Browse Source

Remove changes files for those items already merged in 0.3.2

Nick Mathewson 7 years ago
parent
commit
527eb563cb

+ 0 - 9
changes/bug21394

@@ -1,9 +0,0 @@
-  o Major bugfixes (Exit nodes):
-    - Fix an issue causing high-bandwidth exit nodes to fail a majority
-      or all of their DNS requests, making them basically unsuitable for
-      regular usage in Tor circuits. The problem is related to
-      libevent's DNS handling, but we can work around it in Tor. Fixes
-      bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced
-      eventdns. Credit goes to Dhalgren for identifying and finding a
-      workaround to this bug and to gamambel, arthuredelstein and
-      arma in helping to track it down and analyze it.

+ 0 - 11
changes/bug23318

@@ -1,11 +0,0 @@
-  o Minor bugfixes (path selection):
-    - When selecting relays by bandwidth, avoid a rounding error that
-      could sometimes cause load to be imbalanced incorrectly. Previously,
-      we would always round upwards; now, we round towards the nearest
-      integer.  This had the biggest effect when a relay's weight adjustments
-      should have given it weight 0, but it got weight 1 instead.
-      Fixes bug 23318; bugfix on 0.2.4.3-alpha.
-    - When calculating the fraction of nodes that have descriptors, and all
-      all nodes in the network have zero bandwidths, count the number of nodes
-      instead.
-      Fixes bug 23318; bugfix on 0.2.4.10-alpha.

+ 0 - 4
changes/bug23623

@@ -1,4 +0,0 @@
-  o Minor bugfixes (onion services):
-    - Cache some needed onion service client information instead of
-      continuously computing it over and over again. Fixes bug 23623; bugfix
-      on 0.3.2.1-alpha.

+ 0 - 6
changes/bug23693

@@ -1,6 +0,0 @@
-  o Minor bugfixes (relay, crash):
-    - Avoid a crash when transitioning from client mode to bridge mode.
-      Previously, we would launch the worker threads whenever our "public
-      server" mode changed, but not when our "server" mode changed.
-      Fixes bug 23693; bugfix on 0.2.6.3-alpha.
-

+ 0 - 6
changes/bug23751

@@ -1,6 +0,0 @@
-  o Minor bugfixes (scheduler, channel):
-    - Ignore channels that have been closed while flushing cells. This can
-      happen if the write on the connection fails leading to the channel being
-      closed while in the scheduler loop. This is not a complete fix, it is a
-      bandaid until we are able to refactor those interactions. Fixes bug
-      23751; bugfix on 0.3.2.1-alpha.

+ 0 - 4
changes/bug23753

@@ -1,4 +0,0 @@
-  o Minor features (logging, scheduler):
-    - Introduce a SCHED_BUG() function to log extra information about the
-      scheduler state if we ever catch a bug in the scheduler. Closes ticket
-      23753.

+ 0 - 4
changes/bug23762

@@ -1,4 +0,0 @@
-  o Minor bugfixes (hidden service v3):
-    - Properly retry HSv3 descriptor fetches in the case where we were initially
-      missing required directory information. Fixes bug 23762; bugfix on
-      0.3.2.1-alpha.

+ 0 - 4
changes/bug23774

@@ -1,4 +0,0 @@
-  o Minor bugfixes (memory leak):
-    - Fix a minor memory-leak-at-exit in the KIST scheduler. This
-      bug should have no user-visible impact. Fixes bug 23774;
-      bugfix on 0.3.2.1-alpha.

+ 0 - 6
changes/bug23816

@@ -1,6 +0,0 @@
-  o Minor bugfixes (directory client):
-    - On failure to download directory information, delay retry attempts
-      by a random amount based on the "decorrelated jitter" algorithm.
-      Our previous delay algorithm tended to produce extra-long delays too
-      easily. Fixes bug 23816; bugfix on 0.2.9.1-alpha.
-

+ 0 - 5
changes/bug23820

@@ -1,5 +0,0 @@
-  o Minor bugfixes (IPv6, v3 single onion services):
-    - Remove buggy code for IPv6-only v3 single onion services, and reject
-      attempts to configure them. This release supports IPv4, dual-stack, and
-      IPv6-only v3 hidden services; and IPv4 and dual-stack v3 single onion
-      services. Fixes bug 23820; bugfix on 0.3.2.1-alpha.

+ 0 - 9
changes/bug23985

@@ -1,9 +0,0 @@
-  o Minor bugfixes (bootstrapping):
-    - Fetch descriptors aggressively whenever we lack enough
-      to build circuits, regardless of how many descriptors we are missing.
-      Previously, we would delay launching the fetch when we had fewer than
-      15 missing descriptors, even if some of those descriptors were
-      blocking circuits from building. Fixes bug 23985; bugfix on
-      0.1.1.11-alpha. The effects of this bug became worse in 0.3.0.3-alpha,
-      when we began treating missing descriptors from our primary guards
-      as a reason to delay circuits.

+ 0 - 5
changes/bug24025

@@ -1,5 +0,0 @@
-  o Minor bugfixes (logging, relay):
-    - Downgrade a warning to a protocol warning in the case the ed25519 key is
-      not consistent between the descriptor and micro descriptor of a relay.
-      This can happen for instance if the relay has been flagged
-      NoEdConsensus. Fixes bug 24025; bugfix on 0.3.2.1-alpha.

+ 0 - 3
changes/bug24082

@@ -1,3 +0,0 @@
-  o Minor bugfixes (testing):
-    - Fix a spurious fuzzing-only use of an uninitialized value.
-      Found by Brian Carpenter. Fixes bug 24082; bugfix on 0.3.0.3-alpha.

+ 0 - 4
changes/bug24115

@@ -1,4 +0,0 @@
-  o Minor bugfixes (manpage, hidden service):
-    - Mention that the HiddenServiceNumIntroductionPoints option is 0-10 for
-      v2 service and 0-20 for v3 service. Fixes bug 24115; bugfix on
-      0.3.2.1-alpha.

+ 0 - 4
changes/bug24150

@@ -1,4 +0,0 @@
-  o Minor bugfixes (v3 onion services):
-    - Fix a memory leak when decrypting a badly formatted v3 onion
-      service descriptor. Fixes bug 24150; bugfix on 0.3.2.1-alpha.
-      Found by OSS-Fuzz; this is OSS-Fuzz issue 3994.

+ 0 - 3
changes/bug24170

@@ -1,3 +0,0 @@
-  o Minor bugfixes (path selection):
-    - Actually log the total bandwidth in compute_weighted_bandwidths().
-      Fixes bug 24170; bugfix on 0.2.4.3-alpha.

+ 0 - 6
changes/bug24247

@@ -1,6 +0,0 @@
-  o Minor bugfixes (fuzzing):
-    - Fix a bug in our fuzzing mock replacement for crypto_pk_checksig(), to
-      correctly handle cases where a caller gives it an RSA key of under 160
-      bits. (This is not actually a bug in Tor itself, but wrather in our
-      fuzzing code.)  Fixes bug 24247; bugfix on 0.3.0.3-alpha.
-      Found by OSS-Fuzz as issue 4177.

+ 0 - 4
changes/geoip-2017-11-06

@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
-      Country database.
-

+ 0 - 3
changes/hsdescv3_fuzz_more

@@ -1,3 +0,0 @@
-  o Minor features (testing):
-    - Our fuzzing tests now test the encrypted portions of the
-      v3 hidden service descriptors.  Implements more of 21509.

+ 0 - 7
changes/ticket21031

@@ -1,7 +0,0 @@
-  o Minor features (removed deprecations):
-   - The ClientDNSRejectInternalAddresses flag can once again be set in
-     non-testing Tor networks, so long as they do not use the default
-     directory authorities.
-     This change also removes the deprecation of this
-     flag in 0.2.9.2-alpha. Closes ticket 21031.
-

+ 0 - 4
changes/ticket24109

@@ -1,4 +0,0 @@
-  o Minor features (integration tests):
-    - Test that IPv6-only clients can use microdescriptors when running
-      "make test-network-all". Requires chutney master 61c28b9 or later.
-      Closes ticket 24109.