summaryrefslogtreecommitdiff
path: root/ChangeLog
AgeCommit message (Collapse)Author
2009-02-11and forward-port the 0.2.0.33 and 0.2.0.34 changelogsRoger Dingledine
svn:r18497
2009-02-11Revert an erroneous part of the non-fix to bug 326, and add comments to ↵Nick Mathewson
explain why it was erroneous. svn:r18494
2009-02-10Clients and non-caches do not need to cache unrecognized authority certificates.Nick Mathewson
svn:r18480
2009-02-10As an exit node, scrub the IP address to which we are exiting in the logs. ↵Karsten Loesing
Bugfix on 0.2.1.8-alpha. svn:r18477
2009-02-10Don't extend introduction circuits indefinitely.Nick Mathewson
Doing so could run you out of relay_early cells and give you a senselessly long circuit. Patch from Karsten; may fix bug 878. svn:r18459
2009-02-09Retry circuits if the exit node is optional and nonexistant.Nick Mathewson
Previously, when we had the chosen_exit set but marked optional, and we failed because we couldn't find an onion key for it, we'd just give up on the circuit. But what we really want to do is try again, without the forced exit node. Spotted by rovv. Another case of bug 752. I think this might be unreachable in our current code, but proposal 158 could change that. svn:r18451
2009-02-09Disable KQUEUE from inside Tor if the OSX version is prior to 10.4.0Nick Mathewson
svn:r18450
2009-02-09Use prctl to reenable core dumps when we have setuid to a non-root user.Nick Mathewson
svn:r18449
2009-02-09Bump version to 0.2.1.12-alpha-devNick Mathewson
svn:r18448
2009-02-09a bit more changelog muckingRoger Dingledine
svn:r18426
2009-02-09shuffle the changelog a bitRoger Dingledine
svn:r18425
2009-02-09Fix a remote-crash bug. This will need a patch release.Nick Mathewson
svn:r18421
2009-02-09Fix a temporary DoS vulnerability that could be performed byRoger Dingledine
a directory mirror. Bugfix on 0.2.0.9-alpha; reported by lark. svn:r18420
2009-02-08declare tomorrow as the day for 0.2.1.12-alpha tooRoger Dingledine
svn:r18413
2009-02-05Forward-port ChangeLog for 0.2.0.30.Karsten Loesing
svn:r18404
2009-02-04If we're using bridges and our network goes away, be more willingRoger Dingledine
to forgive our bridges and try again when we get an application request. Bugfix on 0.2.0.x. svn:r18396
2009-02-04cosmetic changesRoger Dingledine
svn:r18394
2009-02-04and forward-port the 0.2.0.33 changelogRoger Dingledine
svn:r18392
2009-01-31Fix a possible cause of bug 915 when parsing multiple votes one of which was ↵Nick Mathewson
bad. Bugfix on 0.2.0.8-alpha. svn:r18354
2009-01-31When building with GCC, use -fno-strict-aliasingNick Mathewson
GCC's interpretation of the C99 aliasing rules, to be charitable, creates a dialect of C intended for a better programmers than I am certain of my ability to be in all times. I just spent 2 hours tracking down a platform-hyperspecific libevent bug that turned out to be because of this, and darned if I ever want to do *that* again. One of Linus's recent rants will give you a picture of why GCC's behavior here can lead to fun surprises in your binaries: http://lwn.net/Articles/316126/ svn:r18351
2009-01-28Support setting serverdnsrandomizecase during sighup. Backportable, unless ↵Nick Mathewson
too trivial. svn:r18307
2009-01-28Fix a race condition on nameserver reconfiguration.Nick Mathewson
This resolves bug 526, wherein we would crash if the following events occurred in this order: A: We're an OR, and one of our nameservers goes down. B: We launch a probe to it to see if it's up again. (We do this hourly in steady-state.) C: Before the probe finishes, we reconfigure our nameservers, usually because we got a SIGHUP and the resolve.conf file changed. D: The probe reply comes back, or times out. (There is a five-second window for this, after B has happens). IOW, if one of our nameservers is down and our nameserver configuration has changed, there were 5 seconds per hour where HUPing the server was unsafe. Bugfix on 0.1.2.1-alpha. Too obscure to backport. svn:r18306
2009-01-28Don't obsolete a very-new connection for having no circuits yet.Nick Mathewson
This fixes the last known case of bug 891, which could happen if two hosts, A and B, disagree about how long a circuit has been open, because of clock drift of some kind. Host A would then mark the connection as is_bad_for_new_circs when it got too old and open a new connection. In between when B receives a NETINFO cell on the new conn, and when B receives a conn cell on the new circuit, the new circuit will seem worse to B than the old one, and so B will mark it as is_bad_for_new_circs in the second or third loop of connection_or_group_set_badness(). Bugfix on 0.1.1.13-alpha. Bug found by rovv. Not a backport candidate: the bug is too obscure and the fix too tricky. svn:r18303
2009-01-28Fix an old changelog entry to mention which bug it fixed.Nick Mathewson
svn:r18302
2009-01-28Forward-port: Fix bug 893: check AP connections for markedness before ↵Nick Mathewson
expiring them. svn:r18299
2009-01-28Actually send the extra_headers content in write_http_response_header_impl. ↵Nick Mathewson
This make X-Descriptor-Now-New get sent. Bugfix on 0.2.0.10-alpha. Spotted by "multiplication". svn:r18297
2009-01-28clean up r18287Roger Dingledine
svn:r18288
2009-01-22Do not use == in our shell code; = is standard.Nick Mathewson
svn:r18239
2009-01-22Support 64-bit time_t. Patch from Matthias Drochner. Partial backport ↵Nick Mathewson
candidate. svn:r18234
2009-01-21Make sure that even in the weird fiddly paths that lead to init_keys,Nick Mathewson
crypto_global_init gets called. Also have it be crypto_global_init that calls crypto_seed_rng, so we are not dependent on OpenSSL's RAND_poll in these fiddly cases. Should fix bug 907. Bugfix on 0.0.9pre6. Backport candidate. svn:r18210
2009-01-21Fix an error in tor_addr_parse that kept us from having a hidden service or ↵Nick Mathewson
a bridge live at an IPv6 address. svn:r18206
2009-01-21Fix warning on panther compile, and bug 913. Backport candidate.Nick Mathewson
svn:r18203
2009-01-21Let controllers actually ask for the "clients_seen" event. BugfixRoger Dingledine
on 0.2.1.10-alpha; reported by Matt Edman. svn:r18201
2009-01-21get ready for more developmentRoger Dingledine
svn:r18200
2009-01-20bump to 0.2.1.11-alpha, clean up changelogtor-0.2.1.11-alphaRoger Dingledine
svn:r18192
2009-01-18mention that tsocks only socksifies TCPPeter Palfrader
In the torify(1) manpage explain that tsocks will only socksify TCP connections, and that therefore it will most likely leak DNS requests. svn:r18160
2009-01-15This patch changes the default location where config and data filesNick Mathewson
are stored when the --enable-local-appdata option is configured. This changes the Windows path from %APPDATA% to a host local %USERPROFILE%\Local Settings\Application Data\ path (aka, LOCAL_APPDATA). Patch from coderman. svn:r18122
2009-01-10Fix ServerDNSRandomizeCase so that setting it to 0 works.Nick Mathewson
Bugfix on 0.2.1.7-alpha. Backport candidate. Fixes bug 905. svn:r18063
2009-01-07Check that Libevent header version matches Libevent library version.Nick Mathewson
Unfortunately, old Libevents don't _put_ a version in their headers, so this can get a little tricky. Fortunately, the only binary-compatibility issue we care about is the size of struct event. Even more fortunately, Libevent 2.0 will let us keep binary compatiblity forever by letting us decouple ourselves from the structs, if we like. svn:r18014
2009-01-07Discard router descriptors as we load them if they are more thanRoger Dingledine
five days old. Otherwise if Tor is off for a long time and then starts with cached descriptors, it will try to use the onion keys in those obsolete descriptors when building circuits. Bugfix on 0.2.0.x. Fixes bug 887. svn:r17993
2009-01-06When our circuit fails at the first hop (e.g. we get a destroyRoger Dingledine
cell back), avoid using that OR connection anymore, and also tell all the one-hop directory requests waiting for it that they should fail. Bugfix on 0.2.1.3-alpha. svn:r17984
2009-01-06Make outgoing DNS requests respect OutboundBindAddress.Nick Mathewson
Fixes the bug part of bug 789. svn:r17983
2009-01-06ok, all set to destabilize it againRoger Dingledine
svn:r17980
2009-01-06bump to 0.2.1.10-alpha, reorganize the changelogtor-0.2.1.10-alphaRoger Dingledine
svn:r17974
2009-01-06and mention the bug # in the changelogRoger Dingledine
svn:r17971
2009-01-06When a relay gets a create cell it can't decrypt (e.g. because it'sRoger Dingledine
using the wrong onion key), we were dropping it and letting the client time out. Now actually answer with a destroy cell. Bugfix on 0.0.2pre8. svn:r17970
2009-01-06Update to the "December 19 2008" ip-to-country fileRoger Dingledine
svn:r17968
2009-01-06specify it was a bugfix on something from 2007Roger Dingledine
svn:r17960
2009-01-06Prevent bridge relays from serving their 'extrainfo' documentRoger Dingledine
to anybody who asks, now that extrainfo docs include potentially sensitive aggregated client geoip summaries. svn:r17958
2009-01-06Bugfix on r13098. Backport candidate.Roger Dingledine
When we made bridge authorities stop serving bridge descriptors over unencrypted links, we also broke DirPort reachability testing for bridges. So bridges with a non-zero DirPort were printing spurious warns to their logs. Bugfix on 0.2.0.16-alpha. Fixes bug 709. svn:r17945