diff options
author | Roger Dingledine <arma@torproject.org> | 2012-06-06 00:30:25 -0400 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2012-06-06 00:30:25 -0400 |
commit | 0ee13dc287320c0b1aeffb0854534ee1d8b561b2 (patch) | |
tree | 8e50d7207f6a85880f9f78db99daa5b53671c008 /ChangeLog | |
parent | f136e835d8f98a0508bfa418d01c40f0b73935a3 (diff) | |
download | tor-0ee13dc287320c0b1aeffb0854534ee1d8b561b2.tar.gz tor-0ee13dc287320c0b1aeffb0854534ee1d8b561b2.zip |
use my time machine to fix a few more typos
Diffstat (limited to 'ChangeLog')
-rw-r--r-- | ChangeLog | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -201,7 +201,7 @@ Changes in version 0.2.3.16-alpha - 2012-06-05 Fixes bug 5891; bugfix on 0.2.3.6-alpha. Also fixes bug 5508 in a better way. - Don't try to open non-control listeners when DisableNetwork is set. - Previousy, we'd open all listeners, then immediately close them. + Previously, we'd open all listeners, then immediately close them. Fixes bug 5604; bugfix on 0.2.3.9-alpha. - Don't abort the managed proxy protocol if the managed proxy sends us an unrecognized line; ignore it instead. Fixes bug @@ -211,7 +211,7 @@ Changes in version 0.2.3.16-alpha - 2012-06-05 - Fix a compilation issue on GNU Hurd, which doesn't have PATH_MAX. Fixes bug 5355; bugfix on 0.2.3.11-alpha. - Remove bogus definition of "_WIN32" from src/win32/orconfig.h, to - unbreak the MSVC build. Fies bug 5858; bugfix on 0.2.3.12-alpha. + unbreak the MSVC build. Fixes bug 5858; bugfix on 0.2.3.12-alpha. - Resolve numerous small warnings and build issues with MSVC. Resolves bug 5859. @@ -268,7 +268,7 @@ Changes in version 0.2.2.36 - 2012-05-24 - Provide controllers with a safer way to implement the cookie authentication mechanism. With the old method, if another locally running program could convince a controller that it was the Tor - process, then that program could trick the contoller into telling + process, then that program could trick the controller into telling it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE" authentication method uses a challenge-response approach to prevent this attack. Fixes bug 5185; implements proposal 193. @@ -397,7 +397,7 @@ Changes in version 0.2.3.15-alpha - 2012-04-30 - When Tor is built with kernel headers from a recent (last few years) Linux kernel, do not fail to run on older (pre-2.6.28 Linux kernels). Fixes bug 5112; bugfix on 0.2.3.1-alpha. - - Fix cross-compilation isssues with mingw. Bugfixes on 0.2.3.6-alpha + - Fix cross-compilation issues with mingw. Bugfixes on 0.2.3.6-alpha and 0.2.3.12-alpha. - Fix compilation with miniupnpc version 1.6; patch from Anthony G. Basile. Fixes bug 5434; bugfix on 0.2.3.12-alpha. @@ -539,7 +539,7 @@ Changes in version 0.2.3.13-alpha - 2012-03-26 - Provide controllers with a safer way to implement the cookie authentication mechanism. With the old method, if another locally running program could convince a controller that it was the Tor - process, then that program could trick the contoller into telling + process, then that program could trick the controller into telling it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE" authentication method uses a challenge-response approach to prevent this attack. Fixes bug 5185, implements proposal 193. |