diff options
author | Roger Dingledine <arma@torproject.org> | 2009-02-02 09:20:48 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2009-02-02 09:20:48 +0000 |
commit | 3040f3760eb5c1c445af5d6c81dc02a4f4620eb5 (patch) | |
tree | bc9303c4048a28f413d3142693926ba7b676694d | |
parent | c283368f60de1d93402199fd138c813fcbc8f843 (diff) | |
download | tor-3040f3760eb5c1c445af5d6c81dc02a4f4620eb5.tar.gz tor-3040f3760eb5c1c445af5d6c81dc02a4f4620eb5.zip |
mark r17887 as needing a backport:
some windowses let you exploit them if you can hand them the
argument to inet_addr().
svn:r18367
-rw-r--r-- | doc/TODO.020 | 10 |
1 files changed, 1 insertions, 9 deletions
diff --git a/doc/TODO.020 b/doc/TODO.020 index 808d36384f..684b98dd6e 100644 --- a/doc/TODO.020 +++ b/doc/TODO.020 @@ -3,21 +3,13 @@ description of the patch.) Backport for 0.2.0: - o r17891: Fix a fun OpenBSD warning. - o r17892: Fix another fun OpenBSD warning. - o r17920: bridge relays don't fetch descriptors much + - r17887: Don't accept 1.2.3 as a valid IP address. Backport for 0.2.0 once better tested: - Xo r16621: Make some DNS code more robust (partial; see also libevent - approach). (Also maybe r16674) - [Partially backported. Instead of the basic name checking, I backported - r17171 instead, to be even more resistant to poisoning.] - r17208,r17209,r7211,r17212,r17214: Avoid gotterdammerung when an authority has an expired certificate. - r17886: Don't remove routerinfos as unlisted unless we have a consensus. - - r17887: Don't accept 1.2.3 as a valid IP address. - o r17917, r17993: tors that haven't run lately take 10+ minutes to start - r17924: Close streams when an exit hands us a local IP. - r18210: Call crypto_global_init() with hardwareaccel flag set right in all cases. |