ソースを参照

start folding in the changes files

Roger Dingledine 12 年 前
コミット
85a98b058c
60 ファイル変更226 行追加288 行削除
  1. 226 0
      ChangeLog
  2. 0 4
      changes/bug1938
  3. 0 6
      changes/bug2297-related
  4. 0 5
      changes/bug2822.1
  5. 0 6
      changes/bug2822.2
  6. 0 4
      changes/bug2954_more
  7. 0 10
      changes/bug2988
  8. 0 7
      changes/bug3196
  9. 0 5
      changes/bug3296
  10. 0 4
      changes/bug3894_fmt_doubles
  11. 0 4
      changes/bug3894_more
  12. 0 4
      changes/bug3964
  13. 0 4
      changes/bug4108
  14. 0 3
      changes/bug4369
  15. 0 6
      changes/bug4591
  16. 0 4
      changes/bug4657
  17. 0 5
      changes/bug4710
  18. 0 4
      changes/bug4865
  19. 0 3
      changes/bug4873
  20. 0 3
      changes/bug5070
  21. 0 5
      changes/bug5089
  22. 0 4
      changes/bug5091
  23. 0 4
      changes/bug5095
  24. 0 6
      changes/bug5139
  25. 0 3
      changes/bug5259
  26. 0 6
      changes/bug5283
  27. 0 8
      changes/bug5346
  28. 0 4
      changes/bug5355
  29. 0 7
      changes/bug5374
  30. 0 5
      changes/bug5380
  31. 0 3
      changes/bug5437
  32. 0 8
      changes/bug5541
  33. 0 4
      changes/bug5597
  34. 0 9
      changes/bug5603
  35. 0 4
      changes/bug5604
  36. 0 4
      changes/bug5622
  37. 0 5
      changes/bug5645
  38. 0 4
      changes/bug5723
  39. 0 3
      changes/bug5760
  40. 0 4
      changes/bug5762
  41. 0 7
      changes/bug5786_nocrash
  42. 0 7
      changes/bug5786_nodups
  43. 0 8
      changes/bug5786_range
  44. 0 4
      changes/bug5796
  45. 0 3
      changes/bug5828
  46. 0 4
      changes/bug5858
  47. 0 3
      changes/bug5859
  48. 0 4
      changes/bug5861
  49. 0 5
      changes/bug5891
  50. 0 4
      changes/bug5910
  51. 0 6
      changes/bug5916
  52. 0 5
      changes/bug5954
  53. 0 4
      changes/bug5969
  54. 0 7
      changes/bug5969_022
  55. 0 5
      changes/bug6007
  56. 0 6
      changes/bug6033
  57. 0 4
      changes/close_file_handle
  58. 0 3
      changes/geoip-may2012
  59. 0 3
      changes/getfilesize_64
  60. 0 5
      changes/routerlist_ins_replace

+ 226 - 0
ChangeLog

@@ -1,3 +1,229 @@
+Changes in version 0.2.3.16-alpha - 2012-06-0?
+  o Major bugfixes (general):
+    - Work around a bug in OpenSSL that broke renegotiation with TLS
+      1.1 and TLS 1.2. Without this workaround, all attempts to speak
+      the v2 Tor connection protocol when both sides were using OpenSSL
+      1.0.1 would fail. Resolves ticket 6033.
+    - When waiting for a client to renegotiate, don't allow it to add
+      any bytes to the input buffer. This fixes a potential DoS issue.
+      Fixes bugs 5934 and 6007; bugfix on 0.2.0.20-rc.
+    - Pass correct OR address to managed proxies (like obfsproxy),
+      even when ORListenAddress is used. Fixes bug 4865; bugfix on
+      0.2.3.9-alpha.
+    - The advertised platform of a router now includes only its operating
+      system's name (e.g., "Linux", "Darwin", "Windows 7"), and not its
+      service pack level (for Windows) or its CPU architecture (for Unix).
+      We also no longer include the "git-XYZ" tag in the version. Resolves
+      part of bug 2988.
+
+  o Major bugfixes (clients):
+    - If we are unable to find any exit that supports our predicted ports,
+      stop calling them predicted, so that we don't loop and build
+      hopeless circuits indefinitely. Fixes bug 3296; bugfix on 0.0.9pre6,
+      which introduced predicted ports.
+    - Fix an edge case where if we fetch or publish a hidden service
+      descriptor, we might build a 4-hop circuit and then use that circuit
+      for exiting afterwards -- even if the new last hop doesn't obey our
+      ExitNodes config option. Fixes bug 5283; bugfix on 0.2.0.10-alpha.
+    - Check at each new consensus whether our entry guards were picked
+      long enough ago that we should rotate them. Previously, we only
+      did this check at startup, which could lead to us holding a guard
+      indefinitely. Fixes bug 5380; bugfix on 0.2.1.14-rc.
+    - When fetching a bridge descriptor from a bridge authority,
+      always do so anonymously, whether we have been able to open
+      circuits or not. Partial fix for bug 1938; bugfix on 2.0.7-alpha.
+      This behavior makes it *safer* to use UpdateBridgesFromAuthority,
+      but we'll need to wait for bug 6010 before it's actually usable.
+
+  o Major bugfixes (directory authorities):
+    - When computing weight parameters, behave more robustly in the
+      presence of a bad bwweightscale value. Previously, the authorities
+      would crash if they agreed on a sufficiently broken weight_scale
+      value: now, they use a reasonable default and carry on. Partial
+      fix for 5786; bugfix on 0.2.2.17-alpha.
+    - Check more thoroughly to prevent a rogue authority from
+      double-voting on any consensus directory parameter. Previously,
+      authorities would crash in this case if the total number of
+      votes for any parameter exceeded the number of active voters,
+      but would let it pass otherwise. Partial fix for bug 5786; bugfix
+      on 0.2.2.2-alpha.
+
+  o Minor features:
+    - Rate-limit log messages when asked to connect anonymously to
+      a private address. When these hit, they tended to hit fast and
+      often. Also, don't bother trying to connect to addresses that we
+      are sure will resolve to 127.0.0.1: getting 127.0.0.1 in a directory
+      reply makes us think we have been lied to, even when the address the
+      client tried to connect to was "localhost." Resolves ticket 2822.
+    - Allow packagers to insert an extra string in server descriptor
+      platform lines by setting the preprocessor variable TOR_BUILD_TAG.
+      Resolves the rest of ticket 2988.
+    - Raise the threshold of server descriptors needed (75%) and exit
+      server descriptors needed (50%) before we will declare ourselves
+      bootstrapped. This will make clients start building circuits a
+      little later, but makes the initially constructed circuits less
+      skewed and less in conflict with further directory fetches. Fixes
+      ticket 3196.
+    - Close any connection that sends unrecognized junk before the
+      handshake. Solves an issue noted in bug 4369.
+    - Improve log messages about managed transports. Resolves ticket 5070.
+    - Tag a bridge's descriptor as "never to be sent unencrypted".
+      This shouldn't matter, since bridges don't open non-anonymous
+      connections to the bridge authority and don't allow unencrypted
+      directory connections from clients, but we might as well make
+      sure. Closes bug 5139.
+    - Expose our view of whether we have gone dormant to the controller,
+      via a new "GETINFO dormant" value. Torbutton and other controllers
+      can use this to avoid doing periodic requests through Tor while
+      it's dormant (bug 4718). Fixes bug 5954.
+    - Tell GCC and Clang to check for any errors in format strings passed
+      to the tor_v*(print|scan)f functions.
+    - Update to the May 1 2012 Maxmind GeoLite Country database.
+
+  o Minor bugfixes (already included in 0.2.2.36):
+    - Reject out-of-range times like 23:59:61 in parse_rfc1123_time().
+      Fixes bug 5346; bugfix on 0.0.8pre3.
+    - Correct parsing of certain date types in parse_http_time().
+      Without this patch, If-Modified-Since would behave
+      incorrectly. Fixes bug 5346; bugfix on 0.2.0.2-alpha. Patch from
+      Esteban Manchado Velázques.
+    - Make our number-parsing functions always treat too-large values
+      as an error, even when those values exceed the width of the
+      underlying type. Previously, if the caller provided these
+      functions with minima or maxima set to the extreme values of the
+      underlying integer type, these functions would return those
+      values on overflow rather than treating overflow as an error.
+      Fixes part of bug 5786; bugfix on 0.0.9.
+    - If we hit the error case where routerlist_insert() replaces an
+      existing (old) server descriptor, make sure to remove that
+      server descriptor from the old_routers list. Fix related to bug
+      1776. Bugfix on 0.2.2.18-alpha.
+    - Clarify the behavior of MaxCircuitDirtiness with hidden service
+      circuits. Fixes issue 5259.
+
+  o Minor bugfixes (coding cleanup, on 0.2.2.x and earlier):
+    - Prevent a null-pointer dereference when receiving a data cell
+      for a nonexistent stream when the circuit in question has an
+      empty deliver window. We don't believe this is triggerable,
+      since we don't currently allow deliver windows to become empty,
+      but the logic is tricky enough that it's better to make the code
+      robust. Fixes bug 5541; bugfix on 0.0.2pre14.
+    - Fix a memory leak when trying to launch a DNS request when the
+      network is disabled or the nameservers are unconfigurable. Fixes
+      bug 5916; bugfix on Tor 0.1.2.1-alpha (for the unconfigurable
+      nameserver case) and on 0.2.3.9-alpha (for the DisableNetwork case).
+    - Don't hold a windows file handle open for every file mapping;
+      the file mapping handle is sufficient. Fixes bug 5951; bugfix on
+      0.1.2.1-alpha.
+    - Avoid O(n^2) performance characteristics when parsing a large
+      extrainfo cache. Fixes bug 5828; bugfix on 0.2.0.1-alpha.
+    - Format more doubles with %f, not %lf. Patch from grarpamp to make
+      Tor build correctly on older BSDs again. Fixes bug 3894; bugfix on
+      Tor 0.2.0.8-alpha.
+    - Make our replacement implementation of strtok_r() compatible with
+      the standard behavior of strtok_r(). Patch by nils. Fixes bug 5091;
+      bugfix on 0.2.2.1-alpha.
+    - Fix a NULL-pointer dereference on a badly formed
+      SETCIRCUITPURPOSE command. Found by mikeyc. Fixes bug 5796;
+      bugfix on 0.2.2.9-alpha.
+    - Fix a build warning with Clang 3.1 related to our use of vasprint.
+      Fixes bug 5969. Bugfix on 0.2.2.11-alpha.
+    - Defensively refactor rend_mid_rendezvous() so that protocol
+      violations and length checks happen in the beginning. Fixes
+      bug 5645.
+    - Set _WIN32_WINNT to 0x0501 consistently throughout the code, so
+      that IPv6 stuff will compile on MSVC, and compilation issues
+      will be easier to track down. Fixes bug 5861.
+
+  o Minor bugfixes (correctness, on 0.2.2.x and earlier):
+    - Exit nodes now correctly report EADDRINUSE and EADDRNOTAVAIL as
+      resource exhaustion, so that clients can adjust their load to
+      try other exits. Fixes bug 4710; bugfix on 0.1.0.1-rc, which
+      started using END_STREAM_REASON_RESOURCELIMIT.
+    - Don't check for whether the address we're using for outbound
+      connections has changed until after the outbound connection has
+      completed. On Windows, getsockname() doesn't succeed until the
+      connection is finished. Fixes bug 5374; bugfix on 0.1.1.14-alpha.
+    - If the configuration tries to set MyFamily on a bridge, refuse to
+      do so, and warn about the security implications. Fixes bug 4657;
+      bugfix on 0.2.0.3-alpha.
+    - If the client fails to set a reasonable set of ciphersuites
+      during its v2 handshake renegotiation, allow the renegotiation to
+      continue nevertheless (i.e. send all the required certificates).
+      Fixes bug 4591; bugfix on 0.2.0.20-rc.
+    - When we receive a SIGHUP and the controller __ReloadTorrcOnSIGHUP
+      option is set to 0 (which Vidalia version 0.2.16 now does when
+      a SAVECONF attempt fails), perform other actions that SIGHUP
+      usually causes (like reopening the logs). Fixes bug 5095; bugfix
+      on 0.2.1.9-alpha.
+    - If we fail to write a microdescriptor to the disk cache, do not
+      continue replacing the old microdescriptor file. Fixes bug 2954;
+      bugfix on 0.2.2.6-alpha.
+    - Exit nodes don't need to fetch certificates for authorities that
+      they don't recognize; only directory authorities, bridges,
+      and caches need to do that. Fixes part of bug 2297; bugfix on
+      0.2.2.11-alpha.
+    - Correctly handle checking the permissions on the parent
+      directory of a control socket in the root directory. Bug found
+      by Esteban Manchado Velázquez. Fixes bug 5089; bugfix on Tor
+      0.2.2.26-beta.
+    - When told to add a bridge with the same digest as a preexisting
+      bridge but a different addr:port, change the addr:port as
+      requested. Previously we would not notice the change. Fixes half
+      of bug 5603; fix on 0.2.2.26-beta.
+    - End AUTHCHALLENGE error messages (in the control protocol) with
+      a CRLF. Fixes bug 5760; bugfix on 0.2.2.36 and 0.2.3.13-alpha.
+
+  o Minor bugfixes (on 0.2.3.x):
+    - Turn an assertion (that the number of handshakes received as a
+      server is not < 1) into a warning. Fixes bug 4873; bugfix on
+      0.2.3.1-alpha.
+    - Format IPv4 addresses correctly in ADDRMAP events. (Previously,
+      we had reversed them when the answer was cached.) Fixes bug
+      5723; bugfix on 0.2.3.1-alpha.
+    - Work correctly on Linux systems with accept4 support advertised in
+      their headers, but without accept4 support in the kernel. Fix
+      by murb. Fixes bug 5762; bugfix on 0.2.3.1-alpha.
+    - When told to add a bridge with the same addr:port as a preexisting
+      bridge but a different transport, change the transport as
+      requested. Previously we would not notice the change. Fixes half
+      of bug 5603; fix on 0.2.3.2-alpha.
+    - Avoid a "double-reply" warning when replying to a SOCKS request
+      with a parse error. Patch from Fabian Keil. Fixes bug 4108;
+      bugfix on 0.2.3.4-alpha.
+    - Fix a bug where a bridge authority crashes if it has seen no
+      directory requests when it's time to write statistics to disk.
+      Fixes bug 5891; bugfix on 0.2.3.6-alpha. Also fixes bug 5508 in
+      a better way.
+    - Don't try to open non-control listeners when DisableNetwork is set.
+      Previousy, we'd open all listeners, then immediately close them.
+      Fixes bug 5604; bugfix on 0.2.3.9-alpha.
+    - Don't abort the managed proxy protocol if the managed proxy
+      sends us an unrecognized line; ignore it instead. Fixes bug
+      5910; bugfix on 0.2.3.9-alpha.
+    - Fix a compile warning in crypto.c when compiling with clang 3.1.
+      Fixes bug 5969, bugfix on 0.2.3.9-alpha.
+    - Fix a compilation issue on GNU Hurd, which doesn't have PATH_MAX.
+      Fixes bug 5355; bugfix on 0.2.3.11-alpha.
+    - Remove bogus definition of "_WIN32" from src/win32/orconfig.h, to
+      unbreak the MSVC build. Fies bug 5858; bugfix on 0.2.3.12-alpha.
+    - Resolve numerous small warnings and build issues with MSVC. Resolves
+      bug 5859.
+
+  o Documentation fixes:
+    - Improve the manual's documentation for the NT Service command-line
+      options. Addresses ticket 3964.
+    - Clarify SessionGroup documentation slightly; resolves ticket 5437.
+    - Document the changes to the ORPort and DirPort options, and the
+      fact that {OR/Dir}ListenAddress is now unnecessary (and
+      therefore deprecated). Resolves ticket 5597.
+
+  o Removed files:
+    - Remove the torrc.bridge file: we don't use it for anything, and
+      it had become badly desynchronized from torrc.sample. Resolves
+      bug 5622.
+
+
 Changes in version 0.2.2.36 - 2012-05-24
 Changes in version 0.2.2.36 - 2012-05-24
   Tor 0.2.2.36 updates the addresses for two of the eight directory
   Tor 0.2.2.36 updates the addresses for two of the eight directory
   authorities, fixes some potential anonymity and security issues,
   authorities, fixes some potential anonymity and security issues,

+ 0 - 4
changes/bug1938

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - When fetching a bridge descriptor from a bridge authority,
-      always do so anonymously, whether we have been able to open
-      circuits or not. Partial fix for bug 1938; bugfix on 2.0.7-alpha.

+ 0 - 6
changes/bug2297-related

@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Exit nodes don't need to fetch certificates for authorities that
-      they don't recognize; only directory authorities, bridges, and
-      caches need to do that. Fix related to bug 2297; bugfix on
-      0.2.2.11-alpha.
-

+ 0 - 5
changes/bug2822.1

@@ -1,5 +0,0 @@
-  o Minor features:
-
-    - Rate-limit log messages when asked to connect anonymously to a private
-      address. When these hit, they tended to hit fast and often. Partial
-      fix for bug 2822.

+ 0 - 6
changes/bug2822.2

@@ -1,6 +0,0 @@
-  o Minor features:
-
-    - Don't bother trying to connect to addresses that we are sure will
-      resolve to 127.0.0.1: Getting 127.0.0.1 in a reply makes us think
-      we have been lied to, even when the address the client tried to
-      connect to was "localhost." Partial fix for bug 2822.

+ 0 - 4
changes/bug2954_more

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - If we fail to write a microdescriptor to disk, do not continue
-      replacing the old microdescriptor file. Fix for bug 2954; bugfix
-      on 0.2.2.6-alpha.

+ 0 - 10
changes/bug2988

@@ -1,10 +0,0 @@
-  o Minor features:
-    - The advertised platform of a router now includes only its
-      operating system's name (e.g., "Linux", "Darwin", "Windows 7"),
-      and not its service pack level (for Windows), or its CPU
-      architecture (for Unix). This is part of ticket 2988.
-    - Do not include the (git-XYZ) tag in published server descriptor
-      platform lines. This is part of ticket 2988.
-    - Allow packagers to insert an extra string in server descriptor
-      platform lines by setting the preprocessor variable TOR_BUILD_TAG.
-      This is part of ticket 2988.

+ 0 - 7
changes/bug3196

@@ -1,7 +0,0 @@
-  o Minor features:
-    - Raise the threshold of server descriptors needed (75%) and exit
-      server descriptors needed (50%) before we will declare ourselves
-      bootstrapped. This will make clients declare completion a little
-      later, but makes the initially constructed circuits less weird
-      and less in conflict with directory connections. Fixes ticket
-      #3196.

+ 0 - 5
changes/bug3296

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - If we are unable to find any exit that supports our predicted
-      ports, stop calling them predicted, so that we don't loop and
-      build hopeless circuits indefinitely. Fix for bug 3296; bugfix
-      on 0.0.9pre6, which introduced predicted ports.

+ 0 - 4
changes/bug3894_fmt_doubles

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Format more doubles with %f, not %lf. Patch from grarpamp to make
-      Tor build correctly on older BSDs again. Fixes bug 3894; bugfix on
-      Tor 0.2.0.8-alpha.

+ 0 - 4
changes/bug3894_more

@@ -1,4 +0,0 @@
-  o Build fixes:
-    - Clean up some code issues that prevented Tor from building on older
-      BSDs.  Fixes bug 3894; reported by grarpamp.
-      

+ 0 - 4
changes/bug3964

@@ -1,4 +0,0 @@
-  o Documentation fixes:
-    - Improve the manual's documentation for the NT Service command-line
-      options. Addresses bug 3964.
-

+ 0 - 4
changes/bug4108

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Avoid a "double-reply" warning when replying to a SOCKS request
-      with a parse error. Patch from Fabian Keil. Fix for bug 4108;
-      bugfix on 0.2.3.4-alpha.

+ 0 - 3
changes/bug4369

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Close any connection that sends unrecognized junk before the
-      handshake.  Solves an issue noted in bug 4369.

+ 0 - 6
changes/bug4591

@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - If the client fails to set a reasonable set of ciphersuites
-      during its v2 handshake renegotiation, allow the renegotiation
-      to continue nevertheless (i.e., send all the required
-      certificates). Fix for bug 4591; bugfix on 0.2.0.20-rc.
-

+ 0 - 4
changes/bug4657

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - If the configuration tries to set MyFamily on a bridge, refuse to
-      do so, and warn about the security implications. Fix for bug 4657;
-      bugfix on 0.2.0.3-alpha.

+ 0 - 5
changes/bug4710

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Exit nodes now correcly report EADDRINUSE and EADDRNOTAVAIL as
-      resource exhaustion, so that clients can adjust their load to
-      try other exits. Fix for bug 4710; bugfix on 0.1.0.1-rc, which
-      started using END_STREAM_REASON_RESOURCELIMIT.

+ 0 - 4
changes/bug4865

@@ -1,4 +0,0 @@
-  o Major bugfixes:
-    - Pass correct OR address to managed proxies, even when
-      ORListenAddress is used. Fixes bug #4865; bugfix on
-      0.2.3.9-alpha.

+ 0 - 3
changes/bug4873

@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - Turn an assertion (that the number of handshakes received as a
-      server is not < 1) into a warning. Bug 4873.

+ 0 - 3
changes/bug5070

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Improve log messages about managed transports. Resolves ticket
-      5070.

+ 0 - 5
changes/bug5089

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Correctly handle checking the permissions on the parent
-      directory of a control socket in the root directory. Bug found
-      by Esteban Manchado Velázquez. Fix for bug 5089; bugfix on Tor
-      0.2.2.26-beta.

+ 0 - 4
changes/bug5091

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Make our replacement implementation of strtok_r compatible with
-      the standard behavior of strtok_r. Patch by nils. Fixes bug
-      5091; bugfix on 0.2.2.1-alpha.

+ 0 - 4
changes/bug5095

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - When we receive a SIGHUP and the controller-use __ReloadTorrcOnSIGHUP
-      option is set to 0, perform other actions that SIGHUP usually causes
-      (like reopening the logs). Fixes bug 5095; bugfix on 0.2.1.9-alpha.

+ 0 - 6
changes/bug5139

@@ -1,6 +0,0 @@
-  o Minor features (bridges):
-    - Tag a bridge's descriptor as "never to be sent
-      unencrypted". This shouldn't matter, since bridges don't open
-      non-anonymous connections to the bridge authority and don't
-      allow unencrypted directory connections from clients, but we
-      might as well make sure. Closes bug 5139.

+ 0 - 3
changes/bug5259

@@ -1,3 +0,0 @@
-  o Documentation fixes:
-    - Clarify the behavior of MaxCircuitDirtiness with hidden service
-      circuits. Fix for issue 5259.

+ 0 - 6
changes/bug5283

@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - Fix an edge case where if we fetch or publish a hidden service
-      descriptor, we might build a 4-hop circuit and then use that circuit
-      for exiting afterwards -- even if the new last hop doesn't obey our
-      ExitNodes config option. Fixes bug 5283; bugfix on 0.2.0.10-alpha.
-

+ 0 - 8
changes/bug5346

@@ -1,8 +0,0 @@
-  o Minor bugfixes:
-    - Correct parsing of certain date types in parse_http_time().
-      Without this patch, If-Modified-Since would behave
-      incorrectly. Fix for bug 5346; bugfix on 0.2.0.2-alpha. Patch from
-      Esteban Manchado Velázques.
-    - Reject out-of-range times like 23:59:61. Fix for bug 5346;
-      bugfix on 0.0.8pre3.
-

+ 0 - 4
changes/bug5355

@@ -1,4 +0,0 @@
-  o Major bugfixes:
-    - Fix a compilation issue on GNU Hurd, which doesn't have PATH_MAX. Fixes
-      bug 5355; bugfix on 0.2.3.11-alpha.
-

+ 0 - 7
changes/bug5374

@@ -1,7 +0,0 @@
-  o Minor bugfixes:
-
-    - Don't check for whether the address we're using for outbound
-      connections has changed until after the outbound connection has
-      completed. On Windows, getsockname() doesn't succeed until the
-      connection is finished. Fix for bug 5374; bugfix on
-      0.1.1.14-alpha.

+ 0 - 5
changes/bug5380

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Check our entry guards for having been picked too long ago when
-      we get a new consensus. (Previously, we only did this check at
-      startup, which could lead to us holding a guard indefinitely,
-      and give weird results.) Fixes bug 5380; bugfix on 0.2.1.14-rc.

+ 0 - 3
changes/bug5437

@@ -1,3 +0,0 @@
-  o Documentation fixes:
-    - Clarify SessionGroup documentation slightly; resolves bug 5437.
-

+ 0 - 8
changes/bug5541

@@ -1,8 +0,0 @@
-  o Minor bugfixes:
-    - Prevent a null-pointer dereference when receiving a data cell
-      for a nonexistent stream when the circuit in question has an
-      empty deliver window. We don't believe this is triggerable,
-      since we don't currently allow deliver windows to become empty,
-      but the logic is tricky enough that it's better to make the code
-      robust. Fixes bug 5541; bugfix on 0.0.2pre14.
-

+ 0 - 4
changes/bug5597

@@ -1,4 +0,0 @@
-  o Documentation:
-    - Document the changes to the ORPort and DirPort options, and the
-      fact that {OR/Dir}ListenAddress is now unnecessary (and
-      therefore deprecated).

+ 0 - 9
changes/bug5603

@@ -1,9 +0,0 @@
-  o Minor bugfixes:
-    - When told to add a bridge with the same addr:port as a
-      preexisting bridge but a different transport, change the
-      transport as requested. Previously we would not notice the
-      change. Fix for bug 5603; fix on 0.2.3.2-alpha.
-    - When told to add a bridge with the same digest as a
-      preexisting bridge but a different addr:port, change the
-      addr:port as requested. Previously we would not notice the
-      change. Fix for bug 5603; fix on 0.2.2.26-beta.

+ 0 - 4
changes/bug5604

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Don't try to open non-control listeners when DisableNetwork is set.
-      Previousy, we'd open all listeners, then immediately close them.
-      Fixes bug 5604; bugfix on 0.2.3.9-alpha.

+ 0 - 4
changes/bug5622

@@ -1,4 +0,0 @@
-  o Removed files:
-    - Remove the torrc.bridge file: we don't use it for anything, and
-      it had become badly desynchronized from torrc.sample.  Resolves
-      bug 5622.

+ 0 - 5
changes/bug5645

@@ -1,5 +0,0 @@
-  o Code refactoring:
-    - Defensively refactor rend_mid_rendezvous() so that protocol
-      violations and length checks happen in the beginning. Fixes bug
-      5645.
-

+ 0 - 4
changes/bug5723

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Format IPv4 addresses correctly in ADDRMAP events. (Previously,
-      we had reversed them when the answer was cached.) Fixes bug
-      5723; bugfix on 0.2.3.1-alpha.

+ 0 - 3
changes/bug5760

@@ -1,3 +0,0 @@
-  o Major bugfixes:
-    - End AUTHCHALLENGE error response messages with a CRLF. Fixes bug 5760;
-      bugfix on 0.2.3.16-alpha, and backported to maint-0.2.2

+ 0 - 4
changes/bug5762

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Work correctly on Linux systems with accept4 support advertised in
-      their headers, but without accept4 support in the kernel. Fix
-      by murb. Fixes bug 5762; bugfix on 0.2.3.1-alpha.

+ 0 - 7
changes/bug5786_nocrash

@@ -1,7 +0,0 @@
-  o Major bugfixes (directory authorties):
-    - When computing weight parameters, behave more robustly in the
-      presence of a bad bwweightscale value.  Previously, the
-      authorities would crash if they agreed on a sufficiently browken
-      weight_scale value: now, they use a reasonable default and carry
-      on. Partial fix for 5786; bugfix on 0.2.2.17-alpha.
-

+ 0 - 7
changes/bug5786_nodups

@@ -1,7 +0,0 @@
-  o Major bugfixes (directory authority):
-    - Check more thoroughly to prevent a rogue authority from
-      double-voting on any consensus directory parameter.  Previously,
-      authorities would crash in this case if the total number of votes
-      for any parameter exceeded the number of active voters, but would
-      let it pass otherwise.  Partial fix for bug 5786; bugfix on
-      0.2.2.2-alpha.

+ 0 - 8
changes/bug5786_range

@@ -1,8 +0,0 @@
-  o Minor bugfixes:
-    - Make our number-parsing functions always treat too-large values
-      as an error, even when those values exceed the width of the
-      underlying type. Previously, if the caller provided these
-      functions with minima or maxima set to the extreme values of the
-      underlying integer type, these functions would return those
-      values on overflow rather than treating overflow as an error.
-      Fix for part of bug 5786; bugfix on Tor 0.0.9.

+ 0 - 4
changes/bug5796

@@ -1,4 +0,0 @@
-  o Minor bugfixes (controller):
-    - Fix a NULL-pointer derefernce on a badly formed
-      SETCIRCUITPURPOSE command. Found by mikeyc. Fixes bug 5796;
-      bugfix on 0.2.2.9-alpha.

+ 0 - 3
changes/bug5828

@@ -1,3 +0,0 @@
-  o Minor bugfixes (performance):
-    - Avoid O(n^2) performance characteristics when parsing a large
-      extrainfo cache. Fixes bug 5828; bugfix on 0.2.0.1-alpha.

+ 0 - 4
changes/bug5858

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Remove bogus definition of "_WIN32" from src/win32/orconfig.h, to
-      unbreak the MSVC build. Fies bug 5858; bugfix on 0.2.3.12-alpha.
-

+ 0 - 3
changes/bug5859

@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - Resolve numerous small warnings and build issues with MSVC. Resolves
-      bug 5859.

+ 0 - 4
changes/bug5861

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Set _WIN32_WINNT to 0x0501 consistently throughout the code, so
-      that IPv6 stuff will compile on MSVC, and compilation issues
-      will be easier to track down. Fix for bug 5861.

+ 0 - 5
changes/bug5891

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Fix a bug where a bridge authority crashes if it has seen no
-      directory requests when it's time to write statistics to disk.
-      Fixes bug 5891.  Also fixes bug 5508 in a better way.
-

+ 0 - 4
changes/bug5910

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Don't abort the managed proxy protocol if the managed proxy
-      sends us an unrecognized line; ignore it instead. Fixes bug
-      5910; bugfix on 0.2.3.9-alpha.

+ 0 - 6
changes/bug5916

@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Fix a memory leak when trying to launch a DNS request when the
-      network is disabled or the nameservers are unconfigurable.  Fix
-      for bug 5916; bugfix on Tor 0.1.2.1-alpha (for the
-      unconfigurable nameserver case) and on 0.2.3.9-alpha (for the
-      DisableNetwork case).

+ 0 - 5
changes/bug5954

@@ -1,5 +0,0 @@
-  o Minor features (controller):
-    - Expose our view of whether we have gone dormant to the
-      controller, via a new "GETINFO dormant" value. Due to bug 4718,
-      torbutton needs this to avoid excessive version checking. Fixes
-      bug 5954.

+ 0 - 4
changes/bug5969

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Fix a compile warning in crypto.c when compiling with clang 3.1.
-      Fixes bug 5969, bugfix on 0.2.3.9-alpha.
-

+ 0 - 7
changes/bug5969_022

@@ -1,7 +0,0 @@
-  o Minor bugfixes
-    - Fix a build warning with Clang 3.1 related to our use of vasprint.
-      Fix for bug 5969. Bugfix on 0.2.2.11-alpha.
-
-  o Compilation improvements:
-    - Tell GCC and Clang to check for any errors in format strings passed
-      to the tor_v*(print|scan)f functions.

+ 0 - 5
changes/bug6007

@@ -1,5 +0,0 @@
-  o Major bugfixes (security):
-    - When waiting for a client to renegotiate, don't allow it to add
-      any bytes to the input buffer. This fixes a DoS issue. Fix for
-      bugs 6007 and 5934; bugfix on 0.2.0.20-rc.
-

+ 0 - 6
changes/bug6033

@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - Work around a bug in OpenSSL that broke renegotiation with
-      TLS 1.1 and TLS 1.2.  Without this workaround, all attempts
-      to speak the v2 Tor network protocol when both sides were
-      using OpenSSL 1.0.1 would fail.  Fix for bug 6033, which is
-      not a bug in Tor.

+ 0 - 4
changes/close_file_handle

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Don't hold a windows file handle open for every file mapping;
-      the file mapping handle is sufficient. Fix for bug 5951; bugfix on
-      0.1.2.1-alpha.

+ 0 - 3
changes/geoip-may2012

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the May 1 2012 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/getfilesize_64

@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - On Windows, correctly detect errors and large file sizes from
-      GetFileSize. Fixes bug 5957; bugfix on Tor 0.1.2.1-alpha.

+ 0 - 5
changes/routerlist_ins_replace

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - If we hit the error case where routerlist_insert() replaces an
-      existing (old) server descriptor, make sure to remove that
-      server descriptor from the old_routers list. Fix related to bug
-      1776. Bugfix on 0.2.2.18-alpha.