diff options
author | Nick Mathewson <nickm@torproject.org> | 2007-02-13 21:18:56 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2007-02-13 21:18:56 +0000 |
commit | a10ccac9cb78bebf480f7e17b63998402fbee3e5 (patch) | |
tree | 936c286e4d8e9261fcd1fbf7056af463975eb5d2 /doc | |
parent | c3281759bad92cd5fb4d184526f64bc4f8e8a7d8 (diff) | |
download | tor-a10ccac9cb78bebf480f7e17b63998402fbee3e5.tar.gz tor-a10ccac9cb78bebf480f7e17b63998402fbee3e5.zip |
r11797@catbus: nickm | 2007-02-13 16:17:40 -0500
Fix a longstanding dnsworker-related bug: when we decide to kill a DNS worker for having been in use too long, and we independently decide to close one of the exit connections waiting for that DNS worker (perhaps because we got an END relay cell), it was possible for us to try to double-free the connection. We were smart enough to detect this and assert, but not smart enough to fix this bug before now. This should resolve bug 390. Backport candidate.
svn:r9581
Diffstat (limited to 'doc')
-rw-r--r-- | doc/TODO | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -232,7 +232,7 @@ P - Figure out why openssl 0.9.8d "make test" fails at sha256t test. - Then clients can choose a bucket (or set of buckets) to download and use. - - Improvements to versioning. + - Improvements to versioning. (Proposal 105) - When we connect to a Tor server, it sends back a cell listing the IP it believes it is using. Use this to block dvorak's attack. Also, this is a fine time to say what time you think it is. |