summaryrefslogtreecommitdiff
path: root/ChangeLog
AgeCommit message (Collapse)Author
2010-07-21partial changelog for 0.2.2.15-alphaRoger Dingledine
2010-07-130.2.2.14-alpha blurbRoger Dingledine
2010-07-13bump to 0.2.2.14-alpha-devRoger Dingledine
2010-07-12guh. 'git commit' did not do what i expect.Roger Dingledine
2010-07-09fold in the latest changesRoger Dingledine
2010-06-29start an 0.2.2.14-alpha changelogRoger Dingledine
2010-06-11Copy the release notes from 0.2.1.26 into the master ChangeLogNick Mathewson
2010-05-05put the blurb in 0.2.2.13-alphaRoger Dingledine
2010-04-24bump to 0.2.2.13-alphator-0.2.2.13-alphaRoger Dingledine
2010-04-23prepare the 0.2.2.13-alpha changelogRoger Dingledine
2010-04-23blurbs for two recent alphasRoger Dingledine
2010-04-20merge in the bug 1364 fixtor-0.2.2.12-alphaRoger Dingledine
2010-04-20prepare for 0.2.2.12-alphaRoger Dingledine
2010-04-19bump to 0.2.2.11-alpha-devRoger Dingledine
2010-04-15bump to 0.2.2.11-alphator-0.2.2.11-alphaRoger Dingledine
2010-04-15gather together the 0.2.2.11-alpha changelogRoger Dingledine
2010-04-03Merge branch 'maint-0.2.1'Roger Dingledine
Conflicts: ChangeLog configure.in contrib/tor-mingw.nsi.in src/win32/orconfig.h
2010-04-02fold in the recent changelog entriesRoger Dingledine
2010-03-16give us a blurb; add stanza to the releasenotestor-0.2.1.25Roger Dingledine
2010-03-15bump to 0.2.1.25Roger Dingledine
it's perfect, let's ship it
2010-03-10let people test the RefuseUnknownExits ideaRoger Dingledine
2010-03-08blurbs for recent alphasRoger Dingledine
2010-03-08fix the tor-exit-notice.html file (bug 1295)Roger Dingledine
2010-03-08bump to 0.2.2.10-alpha-devRoger Dingledine
now's your chance to destabilize it
2010-03-07prepare 0.2.2.10-alpha for releasetor-0.2.2.10-alphaRoger Dingledine
2010-03-06Merge branch 'maint-0.2.1'Roger Dingledine
Conflicts: ChangeLog configure.in contrib/tor-mingw.nsi.in src/win32/orconfig.h
2010-03-06clean up the 0.2.1.25 changelogRoger Dingledine
2010-03-04Merge commit 'sebastian/manpage'Nick Mathewson
2010-03-04Merge commit 'origin/maint-0.2.1'Nick Mathewson
Conflicts: src/or/config.c src/or/test.c
2010-03-04Apply Roger's bug 1269 fix.Nick Mathewson
From http://archives.seul.org/tor/relays/Mar-2010/msg00006.html : As I understand it, the bug should show up on relays that don't set Address to an IP address (so they need to resolve their Address line or their hostname to guess their IP address), and their hostname or Address line fails to resolve -- at that point they'll pick a random 4 bytes out of memory and call that their address. At the same time, relays that *do* successfully resolve their address will ignore the result, and only come up with a useful address if their interface address happens to be a public IP address.
2010-03-01Add configure switch to disable use of asciidocSebastian Hahn
Also break the build if that switch isn't used and asciidoc isn't available.
2010-03-01Simplify asciidoc-helperSebastian Hahn
We don't need sed for our string manipulation, so let's get rid of it. Suggested by weasel.
2010-03-01Ship the asciidoc-helper file in our tarballsSebastian Hahn
Otherwise, the build process breaks when one of the .1.txt gets a new mtime. Suggested by weasel.
2010-02-27Fix a consensus-extension bug found by outofwordsNick Mathewson
When the bandwidth-weights branch added the "directory-footer" token, and began parsing the directory footer at the first occurrence of "directory-footer", it made it possible to fool the parsing algorithm into accepting unsigned data at the end of a consensus or vote. This patch fixes that bug by treating the footer as starting with the first "directory-footer" or the first "directory-signature", whichever comes first.
2010-02-27Merge remote branch 'origin/maint-0.2.1'Nick Mathewson
Conflicts: ChangeLog src/or/routerparse.c
2010-02-27Properly handle non-terminated stringsSebastian Hahn
Treat strings returned from signed_descriptor_get_body_impl() as not NUL-terminated. Since the length of the strings is available, this is not a big problem. Discovered by rieo.
2010-02-26Proper NULL checking in circuit_list_path_impl()Sebastian Hahn
Another dereference-then-NULL-check sequence. No reports of this bug triggered in the wild. Fixes bugreport 1256. Thanks to ekir for discovering and reporting this bug.
2010-02-26Proper NULL checking for hsdesc publicationSebastian Hahn
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered in the wild, but we should fix it anyways in case it ever happens. Also make sure users get a note about this being a bug when they see it in their log. Thanks to ekir for discovering and reporting this bug.
2010-02-26Zero a cipher completely before freeing itSebastian Hahn
We used to only zero the first ptrsize bytes of the cipher. Since cipher is large enough, we didn't zero too many bytes. Discovered and fixed by ekir. Fixes bug 1254.
2010-02-25Merge remote branch 'mikeperry/consensus-bw-weights5-merge'Nick Mathewson
Conflicts: ChangeLog
2010-02-25Merge remote branch 'sebastian/manpage'Nick Mathewson
2010-02-25Restrict PerConnBWRate|Burst to INT32_MAX, update manpageSebastian Hahn
All other bandwidthrate settings are restricted to INT32_MAX, but this check was forgotten for PerConnBWRate and PerConnBWBurst. Also update the manpage to reflect the fact that specifying a bandwidth in terabytes does not make sense, because that value will be too large.
2010-02-23Update a section of the exit notice file, give it a changelog.Sebastian Hahn
2010-02-23Proper NULL checking for hsdesc publicationSebastian Hahn
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered in the wild, but we should fix it anyways in case it ever happens. Also make sure users get a note about this being a bug when they see it in their log. Thanks to ekir for discovering and reporting this bug.
2010-02-23Fix another coverity-spotted memleakSebastian Hahn
2010-02-22Add a changelog entry for the bandwidth weightings.Mike Perry
2010-02-22elevate a changelog entry, and get my mailto out of the man pageRoger Dingledine
2010-02-22Merge remote branch 'sebastian/bug1254'Nick Mathewson
2010-02-22Expand homedirs in paths passed to tor-checkkeySebastian Hahn
This is so that coverity stops complaining about using a user-supplied string with the open() syscall. Let's see if it works.
2010-02-22Zero a cipher completely before freeing itSebastian Hahn
We used to only zero the first ptrsize bytes of the cipher. Since cipher is large enough, we didn't zero too many bytes. Discovered and fixed by ekir. Fixes bug 1254.