Compare commits

...

162 Commits

Author SHA1 Message Date
Nick Mathewson af082895ec Merge branch 'maint-0.2.4' into release-0.2.4 2017-08-01 11:19:28 -04:00
Nick Mathewson b346d43c97 Merge branch 'maint-0.2.4' into release-0.2.4 2017-07-26 15:39:55 -04:00
Nick Mathewson 8374e3e194 Merge branch 'maint-0.2.4' into release-0.2.4 2017-07-26 15:38:48 -04:00
Nick Mathewson 37abaa5a14 Merge branch 'maint-0.2.4' into release-0.2.4 2017-07-07 10:51:28 -04:00
Nick Mathewson 0331e28774 Merge branch 'maint-0.2.4' into release-0.2.4 2017-07-05 13:43:31 -04:00
Nick Mathewson 6a3622154e Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-27 11:04:44 -04:00
Nick Mathewson 404a094142 Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-09 09:58:45 -04:00
Nick Mathewson b2cab96029 Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-08 14:06:56 -04:00
Nick Mathewson f833164576 tor 0.2.4.29 changelog 2017-06-08 09:55:28 -04:00
Nick Mathewson 5ac469d795 Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-08 09:29:48 -04:00
Nick Mathewson cdb58af90d Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-08 09:21:15 -04:00
Nick Mathewson 98f610068f Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-05 14:38:48 -04:00
Nick Mathewson df23e280c4 Merge branch 'maint-0.2.4' into release-0.2.4 2017-06-05 11:59:57 -04:00
Nick Mathewson cdc960b538 Merge branch 'maint-0.2.4' into release-0.2.4 2017-05-08 08:07:56 -04:00
Nick Mathewson d92e622b41 Merge branch 'maint-0.2.4' into release-0.2.4 2017-04-06 08:32:31 -04:00
Nick Mathewson 64bc1490ea Merge branch 'maint-0.2.4' into release-0.2.4 2017-03-08 10:09:20 -05:00
Nick Mathewson 16bbbe82e4 Pick a date, update ReleaseNotes. (0.2.4) 2017-03-03 14:55:06 -05:00
Nick Mathewson 70840ea6d5 Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-28 10:21:58 -05:00
Nick Mathewson e9d45f63aa Sort changelog in release-0.2.4 2017-02-28 10:11:31 -05:00
Nick Mathewson d1dc3d0154 Adjust 0.2.4.28 changelog entry from 0.3.0.4-rc to match 2017-02-28 10:06:00 -05:00
Nick Mathewson 5c139d2491 typo fix 2017-02-23 16:48:04 -05:00
Nick Mathewson a84f923e89 Begin an 0.2.4.28 changelog.
To build this changelog, I've gone through the entries in
release-0.2.4's changes subdirectory, and looked up the ChangeLog
entry for each.  I have not sorted them yet.
2017-02-23 11:16:31 -05:00
Nick Mathewson 2e03c02b74 Remove to changes files that already went in 0.2.4.27 2017-02-23 11:04:21 -05:00
Nick Mathewson 3f5eec8dd7 Bump to 0.2.4.27-dev 2017-02-17 16:11:42 -05:00
Nick Mathewson 2afdf8de2f Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-15 07:50:45 -05:00
Nick Mathewson 92f8b56e27 Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-13 14:39:10 -05:00
Nick Mathewson 8bcc14f62e Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-07 10:39:48 -05:00
Nick Mathewson 9c5ff56659 Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-07 09:21:10 -05:00
Nick Mathewson a2192a671c Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-07 08:56:58 -05:00
Nick Mathewson 040d7cecf3 Merge branch 'maint-0.2.4' into release-0.2.4 2017-02-07 08:40:00 -05:00
Nick Mathewson d7810bb4a3 Merge branch 'maint-0.2.4' into release-0.2.4 2017-01-11 09:11:44 -05:00
Nick Mathewson 956c61ec23 Merge branch 'maint-0.2.4' into release-0.2.4 2016-12-20 18:19:18 -05:00
Nick Mathewson ec3df7cbd2 Merge branch 'maint-0.2.4' into release-0.2.4 2016-12-20 18:05:47 -05:00
Nick Mathewson ce12cde92c Merge branch 'maint-0.2.4' into release-0.2.4 2016-12-09 08:34:39 -05:00
Nick Mathewson bd44053716 Merge branch 'maint-0.2.4' into release-0.2.4 2016-11-07 09:29:37 -05:00
Nick Mathewson 0e2f18868c Merge branch 'maint-0.2.4' into release-0.2.4 2016-07-05 13:51:28 -04:00
Nick Mathewson fd6ba23f7b Merge branch 'maint-0.2.4' into release-0.2.4 2016-07-05 12:25:03 -04:00
Nick Mathewson ef996c91b8 Merge branch 'maint-0.2.4' into release-0.2.4 2016-05-09 14:55:14 -04:00
Nick Mathewson 8e6174e389 Merge branch 'maint-0.2.4' into release-0.2.4 2016-04-07 10:46:22 -04:00
Nick Mathewson 7bb4422a93 Merge branch 'maint-0.2.4' into release-0.2.4 2016-01-07 09:47:36 -08:00
Nick Mathewson a378b22394 Merge remote-tracking branch 'karsten/geoip6-apr2015' into release-0.2.4 2015-04-27 14:13:06 -04:00
Nick Mathewson 55492e7d5a Merge remote-tracking branch 'origin/maint-0.2.3' into release-0.2.4 2015-04-27 14:08:46 -04:00
Nick Mathewson 85169a121e Changelog for 0.2.4.27 2015-04-06 09:55:27 -04:00
Nick Mathewson 7d5ddde487 Merge branch 'maint-0.2.4' into release-0.2.4 2015-04-06 09:49:06 -04:00
Nick Mathewson da8505205d Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2015-04-06 09:31:30 -04:00
Nick Mathewson 44b48a9b67 Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2015-04-03 09:52:01 -04:00
Nick Mathewson d461e7036f copy changelog into release notes. 2015-03-17 09:36:59 -04:00
Nick Mathewson 34b616ce39 Pick a release date 2015-03-17 09:02:14 -04:00
Nick Mathewson 22bdc69429 Merge branch 'maint-0.2.4' into release-0.2.4 2015-03-12 10:50:28 -04:00
Nick Mathewson 9e44ed47ac fold more entries into 0.2.4 changelog 2015-03-12 10:47:12 -04:00
Nick Mathewson 5ba8ab5a88 Merge branch 'maint-0.2.4' into release-0.2.4 2015-03-09 16:24:20 -04:00
Nick Mathewson ef5f2b3606 Copy entries for an 0.2.4.26 changelog 2015-03-09 15:46:05 -04:00
Nick Mathewson b70a0a01ec Merge branch 'maint-0.2.4' into release-0.2.4 2015-03-09 13:37:22 -04:00
Nick Mathewson dc06c071a4 Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2015-02-24 13:27:15 -05:00
Nick Mathewson 1f5b228ee8 Merge branch 'maint-0.2.4' into release-0.2.4
Conflicts:
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2014-10-20 10:30:58 -04:00
Nick Mathewson a8d6eb30b8 Merge branch 'maint-0.2.4' into release-0.2.4
Conflicts:
	configure.ac
2014-10-20 10:26:19 -04:00
Nick Mathewson 6b2ed1a905 copy 0.2.4.25 entry from ChangeLog to ReleaseNotes. 2014-10-19 22:09:04 -04:00
Nick Mathewson 7ce4192d1d better release blurb, maybe. Also bump version. 2014-10-19 21:55:21 -04:00
Nick Mathewson b783ed3b5c Remove a stray changes file. 2014-10-19 21:53:02 -04:00
Nick Mathewson 0c8acf1198 Changelog for 0.2.4.25 2014-10-19 21:43:09 -04:00
Nick Mathewson d1c6b2cf11 Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2014-10-19 14:36:10 -04:00
Roger Dingledine f48def202c bump stable to 0.2.4.24 2014-09-22 14:17:43 -04:00
Roger Dingledine 929dd87c35 Merge branch 'maint-0.2.4' into release-0.2.4 2014-09-22 13:11:38 -04:00
Roger Dingledine 598c61362f Merge branch 'maint-0.2.4' into release-0.2.4
Conflicts:
	configure.ac
	contrib/tor-mingw.nsi.in
	src/win32/orconfig.h
2014-07-28 04:08:18 -04:00
Roger Dingledine 9ac1695844 give it a release blurb 2014-07-28 04:04:55 -04:00
Roger Dingledine eccda448a7 fold in changes entries 2014-07-28 03:44:35 -04:00
Roger Dingledine 637b4e62d1 Merge branch 'maint-0.2.4' into release-0.2.4 2014-07-28 03:09:12 -04:00
Roger Dingledine 911fb9399f Merge branch 'maint-0.2.4' into release-0.2.4 2014-07-24 16:22:36 -04:00
Roger Dingledine dd4f5bc8a7 fold in the changes entries so far 2014-07-21 14:58:01 -04:00
Roger Dingledine 2998d384ec Merge branch 'maint-0.2.4' into release-0.2.4 2014-07-21 14:39:48 -04:00
Roger Dingledine 9959bc54e1 Merge branch 'maint-0.2.4' into release-0.2.4
This is an "ours" merge, to avoid taking the commit that bumped
maint-0.2.4's version to 0.2.4.22-dev.
2014-05-17 04:36:17 -04:00
Nick Mathewson 2ee56e4c2c copy 0.2.4.22 notes into releasenotes 2014-05-16 09:05:06 -04:00
Nick Mathewson 1e7416771e Pick a release date for 0.2.4.22 2014-05-16 08:56:35 -04:00
Roger Dingledine a7d700aa04 match the changelog entries from 0.2.5.x when possible 2014-05-14 16:04:16 -04:00
Roger Dingledine 9aba2117e2 group the sections 2014-05-14 15:55:52 -04:00
Roger Dingledine ca085ba341 two small fixes, and downgrade a severity 2014-05-14 15:48:57 -04:00
Nick Mathewson 0fed6ad45b Bump release-0.2.4 version to 0.2.4.22
This is not officially released yet; it needs some QA first.
2014-05-14 11:14:25 -04:00
Nick Mathewson 1b37d8bef0 Reflow, slightly tidy Changelog 2014-05-14 10:02:55 -04:00
Nick Mathewson 6932f87ae1 changelog edits for 0.2.4.22 2014-05-14 09:41:58 -04:00
Nick Mathewson 3dfd8dd97b mark backported changelog entries and ensure that they match the changelog. 2014-05-07 23:42:04 -04:00
Nick Mathewson 20d569882f Begin work on a changelog for 0.2.4.22 by copying in the changes files unedited 2014-05-07 23:35:00 -04:00
Nick Mathewson 183c861e9a Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2014-05-07 23:20:58 -04:00
Nick Mathewson 75e10f58a9 Add a missing changelog entry back from 0.2.4.11-alpha
When I merged the fix for #7351, and implemented proposal 214 (4-byte
circuit IDs), I forgot to add a changes file.  Later, we never noticed
that it didn't have one.

Resolves ticket #11555.  Thanks to cypherpunks for noticing this was
missing.
2014-04-24 14:00:36 -04:00
Roger Dingledine 4e0bd24287 Merge branch 'maint-0.2.4' into release-0.2.4 2014-04-23 13:47:07 -04:00
Roger Dingledine 505962724c give it a release blurb and date
and also copy the changelog into ReleaseNotes
2014-02-28 10:11:36 -05:00
Roger Dingledine 8ab7e151dd fold in the next changes entry 2014-02-25 16:47:52 -05:00
Roger Dingledine 168da9129d bump to 0.2.4.21 since we're getting close 2014-02-25 16:38:07 -05:00
Roger Dingledine ed960eaa16 Merge branch 'maint-0.2.4' into release-0.2.4 2014-02-25 16:37:44 -05:00
Roger Dingledine dab4656c85 fold in further changes files 2014-02-25 15:36:25 -05:00
Roger Dingledine 4ef52cc167 Merge branch 'maint-0.2.4' into release-0.2.4 2014-02-25 15:05:06 -05:00
Roger Dingledine 4428a14616 use the #10485 changelog stanza from 0.2.5.2-alpha 2014-02-12 04:02:44 -05:00
Roger Dingledine cf2a78248f fold in changes entries 2014-02-11 06:23:41 -05:00
Roger Dingledine 911e0a71a6 Merge branch 'maint-0.2.4' into release-0.2.4 2014-02-10 16:41:13 -05:00
Roger Dingledine d9c111d954 Merge branch 'maint-0.2.4' into release-0.2.4 2014-02-06 12:28:49 -05:00
Roger Dingledine 3cb5c70bee fold in next changes entry 2013-12-22 18:34:37 -05:00
Roger Dingledine ce43072831 Merge branch 'maint-0.2.4' into release-0.2.4 2013-12-22 18:31:50 -05:00
Roger Dingledine 9f7be021f3 bump to 0.2.4.20 2013-12-22 04:21:42 -05:00
Roger Dingledine 8eb617dca3 write the release blurb for 0.2.4.20, and give it a date 2013-12-22 04:11:03 -05:00
Roger Dingledine 00285acca3 fold in changes files so far 2013-12-22 02:35:20 -05:00
Roger Dingledine 2349833f71 Merge branch 'maint-0.2.4' into release-0.2.4 2013-12-22 02:25:53 -05:00
Roger Dingledine e719d05fd2 minor clarity fixes 2013-12-10 15:57:31 -05:00
Roger Dingledine 7c3f1d29af bump to 0.2.4.19 2013-12-10 15:49:49 -05:00
Roger Dingledine f4c7d062f2 Add the dedication to Aaron. 2013-12-10 15:46:50 -05:00
Roger Dingledine 8377a5f6d7 write a blurb for 0.2.4.19 2013-11-22 00:57:30 -05:00
Roger Dingledine 1cda452bc1 bump to 0.2.4.18-rc 2013-11-16 13:12:13 -05:00
Roger Dingledine 5f4748933d fold in more changes entries, clean up changelog 2013-11-16 13:07:58 -05:00
Roger Dingledine 5d1a004e0d Merge branch 'maint-0.2.4' into release-0.2.4 2013-11-15 17:10:31 -05:00
Roger Dingledine f503f30436 start to migrate recent changes 2013-11-15 17:08:45 -05:00
Roger Dingledine 6837a27025 Merge branch 'maint-0.2.4' into release-0.2.4 2013-11-10 21:51:31 -05:00
Roger Dingledine 33b86071b7 Merge branch 'maint-0.2.4' into release-0.2.4 2013-11-02 06:35:46 -04:00
Roger Dingledine 00f95c208e fold in changes entries 2013-10-17 02:51:06 -04:00
Roger Dingledine 7067f53d42 Merge branch 'maint-0.2.4' into release-0.2.4 2013-10-16 18:51:15 -04:00
Roger Dingledine fd35354441 in-progress release notes for the upcoming 0.2.4 stable 2013-10-10 21:43:50 -04:00
Roger Dingledine b9d11bd87c Merge branch 'maint-0.2.4' into release-0.2.4 2013-10-10 21:42:33 -04:00
Roger Dingledine 63bef6c6ab fold in changes entries 2013-09-30 00:55:01 -04:00
Roger Dingledine 8fd9644f17 Merge branch 'maint-0.2.4' into release-0.2.4 2013-09-30 00:46:57 -04:00
Roger Dingledine 00fb525b23 give it a blurb and touch up the changelog stanzas 2013-09-05 02:32:02 -04:00
Roger Dingledine b01028e87e bump to 0.2.4.17-rc 2013-09-05 01:50:14 -04:00
Roger Dingledine cf744acae9 fold in another changes item 2013-09-05 01:48:18 -04:00
Roger Dingledine 60f13485eb Merge branch 'maint-0.2.4' into release-0.2.4 2013-09-05 01:47:47 -04:00
Roger Dingledine 63b91189e0 fold in recent changes entries 2013-09-04 23:57:35 -04:00
Roger Dingledine 6cf02b9ad6 Merge branch 'maint-0.2.4' into release-0.2.4 2013-09-04 23:46:46 -04:00
Roger Dingledine 20d4356c3d fold in changes entries 2013-08-31 20:30:28 -04:00
Roger Dingledine a1963695ca Merge branch 'maint-0.2.4' into release-0.2.4 2013-08-31 20:10:58 -04:00
Nick Mathewson 00ca2cc5b9 Correction in the 0.2.4.16-rc changelog 2013-08-13 10:13:35 -04:00
Roger Dingledine 889e9bd529 bump to 0.2.4.16-rc 2013-08-10 18:17:43 -04:00
Roger Dingledine addbe6f2f3 give it a blurb and a date 2013-08-10 18:06:03 -04:00
Roger Dingledine c2150628fd fold in change stanza 2013-08-10 18:04:17 -04:00
Roger Dingledine 42335972d5 Merge branch 'maint-0.2.4' into release-0.2.4 2013-08-10 18:00:47 -04:00
Roger Dingledine a2ea9df498 fold in more changes entries 2013-08-05 12:06:09 -04:00
Roger Dingledine 27fbfbbe7c Merge branch 'maint-0.2.4' into release-0.2.4 2013-08-05 02:49:40 -04:00
Roger Dingledine f473dec1e0 retroactively reformat a changelog stanza 2013-08-05 02:36:49 -04:00
Roger Dingledine 4a1d9726f4 Merge branch 'maint-0.2.4' into release-0.2.4 2013-07-28 09:50:19 -04:00
Roger Dingledine 2b9fb51ac6 fold in recent changes stanzas 2013-07-19 00:15:54 -04:00
Roger Dingledine bc6c7ea74e Merge branch 'maint-0.2.4' into release-0.2.4 2013-07-18 23:36:05 -04:00
Roger Dingledine e7b435872c bump to 0.2.4.15-rc 2013-07-01 16:39:39 -04:00
Roger Dingledine 8b8e3476c0 fold in changes entries 2013-07-01 15:29:51 -04:00
Roger Dingledine e9f0cdf55f Merge branch 'maint-0.2.4' into release-0.2.4 2013-07-01 15:08:57 -04:00
Nick Mathewson 7b29838891 Oops; retroactively fix a character in the changelog. Roger will never notice. 2013-06-18 16:25:03 -04:00
Nick Mathewson f5729b8c1d Reformat changelog a little to follow arma rules on spacing 2013-06-18 15:06:21 -04:00
Nick Mathewson cee6a991d2 Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2013-06-18 14:46:25 -04:00
Nick Mathewson fd9ba5ed56 Bump version to 0.2.4.14-alpha.
(Remember, this isn't a release until we tag it.)
2013-06-18 10:40:18 -04:00
Nick Mathewson ce168e7800 Start on an 0.2.4.14-alpha changelog 2013-06-18 10:33:14 -04:00
Nick Mathewson 4a9ccb5d59 Merge remote-tracking branch 'origin/maint-0.2.4' into release-0.2.4 2013-06-18 10:28:43 -04:00
Roger Dingledine dcb4f22506 bump to 0.2.4.13-alpha 2013-06-14 18:27:38 -04:00
Roger Dingledine 110a75130e fold in new changes files 2013-06-14 18:25:03 -04:00
Roger Dingledine d78bb2df0e Merge branch 'maint-0.2.4' into release-0.2.4 2013-06-14 04:07:30 -04:00
Roger Dingledine e86f122265 fold in one more 2013-06-10 15:02:30 -04:00
Roger Dingledine b4b14921da Merge branch 'maint-0.2.4' into release-0.2.4 2013-06-10 15:01:25 -04:00
Roger Dingledine a7958a7a2e fold in (and fix up) some changes entries so far 2013-06-10 15:00:09 -04:00
Roger Dingledine 34c70ba9e6 Merge branch 'maint-0.2.4' into release-0.2.4 2013-06-08 15:12:29 -04:00
Roger Dingledine 2d4aebaf76 Merge branch 'maint-0.2.4' into release-0.2.4 2013-05-24 23:58:16 -04:00
Roger Dingledine 91b8bc26f1 give it a blurb and more cleanup 2013-04-18 05:41:01 -04:00
Roger Dingledine afe3dd51a2 bump to 0.2.4.12-alpha 2013-04-18 04:21:57 -04:00
Roger Dingledine 0d896c1e64 fold in the changes files so far 2013-04-18 01:18:54 -04:00
Roger Dingledine 0eb141c416 Merge branch 'maint-0.2.4' into release-0.2.4 2013-04-17 11:19:51 -04:00
Roger Dingledine b4d81f182c Merge branch 'maint-0.2.4' into release-0.2.4 2013-04-16 11:09:50 -04:00
Roger Dingledine 887eba9895 Merge branch 'maint-0.2.4' into release-0.2.4 2013-04-11 01:29:24 -04:00
Roger Dingledine fcd9248387 fold in changes entry 2013-03-11 14:03:06 -04:00
Roger Dingledine 790ddd6e0a Merge branch 'maint-0.2.4' into release-0.2.4 2013-03-11 14:02:26 -04:00
Roger Dingledine f0a5f91b13 bump to 0.2.4.11-alpha 2013-03-11 04:41:52 -04:00
Roger Dingledine 53e11977e4 fold in changes entries so far 2013-03-11 04:38:32 -04:00
250 changed files with 2694 additions and 1247 deletions

1197
ChangeLog

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -1,7 +0,0 @@
- Minor bugfixes:
- Treat ENETUNREACH, EACCES, and EPERM at an exit node as a
NOROUTE error, not an INTERNAL error, since they can apparently
happen when trying to connect to the wrong sort of
netblocks. Fixes a part of bug 10777; bugfix on 0.1.0.1-rc.

View File

@ -1,2 +0,0 @@
o Directory authority changes:
- Urras is no longer a directory authority. Closes ticket 19271.

View File

@ -1,6 +0,0 @@
o Major features (deprecation):
- There's now a "DisableV2DirectoryInfo_" option that prevents us
from serving any directory requests for v2 directory information.
This is for us to test disabling the old deprecated V2 directory
format, so that we can see whether doing so has any effect on
network load. Part of a fix for bug 6783.

View File

@ -1,3 +0,0 @@
o Documentation fixes:
- Clarify the usage and risks of ContactInfo. Resolves ticket 9854.

View File

@ -1,3 +0,0 @@
o Directory authority changes (also in 0.2.8.7):
- The "Tonga" bridge authority has been retired; the new bridge
authority is "Bifroest". Closes tickets 19728 and 19690.

View File

@ -1,3 +0,0 @@
o Documentation:
- Replace remaining references to DirServer in man page and
log entries. Resolves ticket 10124.

View File

@ -1,6 +0,0 @@
o Minor bugfixes:
- Warn and drop the circuit if we receive an inbound 'relay early'
cell. Those used to be normal to receive on hidden service circuits
due to bug 1038, but the buggy Tor versions are long gone from
the network so we can afford to resume watching for them. Resolves
the rest of bug 1038; bugfix on 0.2.1.19.

View File

@ -1,11 +0,0 @@
o Major bugfixes:
- Do not allow OpenSSL engines to replace the PRNG, even when
HardwareAccel is set. The only default builtin PRNG engine uses
the Intel RDRAND instruction to replace the entire PRNG, and
ignores all attempts to seed it with more entropy. That's
cryptographically stupid: the right response to a new alleged
entropy source is never to discard all previously used entropy
sources. Fixes bug 10402; works around behavior introduced in
OpenSSL 1.0.0. Diagnosis and investigation thanks to "coderman"
and "rl1987".

View File

@ -1,3 +0,0 @@
o Minor bugfixes:
- Avoid a crash bug when starting with a corrupted microdescriptor
cache file. Fix for bug 10406; bugfix on 0.2.2.6-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- If we fail to dump a previously cached microdescriptor to disk, avoid
freeing duplicate data later on. Fix for bug 10423; bugfix on
0.2.4.13-alpha. Spotted by "bobnomnom".

View File

@ -1,6 +0,0 @@
o Major bugfixes:
- Avoid launching spurious extra circuits when a stream is pending.
This fixes a bug where any circuit that _wasn't_ unusable for new
streams would be treated as if it were, causing extra circuits to
be launched. Fixes bug 10456; bugfix on 0.2.4.12-alpha.

View File

@ -1,3 +0,0 @@
o Major bugfixes:
- Fix assertion failure when AutomapHostsOnResolve yields an IPv6
address. Fixes bug 10465; bugfix on 0.2.4.7-alpha.

View File

@ -1,4 +0,0 @@
o Documentation fixes:
- Note that all but one DirPort entry must have the NoAdvertise flag
set. Fix for #10470.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Move message about circuit handshake counts into the heartbeat
message where it belongs, instead of logging it once per hour
unconditionally. Fixes bug 10485; bugfix on 0.2.4.17-rc.

View File

@ -1,4 +0,0 @@
o Major bugfixes:
- Do not treat END_STREAM_REASON_INTERNAL as indicating a definite
circuit failure, since it could also indicate an ENETUNREACH
error. Fixes part of bug 10777; bugfix on 0.2.4.8-alpha.

View File

@ -1,4 +0,0 @@
o Minor features (security):
- Always clear OpenSSL bignums before freeing them--even bignums
that don't contain secrets. Resolves ticket 10793. Patch by
Florent Daigniere.

View File

@ -1,4 +0,0 @@
o Minor bugfixes (testing):
- Fix a segmentation fault in our benchmark code when running with
Fedora's OpenSSL package, or any other OpenSSL that provides
ECDH but not P224. Fixes bug 10835; bugfix on 0.2.4.8-alpha.

View File

@ -1,6 +0,0 @@
o Major bugfixes:
- When running a hidden service, do not allow TunneledDirConns 0;
this will keep the hidden service from running, and also
make it publish its descriptors directly over HTTP. Fixes bug 10849;
bugfix on 0.2.1.1-alpha.

View File

@ -1,6 +0,0 @@
o Code simplification and refactoring:
- Remove data structures which were introduced to implement the
CellStatistics option: they are now redundant with the addition
of timestamp to the regular packed_cell_t data structure, which
we did in 0.2.4.18-rc in order to resolve #9093. Fixes bug
10870.

View File

@ -1,5 +0,0 @@
o Minor bugfixes (compilation):
- Build without warnings under clang 3.4. (We have some macros that
define static functions only some of which will get used later in
the module. Starting with clang 3.4, these give a warning unless the
unused attribute is set on them.)

View File

@ -1,6 +0,0 @@
- Minor bugfixes:
- Fix build warnings about missing "a2x" comment when building the
manpages from scratch on OpenBSD; OpenBSD calls it "a2x.py".
Fixes bug 10929; bugfix on tor-0.2.2.9-alpha. Patch from
Dana Koch.

View File

@ -1,3 +0,0 @@
o Minor bugfixes:
- Stop leaking memory when we successfully resolve a PTR record.
Fixes bug 11437; bugfix on 0.2.4.7-alpha.

View File

@ -1,5 +0,0 @@
o Major features (security):
- Block authority signing keys that were used on an authorities
vulnerable to the "heartbleed" bug in openssl (CVE-2014-0160).
(We don't have any evidence that these keys _were_ compromised;
we're doing this to be prudent.) Resolves ticket 11464.

View File

@ -1,12 +0,0 @@
o Major bugfixes:
- Generate the server's preference list for ciphersuites
automatically based on uniform criteria, and considering all
OpenSSL ciphersuites with acceptable strength and forward
secrecy. (The sort order is: prefer AES to 3DES; break ties by
preferring ECDHE to DHE; break ties by preferring GCM to CBC;
break ties by preferring SHA384 to SHA256 to SHA1; and finally,
break ties by preferring AES256 to AES128.) This resolves bugs
#11513, #11492, #11498, #11499. Bugs reported by 'cypherpunks'.
Bugfix on 0.2.4.8-alpha.

View File

@ -1,3 +0,0 @@
o Minor bugfixes:
- Avoid sending an garbage value to the controller when a circuit is
cannibalized. Fixes bug 11519; bugfix on 0.2.3.11-alpha.

View File

@ -1,5 +0,0 @@
o Minor features:
- When we run out of usable circuit IDs on a channel, log only one
warning for the whole channel, and include a description of
how many circuits there were on the channel. Fix for part of ticket
#11553.

View File

@ -1,5 +0,0 @@
o Minor bugfixes:
- Avoid an illegal read from stack when initializing the TLS
module using a version of OpenSSL without all of the ciphers
used by the v2 link handshake. Fixes bug 12227; bugfix on
0.2.4.8-alpha. Found by "starlight".

View File

@ -1,5 +0,0 @@
o Minor bugfixes:
- Correct a confusing error message when trying to extend a circuit
via the control protocol but we don't know a descriptor or
microdescriptor for one of the specified relays. Fixes bug 12718;
bugfix on 0.2.3.1-alpha.

View File

@ -1,3 +0,0 @@
o Directory authority changes:
- Change IP address for gabelmoo (v3 directory authority).

View File

@ -1,13 +0,0 @@
o Major bugfixes:
- Clients now send the correct address for their chosen rendezvous
point when trying to access a hidden service. They used to send
the wrong address, which would still work some of the time because
they also sent the identity digest of the rendezvous point, and if
the hidden service happened to try connecting to the rendezvous
point from a relay that already had a connection open to it,
the relay would reuse that connection. Now connections to hidden
services should be more robust and faster. Also, this bug meant
that clients were leaking to the hidden service whether they were
on a little-endian (common) or big-endian (rare) system, which for
some users might have reduced their anonymity. Fixes bug 13151;
bugfix on 0.2.1.5-alpha.

View File

@ -1,5 +0,0 @@
o Directory authority changes:
- Remove turtles as a directory authority.
- Add longclaw as a new (v3) directory authority. This implements
ticket 13296. This keeps the directory authority count at 9.

View File

@ -1,5 +0,0 @@
o Major bugfixes (openssl bug workaround):
- Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
1.0.1j, built with the 'no-ssl3' configuration option. Fixes
bug 13471. This is a workaround for an OpenSSL bug.

View File

@ -1,7 +0,0 @@
o Major bugfixes (exit node stability):
- Fix an assertion failure that could occur under high DNS load. Fixes
bug 14129; bugfix on Tor 0.0.7rc1. Found by "jowr"; diagnosed and fixed
by "cypherpunks".

View File

@ -1,10 +0,0 @@
o Major bugfixes (relay, stability, possible security):
- Fix a bug that could lead to a relay crashing with an assertion
failure if a buffer of exactly the wrong layout was passed
to buf_pullup() at exactly the wrong time. Fixes bug 15083;
bugfix on 0.2.0.10-alpha. Patch from 'cypherpunks'.
- Do not assert if the 'data' pointer on a buffer is advanced to the very
end of the buffer; log a BUG message instead. Only assert if it is
past that point. Fixes bug 15083; bugfix on 0.2.0.10-alpha.

View File

@ -1,4 +0,0 @@
o Minor features (DoS-resistance):
- Make it harder for attackers to overwhelm hidden services with
introductions, by blocking multiple introduction requests on the
same circuit. Resolves ticket #15515.

View File

@ -1,5 +0,0 @@
o Major bugfixes (security, hidden service):
- Fix an issue that would allow a malicious client to trigger
an assertion failure and halt a hidden service. Fixes
bug 15600; bugfix on 0.2.1.6-alpha. Reported by "skruffy".

View File

@ -1,4 +0,0 @@
o Major bugfixes (security, hidden service):
- Fix a bug that could cause a client to crash with an assertion
failure when parsing a malformed hidden service descriptor.
Fixes bug 15601; bugfix on 0.2.1.5-alpha. Found by "DonnCha".

View File

@ -1,4 +0,0 @@
o Minor bugfixes (hidden service):
- Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells
on a client authorized hidden service. Fixes bug 15823; bugfix
on 0.2.1.6-alpha.

View File

@ -1,8 +0,0 @@
o Major bugfixes (dns proxy mode, crash):
- Avoid crashing when running as a DNS proxy. Closes bug 16248; bugfix on
0.2.0.1-alpha. Patch from 'cypherpunks'.
o Minor features (bug-resistance):
- Make Tor survive errors involving connections without a corresponding
event object. Previously we'd fail with an assertion; now we produce a
log message. Related to bug 16248.

View File

@ -1,6 +0,0 @@
o Major bugfixes (security, correctness):
- Fix a programming error that could cause us to read 4 bytes before
the beginning of an openssl string. This could be used to provoke
a crash on systems with an unusual malloc implementation, or
systems with unsual hardening installed. Fixes bug 17404; bugfix
on 0.2.3.6-alpha.

View File

@ -1,7 +0,0 @@
o Major bugfixes (guard selection):
- Actually look at the Guard flag when selecting a new directory
guard. When we implemented the directory guard design, we
accidentally started treating all relays as if they have the Guard
flag during guard selection, leading to weaker anonymity and worse
performance. Fixes bug 17222; bugfix on 0.2.4.8-alpha. Discovered
by Mohsen Imani.

View File

@ -1,3 +0,0 @@
o Compilation fixes:
- Fix a compilation warning with Clang 3.6: Do not check the
presence of an address which can never be NULL. Fixes bug 17781.

View File

@ -1,4 +0,0 @@
o Minor features (authorities):
- Update the V3 identity key for dannenberg, it was changed on
18 November 2015.
Closes task #17906. Patch by "teor".

View File

@ -1,6 +0,0 @@
o Minor fixes (security):
- Make memwipe() do nothing when passed a NULL pointer
or zero size. Check size argument to memwipe() for underflow.
Closes bug #18089. Reported by "gk", patch by "teor".
Bugfix on 0.2.3.25 and 0.2.4.6-alpha (#7352),
commit 49dd5ef3 on 7 Nov 2012.

View File

@ -1,7 +0,0 @@
o Major bugfixes (security, pointers):
- Avoid a difficult-to-trigger heap corruption attack when extending
a smartlist to contain over 16GB of pointers. Fixes bug #18162;
bugfix on Tor 0.1.1.11-alpha, which fixed a related bug
incompletely. Reported by Guido Vranken.

View File

@ -1,11 +0,0 @@
o Minor bugfixes:
- Stop trying to resolve our hostname so often (e.g. every time we
think about doing a directory fetch). Now we reuse the cached
answer in some cases. Fixes bugs 1992 (bugfix on 0.2.0.20-rc)
and 2410 (bugfix on 0.1.2.2-alpha).
o Minor features:
- Make bridge relays check once a minute for whether their IP
address has changed, rather than only every 15 minutes. Resolves
bugs 1913 and 1992.

View File

@ -1,10 +0,0 @@
o Major features (security fixes):
- Prevent a class of security bugs caused by treating the contents
of a buffer chunk as if they were a NUL-terminated string. At
least one such bug seems to be present in all currently used
versions of Tor, and would allow an attacker to remotely crash
most Tor instances, especially those compiled with extra compiler
hardening. With this defense in place, such bugs can't crash Tor,
though we should still fix them as they occur. Closes ticket
20384 (TROVE-2016-10-001).

View File

@ -1,11 +0,0 @@
o Major bugfixes (parsing, security):
- Fix a bug in parsing that could cause clients to read a single
byte past the end of an allocated region. This bug could be
used to cause hardened clients (built with
--enable-expensive-hardening) to crash if they tried to visit
a hostile hidden service. Non-hardened clients are only
affected depending on the details of their platform's memory
allocator. Fixes bug 21018; bugfix on 0.2.0.8-alpha. Found by
using libFuzzer. Also tracked as TROVE-2016-12-002 and as
CVE-2016-1254.

View File

@ -1,3 +0,0 @@
o Minor bugfixes (correctness):
- Avoid undefined behavior when parsing IPv6 entries from the geoip6
file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.

View File

@ -1,5 +0,0 @@
o Major features (directory authority):
- Directory authorities now support a new consensus method (17)
where they cap the published bandwidth of servers for which
insufficient bandwidth measurements exist. Fixes part of bug
2286.

View File

@ -1,8 +0,0 @@
o Critical bugfixes:
- Distinguish downloading an authority certificate by identity digest from
downloading one by identity digest/signing key digest pair; formerly we
always request them only by identity digest and get the newest one even
when we wanted one with a different signing key. Then we would complain
about being given a certificate we already had, and never get the one we
really wanted. Now we use the "fp-sk/" resource as well as the "fp/"
resource to request the one we want. Fixes bug 5595.

View File

@ -1,5 +0,0 @@
o Major bugfixes:
- Avoid a bug where our response to TLS renegotation under certain
network conditions could lead to a busy-loop, with 100% CPU
consumption. Fixes bug 5650; bugfix on 0.2.0.16-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Relays now treat a changed IPv6 ORPort as sufficient reason to
publish an updated descriptor. Fix for bug 6026; bugfix for
0.2.4.1-alpha.

View File

@ -1,6 +0,0 @@
o Major enhancements:
- Re-enable TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later.
(OpenSSL before 1.0.1 didn't have TLS 1.1 or 1.2. OpenSSL from 1.0.1
through 1.0.1d had bugs that prevented renegotiation from working
with TLS 1.1 or 1.2, so we disabled them to solve bug 6033.) Fix for
issue #6055.

View File

@ -1,6 +0,0 @@
o Major bugfixes:
- When we mark a circuit as unusable for new circuits, have it
continue to be unusable for new circuits even if MaxCircuitDirtiness
is increased too much at the wrong time, or the system clock jumped
backwards. Fix for bug 6174; bugfix on 0.0.2pre26.

View File

@ -1,6 +0,0 @@
o Minor bugfixes:
- Always check the return values of functions fcntl() and
setsockopt(). We don't believe these are ever actually failing in
practice, but better safe than sorry. Also, checking these return
values should please some analysis tools (like Coverity). Patch
from 'flupzor'. Fix for bug 8206; bugfix on all versions of Tor.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Behave correctly when the user disables LearnCircuitBuildTimeout
but doesn't tell us what they would like the timeout to be. Fixes
bug 6304; bugfix on 0.2.2.14-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes (log messages)
- Use circuit creation time for network liveness evaluation. This
should eliminate warning log messages about liveness caused by
changes in timeout evaluation. Fixes bug 6572; bugfix on 0.2.4.8-alpha.

View File

@ -1,4 +0,0 @@
o Minor features (build):
- Detect and reject attempts to build Tor with threading support
when OpenSSL have been compiled with threading support disabled.
Fixes bug 6673.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Fix an assertion failure that would occur when disabling the
ORPort setting on a running Tor process while accounting was
enabled. Fixes bug 6979; bugfix on 0.2.2.18-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes (man page):
- Say "KBytes" rather than "KB" in the man page (for various values
of K), to further reduce confusion about whether Tor counts in
units of memory or fractions of units of memory. Fixes bug 7054.

View File

@ -1,5 +0,0 @@
o Minor bugfix (log cleanups):
- Eliminate several instances where we use Nickname=ID to refer to
nodes in logs. Use Nickname (ID) instead. (Elsewhere, we still use
$ID=Nickname, which is also acceptable.) Fixes bug #7065. Bugfix
on 0.2.3.21-rc, 0.2.4.5-alpha, 0.2.4.8-alpha, and 0.2.4.10-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes (build):
- Add the old src/or/micro-revision.i filename to CLEANFILES.
On the off chance that somebody has one, it will go away as soon
as they run "make clean". Fix for bug 7143; bugfix on 0.2.4.1-alpha.

View File

@ -1,4 +0,0 @@
o Minor features (bug diagnostic):
- If we fail to free a microdescriptor because of bug #7164, log
the filename and line number from which we tried to free it.
This should help us finally fix #7164.

View File

@ -1,6 +0,0 @@
o Minor bugfixes:
- Downgrade the warning severity for the the "md was still referenced 1
node(s)" warning. Tor 0.2.5.4-alpha has better code for trying to
diagnose this bug, and the current warning in earlier versions of
tor achieves nothing useful. Addresses warning from bug 7164.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Fix some bugs in tor-fw-helper-natpmp when trying to build and
run it on Windows. More bugs likely remain. Patch from Gisle Vanem.
Fixes bug 7280; bugfix on 0.2.3.1-alpha.

View File

@ -1,11 +0,0 @@
o Minor bugfixes:
- Don't log inappropriate heartbeat messages when hibernating: a
hibernating node is _expected_ to drop out of the consensus,
decide it isn't bootstrapped, and so forth. Fixes part of bug
7302; bugfix on 0.2.3.1-alpha.
- Don't complain about bootstrapping problems while hibernating.
These complaints reflect a general code problems, but not one
with any problematic effects. (No connections are actually
opened.) Fixes part of bug 7302; bugfix on 0.2.3.2-alpha.

View File

@ -1,4 +0,0 @@
o Major bugfixes:
- Avoid an assertion when we discover that we'd like to write a cell
onto a closing connection: just discard the cell. Fixes another
case of bug 7350; bugfix on 0.2.4.4-alpha.

View File

@ -1,9 +0,0 @@
o Major bugfixes:
- When an exit node tells us that it is rejecting because of its
exit policy a stream we expected it to accept (because of its exit
policy), do not mark the node as useless for exiting if our
expectation was only based on an exit policy summary. Instead,
mark the circuit as unsuitable for that particular address. Fixes
part of bug 7582; bugfix on 0.2.3.2-alpha.

View File

@ -1,5 +0,0 @@
o Minor features:
- Add another diagnostic to the heartbeat message: track and log
overhead that TLS is adding to the data we write. If this is
high, we are sending too little data to SSL_write at a time.
Diagnostic for bug 7707.

View File

@ -1,3 +0,0 @@
o Documentation fixes:
- Update tor-fw-helper.1.txt and tor-fw-helper.c to make option
names match. Fixes bug 7768.

View File

@ -1,7 +0,0 @@
o Minor changes (log clarification)
- Add more detail to a log message about relaxed timeouts. Hopefully
this additional detail will allow us to diagnose the cause of bug 7799.
o Minor bugfixes
- Don't attempt to relax the timeout of already opened 1-hop circuits.
They might never timeout. This should eliminate some/all cases of
the relaxed timeout log message.

View File

@ -1,13 +0,0 @@
o Minor bugfixes:
- When choosing which stream on a formerly stalled circuit to wake
first, make better use of the platform's weak RNG. Previously, we
had been using the % ("modulo") operator to try to generate a 1/N
chance of picking each stream, but this behaves badly with many
platforms' choice of weak RNG. Fix for bug 7801; bugfix on
0.2.2.20-alpha.
- Use our own weak RNG when we need a weak RNG. Windows's rand()
and Irix's random() only return 15 bits; Solaris's random()
returns more bits but its RAND_MAX says it only returns 15, and
so on. Fixes another aspect of bug 7801; bugfix on
0.2.2.20-alpha.

View File

@ -1,8 +0,0 @@
o Minor bugfixes:
- Avoid leaking IPv6 policy content if we fail to format it into
a router descriptor. Spotted by Coverity. Fixes part of 7816;
bugfix on 0.2.4.7-alpha.
- Avoid leaking memory if we fail to compute a consensus signature
or we generated a consensus we couldn't parse. Spotted by Coverity.
Fixes part of 7816; bugfix on 0.2.0.5-alpha.

View File

@ -1,7 +0,0 @@
o Minor bugfixes (memory leak, controller):
- Fix a memory leak during safe-cookie controller authentication.
Spotted by Coverity. Fixes part of bug 7816; bugfix on 0.2.3.13-alpha.
o Minor bugfixes (memory leak, HTTPS proxy support):
- Fix a memory leak when receiving headers from an HTTPS proxy.
Spotted by Coverity. Fixes part of bug 7816; bugfix on 0.2.1.1-alpha.

View File

@ -1,3 +0,0 @@
o Minor bugfixes:
- Fix various places where we leak file descriptors or memory on
error cases. Spotted by coverity. Fixes parts of bug 7816.

View File

@ -1,7 +0,0 @@
o Minor bugfixes:
- When we receive a RELAY_END cell with the reason DONE, or with no
reason, before receiving a RELAY_CONNECTED cell, report the SOCKS
status as "connection refused." Previously we reporting these
cases as success but then immediately closing the connection.
Fixes bug 7902; bugfix on 0.1.0.1-rc. Reported by "oftc_must_
be_destroyed."

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Fix the handling of a TRUNCATE cell when it arrives while the circuit
extension is in progress. Fixes bug 7947; bugfix on 0.0.7.1.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- When rejecting a configuration because we were unable to parse a
quoted string, log an actual error message. Fix for bug 7950;
bugfix on 0.2.0.16-alpha.

View File

@ -1,3 +0,0 @@
o Minor bugfixes:
- Copy-paste description for PathBias params from man page into or.h
comment. Fixes bug 7982.

View File

@ -1,5 +0,0 @@
o Minor bugfixes:
- When autodetecting the number of CPUs, use the number of available
CPUs in preferernce to the number of configured CPUs. Inform the
user if this reduces the number of avialable CPUs. Fix for bug 8002.
Bugfix on 0.2.3.1-alpha.

View File

@ -1,5 +0,0 @@
o Minor usability improvements (build):
- Clarify that when autconf is checking for nacl, it is checking
specifically for nacl with a fast curve25519 implementation.
Fixes bug 8014.

View File

@ -1,7 +0,0 @@
o Minor bugfixes:
- Use direct writes rather than stdio when building microdescriptor
caches, in an attempt to mitigate bug 8031, or at least make it
less common.
- Warn more aggressively when flushing microdescriptors to a
microdescriptor cache fails, in an attempt to mitegate bug 8031,
or at least make it more diagnosable.

View File

@ -1,8 +0,0 @@
o Minor bugfixes:
- Correctly store microdescriptors and extrainfo descriptors with
an internal NUL byte. Fixes bug 8037; bugfix on 0.2.0.1-alpha.
Bug reported by "cypherpunks".
o Minor features:
- Reject as invalid most directory objects containing a
NUL. Belt-and-suspender fix for bug 8037.

View File

@ -1,6 +0,0 @@
o Minor bugfixes (protocol conformance):
- Fix a misframing issue when reading the version numbers in a
VERSIONS cell. Previously we would recognize [00 01 00 02] as
'version 1, version 2, and version 0x100', when it should have
only included versions 1 and 2. Fixes bug 8059; bugfix on
0.2.0.10-alpha. Reported pseudonymously.

View File

@ -1,5 +0,0 @@
o Minor bugfixes:
- Increase the width of the field used to remember a connection's
link protocol version to two bytes. Harmless for now, since the
only currently recognized versions are one byte long. Reported
pseudynmously. Fixes bug 8062, bugfix on 0.2.0.10-alpha.

View File

@ -1,6 +0,0 @@
o Minor bugfixes:
- Downgrade an assertion in connection_ap_expire_beginning to
an LD_BUG message. The fix for bug 8024 should prevent this
message from displaying, but just in case a warn that we can
diagnose is better than more assert crashes. Fix for bug 8065;
bugfix on 0.2.4.8-alpha.

View File

@ -1,3 +0,0 @@
o Minor features:
- Downgrade "unexpected SENDME" warnings to protocol-warn for 0.2.4,
for bug 8093.

View File

@ -1,13 +0,0 @@
o Major bugfixes:
- Many SOCKS5 clients, when configured to offer a username/password,
offer both username/password authentication and "no authentication".
Tor had previously preferred no authentication, but this was
problematic when trying to make applications get proper stream
isolation with IsolateSOCKSAuth. Now, on any SOCKS port with
IsolateSOCKSAuth turned on (which is the default), Tor selects
username/password authentication if it's offered. If this confuses your
application, you can disable it on a per-SOCKSPort basis via
PreferSOCKSNoAuth. Fixes bug 8117; bugfix on 0.2.3.3-alpha.

View File

@ -1,7 +0,0 @@
o Minor features:
- Clear the high bit on curve25519 public keys before passing them to
our backend, in case we ever wind up using a backend that doesn't do
so itself. If we used such a backend, and *didn't* clear the high bit,
we could wind up in a situation where users with such backends would
be distinguishable from users without. Fix for bug 8121; bugfix on
0.2.4.8-alpha.

View File

@ -1,5 +0,0 @@
o Minor features (directory authority):
- Include inside each vote a statement of the performance
thresholds that made the authority vote for its flags. Implements
ticket 8151.

View File

@ -1,3 +0,0 @@
o Minor bugfixes:
- Use less space when formatting identical microdescriptor lines in
directory votes. Fixes bug 8158; bugfix on 0.2.4.1-alpha.

View File

@ -1,6 +0,0 @@
o Minor changes:
- Lower path use bias thresholds to .80 for notice and .60 for warn.
Fixes bug #8161; bugfix on 0.2.4.10-alpa.
- Make the rate limiting flags for the path use bias log messages
independent from the original path bias flags. Fixes bug #8161;
bugfix on 0.2.4.10-alpha.

View File

@ -1,7 +0,0 @@
o Minor bugfixes (security usability):
- Elevate the severity of the warning message when setting
EntryNodes but disabling UseGuardNodes to an error. The outcome
of letting Tor procede with those options enabled (which causes
EntryNodes to get ignored) is sufficiently different from what
was expected that it's best to just refuse to proceed. Fixes bug
8180; bugfix on 0.2.3.11-alpha.

View File

@ -1,3 +0,0 @@
o Minor features:
- Improve debugging output to attempt to diagnose the underlying
cause of bug 8185.

View File

@ -1,5 +0,0 @@
o Minor bugfix:
- Stop sending a stray "(null)" in some cases for the server status
"EXTERNAL_ADDRESS" controller event. Resolves bug 8200; bugfix
on 0.1.2.6-alpha.

View File

@ -1,4 +0,0 @@
o Minor bugfixes:
- Make the format and order of STREAM events for DNS lookups consistent
among the various ways to launch DNS lookups. Fix for bug 8203;
bugfix on 0.2.0.24-rc. Patch by "Desoxy."

View File

@ -1,7 +0,0 @@
o Major bugfixes (hidden services):
- Allow hidden service authentication to succeed again. When we
refactored the hidden service introduction code back in 0.2.4.1-alpha,
we didn't update the code that checks whether authentication
information is present, causing all authentication checks to
return "false". Fix for bug 8207; bugfix on 0.2.4.1-alpha. Found by
Coverity; this is CID 718615.

Some files were not shown because too many files have changed in this diff Show More