mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-20 10:12:15 +01:00
remove changes files that are already merged in release-0.2.4
This commit is contained in:
parent
0d8632e585
commit
b484711a51
@ -1,8 +0,0 @@
|
||||
o Critical bugfixes:
|
||||
- Distinguish downloading an authority certificate by identity digest from
|
||||
downloading one by identity digest/signing key digest pair; formerly we
|
||||
always request them only by identity digest and get the newest one even
|
||||
when we wanted one with a different signing key. Then we would complain
|
||||
about being given a certificate we already had, and never get the one we
|
||||
really wanted. Now we use the "fp-sk/" resource as well as the "fp/"
|
||||
resource to request the one we want. Fixes bug 5595.
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- Relays now treat a changed IPv6 ORPort as sufficient reason to
|
||||
publish an updated descriptor. Fix for bug 6026; bugfix for
|
||||
0.2.4.1-alpha.
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- Copy-paste description for PathBias params from man page into or.h
|
||||
comment. Fixes bug 7982.
|
@ -1,3 +0,0 @@
|
||||
o Minor features:
|
||||
- Downgrade "unexpected SENDME" warnings to protocol-warn for 0.2.4,
|
||||
for bug 8093.
|
@ -1,6 +0,0 @@
|
||||
o Minor bugfixes (log messages)
|
||||
- Fix a scaling issue in the path bias accounting code that resulted in
|
||||
"Bug:" log messages from either pathbias_scale_close_rates() or
|
||||
pathbias_count_build_success(). This represents a bugfix on a previous
|
||||
bugfix: The original fix attempted in 0.2.4.10-alpha was incomplete.
|
||||
Fixes bug 8235; bugfix on 0.2.4.1-alpha.
|
@ -1,5 +0,0 @@
|
||||
o Normal bugfixes:
|
||||
- When launching a resolve request on behalf of an AF_UNIX control
|
||||
socket, omit the address field of the new entry connection, used in
|
||||
subsequent controller events, rather than letting tor_dup_addr() set
|
||||
it to "<unknown address type>". Fixes bug 8639.
|
@ -1,6 +0,0 @@
|
||||
o Minor features (authority):
|
||||
- Add a "ignoring-advertised-bws" boolean to our flag-thresholds
|
||||
lines to describe whether we have enough measured bandwidths to
|
||||
ignore advertised bandwidth claims. Closes ticket 8711.
|
||||
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes (memory leak):
|
||||
- Fix a memory leak that would occur whenever a configuration
|
||||
option changed. Fixes bug #8718; bugfix on 0.2.3.3-alpha.
|
@ -1,6 +0,0 @@
|
||||
o Major bugfixes (memory leak):
|
||||
- Avoid a memory leak where we would leak a consensus body when we find
|
||||
that a consensus which we couldn't previously verify due to missing
|
||||
certificates is now verifiable. Fixes bug 8719; bugfix on
|
||||
0.2.0.10-alpha.
|
||||
|
@ -1,5 +0,0 @@
|
||||
o Major bugfixes (windows):
|
||||
- Prevent failures on Windows Vista and later when rebuilding the
|
||||
microdescriptor cache. Diagnosed by Robert Ransom. Fixes bug 8822;
|
||||
bugfix on 0.2.4.12-alpha.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Major bugfixes (directory authority):
|
||||
- Fix a crash bug when building a consensus using an older consensus as
|
||||
its basis. Fixes bug 8833. Bugfix on 0.2.4.12-alpha.
|
@ -1,6 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- Prevent the get_freelists() function from running off the end of
|
||||
the list of freelists if it somehow gets an unrecognized
|
||||
allocation. Fixes bug 8844; bugfix on 0.2.0.16-alpha. Reported by
|
||||
eugenis.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Minor bugfixes (test):
|
||||
- Fix an impossible buffer overrun in the AES unit tests. Fixes bug 8845;
|
||||
bugfix on 0.2.0.7-alpha. Found by eugenis.
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- Give a less useless error message when the user asks for an IPv4
|
||||
address on an IPv6-only port, or vice versa. Fixes bug 8846; bugfix
|
||||
on 0.2.4.7-alpha.
|
@ -1,5 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- Follow the socks5 protocol when offering username/password
|
||||
authentication. The fix for bug 8117 exposed this bug, and it
|
||||
turns out real-world applications like Pidgin do care. Bugfix on
|
||||
0.2.3.2-alpha; fixes bug 8879.
|
@ -1,3 +0,0 @@
|
||||
o Removed documentation:
|
||||
- Remove some of the older contents of doc/ as obsolete; move others
|
||||
to torspec.git. Fixes bug 8965.
|
@ -1,4 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- Limit hidden service descriptors to at most ten introduction
|
||||
points, to slow one kind of guard enumeration. Fixes bug 9002;
|
||||
bugfix on 0.1.1.11-alpha.
|
@ -1,6 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- Avoid an assertion failure on OpenBSD (and perhaps other BSDs)
|
||||
when an exit connection with optimistic data succeeds immediately
|
||||
rather than returning EINPROGRESS. Fixes bug 9017; bugfix on
|
||||
0.2.3.1-alpha.
|
||||
|
@ -1,6 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- If for some reason we fail to write a microdescriptor while
|
||||
rebuilding the cache, do not let the annotations from that
|
||||
microdescriptor linger in the cache file, and do not let the
|
||||
microdescriptor stay recorded as present in its old location.
|
||||
Fixes bug 9047; bugfix on 0.2.2.6-alpha.
|
@ -1,15 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- When we have too much memory queued in circuits (according to a new
|
||||
MaxMemInCellQueues option), close the circuits consuming the most
|
||||
memory. This prevents us from running out of memory as a relay if
|
||||
circuits fill up faster than they can be drained. Fixes
|
||||
bug 9063; bugfix on the 54th commit of Tor. This bug is a further
|
||||
fix beyond bug 6252, whose fix was merged into 0.2.3.21-rc.
|
||||
|
||||
Also fixes an earlier approach taken in 0.2.4.13-alpha, where we
|
||||
tried to solve this issue simply by imposing an upper limit on the
|
||||
number of queued cells for a single circuit. That approach proved to
|
||||
be problematic, since there are ways to provoke clients to send a
|
||||
number of cells in excess of any such reasonable limit.
|
||||
Fixes bug 9072; bugfix on 0.2.4.13-alpha.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Critical bugfixes:
|
||||
- Disable middle relay queue overfill detection code due to possible
|
||||
guard discovery attack, pending further analysis. Fixes bug #9072.
|
@ -1,4 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- When receiving a new configuration file via the control port's
|
||||
LOADCONF command, do not treat the defaults file as absent.
|
||||
Fixes bug 9122; bugfix on 0.2.3.9-alpha.
|
@ -1,4 +0,0 @@
|
||||
o Minor features:
|
||||
- Issue a warning when running with the bufferevents backend enabled.
|
||||
It's still not stable, and people should know that they're likely
|
||||
to hit unexpected problems. Closes ticket 9147.
|
@ -1,5 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- Fix a bug in the voting algorithm that could yield incorrect results
|
||||
when a non-naming authority declared too many flags. Fixes bug 9200;
|
||||
bugfix on 0.2.0.3-alpha.
|
||||
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- Fix a spurious compilation warning with some older versions of
|
||||
GCC on FreeBSD. Fixes bug 9254; bugfix on 0.2.4.14-alpha.
|
||||
|
@ -1,4 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- Avoid a crash when using --hash-password. Fixes bug 9295; bugfix on
|
||||
0.2.4.15-rc. Found by stem integration tests.
|
||||
|
@ -1,4 +0,0 @@
|
||||
o Major bugfixes (DNS):
|
||||
- Avoid an assertion failure when processing DNS replies without the
|
||||
answer types we expected. Fixes bug 9337; bugfix on 0.2.4.7-alpha.
|
||||
|
@ -1,5 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- Make the default behavior of NumDirectoryGuards be to track
|
||||
NumEntryGuards. Now a user who changes only NumEntryGuards will get
|
||||
the behavior she expects. Fixes bug 9354; bugfix on 0.2.4.8-alpha.
|
||||
|
@ -1,4 +0,0 @@
|
||||
o Minor features (usability):
|
||||
- Warn and fail if a server is configured not to advertise any
|
||||
ORPorts at all. (We need *something* to put in our descriptor, or
|
||||
we just won't work.)
|
@ -1,7 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
|
||||
- Avoid double-closing the listener socket in our socketpair replacement
|
||||
(used on Windows) in the case where the addresses on our opened
|
||||
sockets don't match what we expected. Fixes bug 9400; bugfix on
|
||||
every released Tor version. Found by Coverity.
|
||||
|
@ -1,4 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- Avoid overflows when the user sets MaxCircuitDirtiness to a
|
||||
ridiculously high value, by imposing a (ridiculously high) 30-day
|
||||
maximum on MaxCircuitDirtiness.
|
@ -1,11 +0,0 @@
|
||||
o Major bugfixes:
|
||||
|
||||
- When a relay is extending a circuit to a bridge, it needs to send a
|
||||
NETINFO cell, even when the bridge hasn't sent an AUTH_CHALLENGE
|
||||
cell. Fixes bug 9546; bugfix on 0.2.3.6-alpha.
|
||||
|
||||
- Bridges send AUTH_CHALLENGE cells during their handshakes; previously
|
||||
they did not, which prevented relays from successfully connecting
|
||||
to a bridge for self-test or bandwidth testing. Fixes bug 9546;
|
||||
bugfix on 0.2.3.6-alpha.
|
||||
|
@ -1,5 +0,0 @@
|
||||
o Minor bugfixes:
|
||||
- If the time to download the next old-style networkstatus is in
|
||||
the future, do not decline to consider whether to download the
|
||||
next microdescriptor networkstatus. Fixes bug 9564. Bugfix on
|
||||
0.2.3.14-alpha.
|
@ -1,5 +0,0 @@
|
||||
o Major bugfixes:
|
||||
- If the circuit build timeout logic is disabled (via the consensus,
|
||||
or because we are an authority), then don't build testing circuits.
|
||||
Fixes bug 9657; bugfix on 0.2.2.14-alpha.
|
||||
|
@ -1,5 +0,0 @@
|
||||
o Normal bugfixes:
|
||||
- Always call circuit_n_chan_done(chan, 0) from channel_closed(), so we
|
||||
can't leak pending circuits in some cases where
|
||||
run_connection_housekeeping() calls connection_or_close_normally().
|
||||
Fixes bug #9776; bugfix on 0.2.4.17.
|
@ -1,3 +0,0 @@
|
||||
o Minor documentation fixes:
|
||||
- Fix the documentation of HeartbeatPeriod to say that the heartbeat
|
||||
message is logged at notice, not at info.
|
@ -1,7 +0,0 @@
|
||||
o Major features:
|
||||
- Relays now process the new "NTor" circuit-level handshake requests
|
||||
with higher priority than the old "TAP" circuit-level handshake
|
||||
requests. We still process some TAP requests to not totally starve
|
||||
0.2.3 clients when NTor becomes popular. A new consensus parameter
|
||||
"NumNTorsPerTAP" lets us tune the balance later if we need to.
|
||||
Implements ticket 9574.
|
@ -1,3 +0,0 @@
|
||||
o Minor features:
|
||||
- Update to the August 7 2013 Maxmind GeoLite Country database.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Minor features:
|
||||
- Update to the July 3 2013 Maxmind GeoLite Country database.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Minor features:
|
||||
- Update to the June 5 2013 Maxmind GeoLite Country database.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Minor features:
|
||||
- Update to the May 9 2013 Maxmind GeoLite Country database.
|
||||
|
@ -1,3 +0,0 @@
|
||||
o Minor features:
|
||||
- Update to the September 4 2013 Maxmind GeoLite Country database.
|
||||
|
@ -1,5 +0,0 @@
|
||||
o Code simplification and refactoring:
|
||||
- Avoid using character buffers when constructing most directory
|
||||
objects: this approach was unweildy and error-prone. Instead,
|
||||
build smartlists of strings, and concatenate them when done.
|
||||
|
@ -1,14 +0,0 @@
|
||||
o Minor features (security, timestamp avoidance, proposal 222):
|
||||
- Clients no longer send timestamps in their NETINFO cells. These were
|
||||
not used for anything, and they provided one small way for clients
|
||||
to be distinguished from each other as they moved from network to
|
||||
network or behind NAT. Implements part of proposal 222.
|
||||
- Clients now round timestamps in INTRODUCE cells down to the nearest
|
||||
10 minutes. If a new Support022HiddenServices option is set to 0,
|
||||
or if it's set to "auto" and the feature is disabled in the consensus,
|
||||
the timestamp is sent as 0 instead. Implements part of proposal 222.
|
||||
- Stop sending timestamps in AUTHENTICATE cells. This is not such
|
||||
a big deal from a security point of view, but it achieves no actual
|
||||
good purpose, and isn't needed. Implements part of proposal 222.
|
||||
- Reduce down accuracy of timestamps in hidden service descriptors.
|
||||
Implements part of proposal 222.
|
@ -1,4 +0,0 @@
|
||||
o Minor features:
|
||||
- Track how many "TAP" and "NTor" circuit handshake requests we get,
|
||||
and how many we complete, and log it every hour to help relay
|
||||
operators follow trends in network load. Addresses ticket 9658.
|
@ -1,8 +0,0 @@
|
||||
o Major bugfixes:
|
||||
|
||||
- Fix an uninitialized read that could (in some cases) lead to a remote
|
||||
crash while parsing INTRODUCE 1 cells. (This is, so far as we know,
|
||||
unrelated to the recent news.) Fixes bug XXX; bugfix on
|
||||
0.2.4.1-alpha. Anybody running a hidden service on the experimental
|
||||
0.2.4.x branch should upgrade.
|
||||
|
Loading…
Reference in New Issue
Block a user