aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2019-01-23 09:48:28 -0500
committerNick Mathewson <nickm@torproject.org>2019-01-23 09:48:28 -0500
commitdd6c2b0ad77b5bfbf7f06b1d73f8ab85d81154bf (patch)
treec4e65fb63a72a0f7c50248a5738e8f3000497c98
parent89a0b77740f2a1179badcaa71d1e104cedb6ddde (diff)
downloadtor-dd6c2b0ad77b5bfbf7f06b1d73f8ab85d81154bf.tar.gz
tor-dd6c2b0ad77b5bfbf7f06b1d73f8ab85d81154bf.zip
maint-0.2.9: remove changes files that are merged in 0.2.9 releases
Many of these files cause check-changes to fail, which will be a long-term problem as we continue to support 0.2.9.
-rw-r--r--changes/199745
-rw-r--r--changes/204604
-rw-r--r--changes/204924
-rw-r--r--changes/213598
-rw-r--r--changes/bastet_v64
-rw-r--r--changes/bug155824
-rw-r--r--changes/bug181005
-rw-r--r--changes/bug18329-minimal6
-rw-r--r--changes/bug190254
-rw-r--r--changes/bug198694
-rw-r--r--changes/bug19926_029_info3
-rw-r--r--changes/bug199604
-rw-r--r--changes/bug1996811
-rw-r--r--changes/bug1996910
-rw-r--r--changes/bug200593
-rw-r--r--changes/bug200854
-rw-r--r--changes/bug202354
-rw-r--r--changes/bug202474
-rw-r--r--changes/bug20306_0294
-rw-r--r--changes/bug203077
-rw-r--r--changes/bug204014
-rw-r--r--changes/bug204236
-rw-r--r--changes/bug20424_029_minimal4
-rw-r--r--changes/bug204725
-rw-r--r--changes/bug204845
-rw-r--r--changes/bug204874
-rw-r--r--changes/bug205095
-rw-r--r--changes/bug205294
-rw-r--r--changes/bug205337
-rw-r--r--changes/bug205348
-rw-r--r--changes/bug205366
-rw-r--r--changes/bug205513
-rw-r--r--changes/bug205533
-rw-r--r--changes/bug205604
-rw-r--r--changes/bug205875
-rw-r--r--changes/bug205883
-rw-r--r--changes/bug205913
-rw-r--r--changes/bug205936
-rw-r--r--changes/bug205975
-rw-r--r--changes/bug206136
-rw-r--r--changes/bug206343
-rw-r--r--changes/bug206385
-rw-r--r--changes/bug20710_0254
-rw-r--r--changes/bug207154
-rw-r--r--changes/bug207163
-rw-r--r--changes/bug208104
-rw-r--r--changes/bug208644
-rw-r--r--changes/bug208754
-rw-r--r--changes/bug209353
-rw-r--r--changes/bug2101811
-rw-r--r--changes/bug210356
-rw-r--r--changes/bug210513
-rw-r--r--changes/bug21074_downgrade4
-rw-r--r--changes/bug21108_0296
-rw-r--r--changes/bug21278_extras3
-rw-r--r--changes/bug21278_prevention4
-rw-r--r--changes/bug212805
-rw-r--r--changes/bug213577
-rw-r--r--changes/bug213949
-rw-r--r--changes/bug214504
-rw-r--r--changes/bug215075
-rw-r--r--changes/bug215764
-rw-r--r--changes/bug219436
-rw-r--r--changes/bug220344
-rw-r--r--changes/bug222455
-rw-r--r--changes/bug223499
-rw-r--r--changes/bug223704
-rw-r--r--changes/bug224464
-rw-r--r--changes/bug22460_case28
-rw-r--r--changes/bug224903
-rw-r--r--changes/bug225165
-rw-r--r--changes/bug226368
-rw-r--r--changes/bug226445
-rw-r--r--changes/bug2273712
-rw-r--r--changes/bug227897
-rw-r--r--changes/bug227974
-rw-r--r--changes/bug228015
-rw-r--r--changes/bug22838_0285
-rw-r--r--changes/bug229153
-rw-r--r--changes/bug22916_0273
-rw-r--r--changes/bug23030_0297
-rw-r--r--changes/bug230818
-rw-r--r--changes/bug232913
-rw-r--r--changes/bug2331811
-rw-r--r--changes/bug234706
-rw-r--r--changes/bug236905
-rw-r--r--changes/bug236936
-rw-r--r--changes/bug238743
-rw-r--r--changes/bug239859
-rw-r--r--changes/bug241677
-rw-r--r--changes/bug241703
-rw-r--r--changes/bug241984
-rw-r--r--changes/bug243135
-rw-r--r--changes/bug244803
-rw-r--r--changes/bug246335
-rw-r--r--changes/bug246667
-rw-r--r--changes/bug247366
-rw-r--r--changes/bug248543
-rw-r--r--changes/bug248958
-rw-r--r--changes/bug24898-0296
-rw-r--r--changes/bug249525
-rw-r--r--changes/bug249693
-rw-r--r--changes/bug249787
-rw-r--r--changes/bug252234
-rw-r--r--changes/bug252493
-rw-r--r--changes/bug25249.23
-rw-r--r--changes/bug254405
-rw-r--r--changes/bug256293
-rw-r--r--changes/bug260075
-rw-r--r--changes/bug260725
-rw-r--r--changes/bug261167
-rw-r--r--changes/bug261964
-rw-r--r--changes/bug262695
-rw-r--r--changes/bug264854
-rw-r--r--changes/bug26535.0295
-rw-r--r--changes/bug267873
-rw-r--r--changes/bug268303
-rw-r--r--changes/bug269244
-rw-r--r--changes/bug270814
-rw-r--r--changes/bug270885
-rw-r--r--changes/bug271853
-rw-r--r--changes/bug272265
-rw-r--r--changes/bug272953
-rw-r--r--changes/bug273444
-rw-r--r--changes/bug274183
-rw-r--r--changes/bug274533
-rw-r--r--changes/bug274615
-rw-r--r--changes/bug274633
-rw-r--r--changes/bug274655
-rw-r--r--changes/bug8185_0256
-rw-r--r--changes/coveralls3
-rw-r--r--changes/feature253134
-rw-r--r--changes/feature26372_0294
-rw-r--r--changes/geoip-2017-11-064
-rw-r--r--changes/geoip-2017-12-064
-rw-r--r--changes/geoip-2018-01-054
-rw-r--r--changes/geoip-2018-02-074
-rw-r--r--changes/geoip-2018-03-084
-rw-r--r--changes/geoip-2018-04-034
-rw-r--r--changes/geoip-2018-05-014
-rw-r--r--changes/geoip-2018-06-074
-rw-r--r--changes/geoip-2018-07-034
-rw-r--r--changes/geoip-2018-08-074
-rw-r--r--changes/geoip-april20174
-rw-r--r--changes/geoip-august20174
-rw-r--r--changes/geoip-december20164
-rw-r--r--changes/geoip-february20174
-rw-r--r--changes/geoip-january20174
-rw-r--r--changes/geoip-july20174
-rw-r--r--changes/geoip-june20174
-rw-r--r--changes/geoip-march20174
-rw-r--r--changes/geoip-may20174
-rw-r--r--changes/geoip-november20164
-rw-r--r--changes/geoip-october20174
-rw-r--r--changes/geoip-september20174
-rw-r--r--changes/longclaw-ipv66
-rw-r--r--changes/longclaw_235923
-rw-r--r--changes/more_module_docs4
-rw-r--r--changes/prop275-minimal9
-rw-r--r--changes/task267714
-rw-r--r--changes/ticket197697
-rw-r--r--changes/ticket20170-v35
-rw-r--r--changes/ticket215646
-rw-r--r--changes/ticket219536
-rw-r--r--changes/ticket228953
-rw-r--r--changes/ticket238564
-rw-r--r--changes/ticket239103
-rw-r--r--changes/ticket243153
-rw-r--r--changes/ticket246293
-rw-r--r--changes/ticket246816
-rw-r--r--changes/ticket2490213
-rw-r--r--changes/ticket251224
-rw-r--r--changes/ticket251705
-rw-r--r--changes/ticket252024
-rw-r--r--changes/ticket260623
-rw-r--r--changes/ticket263433
-rw-r--r--changes/ticket264673
-rw-r--r--changes/ticket265603
-rw-r--r--changes/ticket26952-ccache3
-rw-r--r--changes/ticket270873
-rw-r--r--changes/ticket_248015
-rw-r--r--changes/travis_distcheck4
-rw-r--r--changes/trove-2017-0018
-rw-r--r--changes/trove-2017-001.28
-rw-r--r--changes/trove-2017-0057
-rw-r--r--changes/trove-2017-0085
-rw-r--r--changes/trove-2017-00910
-rw-r--r--changes/trove-2017-0106
-rw-r--r--changes/trove-2017-0118
-rw-r--r--changes/trove-2017-012-part16
-rw-r--r--changes/trove-2018-001.16
-rw-r--r--changes/trove-2018-0048
192 files changed, 0 insertions, 941 deletions
diff --git a/changes/19974 b/changes/19974
deleted file mode 100644
index 5496143ddf..0000000000
--- a/changes/19974
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (unit tests):
- - Fix tolerances in unit tests for monotonic time comparisons between
- nanoseconds and microseconds. Previously, we accepted a 10 us
- difference only, which is not realistic on every platform's
- clock_gettime(). Fixes bug 19974; bugfix on 0.2.9.1-alpha.
diff --git a/changes/20460 b/changes/20460
deleted file mode 100644
index 9fbb4a7986..0000000000
--- a/changes/20460
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (testing):
- - Use ECDHE ciphers instead of ECDH in tortls tests. LibreSSL has
- removed the ECDH ciphers which caused the tests to fail on
- platforms which use it. Fixes bug 20460; bugfix on 0.2.8.1-alpha.
diff --git a/changes/20492 b/changes/20492
deleted file mode 100644
index fdcd4d0b4b..0000000000
--- a/changes/20492
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfix (build):
- - The current Git revision when building from a local repository is now
- detected correctly when using git worktrees. Fixes bug 20492; bugfix on
- 0.2.3.9-alpha.
diff --git a/changes/21359 b/changes/21359
deleted file mode 100644
index cc9b377d52..0000000000
--- a/changes/21359
+++ /dev/null
@@ -1,8 +0,0 @@
-
- o Minor features (portability, compilationc)
- - Support building with recent LibreSSL code that uses opaque
- structures. Closes ticket 21359.
- - Autoconf now check to determine if OpenSSL
- structures are opaque, instead of explicitly checking for
- OpenSSL version numbers.
- Part of ticket 21359.
diff --git a/changes/bastet_v6 b/changes/bastet_v6
deleted file mode 100644
index ee4e2c8094..0000000000
--- a/changes/bastet_v6
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (directory authority):
- - Add an IPv6 address for the "bastet" directory authority.
- Closes ticket 24394.
-
diff --git a/changes/bug15582 b/changes/bug15582
deleted file mode 100644
index 5ea6431cf8..0000000000
--- a/changes/bug15582
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation):
- - Avoid compiler warnings in the unit tests for running tor_sscanf()
- with wide string outputs. Fixes bug 15582; bugfix on 0.2.6.2-alpha.
-
diff --git a/changes/bug18100 b/changes/bug18100
deleted file mode 100644
index cd3ba2c977..0000000000
--- a/changes/bug18100
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (linux TPROXY support):
- - Fix a typo that had prevented TPROXY-based transparent proxying from
- working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha.
- Patch from "d4fq0fQAgoJ".
-
diff --git a/changes/bug18329-minimal b/changes/bug18329-minimal
deleted file mode 100644
index 804c4e8dd1..0000000000
--- a/changes/bug18329-minimal
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (bridge):
- - Bridges now include notice in their descriptors that they are bridges,
- and notice of their distribution status, based on their publication
- settings. Implements ticket 18329. For more fine-grained control of
- how a bridge is distributed, upgrade to 0.3.2.x or later.
-
diff --git a/changes/bug19025 b/changes/bug19025
deleted file mode 100644
index 0f365f52ba..0000000000
--- a/changes/bug19025
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (DNS):
- - Fix a bug that prevented exit nodes from caching DNS records for more
- than 60 seconds.
- Fixes bug 19025; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug19869 b/changes/bug19869
deleted file mode 100644
index 430048f161..0000000000
--- a/changes/bug19869
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DNSPort):
- - On DNSPort, stop logging a BUG warning on a failed hostname lookup.
- Fixes bug 19869; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug19926_029_info b/changes/bug19926_029_info
deleted file mode 100644
index 93fd81b6cb..0000000000
--- a/changes/bug19926_029_info
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (logging):
- - Downgrade a harmless log message about the pending_entry_connections
- list from "warn" to "info". Mitigates bug 19926.
diff --git a/changes/bug19960 b/changes/bug19960
deleted file mode 100644
index 5d655859a6..0000000000
--- a/changes/bug19960
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (netbsd, unit tests):
- - Stop expecting NetBSD unit tests to report success for ipfw;
- on NetBSD, it's only pf that's supported.
- Part of a fix for bug 19960; bugfix on 0.2.9.5-alpha.
diff --git a/changes/bug19968 b/changes/bug19968
deleted file mode 100644
index b285706e70..0000000000
--- a/changes/bug19968
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes (relay):
- - Do not try to parallelize workers more than 16x without the
- user explicitly configuring us to do so, even if we do detect more than
- 16 CPU cores. Fixes bug 19968; bugfix on
- 0.2.3.1-alpha.
-
-
- o Minor bugfixes (testing):
- - Avoid a unit test failure on systems with over 16 detectable
- CPU cores. Fixes bug 19968; bugfix on
- 0.2.3.1-alpha.
diff --git a/changes/bug19969 b/changes/bug19969
deleted file mode 100644
index c760c6de03..0000000000
--- a/changes/bug19969
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes (client performance):
- - Clients now respond to new application stream requests when
- they arrive, rather than waiting up to one second before starting
- to handle them. Fixes part of bug 19969; bugfix on 0.2.8.1-alpha.
-
- o Major bugfixes (clients on flaky network connections):
- - When Tor leaves standby because of a new application request, open
- circuits as needed to serve that request. Previously, we would
- potentially wait a very long time. Fixes part of bug 19969; bugfix
- on 0.2.8.1-alpha.
diff --git a/changes/bug20059 b/changes/bug20059
deleted file mode 100644
index 091fab06d1..0000000000
--- a/changes/bug20059
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (relay):
- - Avoid a double-marked-circuit warning that can happen when we receive
- DESTROY cells under heavy load. Fixes bug 20059; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug20085 b/changes/bug20085
deleted file mode 100644
index fd10e7eeeb..0000000000
--- a/changes/bug20085
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Correct the minimum bandwidth value in torrc.sample, and queue a
- corresponding change for torrc.minimal. Closes ticket 20085.
-
diff --git a/changes/bug20235 b/changes/bug20235
deleted file mode 100644
index 54026a8943..0000000000
--- a/changes/bug20235
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compatibility):
- - Work around a bug in the OSX 10.12 SDK that would prevent us
- from successfully targetting earlier versions of OSX.
- Resolves ticket 20235.
diff --git a/changes/bug20247 b/changes/bug20247
deleted file mode 100644
index 731cf0046f..0000000000
--- a/changes/bug20247
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Avoid a sandbox failure when trying to re-bind to a socket and mark
- it as IPv6-only. Fixes bug 20247; bugfix on 0.2.5.1-alpha.
-
diff --git a/changes/bug20306_029 b/changes/bug20306_029
deleted file mode 100644
index ada2676b2b..0000000000
--- a/changes/bug20306_029
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (fascistfirewall):
- - Avoid spurious warnings when ReachableAddresses or FascistFirewall
- is set. Fixes bug 20306; bugfix on 0.2.8.2-alpha.
-
diff --git a/changes/bug20307 b/changes/bug20307
deleted file mode 100644
index 9112c9c78d..0000000000
--- a/changes/bug20307
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (circuit, hidden service)
- - When closing a circuit, the reason for doing so was assigned from an int
- value to a uint16_t which is quite a problem for negative values that are
- our internal reasons (ex: END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS
- side, this was causing introduction points to be flagged as unusable
- because the reason wasn't the right one due to the bad conversion.
- Partially fixes bug 21056 and fixes bug 20307; Bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20401 b/changes/bug20401
deleted file mode 100644
index 85ab3c7322..0000000000
--- a/changes/bug20401
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (relay):
- - Avoid a small memory leak when informing worker threads about rotated
- onion keys. Fixes bug 20401; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug20423 b/changes/bug20423
deleted file mode 100644
index 32bdc3f081..0000000000
--- a/changes/bug20423
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes:
- - For relays that don't know their own address, avoid attempting
- a local hostname resolve for each descriptor we download. Also cut
- down on the number of "Success: chose address 'x.x.x.x'" log lines.
- Fixes bugs 20423 and 20610; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20424_029_minimal b/changes/bug20424_029_minimal
deleted file mode 100644
index eb7886233e..0000000000
--- a/changes/bug20424_029_minimal
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation):
- - When compiling with --enable-openbsd-malloc or --enable-tcmalloc, tell
- the compiler not to include the system malloc implementation. Fixes bug
- 20424; bugfix on 0.2.0.20-rc.
diff --git a/changes/bug20472 b/changes/bug20472
deleted file mode 100644
index 4d90c39f5b..0000000000
--- a/changes/bug20472
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (circuits):
- - Remove a BUG warning in circuit_pick_extend_handshake. Instead, assume
- all nodes support EXTEND2. Use ntor whenever a key is available.
- Fixes bug 20472; bugfix on 0.2.9.3-alpha.
-
diff --git a/changes/bug20484 b/changes/bug20484
deleted file mode 100644
index 9a0b95cb39..0000000000
--- a/changes/bug20484
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (single onion services):
- - Start correctly when creating a single onion service in a
- directory that did not previously exist. Fixes bug 20484; bugfix on
- 0.2.9.3-alpha.
-
diff --git a/changes/bug20487 b/changes/bug20487
deleted file mode 100644
index 4435f14a95..0000000000
--- a/changes/bug20487
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Clarify that setting HiddenServiceNonAnonymousMode requires
- you to also set "SOCKSPort 0". Fixes bug 20487; bugfix on
- 0.2.9.3-alpha.
diff --git a/changes/bug20509 b/changes/bug20509
deleted file mode 100644
index a39ca9f60b..0000000000
--- a/changes/bug20509
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features:
- - Directory authorities now reject relays running versions
- 0.2.9.1-alpha through 0.2.9.4-alpha, because those relays
- suffer from bug 20499 and don't keep their consensus cache
- up-to-date. Resolves ticket 20509.
diff --git a/changes/bug20529 b/changes/bug20529
deleted file mode 100644
index 276be5b2b6..0000000000
--- a/changes/bug20529
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (hidden services):
- - When configuring hidden services, check every hidden service directory's
- permissions. Previously, we only checked the last hidden service.
- Fixes bug 20529; bugfix on 13942 commit 85bfad1 in 0.2.6.2-alpha.
diff --git a/changes/bug20533 b/changes/bug20533
deleted file mode 100644
index 7d1a456328..0000000000
--- a/changes/bug20533
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (consensus downloads):
- - If a consensus expires while we are waiting for certificates to download,
- stop waiting for certificates.
- - If we stop waiting for certificates less than a minute after we started
- downloading them, do not consider the certificate download failure a
- separate failure.
- Fixes bug 20533; bugfix on commit e0204f21 in 0.2.0.9-alpha.
diff --git a/changes/bug20534 b/changes/bug20534
deleted file mode 100644
index 49db433a01..0000000000
--- a/changes/bug20534
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (directory download scheduling):
- - Remove the maximum delay on exponential-backoff scheduling.
- Since we now allow an infinite number of failures (see ticket
- 20536), we must now allow the time to grow longer on each failure.
- Fixes part of bug 20534; bugfix on 0.2.9.1-alpha.
- - Use initial delays and decrements in download scheduling closer to
- those from 0.2.8. Fixes another part of bug 20534; bugfix on
- 0.2.9.1-alpha.
diff --git a/changes/bug20536 b/changes/bug20536
deleted file mode 100644
index 9e0dd164bb..0000000000
--- a/changes/bug20536
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (download scheduling):
- - When using an exponential backoff schedule, do not give up on
- dowloading just because we have failed a bunch of times. Since
- each delay is longer than the last, retrying indefinitely won't
- hurt. Fixes bug 20536; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug20551 b/changes/bug20551
deleted file mode 100644
index b7ec4ca7cc..0000000000
--- a/changes/bug20551
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix implicit conversion warnings under OpenSSL 1.1.
- Fixes bug 20551; bugfix on 0.2.1.1-alpha.
diff --git a/changes/bug20553 b/changes/bug20553
deleted file mode 100644
index 12a2780303..0000000000
--- a/changes/bug20553
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory leak):
- - Work around a memory leak in OpenSSL 1.1 when encoding public keys.
- Fixes bug 20553; bugfix on 0.0.2pre8.
diff --git a/changes/bug20560 b/changes/bug20560
deleted file mode 100644
index 43d605b296..0000000000
--- a/changes/bug20560
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (portability):
- - Run correctly when built on Windows build environments that require
- _vcsprintf(). Fixes bug 20560; bugfix on 0.2.2.11-alpha.
-
diff --git a/changes/bug20587 b/changes/bug20587
deleted file mode 100644
index 341b001363..0000000000
--- a/changes/bug20587
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (download timing):
- - When determining when to download a directory object, handle times
- after 2038 if the operating system supports that. (Someday this will be
- important!) Fixes bug 20587; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20588 b/changes/bug20588
deleted file mode 100644
index 832ef81336..0000000000
--- a/changes/bug20588
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (portability):
- - Fix compilation with OpenSSL 1.1 and less commonly-used
- CPU architectures. Closes ticket 20588.
diff --git a/changes/bug20591 b/changes/bug20591
deleted file mode 100644
index deaa738f5e..0000000000
--- a/changes/bug20591
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (relay bootstrap):
- - Ensure relays don't make multiple connections during bootstrap.
- Fixes bug 20591; bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20593 b/changes/bug20593
deleted file mode 100644
index e9f54d317a..0000000000
--- a/changes/bug20593
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (client directory scheduling):
- - Treat "relay too busy to answer request" as a failed request and a
- reason to back off on our retry frequency. This is safe now that
- exponential backups retry indefinitely, and avoids a bug where we would
- reset our download schedule erroneously.
- Fixes bug 20593; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug20597 b/changes/bug20597
deleted file mode 100644
index f199b63933..0000000000
--- a/changes/bug20597
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (test networks, exponential backoff):
- - When using exponential backoff in test networks, use a lower exponent,
- so the delays do not vary as much. This helps test networks bootstrap
- consistently. Fixes bug 20597; bugfix on 20499; not in any released
- version of tor.
diff --git a/changes/bug20613 b/changes/bug20613
deleted file mode 100644
index 19bb61f4e0..0000000000
--- a/changes/bug20613
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (single onion services, Tor2web):
- - Stop logging long-term one-hop circuits deliberately created by single
- onion services and Tor2web. These log messages are intended to diagnose
- issue 8387, which relates to circuits hanging around forever for no
- reason.
- Fixes bug 20613; bugfix on 0.2.9.1-alpha. Reported by "pastly".
diff --git a/changes/bug20634 b/changes/bug20634
deleted file mode 100644
index 62fc9f4787..0000000000
--- a/changes/bug20634
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (unit tests):
- - Stop spurious failures in the local interface address discovery unit
- tests. Fixes bug 20634; bugfix on 0.2.8.1-alpha; patch by Neel Chauhan.
diff --git a/changes/bug20638 b/changes/bug20638
deleted file mode 100644
index 260d7d0a75..0000000000
--- a/changes/bug20638
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (hidden services):
- - Stop ignoring hidden service key anonymity when first starting tor.
- Instead, refuse to start tor if any hidden service key has been used in
- a different hidden service anonymity mode.
- Fixes bug 20638; bugfix on 17178 in 0.2.9.3-alpha; reported by ahf.
diff --git a/changes/bug20710_025 b/changes/bug20710_025
deleted file mode 100644
index 12bd07536c..0000000000
--- a/changes/bug20710_025
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory leak, use-after-free, linux seccomp2 sandbox):
- - Fix a memory leak and use-after-free error when removing entries
- from the sandbox's getaddrinfo() cache. Fixes bug 20710; bugfix on
- 0.2.5.5-alpha. Patch from "cypherpunks".
diff --git a/changes/bug20715 b/changes/bug20715
deleted file mode 100644
index 737a560cec..0000000000
--- a/changes/bug20715
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory leak)
- - When moving a signed descriptor object from a source to an existing
- destination, free the allocated memory inside that destination object.
- Bugfix on tor-0.2.8.3-alpha; Closes #20715.
diff --git a/changes/bug20716 b/changes/bug20716
deleted file mode 100644
index 37fd6feecf..0000000000
--- a/changes/bug20716
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (client, memory leak):
- - Fix a small memory leak when receiving AF_UNIX connections on
- a SocksPort. Fixes bug 20716; bugfix on 0.2.6.3-alpha.
diff --git a/changes/bug20810 b/changes/bug20810
deleted file mode 100644
index 5420a73175..0000000000
--- a/changes/bug20810
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (relay)
- - When computing old Tor protocol line version in protover, we were
- looking at 0.2.7.5 twice instead of a specific case for 0.2.9.1-alpha.
- Bugfix on tor-0.2.9.4-alpha.
diff --git a/changes/bug20864 b/changes/bug20864
deleted file mode 100644
index 7b8c70fad6..0000000000
--- a/changes/bug20864
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (unit tests, hidden services):
- - Remove a double-free in the single onion service unit test. Stop
- ignoring a return value. Make future changes less error-prone.
- Fixes bug 20864; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug20875 b/changes/bug20875
deleted file mode 100644
index 6bba2cbc12..0000000000
--- a/changes/bug20875
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (download scheduling)
- - Resolve a "bug" warning when considering a download schedule whose
- delay had approached INT_MAX. Fixes 20875; bugfix on 0.2.9.5-alpha.
-
diff --git a/changes/bug20935 b/changes/bug20935
deleted file mode 100644
index 78068c7c06..0000000000
--- a/changes/bug20935
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (portability):
- - Use the correct spelling of MAC_OS_X_VERSION_10_12 on configure.ac
- Fixes bug 20935; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug21018 b/changes/bug21018
deleted file mode 100644
index 49a8b47a25..0000000000
--- a/changes/bug21018
+++ /dev/null
@@ -1,11 +0,0 @@
- o Major bugfixes (parsing, security):
-
- - Fix a bug in parsing that could cause clients to read a single
- byte past the end of an allocated region. This bug could be
- used to cause hardened clients (built with
- --enable-expensive-hardening) to crash if they tried to visit
- a hostile hidden service. Non-hardened clients are only
- affected depending on the details of their platform's memory
- allocator. Fixes bug 21018; bugfix on 0.2.0.8-alpha. Found by
- using libFuzzer. Also tracked as TROVE-2016-12-002 and as
- CVE-2016-1254.
diff --git a/changes/bug21035 b/changes/bug21035
deleted file mode 100644
index bbf3340787..0000000000
--- a/changes/bug21035
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (portability):
- - Avoid crashing when Tor is built using headers that contain
- CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
- without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix on
- 0.2.9.1-alpha.
-
diff --git a/changes/bug21051 b/changes/bug21051
deleted file mode 100644
index 8bb4f80c8e..0000000000
--- a/changes/bug21051
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix Libevent detection on platforms without Libevent 1 headers
- installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug21074_downgrade b/changes/bug21074_downgrade
deleted file mode 100644
index 1bc1f8523a..0000000000
--- a/changes/bug21074_downgrade
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (portability):
- - Don't exit the Tor process if setrlimit() fails to change the file
- limit (which can happen sometimes on some versions of OSX). Fixes
- bug 21074; bugfix on 0.0.9pre5.
diff --git a/changes/bug21108_029 b/changes/bug21108_029
deleted file mode 100644
index 3a3f004fc6..0000000000
--- a/changes/bug21108_029
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (directory authority):
- - During voting, when marking a node as a probable sybil, do not
- clear its BadExit flag: sybils can still be bad in other ways
- too. (We still clear the other flags.) Fixes bug 21108; bugfix
- on 0.2.0.13-alpha.
-
diff --git a/changes/bug21278_extras b/changes/bug21278_extras
deleted file mode 100644
index ffdf4a047b..0000000000
--- a/changes/bug21278_extras
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (code correctness):
- - Repair a couple of (unreachable or harmless) cases of the risky
- comparison-by-subtraction pattern that caused bug 21278.
diff --git a/changes/bug21278_prevention b/changes/bug21278_prevention
deleted file mode 100644
index e07f0a670c..0000000000
--- a/changes/bug21278_prevention
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (directory authority):
- - Directory authorities now reject descriptors that claim to be
- malformed versions of Tor. Helps prevent exploitation of bug 21278.
-
diff --git a/changes/bug21280 b/changes/bug21280
deleted file mode 100644
index e9f0bc174c..0000000000
--- a/changes/bug21280
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (tor-resolve):
- - The tor-resolve command line tool now rejects hostnames over 255
- characters in length. Previously, it would silently truncate
- them, which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
- Patch by "junglefowl".
diff --git a/changes/bug21357 b/changes/bug21357
deleted file mode 100644
index a1cb43a78a..0000000000
--- a/changes/bug21357
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (IPv6 Exits):
- - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects IPv6
- addresses. Instead, only reject a port over IPv6 if the exit policy
- rejects that port on more than an IPv6 /16 of addresses. This bug was
- made worse by 17027 in 0.2.8.1-alpha, which rejects a relay's own IPv6
- address by default.
- Fixes bug 21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.
diff --git a/changes/bug21394 b/changes/bug21394
deleted file mode 100644
index e5452e20ba..0000000000
--- a/changes/bug21394
+++ /dev/null
@@ -1,9 +0,0 @@
- o Major bugfixes (Exit nodes):
- - Fix an issue causing high-bandwidth exit nodes to fail a majority
- or all of their DNS requests, making them basically unsuitable for
- regular usage in Tor circuits. The problem is related to
- libevent's DNS handling, but we can work around it in Tor. Fixes
- bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced
- eventdns. Credit goes to Dhalgren for identifying and finding a
- workaround to this bug and to gamambel, arthuredelstein and
- arma in helping to track it down and analyze it.
diff --git a/changes/bug21450 b/changes/bug21450
deleted file mode 100644
index a1cf89ab41..0000000000
--- a/changes/bug21450
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (voting consistency):
- - Reject version numbers with components that exceed INT32_MAX.
- Otherwise 32-bit and 64-bit platforms would behave inconsistently.
- Fixes bug 21450; bugfix on 0.0.8pre1.
diff --git a/changes/bug21507 b/changes/bug21507
deleted file mode 100644
index f83e291b63..0000000000
--- a/changes/bug21507
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (voting consistency):
- - Reject version numbers with non-numeric prefixes (such as +, -, and
- whitespace). Disallowing whitespace prevents differential version
- parsing between POSIX-based and Windows platforms.
- Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1.
diff --git a/changes/bug21576 b/changes/bug21576
deleted file mode 100644
index 68d8471192..0000000000
--- a/changes/bug21576
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (crash, directory connections):
- - Fix a rare crash when sending a begin cell on a circuit whose linked
- directory connection has already been closed. Fixes bug 21576;
- bugfix on Tor 0.2.9.3-alpha. Reported by alecmuffett.
diff --git a/changes/bug21943 b/changes/bug21943
deleted file mode 100644
index dbe2c726d9..0000000000
--- a/changes/bug21943
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (Linux seccomp2 sandbox):
- - The getpid() system call is now permitted under the Linux seccomp2
- sandbox, to avoid crashing with versions of OpenSSL (and other
- libraries) that attempt to learn the process's PID by using the
- syscall rather than the VDSO code. Fixes bug 21943; bugfix on
- 0.2.5.1-alpha.
diff --git a/changes/bug22034 b/changes/bug22034
deleted file mode 100644
index 6d9e188740..0000000000
--- a/changes/bug22034
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (control port, regression):
- - The GETINFO extra-info/digest/<digest> command was broken because of a
- wrong base16 decode return value check. In was introduced in a refactor
- of that API. Fixex bug #22034; bugfix on tor-0.2.9.1-alpha.
diff --git a/changes/bug22245 b/changes/bug22245
deleted file mode 100644
index 6ae18593ea..0000000000
--- a/changes/bug22245
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (bandwidth accounting):
- - Roll over monthly accounting at the configured hour and minute,
- rather than always at 00:00.
- Fixes bug 22245; bugfix on 0.0.9rc1.
- Found by Andrey Karpov with PVS-Studio.
diff --git a/changes/bug22349 b/changes/bug22349
deleted file mode 100644
index bb43404bfe..0000000000
--- a/changes/bug22349
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes (directory authority):
- - When a directory authority rejects a descriptor or extrainfo with
- a given digest, mark that digest as undownloadable, so that we
- do not attempt to download it again over and over. We previously
- tried to avoid downloading such descriptors by other means, but
- we didn't notice if we accidentally downloaded one anyway. This
- behavior became problematic in 0.2.7.2-alpha, when authorities
- began pinning Ed25519 keys. Fixes ticket
- 22349; bugfix on 0.2.1.19-alpha.
diff --git a/changes/bug22370 b/changes/bug22370
deleted file mode 100644
index e0e87e3339..0000000000
--- a/changes/bug22370
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory handling):
- - When directory authorities reject a router descriptor due to keypinning,
- free the router descriptor rather than leaking the memory.
- Fixes bug 22370; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug22446 b/changes/bug22446
deleted file mode 100644
index eab65aac00..0000000000
--- a/changes/bug22446
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (code style, backport from 0.3.1.3-alpha):
- - Add "Falls through" comments to our codebase, in order to silence
- GCC 7's -Wimplicit-fallthrough warnings. Patch from Andreas
- Stieger. Closes ticket 22446.
diff --git a/changes/bug22460_case2 b/changes/bug22460_case2
deleted file mode 100644
index 0a11759832..0000000000
--- a/changes/bug22460_case2
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (relay, link handshake):
-
- - When performing the v3 link handshake on a TLS connection, report that
- we have the x509 certificate that we actually used on that connection,
- even if we have changed certificates since that connection was first
- opened. Previously, we would claim to have used our most recent x509
- link certificate, which would sometimes make the link handshake fail.
- Fixes one case of bug 22460; bugfix on 0.2.3.6-alpha.
diff --git a/changes/bug22490 b/changes/bug22490
deleted file mode 100644
index 244dd50b36..0000000000
--- a/changes/bug22490
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (correctness):
- - Avoid undefined behavior when parsing IPv6 entries from the geoip6
- file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
diff --git a/changes/bug22516 b/changes/bug22516
deleted file mode 100644
index f024a3c470..0000000000
--- a/changes/bug22516
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Permit the fchmod system call, to avoid crashing on startup when
- starting with the seccomp2 sandbox and an unexpected set of permissions
- on the data directory or its contents. Fixes bug 22516; bugfix on
- 0.2.5.4-alpha.
diff --git a/changes/bug22636 b/changes/bug22636
deleted file mode 100644
index 770cac72e9..0000000000
--- a/changes/bug22636
+++ /dev/null
@@ -1,8 +0,0 @@
- o Build features:
- - Tor's repository now includes a Travis Continuous Integration (CI)
- configuration file (.travis.yml). This is meant to help new developers and
- contributors who fork Tor to a Github repository be better able to test
- their changes, and understand what we expect to pass. To use this new build
- feature, you must fork Tor to your Github account, then go into the
- "Integrations" menu in the repository settings for your fork and enable
- Travis, then push your changes.
diff --git a/changes/bug22644 b/changes/bug22644
deleted file mode 100644
index 9b8742edaf..0000000000
--- a/changes/bug22644
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (controller):
- - Do not crash when receiving a POSTDESCRIPTOR command with an
- empty body. Fixes part of bug 22644; bugfix on 0.2.0.1-alpha.
- - Do not crash when receiving a HSPOST command with an empty body.
- Fixes part of bug 22644; bugfix on 0.2.7.1-alpha.
diff --git a/changes/bug22737 b/changes/bug22737
deleted file mode 100644
index f0de8e6c41..0000000000
--- a/changes/bug22737
+++ /dev/null
@@ -1,12 +0,0 @@
- o Minor bugfixes (defensive programming, undefined behavior):
-
- - Fix a memset() off the end of an array when packing cells. This
- bug should be harmless in practice, since the corrupted bytes
- are still in the same structure, and are always padding bytes,
- ignored, or immediately overwritten, depending on compiler
- behavior. Nevertheless, because the memset()'s purpose is to
- make sure that any other cell-handling bugs can't expose bytes
- to the network, we need to fix it. Fixes bug 22737; bugfix on
- 0.2.4.11-alpha. Fixes CID 1401591.
-
-
diff --git a/changes/bug22789 b/changes/bug22789
deleted file mode 100644
index a653592848..0000000000
--- a/changes/bug22789
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (openbsd, denial-of-service):
- - Avoid an assertion failure bug affecting our implementation of
- inet_pton(AF_INET6) on certain OpenBSD systems whose strtol()
- handling of "0xfoo" differs from what we had expected.
- Fixes bug 22789; bugfix on 0.2.3.8-alpha. Also tracked as
- TROVE-2017-007.
-
diff --git a/changes/bug22797 b/changes/bug22797
deleted file mode 100644
index 619baaa409..0000000000
--- a/changes/bug22797
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (file limits):
- - When setting the maximum number of connections allowed by the OS,
- always allow some extra file descriptors for other files.
- Fixes bug 22797; bugfix on 0.2.0.10-alpha.
diff --git a/changes/bug22801 b/changes/bug22801
deleted file mode 100644
index 7edc79bc84..0000000000
--- a/changes/bug22801
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - When building with certain versions the mingw C header files, avoid
- float-conversion warnings when calling the C functions isfinite(),
- isnan(), and signbit(). Fixes bug 22801; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug22838_028 b/changes/bug22838_028
deleted file mode 100644
index 1d0a4fbfd1..0000000000
--- a/changes/bug22838_028
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation, mingw, backport from 0.3.1.1-alpha):
- - Backport a fix for an "unused variable" warning that appeared
- in some versions of mingw. Fixes bug 22838; bugfix on
- 0.2.8.1-alpha.
-
diff --git a/changes/bug22915 b/changes/bug22915
deleted file mode 100644
index 17a9c6018f..0000000000
--- a/changes/bug22915
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation warnings):
- - Suppress -Wdouble-promotion warnings with clang 4.0. Fixes bug 22915;
- bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug22916_027 b/changes/bug22916_027
deleted file mode 100644
index 5cf99c7d15..0000000000
--- a/changes/bug22916_027
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Compilation):
- - Fix warnings when building with libscrypt and openssl scrypt support
- on Clang. Fixes bug 22916; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug23030_029 b/changes/bug23030_029
deleted file mode 100644
index 89a1b507d7..0000000000
--- a/changes/bug23030_029
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (coverity builds):
- - Avoid Coverity build warnings related to our BUG() macro. By
- default, Coverity treats BUG() as the Linux kernel does: an
- instant abort(). We need to override that so our BUG() macro
- doesn't prevent Coverity from analyzing functions that use it.
- Fixes bug 23030; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug23081 b/changes/bug23081
deleted file mode 100644
index 76c4e30971..0000000000
--- a/changes/bug23081
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (Windows service):
- - When running as a Windows service, set the ID of the main thread
- correctly. Failure to do so made us fail to send log messages
- to the controller in 0.2.1.16-rc, slowed down controller
- event delivery in 0.2.7.3-rc and later, and crash with an assertion
- failure in 0.3.1.1-alpha. Fixes bug 23081; bugfix on 0.2.1.6-alpha.
- Patch and diagnosis from "Vort".
-
diff --git a/changes/bug23291 b/changes/bug23291
deleted file mode 100644
index a5b0efda0a..0000000000
--- a/changes/bug23291
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing):
- - Fix an undersized buffer in test-memwipe.c. Fixes bug 23291; bugfix on
- 0.2.7.2-alpha. Found and patched by Ties Stuij.
diff --git a/changes/bug23318 b/changes/bug23318
deleted file mode 100644
index 7fcb8d4487..0000000000
--- a/changes/bug23318
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes (path selection):
- - When selecting relays by bandwidth, avoid a rounding error that
- could sometimes cause load to be imbalanced incorrectly. Previously,
- we would always round upwards; now, we round towards the nearest
- integer. This had the biggest effect when a relay's weight adjustments
- should have given it weight 0, but it got weight 1 instead.
- Fixes bug 23318; bugfix on 0.2.4.3-alpha.
- - When calculating the fraction of nodes that have descriptors, and all
- all nodes in the network have zero bandwidths, count the number of nodes
- instead.
- Fixes bug 23318; bugfix on 0.2.4.10-alpha.
diff --git a/changes/bug23470 b/changes/bug23470
deleted file mode 100644
index 33367b3a30..0000000000
--- a/changes/bug23470
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfix (relay address resolution):
- - Avoid unnecessary calls to directory_fetches_from_authorities()
- on relays. This avoids spurious address resolutions and
- descriptor rebuilds. This is a mitigation for 21789. The original
- bug was introduced in commit 35bbf2e as part of prop210.
- Fixes 23470 in 0.2.8.1-alpha.
diff --git a/changes/bug23690 b/changes/bug23690
deleted file mode 100644
index 36ff32e499..0000000000
--- a/changes/bug23690
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (relay, crash, assertion failure):
- - Fix a timing-based assertion failure that could occur when the
- circuit out-of-memory handler freed a connection's output buffer.
- Fixes bug 23690; bugfix on 0.2.6.1-alpha.
-
diff --git a/changes/bug23693 b/changes/bug23693
deleted file mode 100644
index 796398be51..0000000000
--- a/changes/bug23693
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay, crash):
- - Avoid a crash when transitioning from client mode to bridge mode.
- Previously, we would launch the worker threads whenever our "public
- server" mode changed, but not when our "server" mode changed.
- Fixes bug 23693; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug23874 b/changes/bug23874
deleted file mode 100644
index bf6620553d..0000000000
--- a/changes/bug23874
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory safety):
- - Clear the address when node_get_prim_orport() returns early.
- Fixes bug 23874; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug23985 b/changes/bug23985
deleted file mode 100644
index 9cb5937962..0000000000
--- a/changes/bug23985
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes (bootstrapping):
- - Fetch descriptors aggressively whenever we lack enough
- to build circuits, regardless of how many descriptors we are missing.
- Previously, we would delay launching the fetch when we had fewer than
- 15 missing descriptors, even if some of those descriptors were
- blocking circuits from building. Fixes bug 23985; bugfix on
- 0.1.1.11-alpha. The effects of this bug became worse in 0.3.0.3-alpha,
- when we began treating missing descriptors from our primary guards
- as a reason to delay circuits.
diff --git a/changes/bug24167 b/changes/bug24167
deleted file mode 100644
index fd0d87efff..0000000000
--- a/changes/bug24167
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (network layer):
- - When closing a connection via close_connection_immediately(), we
- mark it as "not blocked on bandwidth", to prevent later calls
- from trying to unblock it, and give it permission to read. This
- fixes a backtrace warning that can happen on relays under various
- circumstances. Fixes bug 24167; bugfix on 0.1.0.1-rc.
-
diff --git a/changes/bug24170 b/changes/bug24170
deleted file mode 100644
index d3d7347693..0000000000
--- a/changes/bug24170
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (path selection):
- - Actually log the total bandwidth in compute_weighted_bandwidths().
- Fixes bug 24170; bugfix on 0.2.4.3-alpha.
diff --git a/changes/bug24198 b/changes/bug24198
deleted file mode 100644
index 6790706872..0000000000
--- a/changes/bug24198
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (controller, linux seccomp2 sandbox):
- - Avoid a crash when attempting to use the seccomp2 sandbox
- together with the OwningControllerProcess feature.
- Fixes bug 24198; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24313 b/changes/bug24313
deleted file mode 100644
index b927ec3ba6..0000000000
--- a/changes/bug24313
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (security, hidden service v2):
- - Fix a use-after-free error that could crash v2 Tor hidden services
- when it failed to open circuits while expiring introductions
- points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This
- issue is also tracked as TROVE-2017-013 and CVE-2017-8823.
diff --git a/changes/bug24480 b/changes/bug24480
deleted file mode 100644
index 94e5b91a0c..0000000000
--- a/changes/bug24480
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix a signed/unsigned comparison warning introduced by our
- fix to TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
diff --git a/changes/bug24633 b/changes/bug24633
deleted file mode 100644
index 028c7cc143..0000000000
--- a/changes/bug24633
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (portability, msvc):
- - Fix a bug in the bit-counting parts of our timing-wheel code on
- MSVC. (Note that MSVC is still not a supported build platform,
- due to cyptographic timing channel risks.) Fixes bug 24633;
- bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug24666 b/changes/bug24666
deleted file mode 100644
index 830775f5f6..0000000000
--- a/changes/bug24666
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (memory usage):
-
- - When queuing DESTROY cells on a channel, only queue the
- circuit-id and reason fields: not the entire 514-byte
- cell. This fix should help mitigate any bugs or attacks that
- fill up these queues, and free more RAM for other uses. Fixes
- bug 24666; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24736 b/changes/bug24736
deleted file mode 100644
index 632560932a..0000000000
--- a/changes/bug24736
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (address selection):
- - When the fascist_firewall_choose_address_ functions don't find a
- reachable address, set the returned address to the null address and port.
- This is a precautionary measure, because some callers do not check the
- return value.
- Fixes bug 24736; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug24854 b/changes/bug24854
deleted file mode 100644
index 64e10772e0..0000000000
--- a/changes/bug24854
+++ /dev/null
@@ -1,3 +0,0 @@
- o Code simplification and refactoring:
- - Move the list of default directory authorities to their own file for
- inclusion using the C preprocessor. Closes ticket 24854. Patch by "beastr0".
diff --git a/changes/bug24895 b/changes/bug24895
deleted file mode 100644
index 7edde94a0b..0000000000
--- a/changes/bug24895
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (onion services):
- - Fix an "off by 2" error in counting rendezvous failures on the onion
- service side. While we thought we would stop the rendezvous attempt
- after one failed circuit, we were actually making three circuit attempts
- before giving up. Now switch to a default of 2, and allow the consensus
- parameter "hs_service_max_rdv_failures" to override. Fixes bug 24895;
- bugfix on 0.0.6.
-
diff --git a/changes/bug24898-029 b/changes/bug24898-029
deleted file mode 100644
index b33f093841..0000000000
--- a/changes/bug24898-029
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay):
- - Make the internal channel_is_client() function look at what sort
- of connection handshake the other side used, rather than whether
- the other side ever sent a create_fast cell to us. Backports part
- of the fixes from bugs 22805 and 24898.
-
diff --git a/changes/bug24952 b/changes/bug24952
deleted file mode 100644
index 93174c04f5..0000000000
--- a/changes/bug24952
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfix (channel connection):
- - The accurate address of a connection is real_addr, not the addr member.
- TLS Channel remote address is now real_addr content instead of addr
- member. Fixes bug 24952; bugfix on 707c1e2e26 in 0.2.4.11-alpha.
- Patch by "ffmancera".
diff --git a/changes/bug24969 b/changes/bug24969
deleted file mode 100644
index 46b2bae6f4..0000000000
--- a/changes/bug24969
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Linux seccomp2 sandbox):
- - Allow the nanosleep() system call, which glibc uses to implement
- sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24978 b/changes/bug24978
deleted file mode 100644
index 5dc45c7442..0000000000
--- a/changes/bug24978
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features (compatibility, OpenSSL):
- - Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
- Previous versions of Tor would not have worked with OpenSSL
- 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the
- ciphersuites it requires. Here we enable the TLS 1.3 ciphersuites.
- Closes ticket 24978.
-
diff --git a/changes/bug25223 b/changes/bug25223
deleted file mode 100644
index fdd5563500..0000000000
--- a/changes/bug25223
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Make sure we don't modify consensus parameters if we aren't a public
- relay when a new consensus arrives. Fixes bug 25223; bugfix on
- 0.3.3.2-alpha.
diff --git a/changes/bug25249 b/changes/bug25249
deleted file mode 100644
index b4153eeaef..0000000000
--- a/changes/bug25249
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (spec conformance):
- - Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
- 0.2.9.4-alpha.
diff --git a/changes/bug25249.2 b/changes/bug25249.2
deleted file mode 100644
index 9058c11071..0000000000
--- a/changes/bug25249.2
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (spec conformance):
- - Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
- bugfix on 0.2.9.4-alpha.
diff --git a/changes/bug25440 b/changes/bug25440
deleted file mode 100644
index f8d9dd4fab..0000000000
--- a/changes/bug25440
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Fix a bug in out sandboxing rules for the openat() syscall.
- Previously, no openat() call would be permitted, which would break
- filesystem operations on recent glibc versions. Fixes bug 25440;
- bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
diff --git a/changes/bug25629 b/changes/bug25629
deleted file mode 100644
index 190928a941..0000000000
--- a/changes/bug25629
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (C correctness):
- - Fix a very unlikely null pointer dereference. Fixes bug 25629;
- bugfix on 0.2.9.15. Found by Coverity; this is CID 1430932.
diff --git a/changes/bug26007 b/changes/bug26007
deleted file mode 100644
index efcd15084d..0000000000
--- a/changes/bug26007
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (directory authorities, security):
- - When directory authorities read a zero-byte bandwidth file, they log
- a warning with the contents of an uninitialised buffer. Log a warning
- about the empty file instead.
- Fixes bug 26007; bugfix on 0.2.2.1-alpha.
diff --git a/changes/bug26072 b/changes/bug26072
deleted file mode 100644
index 2489e4fbb5..0000000000
--- a/changes/bug26072
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (correctness, client):
- - Upon receiving a malformed connected cell, stop processing the cell
- immediately. Previously we would mark the connection for close, but
- continue processing the cell as if the connection were open. Fixes bug
- 26072; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug26116 b/changes/bug26116
deleted file mode 100644
index 3bfde74f77..0000000000
--- a/changes/bug26116
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (compatibility, openssl):
- - Work around a change in OpenSSL 1.1.1 where
- return values that would previously indicate "no password" now
- indicate an empty password. Without this workaround, Tor instances
- running with OpenSSL 1.1.1 would accept descriptors that other Tor
- instances would reject. Fixes bug 26116; bugfix on 0.2.5.16.
-
diff --git a/changes/bug26196 b/changes/bug26196
deleted file mode 100644
index 47fcffa0f8..0000000000
--- a/changes/bug26196
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (hardening):
- - Prevent a possible out-of-bounds smartlist read in
- protover_compute_vote(). Fixes bug 26196; bugfix on
- 0.2.9.4-alpha.
diff --git a/changes/bug26269 b/changes/bug26269
deleted file mode 100644
index 73dcdbf5c5..0000000000
--- a/changes/bug26269
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix a compilation warning on some versions of GCC when
- building code that calls routerinfo_get_my_routerinfo() twice,
- assuming that the second call will succeed if the first one did.
- Fixes bug 26269; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug26485 b/changes/bug26485
deleted file mode 100644
index 5a40b7a78e..0000000000
--- a/changes/bug26485
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (directory authority):
- - When voting for recommended versions, make sure that all of the
- versions are well-formed and parsable. Fixes bug 26485; bugfix on
- 0.1.1.6-alpha.
diff --git a/changes/bug26535.029 b/changes/bug26535.029
deleted file mode 100644
index 111b539f17..0000000000
--- a/changes/bug26535.029
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (testing, compatibility):
- - When running the ntor_ref.py test, make sure only to pass strings
- (rather than "bytes" objects) to the Python subprocess module.
- Python 3 on Windows seems to require this. Fixes bug 26535; bugfix on
- 0.2.5.5-alpha.
diff --git a/changes/bug26787 b/changes/bug26787
deleted file mode 100644
index b32e519a93..0000000000
--- a/changes/bug26787
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing):
- - Disable core dumps in test_bt.sh, to avoid failures in "make
- distcheck". Fixes bug 26787; bugfix on 0.2.5.2-alpha.
diff --git a/changes/bug26830 b/changes/bug26830
deleted file mode 100644
index c002f19530..0000000000
--- a/changes/bug26830
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - Skip an unreliable key generation test on Windows, until the underlying
- issue in bug 26076 is resolved. Fixes bug 26830; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug26924 b/changes/bug26924
deleted file mode 100644
index 882db56b40..0000000000
--- a/changes/bug26924
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (single onion services, Tor2web):
- - Log a protocol warning when single onion services or Tor2web clients
- fail to authenticate direct connections to relays.
- Fixes bug 26924; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug27081 b/changes/bug27081
deleted file mode 100644
index 74e0efbd29..0000000000
--- a/changes/bug27081
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation, windows):
- - Don't link or search for pthreads when building for Windows, even if we
- are using build environment (like mingw) that provides a pthreads
- library. Fixes bug 27081; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug27088 b/changes/bug27088
deleted file mode 100644
index d4d3b292c5..0000000000
--- a/changes/bug27088
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (continuous integration):
- - Pass the module flags to distcheck configure, and
- log the flags before running configure. (Backported
- to 0.2.9 and later as a precaution.)
- Fixes bug 27088; bugfix on 0.3.4.1-alpha.
diff --git a/changes/bug27185 b/changes/bug27185
deleted file mode 100644
index 79221b3df4..0000000000
--- a/changes/bug27185
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Windows, compilation):
- - Silence a compilation warning on MSVC 2017 and clang-cl.
- Fixes bug 27185; bugfix on 0.2.2.2-alpha.
diff --git a/changes/bug27226 b/changes/bug27226
deleted file mode 100644
index 9030773cd5..0000000000
--- a/changes/bug27226
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (testing, openssl compatibility):
- - Our "tortls/cert_matches_key" unit test no longer relies on OpenSSL
- internals. Previously, it relied on unsupported OpenSSL behavior in
- a way that caused it to crash with OpenSSL 1.0.2p. Fixes bug 27226;
- bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug27295 b/changes/bug27295
deleted file mode 100644
index c5a364877a..0000000000
--- a/changes/bug27295
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing, chutney):
- - Before running make test-network-all, delete old logs and test result
- files, to avoid spurious failures. Fixes bug 27295; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug27344 b/changes/bug27344
deleted file mode 100644
index 9f66855586..0000000000
--- a/changes/bug27344
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compatibility):
- - Tell OpenSSL to maintain backward compatibility with previous
- RSA1024/DH1024 users in Tor. With OpenSSL 1.1.1-pre6, these ciphers
- are disabled by default. Closes ticket 27344.
diff --git a/changes/bug27418 b/changes/bug27418
deleted file mode 100644
index 1d99497dc4..0000000000
--- a/changes/bug27418
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - When we use echo in Travis, don't pass a --flag as the first argument.
- Fixes bug 27418; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27453 b/changes/bug27453
deleted file mode 100644
index 4501346d2c..0000000000
--- a/changes/bug27453
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - When a Travis build fails, and showing a log fails, keep trying to
- show the other logs. Fixes bug 27453; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27461 b/changes/bug27461
deleted file mode 100644
index 3571ee816a..0000000000
--- a/changes/bug27461
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Stop calling SetProcessDEPPolicy() on 64-bit Windows. It is not
- supported, and always fails. Some compilers warn about the function
- pointer cast on 64-bit Windows.
- Fixes bug 27461; bugfix on 0.2.2.23-alpha.
diff --git a/changes/bug27463 b/changes/bug27463
deleted file mode 100644
index 073acdd997..0000000000
--- a/changes/bug27463
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (onion services):
- - Silence a spurious compiler warning in rend_client_send_introduction().
- Fixes bug 27463; bugfix on 0.1.1.2-alpha.
diff --git a/changes/bug27465 b/changes/bug27465
deleted file mode 100644
index 743b35130f..0000000000
--- a/changes/bug27465
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Silence a spurious compiler warning on the GetAdaptersAddresses
- function pointer cast. This issue is already fixed by 26481 in
- 0.3.5 and later, by removing the lookup and cast.
- Fixes bug 27465; bugfix on 0.2.3.11-alpha.
diff --git a/changes/bug8185_025 b/changes/bug8185_025
deleted file mode 100644
index 1bfc12b1e4..0000000000
--- a/changes/bug8185_025
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (logging, relay shutdown, annoyance):
- - When a circuit is marked for close, do not attempt to package any cells
- for channels on that circuit. Previously, we would detect this
- condition lower in the call stack, when we noticed that the circuit had
- no attached channel, and log an annoying message. Fixes bug 8185;
- bugfix on 0.2.5.4-alpha.
diff --git a/changes/coveralls b/changes/coveralls
deleted file mode 100644
index 7fa69bb2b4..0000000000
--- a/changes/coveralls
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Our Travis CI configuration now integrates with the Coveralls coverage
- analysis tool. Closes ticket 25818.
diff --git a/changes/feature25313 b/changes/feature25313
deleted file mode 100644
index 90f421169f..0000000000
--- a/changes/feature25313
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (sandbox):
- - Explicitly permit the poll() system call when the Linux seccomp2-based
- sandbox is enabled: apparently, some versions of libc use poll() when
- calling getpwnam(). Closes ticket 25313.
diff --git a/changes/feature26372_029 b/changes/feature26372_029
deleted file mode 100644
index 150ac30555..0000000000
--- a/changes/feature26372_029
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compilation):
-
- - When building Tor, prefer to use Python 3 over Python 2, and more
- recent (contemplated) versions over older ones. Closes ticket 26372.
diff --git a/changes/geoip-2017-11-06 b/changes/geoip-2017-11-06
deleted file mode 100644
index f034be9006..0000000000
--- a/changes/geoip-2017-11-06
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2017-12-06 b/changes/geoip-2017-12-06
deleted file mode 100644
index ae4fb1149f..0000000000
--- a/changes/geoip-2017-12-06
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the December 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-01-05 b/changes/geoip-2018-01-05
deleted file mode 100644
index 59aba02d09..0000000000
--- a/changes/geoip-2018-01-05
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the January 5 2018 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-02-07 b/changes/geoip-2018-02-07
deleted file mode 100644
index f45228fd76..0000000000
--- a/changes/geoip-2018-02-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-03-08 b/changes/geoip-2018-03-08
deleted file mode 100644
index d9696aab53..0000000000
--- a/changes/geoip-2018-03-08
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2
- Country database. Closes ticket 25469.
-
diff --git a/changes/geoip-2018-04-03 b/changes/geoip-2018-04-03
deleted file mode 100644
index 987cc450bf..0000000000
--- a/changes/geoip-2018-04-03
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 25718.
-
diff --git a/changes/geoip-2018-05-01 b/changes/geoip-2018-05-01
deleted file mode 100644
index 1528bb0c31..0000000000
--- a/changes/geoip-2018-05-01
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2
- Country database. Closes ticket 26104.
-
diff --git a/changes/geoip-2018-06-07 b/changes/geoip-2018-06-07
deleted file mode 100644
index 0f8cff97af..0000000000
--- a/changes/geoip-2018-06-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the June 7 2018 Maxmind GeoLite2
- Country database. Closes ticket 26351.
-
diff --git a/changes/geoip-2018-07-03 b/changes/geoip-2018-07-03
deleted file mode 100644
index e921d63c99..0000000000
--- a/changes/geoip-2018-07-03
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 26674.
-
diff --git a/changes/geoip-2018-08-07 b/changes/geoip-2018-08-07
deleted file mode 100644
index 9ddbe7b1b2..0000000000
--- a/changes/geoip-2018-08-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the August 7 2018 Maxmind GeoLite2
- Country database. Closes ticket 27089.
-
diff --git a/changes/geoip-april2017 b/changes/geoip-april2017
deleted file mode 100644
index b489eaf016..0000000000
--- a/changes/geoip-april2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-august2017 b/changes/geoip-august2017
deleted file mode 100644
index 2dab18a63f..0000000000
--- a/changes/geoip-august2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the August 3 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-december2016 b/changes/geoip-december2016
deleted file mode 100644
index 60754ea21d..0000000000
--- a/changes/geoip-december2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the December 7 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-february2017 b/changes/geoip-february2017
deleted file mode 100644
index ec54b6122a..0000000000
--- a/changes/geoip-february2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-january2017 b/changes/geoip-january2017
deleted file mode 100644
index 77bc9a5991..0000000000
--- a/changes/geoip-january2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-july2017 b/changes/geoip-july2017
deleted file mode 100644
index ed10369f1b..0000000000
--- a/changes/geoip-july2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the July 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-june2017 b/changes/geoip-june2017
deleted file mode 100644
index 2ea7bf105e..0000000000
--- a/changes/geoip-june2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the June 8 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-march2017 b/changes/geoip-march2017
deleted file mode 100644
index 6dc92baa2f..0000000000
--- a/changes/geoip-march2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the March 7 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-may2017 b/changes/geoip-may2017
deleted file mode 100644
index 4e504d7a0a..0000000000
--- a/changes/geoip-may2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-november2016 b/changes/geoip-november2016
deleted file mode 100644
index b3f9913bb1..0000000000
--- a/changes/geoip-november2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (ge0oip):
- - Update geoip and geoip6 to the November 3 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-october2017 b/changes/geoip-october2017
deleted file mode 100644
index 11f623e85f..0000000000
--- a/changes/geoip-october2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-september2017 b/changes/geoip-september2017
deleted file mode 100644
index be01ff9521..0000000000
--- a/changes/geoip-september2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the September 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/longclaw-ipv6 b/changes/longclaw-ipv6
deleted file mode 100644
index 75899c9d07..0000000000
--- a/changes/longclaw-ipv6
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (directory authorities):
- - Remove longclaw's IPv6 address, as it will soon change.
- Authority IPv6 addresses were originally added in 0.2.8.1-alpha.
- This leaves 3/8 directory authorities with IPv6 addresses, but there
- are also 52 fallback directory mirrors with IPv6 addresses.
- Resolves 19760.
diff --git a/changes/longclaw_23592 b/changes/longclaw_23592
deleted file mode 100644
index 91e2da8972..0000000000
--- a/changes/longclaw_23592
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
- - The directory authority "Longclaw" has changed its IP address.
- Closes ticket 23592.
diff --git a/changes/more_module_docs b/changes/more_module_docs
deleted file mode 100644
index 0066ddfcf0..0000000000
--- a/changes/more_module_docs
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Module-level documentation for several more modules. Closes tickets
- 19287 and
- 19290.
diff --git a/changes/prop275-minimal b/changes/prop275-minimal
deleted file mode 100644
index 83d42f850b..0000000000
--- a/changes/prop275-minimal
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor features (future-proofing):
-
- - Tor no longer refuses to download microdescriptors or descriptors if
- they are listed as "published in the future". This change will
- eventually allow us to stop listing meaningful "published" dates
- in microdescriptor consensuses, and thereby allow us to reduce the
- resources required to download consensus diffs by over 50%.
- Implements part of ticket 21642; implements part of proposal 275.
-
diff --git a/changes/task26771 b/changes/task26771
deleted file mode 100644
index fd700900f7..0000000000
--- a/changes/task26771
+++ /dev/null
@@ -1,4 +0,0 @@
- o Directory authority changes:
- - The "Bifroest" bridge authority has been retired; the new bridge
- authority is "Serge", and it is operated by George from the
- TorBSD project. Closes ticket 26771.
diff --git a/changes/ticket19769 b/changes/ticket19769
deleted file mode 100644
index 9fc05c3e9e..0000000000
--- a/changes/ticket19769
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major features (security):
- - Change the algorithm used to decide DNS TTLs on client and server side,
- to better resist DNS-based correlation attacks like the DefecTor attack
- of Greschbach, Pulls, Roberts, Winter, and Feamster). Now
- relays only return one of two possible DNS TTL values, and clients
- are willing to believe DNS TTL values up to 3 hours long.
- Closes ticket 19769.
diff --git a/changes/ticket20170-v3 b/changes/ticket20170-v3
deleted file mode 100644
index d634e72053..0000000000
--- a/changes/ticket20170-v3
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features (fallback directory list):
- - Replace the 81 remaining fallbacks of the 100 originally introduced
- in Tor 0.2.8.3-alpha in March 2016, with a list of 177 fallbacks
- (123 new, 54 existing, 27 removed) generated in December 2016.
- Resolves ticket 20170.
diff --git a/changes/ticket21564 b/changes/ticket21564
deleted file mode 100644
index 7e01f41f8f..0000000000
--- a/changes/ticket21564
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (fallback directory list):
- - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in
- December 2016 (of which ~126 were still functional), with a list of
- 151 fallbacks (32 new, 119 existing, 58 removed) generated in
- May 2017.
- Resolves ticket 21564.
diff --git a/changes/ticket21953 b/changes/ticket21953
deleted file mode 100644
index 7cc84f506d..0000000000
--- a/changes/ticket21953
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features:
- - Enable a couple of pieces of Windows hardening: one
- (HeapEnableTerminationOnCorruption) that has been on-by-default since
- Windows 8, and unavailable before Windows 7, and one
- (PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION) which we believe doesn't
- affect us, but shouldn't do any harm. Closes ticket 21953.
diff --git a/changes/ticket22895 b/changes/ticket22895
deleted file mode 100644
index a3f7b86019..0000000000
--- a/changes/ticket22895
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix unused variable warnings in donna's Curve25519 SSE2 code.
- Fixes bug 22895; bugfix on 0.2.7.2-alpha.
diff --git a/changes/ticket23856 b/changes/ticket23856
deleted file mode 100644
index 049da18d06..0000000000
--- a/changes/ticket23856
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor feature (relay statistics):
- - Change relay bandwidth reporting stats interval from 4 hours to 24 hours
- in order to reduce the efficiency of guard discovery attacks. Fixes
- ticket 23856.
diff --git a/changes/ticket23910 b/changes/ticket23910
deleted file mode 100644
index eb38fcf32f..0000000000
--- a/changes/ticket23910
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
- - Add bastet as a ninth directory authority to the default list. Closes
- ticket 23910.
diff --git a/changes/ticket24315 b/changes/ticket24315
deleted file mode 100644
index df34dbf412..0000000000
--- a/changes/ticket24315
+++ /dev/null
@@ -1,3 +0,0 @@
- o Major features (linux seccomp2 sandbox):
- - Update the sandbox rules so that they should now work correctly with
- Glibc 2.26. Closes ticket 24315.
diff --git a/changes/ticket24629 b/changes/ticket24629
deleted file mode 100644
index 482c0a1a6d..0000000000
--- a/changes/ticket24629
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Enable macOS builds in our Travis CI configuration.
- Closes ticket 24629.
diff --git a/changes/ticket24681 b/changes/ticket24681
deleted file mode 100644
index cc0a42b2e0..0000000000
--- a/changes/ticket24681
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (fallback directory mirrors):
- - Make the default DirAuthorityFallbackRate 0.1, so that clients on the
- public tor network prefer to bootstrap off fallback directory mirrors.
- This is a follow-up to 24679, which removed weights from the default
- fallbacks.
- Implements ticket 24681.
diff --git a/changes/ticket24902 b/changes/ticket24902
deleted file mode 100644
index 1a2ef95cc9..0000000000
--- a/changes/ticket24902
+++ /dev/null
@@ -1,13 +0,0 @@
- o Major features (denial of service mitigation):
- - Give relays some defenses against the recent network overload. We start
- with three defenses (default parameters in parentheses). First: if a
- single client address makes too many concurrent connections (>100), hang
- up on further connections. Second: if a single client address makes
- circuits too quickly (more than 3 per second, with an allowed burst of
- 90) while also having too many connections open (3), refuse new create
- cells for the next while (1-2 hours). Third: if a client asks to
- establish a rendezvous point to you directly, ignore the request. These
- defenses can be manually controlled by new torrc options, but relays
- will also take guidance from consensus parameters, so there's no need to
- configure anything manually. Implements ticket 24902.
-
diff --git a/changes/ticket25122 b/changes/ticket25122
deleted file mode 100644
index 2921811b22..0000000000
--- a/changes/ticket25122
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor feature (geoip cache):
- - Make our OOM handler aware of the geoip client history cache so it
- doesn't fill up the memory which is especially important for IPv6 and
- our DoS mitigation subsystem. Closes ticket 25122.
diff --git a/changes/ticket25170 b/changes/ticket25170
deleted file mode 100644
index 0652139400..0000000000
--- a/changes/ticket25170
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfix (directory authority, documentation):
- - When a fingerprint or network address is marked as rejected, the
- returned message by the authority now explicitly mention to set a valid
- ContactInfo address and contact the bad-relays@ mailing list. Fixes bug
- 25170; bugfix on 0.2.9.1.
diff --git a/changes/ticket25202 b/changes/ticket25202
deleted file mode 100644
index ba64abad7b..0000000000
--- a/changes/ticket25202
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Add extra safety checks when refilling the circuit creation bucket to
- ensure we never set a value that is above the allowed burst. Fixes
- bug 25202; bugfix on 0.3.3.2-alpha.
diff --git a/changes/ticket26062 b/changes/ticket26062
deleted file mode 100644
index 1ee49d8608..0000000000
--- a/changes/ticket26062
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (client):
- - Don't consider Tor running as a client if the ControlPort is open. Fixes
- bug 26062; bugfix on 0.2.9.4-alpha.
diff --git a/changes/ticket26343 b/changes/ticket26343
deleted file mode 100644
index ab5f332ee6..0000000000
--- a/changes/ticket26343
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (directory authority):
- - Add an IPv6 address for the "dannenberg" directory
- authority. Closes ticket 26343.
diff --git a/changes/ticket26467 b/changes/ticket26467
deleted file mode 100644
index 45883786c2..0000000000
--- a/changes/ticket26467
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory, correctness):
- - Fix a number of small memory leaks identified by coverity. Fixes
- bug 26467; bugfix on numerous Tor versions.
diff --git a/changes/ticket26560 b/changes/ticket26560
deleted file mode 100644
index 5b4fb1bfe7..0000000000
--- a/changes/ticket26560
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Install libcap-dev and libseccomp2-dev so these optional
- dependencies get tested on Travis CI. Closes ticket 26560.
diff --git a/changes/ticket26952-ccache b/changes/ticket26952-ccache
deleted file mode 100644
index edc115e9de..0000000000
--- a/changes/ticket26952-ccache
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Use ccache in our Travis CI configuration.
- Closes ticket 26952.
diff --git a/changes/ticket27087 b/changes/ticket27087
deleted file mode 100644
index b8af70aaa0..0000000000
--- a/changes/ticket27087
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Run asciidoc during Travis CI.
- Implements ticket 27087.
diff --git a/changes/ticket_24801 b/changes/ticket_24801
deleted file mode 100644
index f5f6c831af..0000000000
--- a/changes/ticket_24801
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features (new fallback directories):
- - The fallback directory list has been re-generated based on the
- current status of the network. Tor uses fallback directories to
- bootstrap it doesn't yet have up-to-date directory
- information. Closes ticket 24801.
diff --git a/changes/travis_distcheck b/changes/travis_distcheck
deleted file mode 100644
index 0f278fe7ee..0000000000
--- a/changes/travis_distcheck
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (continuous integration):
- - Our .travis.yml configuration now includes support for testing
- the results of "make distcheck". (It's not uncommon for "make check" to
- pass but "make distcheck" to fail.) Closes ticket 25814.
diff --git a/changes/trove-2017-001 b/changes/trove-2017-001
deleted file mode 100644
index 5187e6d5f1..0000000000
--- a/changes/trove-2017-001
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (security):
- - Downgrade the "-ftrapv" option from "always on" to "only on when
- --enable-expensive-hardening is provided." This hardening option, like
- others, can turn survivable bugs into crashes--and having it on by
- default made a (relatively harmless) integer overflow bug into a
- denial-of-service bug. Fixes bug 21278 (TROVE-2017-001); bugfix on
- 0.2.9.1-alpha.
-
diff --git a/changes/trove-2017-001.2 b/changes/trove-2017-001.2
deleted file mode 100644
index 3ef073cf9f..0000000000
--- a/changes/trove-2017-001.2
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (parsing):
- - Fix an integer underflow bug when comparing malformed Tor versions.
- This bug is harmless, except when Tor has been built with
- --enable-expensive-hardening, which would turn it into a crash;
- or on Tor 0.2.9.1-alpha through Tor 0.2.9.8, which were built with
- -ftrapv by default.
- Part of TROVE-2017-001. Fixes bug 21278; bugfix on
- 0.0.8pre1. Found by OSS-Fuzz.
diff --git a/changes/trove-2017-005 b/changes/trove-2017-005
deleted file mode 100644
index cebb013f86..0000000000
--- a/changes/trove-2017-005
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (hidden service, relay, security):
- - Fix an assertion failure caused by receiving a BEGIN_DIR cell on
- a hidden service rendezvous circuit. Fixes bug 22494, tracked as
- TROVE-2017-005 and CVE-2017-0376; bugfix on 0.2.2.1-alpha. Found
- by armadev.
-
-
diff --git a/changes/trove-2017-008 b/changes/trove-2017-008
deleted file mode 100644
index 4b9c5b0a12..0000000000
--- a/changes/trove-2017-008
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (security, hidden services, loggging):
- - Fix a bug where we could log uninitialized stack when a certain
- hidden service error occurred while SafeLogging was disabled.
- Fixes bug #23490; bugfix on 0.2.7.2-alpha.
- This is also tracked as TROVE-2017-008 and CVE-2017-0380.
diff --git a/changes/trove-2017-009 b/changes/trove-2017-009
deleted file mode 100644
index 166a5faec6..0000000000
--- a/changes/trove-2017-009
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes (security):
- - When checking for replays in the INTRODUCE1 cell data for a (legacy)
- hiddden service, correctly detect replays in the RSA-encrypted part of
- the cell. We were previously checking for replays on the entire cell,
- but those can be circumvented due to the malleability of Tor's legacy
- hybrid encryption. This fix helps prevent a traffic confirmation
- attack. Fixes bug 24244; bugfix on 0.2.4.1-alpha. This issue is also
- tracked as TROVE-2017-009 and CVE-2017-8819.
-
-
diff --git a/changes/trove-2017-010 b/changes/trove-2017-010
deleted file mode 100644
index d5bf9333da..0000000000
--- a/changes/trove-2017-010
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (security):
- - Fix a denial-of-service issue where an attacker could crash
- a directory authority using a malformed router descriptor.
- Fixes bug 24245; bugfix on 0.2.9.4-alpha. Also tracked
- as TROVE-2017-010 and CVE-2017-8820.
-
diff --git a/changes/trove-2017-011 b/changes/trove-2017-011
deleted file mode 100644
index 82d20d9e78..0000000000
--- a/changes/trove-2017-011
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (security):
- - Fix a denial of service bug where an attacker could use a malformed
- directory object to cause a Tor instance to pause while OpenSSL would
- try to read a passphrase from the terminal. (If the terminal was not
- available, tor would continue running.) Fixes bug 24246; bugfix on
- every version of Tor. Also tracked as TROVE-2017-011 and
- CVE-2017-8821. Found by OSS-Fuzz as testcase 6360145429790720.
-
diff --git a/changes/trove-2017-012-part1 b/changes/trove-2017-012-part1
deleted file mode 100644
index 9fccc2cf65..0000000000
--- a/changes/trove-2017-012-part1
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (security, relay):
- - When running as a relay, make sure that we never build a path through
- ourselves, even in the case where we have somehow lost the version of
- our descriptor appearing in the consensus. Fixes part of bug 21534;
- bugfix on 0.2.0.1-alpha. This issue is also tracked as TROVE-2017-012
- and CVE-2017-8822.
diff --git a/changes/trove-2018-001.1 b/changes/trove-2018-001.1
deleted file mode 100644
index f0ee92f409..0000000000
--- a/changes/trove-2018-001.1
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (denial-of-service, directory authority):
- - Fix a protocol-list handling bug that could be used to remotely crash
- directory authorities with a null-pointer exception. Fixes bug 25074;
- bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001.
-
-
diff --git a/changes/trove-2018-004 b/changes/trove-2018-004
deleted file mode 100644
index 37e0a89b0d..0000000000
--- a/changes/trove-2018-004
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (denial-of-service):
- - Fix a possible crash on malformed consensus. If a consensus had
- contained an unparseable protocol line, it could have made clients
- and relays crash with a null-pointer exception. To exploit this
- issue, however, an attacker would need to be able to subvert the
- directory-authority system. Fixes bug 25251; bugfix on
- 0.2.9.4-alpha. Also tracked as TROVE-2018-004.
-