diff options
Diffstat (limited to 'changes')
-rw-r--r-- | changes/6757 | 5 | ||||
-rw-r--r-- | changes/6982 | 3 | ||||
-rw-r--r-- | changes/addr_is_internal_debug | 4 | ||||
-rw-r--r-- | changes/bug6465 | 12 | ||||
-rw-r--r-- | changes/bug6816 | 6 | ||||
-rw-r--r-- | changes/bug7011 | 6 | ||||
-rw-r--r-- | changes/bug7014 | 5 | ||||
-rw-r--r-- | changes/bug7022 | 3 | ||||
-rw-r--r-- | changes/bug7037 | 6 | ||||
-rw-r--r-- | changes/bug7038 | 5 | ||||
-rw-r--r-- | changes/bug7039 | 7 | ||||
-rw-r--r-- | changes/bug7235 | 3 | ||||
-rw-r--r-- | changes/dropped_openssl_vers | 3 | ||||
-rw-r--r-- | changes/src_ext | 3 | ||||
-rw-r--r-- | changes/ticket5749 | 3 | ||||
-rw-r--r-- | changes/ticket6997 | 2 | ||||
-rw-r--r-- | changes/warn-about-hses-without-guards | 8 |
17 files changed, 3 insertions, 81 deletions
diff --git a/changes/6757 b/changes/6757 deleted file mode 100644 index 6b17f951d1..0000000000 --- a/changes/6757 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (client): - - Make clients running with IPv6 bridges connect over IPv6 again, - even without setting new config options ClientUseIPv6 and - ClientPreferIPv6ORPort. - Fixes bug 6757; bugfix on 0.2.4.1-alpha. diff --git a/changes/6982 b/changes/6982 deleted file mode 100644 index edfa066a56..0000000000 --- a/changes/6982 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (portability): - - Tor now builds correctly on Bitrig, an OpenBSD fork. Patch from dhill. - Ticket 6982. diff --git a/changes/addr_is_internal_debug b/changes/addr_is_internal_debug deleted file mode 100644 index 6de221bb2e..0000000000 --- a/changes/addr_is_internal_debug +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features: - - Log the call-site of a failed tor_addr_is_internal(), so that we - can learn who is calling it with AF_UNSPECIFIED and fix the - second (unrelated) part of bug 7086. diff --git a/changes/bug6465 b/changes/bug6465 deleted file mode 100644 index a5ea9e213c..0000000000 --- a/changes/bug6465 +++ /dev/null @@ -1,12 +0,0 @@ - o Infrastructure features: - - Introduce new channel_t abstraction between circuits and or_connection_t - to allow for implementing alternate OR-to-OR transports. A channel_t is - an abstract object which can either be a cell-bearing channel, which is - responsible for authenticating and handshaking with the remote OR and - transmitting cells to and from it, or a listening channel, which spawns - new cell-bearing channels at the request of remote ORs. - - - Also new is the channel_tls_t subclass of channel_t, adapting it to the - existing or_connection_t code. The V2/V3 protocol handshaking code - which formerly resided in command.c has been moved below the channel_t - abstraction layer and may be found in channeltls.c now. diff --git a/changes/bug6816 b/changes/bug6816 deleted file mode 100644 index e9e6877a96..0000000000 --- a/changes/bug6816 +++ /dev/null @@ -1,6 +0,0 @@ - o Infrastructure features: - - Introduce new circuitmux_t storing the queue of circuits for a channel; - this encapsulates and abstracts the queue logic and circuit selection - policy, and allows the latter to be overridden easily by switching out - a policy object. The existing EWMA behavior is now implemented as a - circuitmux_policy_t. This fixes bug 6816. diff --git a/changes/bug7011 b/changes/bug7011 deleted file mode 100644 index f3d0aa2e1e..0000000000 --- a/changes/bug7011 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes: - - Use square brackets around IPv6 addresses in numerous places that needed - them, including log messages, HTTPS CONNECT proxy requests, - TransportProxy statefile entries, and pluggable transport extra-info - lines. Fix for bug 7011; patch by David Fifield. - diff --git a/changes/bug7014 b/changes/bug7014 deleted file mode 100644 index 1d39103a50..0000000000 --- a/changes/bug7014 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes: - - Fix two cases in src/or/transports.c where we were calling - fmt_addr() twice in a parameter list. Bug found by David - Fifield. Fixes bug 7014; bugfix on 0.2.3.9-alpha. - diff --git a/changes/bug7022 b/changes/bug7022 deleted file mode 100644 index 10ac354724..0000000000 --- a/changes/bug7022 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes: - - Fix memory leaks whenever we logged any message about the "path - bias" detection. Fixes bug 7022; bugfix on 0.2.3.21-rc. diff --git a/changes/bug7037 b/changes/bug7037 deleted file mode 100644 index fc3a1ad1c5..0000000000 --- a/changes/bug7037 +++ /dev/null @@ -1,6 +0,0 @@ - o Minor bugfixes: - - When relays refuse a "create" cell because their queue of pending - create cells is too big (typically because their cpu can't keep up - with the arrival rate), send back reason "resource limit" rather - than reason "internal", so network measurement scripts can get a - more accurate picture. Bugfix on 0.1.1.11-alpha; fixes bug 7037. diff --git a/changes/bug7038 b/changes/bug7038 deleted file mode 100644 index 3805d868b2..0000000000 --- a/changes/bug7038 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (log messages): - - Downgrade "Failed to hand off onionskin" messages to "debug" - severity, since they're typically redundant with the "Your computer - is too slow" messages. Fixes bug 7038; bugfix on 0.2.2.16-alpha. - diff --git a/changes/bug7039 b/changes/bug7039 deleted file mode 100644 index dc5111a00c..0000000000 --- a/changes/bug7039 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor bugfixes: - - When a Tor client gets a "truncated" relay cell, the first byte of - its payload specifies why the circuit was truncated. We were - ignoring this 'reason' byte when tearing down the circuit, resulting - in the controller not being told why the circuit closed. Now we - pass the reason from the truncated cell to the controller. Bugfix - on 0.1.2.3-alpha; fixes bug 7039. diff --git a/changes/bug7235 b/changes/bug7235 new file mode 100644 index 0000000000..15d610090b --- /dev/null +++ b/changes/bug7235 @@ -0,0 +1,3 @@ + o Minor bugfixes (build): + - Fix a linking error when building tor-fw-helper without miniupnp. + Fixes bug 7235; bugfix on 0.2.4.2-alpha. Fix by Anthony G. Basile. diff --git a/changes/dropped_openssl_vers b/changes/dropped_openssl_vers deleted file mode 100644 index dc79d5e3ff..0000000000 --- a/changes/dropped_openssl_vers +++ /dev/null @@ -1,3 +0,0 @@ - o Required libraries: - - Tor now requires OpenSSL 0.9.8 or later; OpenSSL 1.0.0 or later is - strongly recommended. diff --git a/changes/src_ext b/changes/src_ext deleted file mode 100644 index a1b2a2198f..0000000000 --- a/changes/src_ext +++ /dev/null @@ -1,3 +0,0 @@ - o Code refactoring: - - Source files taken from other packages now reside in src/ext; - previously they were scattered around the rest of Tor. diff --git a/changes/ticket5749 b/changes/ticket5749 deleted file mode 100644 index 0237241981..0000000000 --- a/changes/ticket5749 +++ /dev/null @@ -1,3 +0,0 @@ - o New directory authorities: - - Add Faravahar (run by Sina Rabbani) as the ninth v3 directory - authority. Closes ticket 5749. diff --git a/changes/ticket6997 b/changes/ticket6997 deleted file mode 100644 index 0a33b37552..0000000000 --- a/changes/ticket6997 +++ /dev/null @@ -1,2 +0,0 @@ - o Minor bugfixes: - - Command-line option "--version" implies "--quiet". Closes ticket #6997. diff --git a/changes/warn-about-hses-without-guards b/changes/warn-about-hses-without-guards deleted file mode 100644 index 57b8b4d00f..0000000000 --- a/changes/warn-about-hses-without-guards +++ /dev/null @@ -1,8 +0,0 @@ - o Minor features: - - - Warn users who run hidden services on a Tor client with - UseEntryGuards disabled that their hidden services will be - vulnerable to http://freehaven.net/anonbib/#hs-attack06 (the - attack which motivated Tor to support entry guards in the first - place). Fixes bug 6889. - |