Prechádzať zdrojové kódy

Remove changes files that predate current origin/release-0.2.2

Nick Mathewson 13 rokov pred
rodič
commit
e9fb50c797

+ 0 - 6
changes/bug1074-part2

@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - Stop sending a CLOCK_SKEW controller status event whenever
-      we fetch directory information from a relay that has a wrong clock.
-      Instead, only inform the controller when it's a trusted authority
-      that claims our clock is wrong. Bugfix on tor-0.1.2.6-alpha;
-      fixes the other half of bug 1074.

+ 0 - 4
changes/bug2004

@@ -1,4 +0,0 @@
-  o Minor features
-    - Log less aggressively about circuit timeout changes, and improve some
-      other circuit timeout messages.  Resolves bug 2004.
-

+ 0 - 4
changes/bug2060

@@ -1,4 +0,0 @@
-  o Minor features
-    - Make sure to disable DirPort if running as a bridge.  DirPorts aren't
-      used on bridges, and it makes bridge scanning way too easy.
-

+ 0 - 9
changes/bug2081_followup

@@ -1,9 +0,0 @@
-  o Minor features (authorities)
-    - Directory authorities now reject relays running any versions of
-      Tor between 0.2.1.3-alpha and 0.2.1.18 inclusive; they have
-      known bugs that keep RELAY_EARLY cells from working on rendezvous
-      circuits.  Followup to fix for bug 2081.
-    - Directory authorities now reject relays running any version of Tor
-      older than 0.2.0.26-rc.  That is the earliest version that fetches
-      current directory information correctly.  Fix for bug 2156.
-

+ 0 - 6
changes/bug2097-more

@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Fix a logic error in directory_fetches_from_authorities that
-      would cause all _non_-exits refusing single-hop-like circuits to
-      fetch from authorities, when we wanted to have _exits_ fetch
-      from authorities.  Fix by boboper; fixes more of 2097; bugfix on
-      0.2.2.16-alpha.

+ 0 - 4
changes/bug2146.1

@@ -1,4 +0,0 @@
-  - Major bugfixes:
-    o Fix a bug that could break accounting on 64-bit systems with large
-      time_t values, making them hibernate for impossibly long intervals.
-      Bugfix on 0.0.9pre6; fix for bug 2146; fix by boboper.

+ 0 - 4
changes/bug2181

@@ -1,4 +0,0 @@
-  o Minor features
-    - Log a little more clearly about the times at which we're no longer
-      accepting new connections.  Resolves bug 2181.
-

+ 0 - 11
changes/bug2190

@@ -1,11 +0,0 @@
-  o Minor bugfixes
-    - Prevent calls from Libevent from inside Libevent log handlers.
-      This had potential to cause a nasty set of crashes, especially if
-      running Libevent with debug logging enabled, and running Tor
-      with a controller watching for low-severity log messages.
-      Bugfix on 0.1.0.2-rc.  Fixes bug 2190.
-    - Make Libevent log messages get delievered to controllers later,
-      and not from inside the Libevent log handler.  This prevents
-      unsafe reentrant Libevent calls while still letting the log
-      messages get through.
-

+ 0 - 6
changes/bug2203

@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Clients should not weight BadExit nodes as Exits in their node
-      selection. Similarly, directory authorities should not count
-      BadExit bandwidth as Exit bandwidth when computing bandwidth-weights.
-      Bugfix on 0.2.2.10-alpha; fixes bug 2203.
-

+ 0 - 5
changes/bug2210

@@ -1,5 +0,0 @@
-  o ?? bugfixes:
-    - Fix a bug that would cause newer streams on a given circuit to
-      get preference when reading bytes from the network.  Fixes bug
-      2210.  Fix by Mashael AlSabah.  This bug was introduced before
-      the first Tor release, in svn revision r152.

+ 0 - 3
changes/bug2235

@@ -1,3 +0,0 @@
-  o Minor bugfixes
-    - Avoid crashes when AccountingMax is set on clients.  Fixes bug 2235;
-      Bugfix on 0.2.2.18-alpha.  Diagnosed by boboper.

+ 0 - 15
changes/bug2279

@@ -1,15 +0,0 @@
-  o Minor bugfixes
-    - Avoid a double mark-for-free warning when failing to attach a
-      transparent proxy connection.  Fixes bug 2279.  Bugfix on
-      Tor 0.1.2.1 alpha.
-
-  o Minor features
-    - Detect attempts at the client side to open connections to private
-      IP addresses (like 127.0.0.1, 10.0.0.1, and so on) with a randomly
-      chosen exit node.  Attempts to do so are always ill-defined, generally
-      prevented by exit policies, and usually in error.  This will also
-      help to detect loops in transparent proxy configurations.  You can
-      disable this feature by setting "ClientRejectInternalAddresses 0"
-      in your torrc.
-
-

+ 0 - 5
changes/bug2305

@@ -1,5 +0,0 @@
-  o Build changes
-    - Tor does not build packages correctly with Automake 1.6 and earlier;
-      added a check to Makefile.am to make sure that we're building with
-      Automake 1.7 or later.
-

+ 0 - 4
changes/bug2313

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix compilation on mingw when a pthreads compatibility library
-      has been installed.  (We don't want to use it, so we shouldn't
-      be including pthread.h.)  Fixes bug 2313; bugfix on 0.1.0.1-rc.

+ 0 - 4
changes/bug2314

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Fix a bunch of compile warnings revealed by mingw with gcc 4.5. Fixes
-      bug 2314.
-

+ 0 - 9
changes/bug2317

@@ -1,9 +0,0 @@
-  o Major features:
-    - Introduce minimum/maximum values that a client is going to believe
-      in a consensus. This helps to avoid crashes or worse when a param
-      has a weird value.
-
-  o Major bugfixes:
-    - Prevent crash/heap corruption when cbtnumnodes consensus parameter is
-      set to 0 or large values. Fixes bug 2317.
-

+ 0 - 4
changes/bug2324

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Add a check for SIZE_T_MAX to tor_realloc to try to avoid
-      underflow errors there too.  Fixes bug 2324.
-

+ 0 - 5
changes/bug2324_uncompress

@@ -1,5 +0,0 @@
-  o Major bugfixes (security):
-    - Prevent a DoS attack by disallowing any zlib-compressed data
-      whose compression factor is implausibly high.  Fixes the
-      second part of bug2324; found by doors.
-

+ 0 - 6
changes/bug2326

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug where we would assert if we ever had a
-      cached-descriptors.new file (or another file read directly into
-      memory) of exactly SIZE_T_CEILING bytes.  Found by doors; fixes
-      bug 2326; bugfix on 0.2.1.25.
-

+ 0 - 9
changes/bug2328

@@ -1,9 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug where we would declare that we had run out of virtual
-      addresses when the address space was only half-exhausted.  Bugfix
-      on 0.1.2.1-alpha.
-    - Correctly handle the case where AutomapHostsOnResolve is set but no
-      virtual addresses are available.  Fixes bug2328, bugfix on
-      0.1.2.1-alpha.  Bug found by doorss.
-    - Correctly handle wrapping around to when we run out of virtual address
-      space.  Found by cypherpunks, bugfix on 0.2.0.5-alpha.

+ 0 - 7
changes/bug2330

@@ -1,7 +0,0 @@
-  o Minor bugfixes
-    - Handle SOCKS messages longer than 128 bytes long correctly, rather
-      than waiting forever for them to finish.  Fixes bug 2330.  Bugfix on
-      0.2.0.16-alpha.  Found by doorss.
-
-
-

+ 0 - 7
changes/bug2331

@@ -1,7 +0,0 @@
-  o Minor bugfixes:
-    - Add assertions to check for overflow in arguments to
-      base32_encode and base32_decode; fix a signed-unsigned
-      comparison there too.  These bugs are not actually reachable in
-      Tor, but it's good to prevent future errors too.  Found by
-      doorss.
-

+ 0 - 4
changes/bug2332

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug with handling misformed replies to reverse DNS lookup
-      requests in DNSPort.  Bugfix on Tor 0.2.0.1-alpha.  Related to a bug
-      reported by doorss.

+ 0 - 3
changes/bug2337

@@ -1,3 +0,0 @@
-  o Minor bugfixes
-    - Detect broken platforms with a signed size_t, and refuse to
-      build there.  Found and analyzed by doorss and rransom.

+ 0 - 6
changes/bug2346

@@ -1,6 +0,0 @@
-  o Minor features
-    - If writing the state file to disk fails, wait up to an hour
-      before retrying again.  (Our old code would retry the write
-      immediately.)  Fixes bug 2346.  Bugfix on Tor 0.1.1.3-alpha.
-
-

+ 0 - 6
changes/bug2352

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Fix some potential asserts and partsing issues with grossly
-      malformed router caches.  Fixes bug 2352.  Found by doorss.
-      Bugfix on Tor 0.2.1.27.
-
-

+ 0 - 5
changes/bug2358

@@ -1,5 +0,0 @@
-  o Minor features
-    - Enable Address Space Layout Randomization (ASLR) and Data Execution
-      Prevention (DEP) by default on Windows to make it harder for
-      attackers to exploit vulnerabilities.  Patch from John Brooks.
- 

+ 0 - 6
changes/bug2363

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Correctly detect failures to create DNS requests when using Libevent
-      versions before v2.  (Before Libevent 2, we used our own evdns
-      implementation.  Its return values for Libevent's evdns_resolve_*()
-      functions are not consistent with those from Libevent.) Found by
-      Lodger; fixes bug 2363; bugfix on 0.2.2.6-alpha.

+ 0 - 4
changes/bug2364

@@ -1,4 +0,0 @@
-  o Documentation
-    - Document the default socks host and port (127.0.0.1:9050) for
-      tor-resolve.
-

+ 0 - 8
changes/bug2378

@@ -1,8 +0,0 @@
-  o Minor bugfixes
-    - Correctly detect failure to allocate an OpenSSL BIO.  Fixes bug 2378;
-      found by "cypherpunks".   This bug was introduced before the
-      first Tor release, in svn commit r110.
-
-  o Minor code simplifications and refactorings
-    - Always treat failure to allocate an RSA key as an unrecoverable
-      allocation error.

+ 0 - 6
changes/bug2384

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Zero out a few more keys in memory before freeing them.  Fixes bug
-      2384 and part of bug 2385.  These key instances found by
-      "cypherpunks".  Bugfix on 0.0.2pre9.
-
-

+ 0 - 6
changes/bug2408

@@ -1,6 +0,0 @@
-  o Major bugfixes
-    - Ignore and warn about "PublishServerDescriptor hidserv" torrc
-      options.  The 'hidserv' argument never controlled publication
-      of hidden service descriptors.  Bugfix on 0.2.0.1-alpha.
-
-

+ 0 - 4
changes/bug2409

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Resolve a bug in verifying signatures of directory objects
-      with digests longer than SHA1.  Bugfix on 0.2.2.20-alpha;
-      fixes bug 2409; found by "piebeer".

+ 0 - 5
changes/bug2432

@@ -1,5 +0,0 @@
-  o Minor features:
-    - Provide a log message stating which geoip file we're parsing
-      instead of just stating that we're parsing the geoip file.
-      Implements ticket 2432.
-

+ 0 - 5
changes/bug2433

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Don't assert when changing from bridge to relay or vice versa with a controller.
-      The assert happened because we didn't properly initialize our keys in this case.
-      Bugfix on 0.2.2.18, fixes bug 2433. Issue first discovered by bastik.
-

+ 0 - 5
changes/bug2470

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - If relays set RelayBandwidthBurst but not RelayBandwidthRate,
-      Tor would ignore their RelayBandwidthBurst setting,
-      potentially using more bandwidth than expected. Bugfix on
-      0.2.0.1-alpha. Reported by Paul Wouters. Fixes bug 2470.

+ 0 - 5
changes/bytecount

@@ -1,5 +0,0 @@
-  o Minor bugfixes
-    - Fix a off-by-one error in calculating some controller command argument
-      lengths.  Fortunately, this is harmless, the controller code does
-      redundant NUL termination too.  Found by boboper.  Bugfix on
-      0.1.1.1-alpha.

+ 0 - 3
changes/dhparam

@@ -1,3 +0,0 @@
-  o Minor features
-    - Adjust our TLS Diffie-Hellman parameters to match those used by
-      Apache's mod_ssl.

+ 0 - 6
changes/fix2195-fix

@@ -1,6 +0,0 @@
-  o Minor bugfixes:
-    - Do not dereference NULL if a bridge fails to build its
-      extra-info descriptor. Previously, we would have dereferenced
-      NULL. Found by an anonymous commenter on Trac. Bugfix on
-      0.2.2.19-alpha.
-

+ 0 - 3
changes/gabelmoo-newip

@@ -1,3 +0,0 @@
- o Directory authority changes:
-    - Change IP address and ports for gabelmoo (v3 directory authority).
-

+ 0 - 3
changes/geoip-dec2010

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the December 1 2010 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-feb2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the February 1 2011 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-jan2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the January 1 2011 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/mingw-openssl098m

@@ -1,3 +0,0 @@
- o Minor features
-   - Build correctly on mingw with more recent version of OpenSSL 0.9.8.
-     Patch from mingw-san.

+ 0 - 6
changes/policy_summarize-assert

@@ -1,6 +0,0 @@
-  o Major bugfixes (security)
-    - Fix a bounds-checking error that could allow an attacker to
-      remotely crash a directory authority.  Found by piebeer.
-      Bugfix on 0.2.1.5-alpha.
-
-

+ 0 - 5
changes/remove-website

@@ -1,5 +0,0 @@
-  o Removed files:
-    - Stop shipping the old doc/website/ directory in the tarball. We
-      changed the website format in late 2010, and what we shipped in
-      0.2.1.26 really wasn't that useful anyway.
-

+ 0 - 4
changes/routerparse_maxima

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Check for and reject overly long directory certificates and
-      directory tokens before they have a chance to hit any
-      assertions. Bugfix on 0.2.1.28. Found by doorss.

+ 0 - 5
changes/security_bug

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Fix a remotely exploitable bug that could be used to crash instances
-      of Tor remotely by overflowing on the heap.  Remove-code execution
-      hasn't been confirmed, but can't be ruled out.  Obviously, everyone
-      should upgrade.  Bugfix on the 0.1.1 series and later.

+ 0 - 5
changes/task2196

@@ -1,5 +0,0 @@
-  o Minor features:
-    - Report only the top 10 ports in exit-port stats in order not to
-      exceed the maximum extra-info descriptor length of 50 KB. Implements
-      task 2196.
-

+ 0 - 8
changes/tolen_asserts

@@ -1,8 +0,0 @@
-  o Major bugfixes (security)
-    - Fix a heap overflow bug where an adversary could cause heap
-      corruption.  This bug potentially allows remote code execution
-      attacks.  Found by debuger.  Fixes CVE-2011-0427.  Bugfix on
-      0.1.2.10-rc.
-  o Defensive programming
-    - Introduce output size checks on all of our decryption functions.
-