aboutsummaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2012-01-07 07:42:07 -0500
committerRoger Dingledine <arma@torproject.org>2012-01-07 07:42:07 -0500
commit36721e940d77c8331ce13ad96ed3a6c80b13958b (patch)
tree8c36c03cc9b335b3f5bca3e8dcaa9fb4ed4d6efc /changes
parent19c372daf0aa66219b662a4caeec09bb7bdfc029 (diff)
downloadtor-36721e940d77c8331ce13ad96ed3a6c80b13958b.tar.gz
tor-36721e940d77c8331ce13ad96ed3a6c80b13958b.zip
fold in some new changelog stanzas
Diffstat (limited to 'changes')
-rw-r--r--changes/bug11013
-rw-r--r--changes/bug12408
-rw-r--r--changes/bug1297b20
-rw-r--r--changes/bug18279
-rw-r--r--changes/bug25713
-rw-r--r--changes/bug3825b7
-rw-r--r--changes/bug4531_take25
-rw-r--r--changes/bug46534
-rw-r--r--changes/bug46975
-rw-r--r--changes/bug47336
-rw-r--r--changes/bug475914
-rw-r--r--changes/bug47794
-rw-r--r--changes/bug47869
-rw-r--r--changes/bug47886
-rw-r--r--changes/bug47967
-rw-r--r--changes/bug48034
-rw-r--r--changes/bug482213
-rw-r--r--changes/clang_30_options5
-rw-r--r--changes/feature241112
-rw-r--r--changes/geoip-january20123
-rw-r--r--changes/portability_01_haiku14
-rw-r--r--changes/prop1107
-rw-r--r--changes/timersub_bug7
23 files changed, 0 insertions, 175 deletions
diff --git a/changes/bug1101 b/changes/bug1101
deleted file mode 100644
index 784ae083f1..0000000000
--- a/changes/bug1101
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Use absolute path names when reporting the torrc filename, so
- that a controller can more easily find it. Resolves bug 1101.
diff --git a/changes/bug1240 b/changes/bug1240
deleted file mode 100644
index 657066491c..0000000000
--- a/changes/bug1240
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes:
- - When running with an older Linux kernel that erroneously responds
- to strange nmap behavior by having accept() return successfully
- with a zero-length socket, just close the connection. Previously,
- we would try harder to learn the remote address: but there was no
- such remote address to learn, and our method for trying to learn
- it was incorrect. Fixes bugs #1240, #4745, and #4747. Bugfix on
- 0.1.0.3-rc. Reported and diagnosed by "r1eo".
diff --git a/changes/bug1297b b/changes/bug1297b
deleted file mode 100644
index fb0d00cabf..0000000000
--- a/changes/bug1297b
+++ /dev/null
@@ -1,20 +0,0 @@
- o Minor bugfixes:
-
- - Don't close hidden service client circuits which have almost
- finished connecting to their destination when they reach the
- normal circuit-build timeout. Previously, we would close
- introduction circuits which are waiting for an acknowledgement
- from the introduction-point relay and rendezvous circuits which
- have been specified in an INTRODUCE1 cell sent to a hidden
- service after the normal CBT; now, we mark them as 'timed out',
- and launch another rendezvous attempt in parallel. This
- behaviour change can be disabled using the new
- CloseHSClientCircuitsImmediatelyOnTimeout option. Fixes part of
- bug 1297.
-
- - Don't close hidden-service-side rendezvous circuits when they
- reach the normal circuit-build timeout. Previously, we would
- close them. This behaviour change can be disabled using the new
- CloseHSServiceRendCircuitsImmediatelyOnTimeout option. Fixes
- the remaining part of bug 1297.
-
diff --git a/changes/bug1827 b/changes/bug1827
deleted file mode 100644
index 0701876d81..0000000000
--- a/changes/bug1827
+++ /dev/null
@@ -1,9 +0,0 @@
- - Minor features:
- - Try to use system facilities for enumerating local interface
- addresses, before falling back to our old approach (which was
- binding a UDP socket, and calling getsockname() on it). That
- approach was confusing people whose draconian firewall software
- didn't like binding to UDP sockets, regardless of whether
- packets were sent. Now we try to use getifaddrs(), SIOCGIFCONF,
- or GetAdaptersAddresses(), depending on what the system
- supports. Resolves ticket #1827.
diff --git a/changes/bug2571 b/changes/bug2571
deleted file mode 100644
index dfb4f3be3d..0000000000
--- a/changes/bug2571
+++ /dev/null
@@ -1,3 +0,0 @@
- - Minor features:
- - If EntryNodes are given, but UseEntryGuards is set to 0, warn that
- EntryNodes will have no effect. Resolves issue 2571.
diff --git a/changes/bug3825b b/changes/bug3825b
deleted file mode 100644
index 08c0c2de73..0000000000
--- a/changes/bug3825b
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major features:
-
- - Adjust the number of introduction points that a hidden service
- will try to maintain based on how long its introduction points
- remain in use and how many introductions they handle. Fixes
- part of bug 3825.
-
diff --git a/changes/bug4531_take2 b/changes/bug4531_take2
deleted file mode 100644
index fd4f5f0c46..0000000000
--- a/changes/bug4531_take2
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes:
- - Fix null-pointer access that could occur if TLS allocation failed.
- Fixes bug 4531; bugfix on 0.2.0.20-rc. Found by "troll_un". This was
- erroneously listed as fixed in 0.2.3.9-alpha, but the fix had
- accidentally been reverted.
diff --git a/changes/bug4653 b/changes/bug4653
deleted file mode 100644
index 3c0596f94e..0000000000
--- a/changes/bug4653
+++ /dev/null
@@ -1,4 +0,0 @@
- o Code simplification and refactoring:
- - Use OpenSSL's built-in SSL_state_string_long() instead of our
- own homebrewed ssl_state_to_string() replacement. Patch from
- Emile Snyder. Fixes bug 4653.
diff --git a/changes/bug4697 b/changes/bug4697
deleted file mode 100644
index c3c940d874..0000000000
--- a/changes/bug4697
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes:
- - Fix an assertion failure when, while running with bufferevents, a
- connection finishes connecting after it is marked for close, but
- before it is closed. Fix for bug 4697; Bugfix on 0.2.3.1-alpha.
-
diff --git a/changes/bug4733 b/changes/bug4733
deleted file mode 100644
index 672cfbc9be..0000000000
--- a/changes/bug4733
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor fix:
- test_util_spawn_background_ok() hardcoded the expected value
- for ENOENT to 2. This isn't portable as error numbers are
- platform specific, and particularly the hurd has ENOENT at
- 0x40000002. Construct expected string at runtime, using the
- correct value for ENOENT (closes: #4733). Bugfix on 0.2.3.1-alpha.
diff --git a/changes/bug4759 b/changes/bug4759
deleted file mode 100644
index 19138ab8b2..0000000000
--- a/changes/bug4759
+++ /dev/null
@@ -1,14 +0,0 @@
- o Minor bugfixes:
-
- - Make sure we never mark the wrong rendezvous circuit as having
- had its introduction cell acknowleged by the introduction-point
- relay. Previously, when we received an INTRODUCE_ACK cell on a
- client-side hidden-service introduction circuit, we might have
- marked a rendezvous circuit other than the one we specified in
- the INTRODUCE1 cell as INTRO_ACKED, which would have produced a
- warning message and interfered with the hidden service
- connection-establishment process. Bugfix on 0.2.3.3-alpha, when
- the stream-isolation feature which might cause Tor to open
- multiple rendezvous circuits for the same hidden service was
- added. Fixes bug 4759.
-
diff --git a/changes/bug4779 b/changes/bug4779
deleted file mode 100644
index 4535a2b04d..0000000000
--- a/changes/bug4779
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes:
- - Do not use OpenSSL 1.0.0's counter mode: it has a critical bug
- that was fixed in OpenSSL 1.0.0a. Fixes bug 4779; bugfix on
- Tor 0.2.3.9-alpha. Found by Pascal.
diff --git a/changes/bug4786 b/changes/bug4786
deleted file mode 100644
index 7c1c60f632..0000000000
--- a/changes/bug4786
+++ /dev/null
@@ -1,9 +0,0 @@
- - Feature removal:
- - When sending or relaying a RELAY_EARLY cell, we used to convert
- it to a RELAY cell if the connection was using the v1 link
- protocol. This was a workaround for older versions of Tor, which
- didn't handle RELAY_EARLY cells properly. Now that all supported
- versions can handle RELAY_EARLY cells, and now that we're
- enforcing the "no RELAY_EXTEND commands except in RELAY_EARLY
- cells" rule, we're removing this workaround. Addresses bug 4786.
-
diff --git a/changes/bug4788 b/changes/bug4788
deleted file mode 100644
index d65c0015a0..0000000000
--- a/changes/bug4788
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (directory server):
- - Directory servers now reject versions of Tor older than 0.2.1.30,
- and Tor versions between 0.2.2.1-alpha and 0.2.2.20-alpha
- (inclusive). These versions accounted for only a small fraction of
- the Tor network, and have numerous known security issues. Resolves
- issue #4788.
diff --git a/changes/bug4796 b/changes/bug4796
deleted file mode 100644
index bcb795ffc2..0000000000
--- a/changes/bug4796
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes:
-
- - Don't exit with an assertion failure when we mark a new
- client-side hidden-service introduction circuit for close during
- the process of creating it. Bugfix on 0.2.3.6-alpha. Fixes bug
- 4796; reported by murb.
-
diff --git a/changes/bug4803 b/changes/bug4803
deleted file mode 100644
index cd25266c75..0000000000
--- a/changes/bug4803
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes:
- - Correctly spell "connect" in a log message when creating a controlsocket
- fails. Fixes bug 4803; bugfix on 0.2.2.26-beta/0.2.3.2-alpha.
-
diff --git a/changes/bug4822 b/changes/bug4822
deleted file mode 100644
index 73f43f0452..0000000000
--- a/changes/bug4822
+++ /dev/null
@@ -1,13 +0,0 @@
- o Major security workaround:
- - When building or running with any version of OpenSSL earlier
- than 0.9.8s or 1.0.0f, disable SSLv3 support. These versions had
- a bug (CVE-2011-4576) in which their block cipher padding
- included uninitialized data, potentially leaking sensitive
- information to any peer with whom they made a SSLv3
- connection. Tor does not use SSL v3 by default, but a hostile
- client or server could force an SSLv3 connection in order to
- gain information that they shouldn't have been able to get. The
- best solution here is to upgrade to OpenSSL 0.9.8s or 1.0.0f (or
- later). But when building or running with a non-upgraded
- OpenSSL, we should instead make sure that the bug can't happen
- by disabling SSLv3 entirely.
diff --git a/changes/clang_30_options b/changes/clang_30_options
deleted file mode 100644
index e8e34c8e3e..0000000000
--- a/changes/clang_30_options
+++ /dev/null
@@ -1,5 +0,0 @@
- o Code simplifications and refactoring:
- - During configure, detect when we're building with clang version 3.0 or
- lower and disable the -Wnormalized=id and -Woverride-init CFLAGS.
- clang doesn't support them yet.
-
diff --git a/changes/feature2411 b/changes/feature2411
deleted file mode 100644
index 633a5cebd3..0000000000
--- a/changes/feature2411
+++ /dev/null
@@ -1,12 +0,0 @@
- o Minor features:
-
- - Report flags that control a circuit's path selection to
- controllers in CIRC events and in replies to 'GETINFO
- circuit-status'. Implements part of ticket 2411.
-
- - Report the hidden service address and current state of a
- hidden-service-related circuit to controllers in CIRC events and
- in replies to 'GETINFO circuit-status'. Implements part of
- ticket 2411.
-
-
diff --git a/changes/geoip-january2012 b/changes/geoip-january2012
deleted file mode 100644
index 2f4180e578..0000000000
--- a/changes/geoip-january2012
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Update to the January 3 2012 Maxmind GeoLite Country database.
-
diff --git a/changes/portability_01_haiku b/changes/portability_01_haiku
deleted file mode 100644
index 74887fe0c3..0000000000
--- a/changes/portability_01_haiku
+++ /dev/null
@@ -1,14 +0,0 @@
- o Minor buxfixes:
- - During configure, search for library containing cos function as
- libm lives in libcore on some platforms (BeOS/Haiku).
- Linking against libm was hard-coded before. Bugfix on
- 0.2.2.2-alpha, fixes the first part of bug 4727. Patch and
- analysis by Martin Hebnes Pedersen.
- - Preprocessor directives should not be put inside the arguments
- of a macro. This would break compilation with GCC releases prior
- to version 3.3. We would never recommend such an old GCC
- version, but it is apparently required for binary compatibility
- on some platforms (namely, certain builds of Haiku). Bugfix on
- 0.2.3.3-alpha, fixes the other part of bug 4727. Patch and
- analysis by Martin Hebnes Pedersen.
-
diff --git a/changes/prop110 b/changes/prop110
deleted file mode 100644
index 843595ecf4..0000000000
--- a/changes/prop110
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major features:
- - Now that Tor 0.2.0.x is completely deprecated, we can enable the
- final part of "Proposal 110: Avoiding infinite length circuits"
- by refusing all circuit-extend requests that do not appear in a
- "relay_early" cell. This change helps Tor to resist a class of
- denial-of-service attacks by limiting the maximum circuit length.
-
diff --git a/changes/timersub_bug b/changes/timersub_bug
deleted file mode 100644
index 9183862677..0000000000
--- a/changes/timersub_bug
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes:
- - Provide correct replacements for the timeradd() and timersub() functions
- for platforms that lack them (for example, windows). The timersub()
- function is used when expiring circuits, timeradd() is currently unused.
- Patch written by Vektor, who also reported the bug. Thanks! Bugfix
- on 0.2.2.24-alpha/0.2.3.1-alpha, fixes bug 4778.
-