summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2014-10-23declare 0.2.3.x end-of-life more clearlytor-0.2.5.10Roger Dingledine
2014-10-23Note 0.2.3.x deprecationNick Mathewson
2014-10-23I plan to release Tor 0.2.5.10 tomorrow.Nick Mathewson
2014-10-20Write a first-draft for an 0.2.5.10 blurbNick Mathewson
2014-10-20Start work on summarizing 0.2.5.10 stuff. Remove a bugfix-on-0.2.5 entryNick Mathewson
2014-10-20Merge branch 'maint-0.2.5' into release-0.2.5Nick Mathewson
Conflicts: configure.ac contrib/win32build/tor-mingw.nsi.in src/win32/orconfig.h
2014-10-20bump maint-0.2.5 to 0.2.5.9-rc-devNick Mathewson
2014-10-20Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-20Whoops, bump the version properly.Nick Mathewson
2014-10-20bump maint-0.2.4 to 0.2.4.25-devNick Mathewson
2014-10-20forward-port the 0.2.4.25 changelog to release-0.2.5 changelog and releasenotestor-0.2.5.9-rcNick Mathewson
2014-10-19Better release blurb, maybe.Nick Mathewson
2014-10-19Bump version to 0.2.5.9-rcNick Mathewson
2014-10-19Re-run format-changelog and set the release dateNick Mathewson
2014-10-19Fold 13471 into changelog and releasenotesNick Mathewson
2014-10-19Merge branch 'maint-0.2.5' into release-0.2.5Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-19Note that our #13426 fix is also a #13471 fix.Nick Mathewson
See also http://marc.info/?l=openssl-dev&m=141357408522028&w=2
2014-10-19Change 0.2.5.9 to 0.2.5.9-rc in the changelog; write a draft blurbNick Mathewson
2014-10-19Sort and collate the ReleaseNotes sections again.Nick Mathewson
2014-10-19Recategorize some uncategorized things in the releasenotesNick Mathewson
2014-10-19Move around some entries in the ReleaseNotes between sectionsNick Mathewson
2014-10-19Automatically sort and collate ReleaseNotes.Nick Mathewson
No entries have been removed or edited or added in this commit; no section names have been changed. We may need another round of removal/editing/etc after we edit some section names. We may want to re-order items within sections.
2014-10-19Copy 0.2.5.9 entries into ReleaseNotesNick Mathewson
2014-10-19Tidy an entry in the 0259 changelog. Now I like the entries.Nick Mathewson
2014-10-19Format_changelog on the 0.2.5.9 changelogNick Mathewson
2014-10-19Copy changes/* into the ChangeLog file for 0.2.5.9Nick Mathewson
2014-10-19Merge remote-tracking branch 'origin/maint-0.2.5' into release-0.2.5Nick Mathewson
2014-10-16Downgrade 'unexpected sendme cell from client' to PROTOCOL_WARNNick Mathewson
Closes 8093.
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-10-16Merge remote-tracking branch 'origin/maint-0.2.3' into maint-0.2.4Nick Mathewson
2014-10-16Merge branch 'no_sslv3_023' into maint-0.2.3Nick Mathewson
2014-10-15Disable SSLv3 unconditionally. Closes ticket 13426.Nick Mathewson
The POODLE attack doesn't affect Tor, but there's no reason to tempt fate: SSLv3 isn't going to get any better.
2014-10-03Merge remote-tracking branch 'public/bug13325_024' into maint-0.2.5Nick Mathewson
2014-10-03Run correctly on OpenBSD systems without SSL_METHOD.get_cipher_by_charNick Mathewson
Also, make sure we will compile correctly on systems where they finally rip it out. Fixes issue #13325. Caused by this openbsd commit: ​http://marc.info/?l=openbsd-cvs&m=140768179627976&w=2 Reported by Fredzupy.
2014-09-29Merge branch 'bug13295_v2_025' into maint-0.2.5Nick Mathewson
2014-09-29Don't use the getaddrinfo sandbox cache from tor-resolveNick Mathewson
Fixes bug 13295; bugfix on 0.2.5.3-alpha. The alternative here is to call crypto_global_init() from tor-resolve, but let's avoid linking openssl into tor-resolve for as long as we can.
2014-09-22put an ordering on 0.2.4.24 vs 0.2.5.8-rctor-0.2.5.8-rcRoger Dingledine
2014-09-22bump version to 0.2.5.8-rcRoger Dingledine
2014-09-21commit my in-progress 0.2.5.x release notesRoger Dingledine
they're far from done, but this way i won't lose them
2014-09-20merge in the next changes entryRoger Dingledine
2014-09-20Merge branch 'maint-0.2.5' into release-0.2.5Roger Dingledine
2014-09-20Merge branch 'maint-0.2.4' into maint-0.2.5Roger Dingledine
Conflicts: src/or/config.c
2014-09-20Merge branch 'maint-0.2.3' into maint-0.2.4Roger Dingledine
2014-09-20gabelmoo's IPv4 address changedSebastian Hahn
2014-09-19fold in existing changes entryRoger Dingledine
2014-09-19Merge branch 'maint-0.2.5' into release-0.2.5Roger Dingledine
2014-09-16Merge remote-tracking branch 'origin/maint-0.2.4' into maint-0.2.5Nick Mathewson
2014-09-16clients now send correct address for rendezvous pointRoger Dingledine
Clients now send the correct address for their chosen rendezvous point when trying to access a hidden service. They used to send the wrong address, which would still work some of the time because they also sent the identity digest of the rendezvous point, and if the hidden service happened to try connecting to the rendezvous point from a relay that already had a connection open to it, the relay would reuse that connection. Now connections to hidden services should be more robust and faster. Also, this bug meant that clients were leaking to the hidden service whether they were on a little-endian (common) or big-endian (rare) system, which for some users might have reduced their anonymity. Fixes bug 13151; bugfix on 0.2.1.5-alpha.