From 3040f3760eb5c1c445af5d6c81dc02a4f4620eb5 Mon Sep 17 00:00:00 2001 From: Roger Dingledine Date: Mon, 2 Feb 2009 09:20:48 +0000 Subject: mark r17887 as needing a backport: some windowses let you exploit them if you can hand them the argument to inet_addr(). svn:r18367 --- doc/TODO.020 | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) (limited to 'doc') diff --git a/doc/TODO.020 b/doc/TODO.020 index 808d36384f..684b98dd6e 100644 --- a/doc/TODO.020 +++ b/doc/TODO.020 @@ -3,21 +3,13 @@ description of the patch.) Backport for 0.2.0: - o r17891: Fix a fun OpenBSD warning. - o r17892: Fix another fun OpenBSD warning. - o r17920: bridge relays don't fetch descriptors much + - r17887: Don't accept 1.2.3 as a valid IP address. Backport for 0.2.0 once better tested: - Xo r16621: Make some DNS code more robust (partial; see also libevent - approach). (Also maybe r16674) - [Partially backported. Instead of the basic name checking, I backported - r17171 instead, to be even more resistant to poisoning.] - r17208,r17209,r7211,r17212,r17214: Avoid gotterdammerung when an authority has an expired certificate. - r17886: Don't remove routerinfos as unlisted unless we have a consensus. - - r17887: Don't accept 1.2.3 as a valid IP address. - o r17917, r17993: tors that haven't run lately take 10+ minutes to start - r17924: Close streams when an exit hands us a local IP. - r18210: Call crypto_global_init() with hardwareaccel flag set right in all cases. -- cgit v1.2.3-54-g00ecf