mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-12 22:23:49 +01:00
copy all the changes files into the changelog again. still unedited
This commit is contained in:
parent
7a8cac14d5
commit
aa1ad30fc9
32
ChangeLog
32
ChangeLog
@ -43,6 +43,11 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
|
|||||||
break ties by preferring AES256 to AES128.) This resolves bugs
|
break ties by preferring AES256 to AES128.) This resolves bugs
|
||||||
#11513, #11492, #11498, #11499. Bugs reported by 'cypherpunks'.
|
#11513, #11492, #11498, #11499. Bugs reported by 'cypherpunks'.
|
||||||
Bugfix on 0.2.4.8-alpha.
|
Bugfix on 0.2.4.8-alpha.
|
||||||
|
- Servers now trust themselves to have a better view than clients of
|
||||||
|
which TLS ciphersuites to choose. (Thanks to #11513, the server
|
||||||
|
list is now well-considered, whereas the client list has been
|
||||||
|
chosen mainly for anti-fingerprinting purposes.) Resolves ticket
|
||||||
|
11528.
|
||||||
|
|
||||||
o Major bugfixes (undefined behavior):
|
o Major bugfixes (undefined behavior):
|
||||||
- Fix two instances of possible undefined behavior in channeltls.c
|
- Fix two instances of possible undefined behavior in channeltls.c
|
||||||
@ -70,6 +75,14 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
|
|||||||
connection. This prevents controllers from declaring that a
|
connection. This prevents controllers from declaring that a
|
||||||
connection has failed because of "DONE" or other junk reasons.
|
connection has failed because of "DONE" or other junk reasons.
|
||||||
Fixes bug 10431; bugfix on 0.2.1.1-alpha.
|
Fixes bug 10431; bugfix on 0.2.1.1-alpha.
|
||||||
|
- Improve the warning message when trying to enable the Linux
|
||||||
|
sandbox code on a Tor built without libseccomp. Instead of
|
||||||
|
saying "Sandbox is not implemented on this platform", we now
|
||||||
|
explain that we to need be built with libseccomp. Fixes bug
|
||||||
|
11543; bugfix on 0.2.5.1-alpha.
|
||||||
|
- Avoid generating spurious warnings and failure messages when
|
||||||
|
starting with DisableNetwork enabled. Fixes bug 11200 and bug
|
||||||
|
10405; bugfix on 0.2.3.9-alpha.
|
||||||
|
|
||||||
o Minor bugfixes (closing channels):
|
o Minor bugfixes (closing channels):
|
||||||
- If write_to_buf() in connection_write_to_buf_impl_() ever fails,
|
- If write_to_buf() in connection_write_to_buf_impl_() ever fails,
|
||||||
@ -127,6 +140,20 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
|
|||||||
- Stop accepting bridge lines containing hostnames. Doing so allowed
|
- Stop accepting bridge lines containing hostnames. Doing so allowed
|
||||||
clients to perform DNS requests on the hostnames, which was not
|
clients to perform DNS requests on the hostnames, which was not
|
||||||
sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
|
sensible behavior. Fixes bug 10801; bugfix on 0.2.0.1-alpha.
|
||||||
|
- Fix a bug where a client-side Tor with pluggable transports
|
||||||
|
would take 60 seconds to bootstrap if a config re-read was
|
||||||
|
triggered at just the right timing during bootstrap. Refixes bug
|
||||||
|
11156; bugfix on 0.2.5.3-alpha.
|
||||||
|
- Avoid 60-second delays in the bootstrapping process when Tor
|
||||||
|
is launching for a second time while using bridges. Fixes bug 9229;
|
||||||
|
bugfix on 0.2.0.3-alpha.
|
||||||
|
|
||||||
|
o Minor bugfixes (DNS):
|
||||||
|
- When receing a DNS query for an unsupported type, reply with
|
||||||
|
no answer rather than with a NOTIMPL error. This behavior isn't
|
||||||
|
correct either, but it will break fewer client programs, we hope.
|
||||||
|
Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch
|
||||||
|
from "epoch".
|
||||||
|
|
||||||
o Minor bugfixes (exit):
|
o Minor bugfixes (exit):
|
||||||
- Stop leaking memory when we successfully resolve a PTR record.
|
- Stop leaking memory when we successfully resolve a PTR record.
|
||||||
@ -152,6 +179,11 @@ Changes in version 0.2.5.4-alpha - 2014-04-??
|
|||||||
- Demote the message that we give when a flushing connection times
|
- Demote the message that we give when a flushing connection times
|
||||||
out for too long from NOTICE to INFO. It was usually meaningless.
|
out for too long from NOTICE to INFO. It was usually meaningless.
|
||||||
Resolves ticket 5286.
|
Resolves ticket 5286.
|
||||||
|
- Don't log so many notice-level bootstrapping messages at startup about
|
||||||
|
downloading descriptors. Previously, we'd log a notice whenever we
|
||||||
|
learned about more routers. Now, we only log a notice at every 5% of
|
||||||
|
progress. Fixes bug 9963.
|
||||||
|
|
||||||
|
|
||||||
o Minor features (performance, compatibility):
|
o Minor features (performance, compatibility):
|
||||||
- Update the list of TLS cipehrsuites that a client advertises
|
- Update the list of TLS cipehrsuites that a client advertises
|
||||||
|
@ -1,8 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
|
|
||||||
- Improve the warning message when trying to enable the Linux
|
|
||||||
sandbox code on a Tor built without libseccomp. Instead of
|
|
||||||
saying "Sandbox is not implemented on this platform", we now
|
|
||||||
explain that we to need be built with libseccomp. Fixes bug
|
|
||||||
11543; bugfix on 0.2.5.1-alpha.
|
|
||||||
|
|
@ -1,6 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- When receing a DNS query for an unsupported type, reply with
|
|
||||||
no answer rather than with a NOTIMPL error. This behavior isn't
|
|
||||||
correct either, but it will break fewer client programs, we hope.
|
|
||||||
Fixes bug 10268; bugfix on 0.2.0.1-alpha. Original patch
|
|
||||||
from "epoch".
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes (clients):
|
|
||||||
- Fix a bug where a client-side Tor with pluggable transports
|
|
||||||
would take 60 seconds to bootstrap if a config re-read was
|
|
||||||
triggered at just the right timing during bootstrap. Refixes bug
|
|
||||||
11156; bugfix on 0.2.5.3-alpha.
|
|
@ -1,5 +0,0 @@
|
|||||||
- Minor bugfixes:
|
|
||||||
|
|
||||||
- Avoid generating spurious warnings and failure messages when
|
|
||||||
starting with DisableNetwork enabled. Fixes bug 11200 and bug
|
|
||||||
10405; bugfix on 0.2.3.9-alpha.
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor bugfixes:
|
|
||||||
- Avoid 60-second delays in the bootstrapping process when Tor
|
|
||||||
is launching for a second time while using bridges. Fixes bug 9229;
|
|
||||||
bugfix on 0.2.0.3-alpha.
|
|
||||||
|
|
@ -1,5 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Don't log so many notice-level bootstrapping messages at startup about
|
|
||||||
downloading descriptors. Previously, we'd log a notice whenever we
|
|
||||||
learned about more routers. Now, we only log a notice at every 5% of
|
|
||||||
progress. Fixes bug 9963.
|
|
@ -1,6 +0,0 @@
|
|||||||
o Minor features:
|
|
||||||
- Servers now trust themselves to have a better view than clients of
|
|
||||||
which TLS ciphersuites to choose. (Thanks to #11513, the server
|
|
||||||
list is now well-considered, whereas the client list has been
|
|
||||||
chosen mainly for anti-fingerprinting purposes.) Resolves ticket
|
|
||||||
11528.
|
|
Loading…
Reference in New Issue
Block a user