blob: da06a8f57be81b17ab15a286beaf0806a3382fba (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
|
(Remember to include both the revision number _AND_ an abbreviated
description of the patch.)
Backport for 0.2.0:
o r17135: ClientDNSRejectInternalAddresses not consistently obeyed.
Backport for 0.2.0 once better tested:
o r16136: prevent circid collision. [Also backport to 0.1.2.x??]
o r16558: Avoid mis-routing CREATED cells.
Xo r16621: Make some DNS code more robust (partial; see also libevent
approach). (Also maybe r16674)
[Partially backported. Instead of the basic name checking, I backported
r17171 instead, to be even more resistant to poisoning.]
o r17091: distinguish "no routers support pending circuits" from
"no circuits are pending."
o See also r17181...
o ... and r17184.
- r17137: send END cell in response to connect to nonexistent hidserv port.
- r17138: reject *:* servers should never do DNS lookups.
o r17139: Fix another case of overriding .exit choices.
- r17162 and r17164: fix another case of not checking cpath_layer.
- r17208,r17209,r7211,r17212,r17214: Avoid gotterdammerung when an
authority has an expired certificate.
- r17562: Fix bug 874, wherein a sighup would make us kill all our intro
points and leave their corpses for the next set of intro points to
stumble over.
o r17566: FIx bug 691, wherein failure to run dns_init() would kill Tor
dead.
Backport for 0.2.0, maybe:
- r14830: Disable TLS compression. This saves RAM and CPU, and
makes our TLS compression harder to distinguish from
firefox's. Win/win/win, right?
|