mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 04:13:28 +01:00
Remove changes files that have already been merged in release-0.2.5
(This means that changes/* is now "everything that changed since 0.2.5.10".)
This commit is contained in:
parent
4e7046cfb2
commit
a477d7c666
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Disable sandbox name resolver cache when running tor-resolve:
|
|
||||||
tor-resolve doesn't use the sandbox code, and turning it on was
|
|
||||||
breaking attempts to do tor-resolve on a non-default server on
|
|
||||||
Linux. Fixes bug 13295; bugfix on 0.2.5.3-alpha.
|
|
@ -1,6 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Fix compilation when building with bufferevents enabled. (This
|
|
||||||
configuration is still not expected to work, however.)
|
|
||||||
Fixes bugs 12438, 12474, 11578; bugfixes on 0.2.5.1-alpha and
|
|
||||||
0.2.5.3-alpha. Patches from Anthony G. Basile and Sathyanarayanan
|
|
||||||
Gunasekaran.
|
|
@ -1,6 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Warn and drop the circuit if we receive an inbound 'relay early'
|
|
||||||
cell. Those used to be normal to receive on hidden service circuits
|
|
||||||
due to bug 1038, but the buggy Tor versions are long gone from
|
|
||||||
the network so we can afford to resume watching for them. Resolves
|
|
||||||
the rest of bug 1038; bugfix on 0.2.1.19.
|
|
@ -1,7 +0,0 @@
|
|||||||
o Major bugfixes:
|
|
||||||
- When Tor starts with DisabledNetwork set, it would correctly
|
|
||||||
conclude that it shouldn't try making circuits, but it would
|
|
||||||
mistakenly cache this conclusion and continue believing it even
|
|
||||||
when DisableNetwork is set to 0. Fixes the bug introduced by the
|
|
||||||
fix for bug 11200; bugfix on 0.2.5.4-alpha.
|
|
||||||
|
|
@ -1,4 +0,0 @@
|
|||||||
o Bugfixes
|
|
||||||
- Correctly update the local mark on the controlling channel when changing
|
|
||||||
the address of an or_connection_t after the handshake. Fixes bug #12160;
|
|
||||||
bugfix on 0.2.4.4-alpha.
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes (portability):
|
|
||||||
- Compile correctly with builds and forks of OpenSSL (such as
|
|
||||||
LibreSSL) that disable compression. Fixes bug 12602; bugfix on
|
|
||||||
0.2.1.1-alpha. Patch from "dhill".
|
|
||||||
|
|
@ -1,10 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- When logging information about an EXTEND2 or EXTENDED2 cell, log
|
|
||||||
their names correctly. Fixes part of bug 12700; bugfix on
|
|
||||||
0.2.4.8-alpha.
|
|
||||||
|
|
||||||
o Minor bugfixes:
|
|
||||||
- When logging information about a relay cell whose command we
|
|
||||||
don't recognize, log its command as an integer. Fixes part of
|
|
||||||
bug 12700; bugfix on 0.2.1.10-alpha.
|
|
||||||
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Correct a confusing error message when trying to extend a circuit
|
|
||||||
via the control protocol but we don't know a descriptor or
|
|
||||||
microdescriptor for one of the specified relays. Fixes bug 12718;
|
|
||||||
bugfix on 0.2.3.1-alpha.
|
|
@ -1,3 +0,0 @@
|
|||||||
o Distribution:
|
|
||||||
- Verify configuration file via ExecStartPre in the systemd unit file.
|
|
||||||
Patch from intrigeri; resolves ticket 12730.
|
|
@ -1,9 +0,0 @@
|
|||||||
o Distribution:
|
|
||||||
- Explicitly disable RunAsDaemon in the systemd unit file.
|
|
||||||
Our current systemd unit uses "Type = simple", so systemd does
|
|
||||||
not expect tor to fork. If the user has "RunAsDaemon 1" in their
|
|
||||||
torrc, then things won't work as expected. This is e.g. the case
|
|
||||||
on Debian (and derivatives), since there we pass
|
|
||||||
"--defaults-torrc /usr/share/tor/tor-service-defaults-torrc"
|
|
||||||
(that contains "RunAsDaemon 1") by default.
|
|
||||||
Patch by intrigeri; resolves ticket 12731.
|
|
@ -1,4 +0,0 @@
|
|||||||
o Documentation:
|
|
||||||
- Adjust the URLs in the README to refer to the new locations of
|
|
||||||
several documents on the website. Patch from Matt Pagan. Fixes
|
|
||||||
bug 12830.
|
|
@ -1,4 +0,0 @@
|
|||||||
o Major bugfixes (relay):
|
|
||||||
- Avoid queuing or sending destroy cells for circuit ID zero when
|
|
||||||
we fail to send a CREATE cell. Fixes bug 12848; bugfix on
|
|
||||||
0.0.8pre1. Found and fixed by "cypherpunks".
|
|
@ -1,7 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Restore the functionality of CookieAuthFileGroupReadable. Fixes bug
|
|
||||||
12864; bugfix on 0.2.5.1-alpha.
|
|
||||||
|
|
||||||
o Minor features:
|
|
||||||
- Add an ExtORPortCookieAuthFileGroupReadable option to make the
|
|
||||||
cookie file for the ExtORPort g+r by default.
|
|
@ -1,3 +0,0 @@
|
|||||||
o Documentation:
|
|
||||||
- Document 'reject6' and 'accept6' ExitPolicy entries. Resolves
|
|
||||||
ticket 12878.
|
|
@ -1,4 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Warn about attempts to run hidden services and relays in the
|
|
||||||
same process: that's probably not a good idea. Closes ticket
|
|
||||||
12908.
|
|
@ -1,8 +0,0 @@
|
|||||||
o Major bugfixes:
|
|
||||||
- Resume expanding abbreviations for command-line options. The fix
|
|
||||||
for bug 4647 accidentally removed our hack from bug 586 that rewrote
|
|
||||||
HashedControlPassword to __HashedControlSessionPassword when it
|
|
||||||
appears on the commandline (which allowed the user to set her
|
|
||||||
own HashedControlPassword in the torrc file while the controller
|
|
||||||
generates a fresh session password for each run). Fixes bug 12948;
|
|
||||||
bugfix on 0.2.5.1-alpha.
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Downgrade "Unexpected onionskin length after decryption" warning
|
|
||||||
to a protocol-warn, since there's nothing relay operators can do
|
|
||||||
about a client that sends them a malformed create cell. Resolves
|
|
||||||
bug 12996; bugfix on 0.0.6rc1.
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Log more specific warnings when we get an ESTABLISH_RENDEZVOUS cell
|
|
||||||
on a cannibalized or non-OR circuit. Resolves ticket 12997.
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor bugfixes (relay):
|
|
||||||
- Escape all strings from the directory connection before logging them.
|
|
||||||
Fixes bug 13071; bugfix on 0.1.1.15. Patch from "teor".
|
|
@ -1,3 +0,0 @@
|
|||||||
o Compilation fixes:
|
|
||||||
- Make the nmake make files work again. Fixes bug 13081. Bugfix on 0.2.5.1-alpha. Patch
|
|
||||||
from "NewEraCracker".
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor bugfixes (controller):
|
|
||||||
- Actually send TRANSPORT_LAUNCHED and HS_DESC events to controllers.
|
|
||||||
Fixes bug 13085; bugfix on 0.2.5.1-alpha. Patch by "teor".
|
|
@ -1,4 +0,0 @@
|
|||||||
o Minor bugfixes (conformance):
|
|
||||||
- In routerlist_assert_ok(), don't take the address of a routerinfo's
|
|
||||||
cache_info member unless that routerinfo is non-NULL. Fixes bug
|
|
||||||
13096; bugfix on 0.1.1.9-alpha. Patch by "teor".
|
|
@ -1,3 +0,0 @@
|
|||||||
o Directory authority changes:
|
|
||||||
- Change IP address for gabelmoo (v3 directory authority).
|
|
||||||
|
|
@ -1,8 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Reduce the log severity of the "Pluggable transport proxy does
|
|
||||||
not provide any needed transports and will not be launched."
|
|
||||||
message, since Tor Browser includes several ClientTransportPlugin
|
|
||||||
lines in its torrc-defaults file, leading every Tor Browser user
|
|
||||||
who looks at her logs to see these notices and wonder if they're
|
|
||||||
dangerous. Resolves bug 13124; bugfix on 0.2.5.3-alpha.
|
|
||||||
|
|
@ -1,13 +0,0 @@
|
|||||||
o Major bugfixes:
|
|
||||||
- Clients now send the correct address for their chosen rendezvous
|
|
||||||
point when trying to access a hidden service. They used to send
|
|
||||||
the wrong address, which would still work some of the time because
|
|
||||||
they also sent the identity digest of the rendezvous point, and if
|
|
||||||
the hidden service happened to try connecting to the rendezvous
|
|
||||||
point from a relay that already had a connection open to it,
|
|
||||||
the relay would reuse that connection. Now connections to hidden
|
|
||||||
services should be more robust and faster. Also, this bug meant
|
|
||||||
that clients were leaking to the hidden service whether they were
|
|
||||||
on a little-endian (common) or big-endian (rare) system, which for
|
|
||||||
some users might have reduced their anonymity. Fixes bug 13151;
|
|
||||||
bugfix on 0.2.1.5-alpha.
|
|
@ -1,4 +0,0 @@
|
|||||||
o Compilation fixes:
|
|
||||||
- Build and run correctly on systems like OpenBSD-current that
|
|
||||||
have patched OpenSSL to remove get_cipher_by_char and/or its
|
|
||||||
implementations. Fixes issue 13325.
|
|
@ -1,5 +0,0 @@
|
|||||||
o Major bugfixes (openssl bug workaround):
|
|
||||||
- Avoid crashing when using OpenSSL version 0.9.8zc, 1.0.0o, or
|
|
||||||
1.0.1j, built with the 'no-ssl3' configuration option. Fixes
|
|
||||||
bug 13471. This is a workaround for an OpenSSL bug.
|
|
||||||
|
|
@ -1,3 +0,0 @@
|
|||||||
o Downgraded warnings:
|
|
||||||
- Downgrade the severity of the 'unexpected sendme cell from client' from
|
|
||||||
'warn' to 'protocol warning'. Closes ticket 8093.
|
|
@ -1,11 +0,0 @@
|
|||||||
o Major bugfixes (client):
|
|
||||||
|
|
||||||
- Perform circuit cleanup operations even when circuit
|
|
||||||
construction operations are disabled (because the network is
|
|
||||||
disabled, or because there isn't enough directory information).
|
|
||||||
Previously, when we were not building predictive circuits, we
|
|
||||||
were not closing expired circuits either.
|
|
||||||
|
|
||||||
Fixes bug 8387; bugfix on 0.1.1.11-alpha. This bug became visible
|
|
||||||
in 0.2.4.10-alpha when we became more strict about when we have
|
|
||||||
"enough directory information to build circuits".
|
|
@ -1,12 +0,0 @@
|
|||||||
o Major bugfixes:
|
|
||||||
|
|
||||||
- Fix a bug in the bounds-checking in the 32-bit curve25519-donna
|
|
||||||
implementation that caused incorrect results on 32-bit
|
|
||||||
implementations when certain malformed inputs were used along with
|
|
||||||
a small class of private ntor keys. This bug does not currently
|
|
||||||
appear to allow an attacker to learn private keys or impersonate a
|
|
||||||
Tor server, but it could provide a means to distinguish 32-bit Tor
|
|
||||||
implementations from 64-bit Tor implementations. Fixes bug 12694;
|
|
||||||
bugfix on 0.2.4.8-alpha. Bug found by Robert Ransom; fix from
|
|
||||||
Adam Langley.
|
|
||||||
|
|
@ -1,4 +0,0 @@
|
|||||||
o Major security fixes:
|
|
||||||
- Disable support for SSLv3. All versions of OpenSSL in use with
|
|
||||||
Tor today support TLS 1.0 or later, so we can safely turn off
|
|
||||||
support for this old (and insecure) protocol. Fixes bug 13426.
|
|
@ -1,2 +0,0 @@
|
|||||||
o Minor features (diagnostic):
|
|
||||||
- Slightly enhance the diagnostic message for bug 12184.
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Update geoip to the August 7 2014 Maxmind GeoLite2 Country database.
|
|
||||||
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Update geoip to the July 10 2014 Maxmind GeoLite2 Country database.
|
|
||||||
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Update geoip6 to the August 7 2014 Maxmind GeoLite2 Country database.
|
|
||||||
|
|
@ -1,2 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Update geoip6 to the July 10 2014 Maxmind GeoLite2 Country database.
|
|
@ -1,3 +0,0 @@
|
|||||||
o Minor bugfixes (compilation):
|
|
||||||
- Fix compilation of test.h with MSVC. Patch from Gisle Vanem;
|
|
||||||
bugfix on 0.2.5.5-alpha.
|
|
@ -1,6 +0,0 @@
|
|||||||
Major features:
|
|
||||||
- Make the number of entry guards configurable via a new
|
|
||||||
NumEntryGuards consensus parameter, and the number of directory
|
|
||||||
guards configurable via a new NumDirectoryGuards consensus
|
|
||||||
parameter. Implements ticket 12688.
|
|
||||||
|
|
@ -1,9 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Authorities now assign the Guard flag to the fastest 25% of the
|
|
||||||
network (it used to be the fastest 50%). Also raise the consensus
|
|
||||||
weight that guarantees the Guard flag from 250 to 2000. For the
|
|
||||||
current network, this results in about 1100 guards, down from 2500.
|
|
||||||
This step paves the way for moving the number of entry guards
|
|
||||||
down to 1 (proposal 236) while still providing reasonable expected
|
|
||||||
performance for most users. Implements ticket 12690.
|
|
||||||
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Fix a large number of false positive warnings from the clang
|
|
||||||
analyzer static analysis tool. This should make real warnings
|
|
||||||
easier for clang analyzer to find. Patch from "teor". Closes
|
|
||||||
ticket 13036.
|
|
Loading…
Reference in New Issue
Block a user