Browse Source

rm files for changes merged in all of release021, release022, master

Nick Mathewson 14 years ago
parent
commit
0d94f78705
54 changed files with 0 additions and 272 deletions
  1. 0 4
      changes/all_descs
  2. 0 10
      changes/annotations_fix
  3. 0 6
      changes/bug1074-part2
  4. 0 8
      changes/bug1125
  5. 0 5
      changes/bug1141
  6. 0 9
      changes/bug1172
  7. 0 7
      changes/bug1840
  8. 0 9
      changes/bug1859
  9. 0 6
      changes/bug1981
  10. 0 5
      changes/bug2050
  11. 0 6
      changes/bug2190
  12. 0 5
      changes/bug2305
  13. 0 4
      changes/bug2313
  14. 0 4
      changes/bug2324
  15. 0 5
      changes/bug2324_uncompress
  16. 0 6
      changes/bug2326
  17. 0 9
      changes/bug2328
  18. 0 4
      changes/bug2332
  19. 0 6
      changes/bug2352
  20. 0 6
      changes/bug2384
  21. 0 6
      changes/bug2402_redux
  22. 0 6
      changes/bug2408
  23. 0 5
      changes/bug2470
  24. 0 5
      changes/bug2475
  25. 0 5
      changes/bug2629
  26. 0 6
      changes/bug2750
  27. 0 4
      changes/bug2933
  28. 0 3
      changes/dhparam
  29. 0 7
      changes/fix2204
  30. 0 9
      changes/forget-rend-descs-on-newnym
  31. 0 3
      changes/gabelmoo-newip
  32. 0 3
      changes/geoip-apr2011
  33. 0 3
      changes/geoip-dec2010
  34. 0 3
      changes/geoip-feb2011
  35. 0 3
      changes/geoip-jan2011
  36. 0 3
      changes/geoip-mar2011
  37. 0 3
      changes/geoip-oct2010
  38. 0 3
      changes/geoip-sep2010
  39. 0 3
      changes/geoip-update-august2010
  40. 0 2
      changes/geoip-update-june2010
  41. 0 4
      changes/ipv6_crash
  42. 0 3
      changes/maatuska-new-v3auth
  43. 0 3
      changes/mingw-openssl098m
  44. 0 3
      changes/misc-reason
  45. 0 5
      changes/new-geoip-db
  46. 0 4
      changes/openbsd-sysheaders
  47. 0 6
      changes/policy_summarize-assert
  48. 0 5
      changes/remove-debian
  49. 0 5
      changes/remove-website
  50. 0 4
      changes/routerparse_maxima
  51. 0 5
      changes/security_bug
  52. 0 8
      changes/tolen_asserts
  53. 0 5
      changes/torspec.git
  54. 0 3
      changes/zlib_aint_openssl

+ 0 - 4
changes/all_descs

@@ -1,4 +0,0 @@
-  o Major bugfixes (bridge authority)
-    - Do not allow encrypte requests for "all" bridges to return all
-      bridges.
-

+ 0 - 10
changes/annotations_fix

@@ -1,10 +0,0 @@
-  o Major bugfixes
-    - Do even more to reject (and not just ignore) annotations on
-      router descriptors received anywhere but from the cache.
-      Previously we would ignore such annotations at first, but cache
-      them to disk anyway.  Bugfix on 0.2.0.8-alpha. Found by piebeer.
-
-  o Minor bugfixes
-    - Enforce multiplicity rules when parsing annotations.  Bugfix on
-      0.2.0.8-alpha. Found by piebeer.
-

+ 0 - 6
changes/bug1074-part2

@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - Stop sending a CLOCK_SKEW controller status event whenever
-      we fetch directory information from a relay that has a wrong clock.
-      Instead, only inform the controller when it's a trusted authority
-      that claims our clock is wrong. Bugfix on tor-0.1.2.6-alpha;
-      fixes the other half of bug 1074.

+ 0 - 8
changes/bug1125

@@ -1,8 +0,0 @@
-  o Major bugfixes
-    - Do not log messages to the controller while shrinking buffer
-      freelists.  Doing so would sometimes make the controller
-      connection try to allocate a buffer chunk, which would mess
-      up the internals of the freelist and cause an assertion
-      failure. Fixes bug 1125; fixed by Robert Ransom. Bugfix on
-      Tor 0.2.0.16-alpha.
-

+ 0 - 5
changes/bug1141

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Fix an assertion failure that could occur in caches or bridge users
-      when using a very short voting interval on a testing network.
-      Diagnosed by Robert Hogan.  Fixes bug 1141; bugfix on 0.2.0.8-alpha.
-

+ 0 - 9
changes/bug1172

@@ -1,9 +0,0 @@
-  o Minor bugfixes:
-    - When we restart our relay, we might get a successful connection
-      from the outside before we've started our reachability tests,
-      triggering a warning: "ORPort found reachable, but I have no
-      routerinfo yet. Failing to inform controller of success." This
-      bug was harmless unless Tor is running under a controller
-      like Vidalia, in which case the controller would never get a
-      REACHABILITY_SUCCEEDED status event. Bugfix on 0.1.2.6-alpha;
-      fixes bug 1172.

+ 0 - 7
changes/bug1840

@@ -1,7 +0,0 @@
-  o Minor bugfixes:
-    - Allow handshaking OR connections to take a full KeepalivePeriod
-      seconds to handshake.  Previously, we would close them after
-      IDLE_OR_CONN_TIMEOUT seconds, as if they were open.  This is a
-      bugfix on 0.2.1.26.  Thanks to mingw-san for analysis help.  Fixes
-      bug 1840.
-

+ 0 - 9
changes/bug1859

@@ -1,9 +0,0 @@
-  o Minor bugfixes:
-    - Bring the logic that gathers routerinfos and assesses the
-      acceptability of circuits into line. This prevents a Tor OP from getting
-      locked in a cycle of choosing its local OR as an exit for a path (due to
-      a .exit request) and then rejecting the circuit because its OR is not
-      listed yet. Also prevent Tor clients from using an OR running in the same
-      instance as an exit (due to a .exit request) if the OR does not meet the
-      same requirements expected of an OR running elsewhere.
-      Fixes bug 1859; bugfix on 0.2.0-alpha.

+ 0 - 6
changes/bug1981

@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - When you use bridges and your network goes away and your bridges
-      get marked as down, recover when you attempt a new socks connection
-      (if the network is back) rather than waiting up to an hour to try
-      fetching new descriptors for your bridges. Bugfix on 0.2.0.3-alpha;
-      fixes bug 1981.

+ 0 - 5
changes/bug2050

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Learn our external IP address when we're a relay or bridge, even if
-      we set PublishServerDescriptor to 0. Bugfix on 0.2.0.3-alpha,
-      where we introduced bridge relays that don't need to publish to
-      be useful. Fixes bug 2050.

+ 0 - 6
changes/bug2190

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Prevent calls from Libevent from inside Libevent log handlers.
-      This had potential to cause a nasty set of crashes, especially if
-      running Libevent with debug logging enabled, and running Tor
-      with a controller watching for low-severity log messages.
-      Bugfix on 0.1.0.2-rc.  Fixes bug 2190.

+ 0 - 5
changes/bug2305

@@ -1,5 +0,0 @@
-  o Build changes
-    - Tor does not build packages correctly with Automake 1.6 and earlier;
-      added a check to Makefile.am to make sure that we're building with
-      Automake 1.7 or later.
-

+ 0 - 4
changes/bug2313

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix compilation on mingw when a pthreads compatibility library
-      has been installed.  (We don't want to use it, so we shouldn't
-      be including pthread.h.)  Fixes bug 2313; bugfix on 0.1.0.1-rc.

+ 0 - 4
changes/bug2324

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Add a check for SIZE_T_MAX to tor_realloc to try to avoid
-      underflow errors there too.  Fixes bug 2324.
-

+ 0 - 5
changes/bug2324_uncompress

@@ -1,5 +0,0 @@
-  o Major bugfixes (security):
-    - Prevent a DoS attack by disallowing any zlib-compressed data
-      whose compression factor is implausibly high.  Fixes the
-      second part of bug2324; found by doors.
-

+ 0 - 6
changes/bug2326

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug where we would assert if we ever had a
-      cached-descriptors.new file (or another file read directly into
-      memory) of exactly SIZE_T_CEILING bytes.  Found by doors; fixes
-      bug 2326; bugfix on 0.2.1.25.
-

+ 0 - 9
changes/bug2328

@@ -1,9 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug where we would declare that we had run out of virtual
-      addresses when the address space was only half-exhausted.  Bugfix
-      on 0.1.2.1-alpha.
-    - Correctly handle the case where AutomapHostsOnResolve is set but no
-      virtual addresses are available.  Fixes bug2328, bugfix on
-      0.1.2.1-alpha.  Bug found by doorss.
-    - Correctly handle wrapping around to when we run out of virtual address
-      space.  Found by cypherpunks, bugfix on 0.2.0.5-alpha.

+ 0 - 4
changes/bug2332

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix a bug with handling misformed replies to reverse DNS lookup
-      requests in DNSPort.  Bugfix on Tor 0.2.0.1-alpha.  Related to a bug
-      reported by doorss.

+ 0 - 6
changes/bug2352

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Fix some potential asserts and partsing issues with grossly
-      malformed router caches.  Fixes bug 2352.  Found by doorss.
-      Bugfix on Tor 0.2.1.27.
-
-

+ 0 - 6
changes/bug2384

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Zero out a few more keys in memory before freeing them.  Fixes bug
-      2384 and part of bug 2385.  These key instances found by
-      "cypherpunks".  Bugfix on 0.0.2pre9.
-
-

+ 0 - 6
changes/bug2402_redux

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Use micro-revision numbers in 0.2.1.x instead: apparently, they
-      were more used than we had known.  (Bugfix on 0.2.1.30).
-    - Instead of generating our micro-version numbers using SVN revisions,
-      use git revisions instead.  Bugfix on 0.2.1.15-rc; fixes bug 2402.
-

+ 0 - 6
changes/bug2408

@@ -1,6 +0,0 @@
-  o Major bugfixes
-    - Ignore and warn about "PublishServerDescriptor hidserv" torrc
-      options.  The 'hidserv' argument never controlled publication
-      of hidden service descriptors.  Bugfix on 0.2.0.1-alpha.
-
-

+ 0 - 5
changes/bug2470

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - If relays set RelayBandwidthBurst but not RelayBandwidthRate,
-      Tor would ignore their RelayBandwidthBurst setting,
-      potentially using more bandwidth than expected. Bugfix on
-      0.2.0.1-alpha. Reported by Paul Wouters. Fixes bug 2470.

+ 0 - 5
changes/bug2475

@@ -1,5 +0,0 @@
-  o Minor bugfixes:
-    - Avoid signed/unsigned comparisons by making SIZE_T_CEILING unsigned.
-      (None of the cases where we did this before were wrong, but by making
-      this change we can avoid warnings.)  Fixes bug2475; bugfix on
-      Tor 0.2.1.28.

+ 0 - 5
changes/bug2629

@@ -1,5 +0,0 @@
-  o Minor bugfixes
-    - Fix a crash bug that could occur occasionally when a client was
-      configured with a large number of bridges.  Fixes bug 2629; bugfix
-      on 0.2.1.2-alpha.  Bugfix by trac user "shitlei".
-

+ 0 - 6
changes/bug2750

@@ -1,6 +0,0 @@
-  o Minor bugfixes
-    - Correct the warning displayed when a rendezvous descriptor exceeds
-      the maximum size.  Fixes bug 2750; bugfix on 0.2.1.5-alpha.  Found
-      by John Brooks.
-
-

+ 0 - 4
changes/bug2933

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Fix an uncommon assertion failure when running with DNSPort under
-      heavy load.  Fixes bug 2933; bugfix on 2.0.1-alpha.
-

+ 0 - 3
changes/dhparam

@@ -1,3 +0,0 @@
-  o Minor features
-    - Adjust our TLS Diffie-Hellman parameters to match those used by
-      Apache's mod_ssl.

+ 0 - 7
changes/fix2204

@@ -1,7 +0,0 @@
-  o Major bugfixes
-    - Do not set the tlsext_host_name extension on server SSL objects;
-      only on client SSL objects.  We set it to immitate a browser, not a
-      vhosting server. This resolves an incompatibility with openssl 0.9.8p
-      and openssl 1.0.0b.  Fixes bug 2204; bugfix on 0.2.1.1-alpha.
-
-

+ 0 - 9
changes/forget-rend-descs-on-newnym

@@ -1,9 +0,0 @@
-  o Security fixes:
-    - Forget all hidden service descriptors cached as a client when
-      processing a SIGNAL NEWNYM command.  Fixes bug 3000.  Bugfix on
-      0.0.6.
-  o Code simplifications and refactoring:
-    - Allow rend_client_send_introduction to fail without closing the
-      AP connection permanently.
-
-

+ 0 - 3
changes/gabelmoo-newip

@@ -1,3 +0,0 @@
- o Directory authority changes:
-    - Change IP address and ports for gabelmoo (v3 directory authority).
-

+ 0 - 3
changes/geoip-apr2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the April 1 2011 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-dec2010

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the December 1 2010 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-feb2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the February 1 2011 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-jan2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the January 1 2011 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-mar2011

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the March 1 2011 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-oct2010

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the October 1 2010 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-sep2010

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Update to the September 1 2010 Maxmind GeoLite Country database.
-

+ 0 - 3
changes/geoip-update-august2010

@@ -1,3 +0,0 @@
-  o Minor features
-    - Update to the August 1 2010 Maxmind GeoLite Country database.
-

+ 0 - 2
changes/geoip-update-june2010

@@ -1,2 +0,0 @@
-  o Minor features
-    - Update to the June 1 2010 Maxmind GeoLite Country database.

+ 0 - 4
changes/ipv6_crash

@@ -1,4 +0,0 @@
-  o Major bugfixes:
-    - Fix a crash in parsing router descriptors containing IPv6
-      addresses.  This one crashed the directory authorities when somebody
-      fired up some experimental code. Bugfix on 0.2.1.3-alpha.

+ 0 - 3
changes/maatuska-new-v3auth

@@ -1,3 +0,0 @@
-  o New directory authorities:
-    - Set up maatuska (run by Linus Nordberg) as the eighth v3 directory
-      authority.

+ 0 - 3
changes/mingw-openssl098m

@@ -1,3 +0,0 @@
- o Minor features
-   - Build correctly on mingw with more recent version of OpenSSL 0.9.8.
-     Patch from mingw-san.

+ 0 - 3
changes/misc-reason

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Have clients begin understanding the new END_STREAM_REASON_NOROUTE
-      error code.

+ 0 - 5
changes/new-geoip-db

@@ -1,5 +0,0 @@
-  o Major features:
-    - Move to the Maxmind GeoIP db (rather than the June 2009
-      ip-to-country GeoIP db) for our statistics that count how many
-      users relays are seeing from each country. Now we have more accurate
-      data for many African countries.

+ 0 - 4
changes/openbsd-sysheaders

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - When building with --enable-gcc-warnings on OpenBSD, disable
-      warnings in system headers.  This makes --enable-gcc-warnings
-      pass on OpenBSD 4.8.

+ 0 - 6
changes/policy_summarize-assert

@@ -1,6 +0,0 @@
-  o Major bugfixes (security)
-    - Fix a bounds-checking error that could allow an attacker to
-      remotely crash a directory authority.  Found by piebeer.
-      Bugfix on 0.2.1.5-alpha.
-
-

+ 0 - 5
changes/remove-debian

@@ -1,5 +0,0 @@
-  o Removed files:
-    -  Remove the old debian/ directory from the main Tor distribution.
-       The official Tor-for-debian git repository lives at the URL
-       https://git.torproject.org/debian/tor.git .
-

+ 0 - 5
changes/remove-website

@@ -1,5 +0,0 @@
-  o Removed files:
-    - Stop shipping the old doc/website/ directory in the tarball. We
-      changed the website format in late 2010, and what we shipped in
-      0.2.1.26 really wasn't that useful anyway.
-

+ 0 - 4
changes/routerparse_maxima

@@ -1,4 +0,0 @@
-  o Minor bugfixes
-    - Check for and reject overly long directory certificates and
-      directory tokens before they have a chance to hit any
-      assertions. Bugfix on 0.2.1.28. Found by doorss.

+ 0 - 5
changes/security_bug

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Fix a remotely exploitable bug that could be used to crash instances
-      of Tor remotely by overflowing on the heap.  Remove-code execution
-      hasn't been confirmed, but can't be ruled out.  Obviously, everyone
-      should upgrade.  Bugfix on the 0.1.1 series and later.

+ 0 - 8
changes/tolen_asserts

@@ -1,8 +0,0 @@
-  o Major bugfixes (security)
-    - Fix a heap overflow bug where an adversary could cause heap
-      corruption.  This bug potentially allows remote code execution
-      attacks.  Found by debuger.  Fixes CVE-2011-0427.  Bugfix on
-      0.1.2.10-rc.
-  o Defensive programming
-    - Introduce output size checks on all of our decryption functions.
-

+ 0 - 5
changes/torspec.git

@@ -1,5 +0,0 @@
-  o Packaging changes:
-    - Stop shipping the Tor specs files and development proposal documents
-      in the tarball. They are now in a separate git repository at
-      git://git.torproject.org/torspec.git
-

+ 0 - 3
changes/zlib_aint_openssl

@@ -1,3 +0,0 @@
-  o Minor bugfixes
-    - When warning about missing zlib development packages, give the
-      correct package names.  Bugfix on 0.2.0.1-alpha.