate a browser, not a vhosting server. Fixes bug 2204;
|
||||
|
@ -19,6 +22,11 @@ Changes in version 0.2.2.19-alpha - 2010-11-21
|
|||
|
||||
|
||||
Changes in version 0.2.2.18-alpha - 2010-11-16
|
||||
Tor 0.2.2.18-alpha fixes several crash bugs that have been nagging
|
||||
us lately, makes unpublished bridge relays able to detect their IP
|
||||
address, and fixes a wide variety of other bugs to get us much closer
|
||||
to a stable release.
|
||||
|
||||
o Major bugfixes:
|
||||
- Do even more to reject (and not just ignore) annotations on
|
||||
router descriptors received anywhere but from the cache. Previously
|
||||
|
|
Loading…
Reference in New Issue