Pārlūkot izejas kodu

Remove changes files which have been removed in release-0.2.3

Nick Mathewson 13 gadi atpakaļ
vecāks
revīzija
65a65edd6b

+ 0 - 6
changes/bug6043

@@ -1,6 +0,0 @@
-  o Packaging (RPM):
-    - Our default RPM spec files have been updated to work with mock
-      and rpmbuild on RHEL/Fedora. They have an updated set of
-      dependencies and conflicts, a fix for an ancient typo when creating
-      the "_tor" user, and better instructions. Thanks to Ondrej
-      Mikle for the patch series; fix for bug 6043.

+ 0 - 3
changes/bug6218

@@ -1,3 +0,0 @@
-  o Minor bugfixes:
-    - Fix wrong TCP port range in parse_port_range(). Fixes bug 6218;
-      bugfix on 0.2.1.10-alpha.

+ 0 - 7
changes/bug6271

@@ -1,7 +0,0 @@
-   o Major bugfixes
-
-     - Fix a bug handling SENDME cells on nonexistent streams that
-       could result in bizarre window values. Report and patch
-       contributed pseudymously.  Fixes part of bug 6271. This bug
-       was introduced before the first Tor release, in svn commit
-       r152.

+ 0 - 3
changes/bug6274

@@ -1,3 +0,0 @@
- o Minor bugfixes:
-   - Ignore ServerTransportPlugin lines when Tor is not configured as
-     a relay. Fixes bug 6274; bugfix on 0.2.3.6-alpha.

+ 0 - 3
changes/bug6274_2

@@ -1,3 +0,0 @@
- o Minor features:
-   - Terminate active server managed proxies if Tor stops being a
-     relay. Addresses parts of bug 6274; bugfix on 0.2.3.6-alpha.

+ 0 - 4
changes/bug6296

@@ -1,4 +0,0 @@
-   o Minor bugfixes:
-
-     - Instead of ENOBUFS on Windows, say WSAENOBUFS. Fixes
-       compilation on Windows.  Fixes bug 6296; bugfix on 0.2.3.18-rc.

+ 0 - 4
changes/bug6377

@@ -1,4 +0,0 @@
- o Testing:
-   - Make it possible to set the TestingTorNetwork configuration
-     option using AlternateDirAuthority and AlternateBridgeAuthority
-     as an alternative to setting DirServer.

+ 0 - 3
changes/bug6387

@@ -1,3 +0,0 @@
-  o Documentation:
-    - Clarify the documentation for the Alternate*Authority options.
-      Fixes bug 6387.

+ 0 - 4
changes/bug6397

@@ -1,4 +0,0 @@
-  o Major bugfixes:
-    - When disabling guards for having too high a proportion of failed
-      circuits, make sure to look at each guard. Fix for bug 6397; bugfix
-      on 0.2.3.17-beta.

+ 0 - 3
changes/bug6436

@@ -1,3 +0,0 @@
-  o Minor features:
-    - Provide a better error message about possible OSX Asciidoc failure
-      reasons. Fix for bug 6436.

+ 0 - 5
changes/bug6480

@@ -1,5 +0,0 @@
-  o Major bugfixes:
-    - Avoid read-from-freed-RAM bug and related double-free bug that
-      could occur when a DNS request fails while launching it.  Fixes
-      bug 6480; bugfix on 0.2.0.1-alpha.
-

+ 0 - 4
changes/bug6490

@@ -1,4 +0,0 @@
-  o Minor features:
-    - Warn when Tor is configured to use accounting in a way that will
-      link a hidden service to some other hidden service or public
-      address. Fix for bug 6490.

+ 0 - 2
changes/bug6500

@@ -1,2 +0,0 @@
-  o Minor bugfixes:
-    - Fix some typos in the manpages. Patch from A. Costa. Fixes bug 6500.

+ 0 - 5
changes/bug6530

@@ -1,5 +0,0 @@
-  o Major security fixes:
-    - Avoid a read of uninitializd RAM when reading a vote or consensus
-      document with an unrecognized flavor name. This could lead to a
-      remote crash bug. Fixes bug 6530; bugfix on 0.2.2.6-alpha.
-      

+ 0 - 4
changes/cov709056

@@ -1,4 +0,0 @@
-  o Minor bugfixes:
-    - Check return value of fputs() when writing authority certificate
-      file. Fixes Coverity issue 709056; bugfix on 0.2.0.1-alpha.
-

+ 0 - 14
changes/pathsel-BUGGY-a

@@ -1,14 +0,0 @@
-  o Security fixes:
-
-    - Try to leak less information about what relays a client is
-      choosing to a side-channel attacker.  Previously, a Tor client
-      would stop iterating through the list of available relays as
-      soon as it had chosen one, thus finishing a little earlier
-      when it picked a router earlier in the list.  If an attacker
-      can recover this timing information (nontrivial but not
-      proven to be impossible), they could learn some coarse-
-      grained information about which relays a client was picking
-      (middle nodes in particular are likelier to be affected than
-      exits).  The timing attack might be mitigated by other factors
-      (see bug #6537 for some discussion), but it's best not to
-      take chances.  Fixes bug 6537; bugfix on 0.0.8rc1.

+ 0 - 3
changes/port_doc

@@ -1,3 +0,0 @@
-  o Minor features (usability):
-    - Try to make the warning when giving an obsolete SOCKSListenAddress
-      a littel more useful.

+ 0 - 6
changes/revert-geoip-may2012

@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - Revert to the May 1 2012 Maxmind GeoLite Country database. In the
-      June 2012 database, Maxmind marked many Tor relays as country "A1",
-      which will cause risky behavior for clients that set EntryNodes
-      or ExitNodes. Addresses bug 6334; bugfix on 0.2.3.17-beta.
-

+ 0 - 8
changes/smartlist_foreach

@@ -1,8 +0,0 @@
-  o Code simplification and refactoring:
-    - Do not use SMARTLIST_FOREACH for any loop whose body exceeds
-      10 lines. Doing so in the past has led to hard-to-debug code.
-      The new style is to use the SMARTLIST_FOREACH_{BEGIN,END} pair.
-      Issue 6400.
-    - Do not nest SMARTLIST_FOREACH blocks within one another. Any
-      nested block ought to be using SMARTLIST_FOREACH_{BEGIN,END}.
-      Issue 6400.