Roger Dingledine
32796bbe82
forward-port the 0.2.2.22-alpha changelog
2011-02-07 22:29:19 -05:00
Roger Dingledine
670ff24788
fix 0.2.2 changelog to match 0.2.1
2011-01-18 19:15:31 -05:00
Roger Dingledine
c947db7f4b
forward-port that part of the changelog
2011-01-15 22:42:14 -05:00
Roger Dingledine
8e9b25e6c7
some changelog entries for master too
2011-01-15 20:59:25 -05:00
Roger Dingledine
601b6a8099
remove duplicate (wrong) changelog entry
2010-12-20 09:14:11 -05:00
Roger Dingledine
539814e0c9
forward-port the two recent changelog entries
2010-12-20 07:49:22 -05:00
Roger Dingledine
e57cb6b976
pick a more accurate release date
2010-11-22 22:44:20 -05:00
Roger Dingledine
f54e75a2c6
prepare for our emergency openssl fix release
2010-11-21 16:59:42 -05:00
Roger Dingledine
910de7dfac
final touchups
2010-11-16 01:12:32 -05:00
Roger Dingledine
a08a7e0fc6
warn more about AllowSingleHopExits
2010-11-16 00:13:25 -05:00
Roger Dingledine
e0b922b7e6
merge in more changelog entries
2010-11-15 23:54:20 -05:00
Roger Dingledine
6b4db953c9
fold the changes files into a changelog
2010-11-09 21:50:30 -05:00
Roger Dingledine
dd68c07dc3
retroactively declare the cbt fixes to be major
...
also put in release blurbs
2010-10-01 04:53:23 -04:00
Roger Dingledine
a3f488a887
bump to 0.2.2.17-alpha
2010-09-30 17:49:11 -04:00
Roger Dingledine
d62a2d6ee5
write up a changelog file
2010-09-30 17:32:17 -04:00
Roger Dingledine
85cad94221
bump to 0.2.2.16-alpha-dev
2010-09-17 05:07:59 -04:00
Roger Dingledine
61e0079ab2
best tor ever!
2010-09-17 02:06:34 -04:00
Roger Dingledine
80b631844b
fold in the recent changes files
2010-09-16 13:45:54 -04:00
Roger Dingledine
1bc20f9c1a
merge changes files for upcoming release
2010-09-13 05:51:49 -04:00
Roger Dingledine
1f81474b2e
bump to 0.2.2.15-alpha
2010-08-18 19:16:02 -04:00
Roger Dingledine
f6734103e1
fold in even more changelog entries
2010-08-18 16:42:15 -04:00
Roger Dingledine
e7956d4a73
explain the non-fix for bug 1776
2010-08-18 16:11:55 -04:00
Roger Dingledine
8c87319f3c
bug 1776 isn't fixed. save its changelog entry for next time.
2010-08-18 15:51:47 -04:00
Nick Mathewson
d72edc4b78
Edit the changelog to reflect the fact that we are backing off on ending NOROUTE for now
2010-08-18 13:50:47 -04:00
Roger Dingledine
2ede14c2ca
fold in the next set of changelog entries
2010-08-16 02:02:11 -04:00
Roger Dingledine
a1686d867e
fold in the makefile.am changes entry
2010-08-13 17:19:04 -04:00
Roger Dingledine
863b6c439e
changelog entry for f060b18e6c
2010-08-11 02:11:05 -04:00
Roger Dingledine
267c976405
fold in most of the changes/foo files
2010-08-11 01:51:41 -04:00
Roger Dingledine
a80ffbb6cc
partial changelog for 0.2.2.15-alpha
2010-07-21 09:28:34 -04:00
Roger Dingledine
4fc230b305
0.2.2.14-alpha blurb
2010-07-13 15:50:24 -04:00
Roger Dingledine
69dfd67d90
bump to 0.2.2.14-alpha-dev
2010-07-13 15:48:03 -04:00
Roger Dingledine
1ea99c6364
guh. 'git commit' did not do what i expect.
2010-07-12 16:46:28 -04:00
Roger Dingledine
c3febf8660
fold in the latest changes
2010-07-09 14:07:54 -04:00
Roger Dingledine
1d5b2da3a8
start an 0.2.2.14-alpha changelog
2010-06-29 18:40:08 -04:00
Nick Mathewson
308457218a
Copy the release notes from 0.2.1.26 into the master ChangeLog
2010-06-11 16:31:03 -04:00
Roger Dingledine
ec3f576fbe
put the blurb in 0.2.2.13-alpha
2010-05-05 03:12:26 -04:00
Roger Dingledine
feb8c1b5f6
bump to 0.2.2.13-alpha
2010-04-24 05:43:43 -04:00
Roger Dingledine
8afc7d563d
prepare the 0.2.2.13-alpha changelog
2010-04-23 20:59:20 -04:00
Roger Dingledine
45ab6959c9
blurbs for two recent alphas
2010-04-23 19:42:34 -04:00
Roger Dingledine
3d8879a04d
merge in the bug 1364 fix
2010-04-20 03:59:23 -04:00
Roger Dingledine
ea6cdafee5
prepare for 0.2.2.12-alpha
2010-04-20 03:53:07 -04:00
Roger Dingledine
84924fcd30
bump to 0.2.2.11-alpha-dev
2010-04-19 06:09:06 -04:00
Roger Dingledine
9cde5a4629
bump to 0.2.2.11-alpha
2010-04-15 11:02:31 -04:00
Roger Dingledine
eafbc3caa1
gather together the 0.2.2.11-alpha changelog
2010-04-15 10:48:33 -04:00
Roger Dingledine
8aec982f91
Merge branch 'maint-0.2.1'
...
Conflicts:
ChangeLog
configure.in
contrib/tor-mingw.nsi.in
src/win32/orconfig.h
2010-04-03 22:05:02 -04:00
Roger Dingledine
51d084f805
fold in the recent changelog entries
2010-04-02 15:33:38 -04:00
Roger Dingledine
6b7e5eb5f1
give us a blurb; add stanza to the releasenotes
2010-03-16 00:44:30 -04:00
Roger Dingledine
94dccce3fa
bump to 0.2.1.25
...
it's perfect, let's ship it
2010-03-15 18:08:29 -04:00
Roger Dingledine
1108358e96
let people test the RefuseUnknownExits idea
2010-03-10 22:43:23 -05:00
Roger Dingledine
10a6b30bee
blurbs for recent alphas
2010-03-08 23:09:49 -05:00
Roger Dingledine
4d7d1027ae
fix the tor-exit-notice.html file (bug 1295)
2010-03-08 20:40:21 -05:00
Roger Dingledine
db135e92b4
bump to 0.2.2.10-alpha-dev
...
now's your chance to destabilize it
2010-03-08 00:40:00 -05:00
Roger Dingledine
81b84c0b01
prepare 0.2.2.10-alpha for release
2010-03-07 00:13:12 -05:00
Roger Dingledine
407a9d4193
Merge branch 'maint-0.2.1'
...
Conflicts:
ChangeLog
configure.in
contrib/tor-mingw.nsi.in
src/win32/orconfig.h
2010-03-06 22:46:39 -05:00
Roger Dingledine
841351e612
clean up the 0.2.1.25 changelog
2010-03-06 22:39:34 -05:00
Nick Mathewson
8719748767
Merge commit 'sebastian/manpage'
2010-03-04 23:30:53 -05:00
Nick Mathewson
eb2e56ad3c
Merge commit 'origin/maint-0.2.1'
...
Conflicts:
src/or/config.c
src/or/test.c
2010-03-04 18:44:31 -05:00
Nick Mathewson
3ff092391b
Apply Roger's bug 1269 fix.
...
From http://archives.seul.org/tor/relays/Mar-2010/msg00006.html :
As I understand it, the bug should show up on relays that don't set
Address to an IP address (so they need to resolve their Address
line or their hostname to guess their IP address), and their
hostname or Address line fails to resolve -- at that point they'll
pick a random 4 bytes out of memory and call that their address. At
the same time, relays that *do* successfully resolve their address
will ignore the result, and only come up with a useful address if
their interface address happens to be a public IP address.
2010-03-04 18:37:40 -05:00
Sebastian Hahn
4db5e7ae76
Add configure switch to disable use of asciidoc
...
Also break the build if that switch isn't used and asciidoc isn't
available.
2010-03-01 05:02:27 +01:00
Sebastian Hahn
0cd1b499b4
Simplify asciidoc-helper
...
We don't need sed for our string manipulation, so let's get rid of
it. Suggested by weasel.
2010-03-01 04:07:55 +01:00
Sebastian Hahn
f9de12b864
Ship the asciidoc-helper file in our tarballs
...
Otherwise, the build process breaks when one of the .1.txt gets
a new mtime. Suggested by weasel.
2010-03-01 04:07:55 +01:00
Nick Mathewson
27a8a56e6c
Fix a consensus-extension bug found by outofwords
...
When the bandwidth-weights branch added the "directory-footer"
token, and began parsing the directory footer at the first
occurrence of "directory-footer", it made it possible to fool the
parsing algorithm into accepting unsigned data at the end of a
consensus or vote. This patch fixes that bug by treating the footer
as starting with the first "directory-footer" or the first
"directory-signature", whichever comes first.
2010-02-27 17:07:05 -05:00
Nick Mathewson
937b5cdd41
Merge remote branch 'origin/maint-0.2.1'
...
Conflicts:
ChangeLog
src/or/routerparse.c
2010-02-27 15:34:02 -05:00
Sebastian Hahn
b67657bd95
Properly handle non-terminated strings
...
Treat strings returned from signed_descriptor_get_body_impl() as not
NUL-terminated. Since the length of the strings is available, this is
not a big problem.
Discovered by rieo.
2010-02-27 02:13:22 +01:00
Sebastian Hahn
86828e2004
Proper NULL checking in circuit_list_path_impl()
...
Another dereference-then-NULL-check sequence. No reports of this bug
triggered in the wild. Fixes bugreport 1256.
Thanks to ekir for discovering and reporting this bug.
2010-02-26 05:53:26 +01:00
Sebastian Hahn
f36c36f4a8
Proper NULL checking for hsdesc publication
...
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered
in the wild, but we should fix it anyways in case it ever happens.
Also make sure users get a note about this being a bug when they
see it in their log.
Thanks to ekir for discovering and reporting this bug.
2010-02-26 05:49:34 +01:00
Sebastian Hahn
a9802d3322
Zero a cipher completely before freeing it
...
We used to only zero the first ptrsize bytes of the cipher. Since
cipher is large enough, we didn't zero too many bytes. Discovered
and fixed by ekir. Fixes bug 1254.
2010-02-26 05:47:25 +01:00
Nick Mathewson
2ab3389ed6
Merge remote branch 'mikeperry/consensus-bw-weights5-merge'
...
Conflicts:
ChangeLog
2010-02-25 16:22:29 -05:00
Nick Mathewson
8b93dacbcf
Merge remote branch 'sebastian/manpage'
2010-02-25 14:32:22 -05:00
Sebastian Hahn
2917c0596c
Restrict PerConnBWRate|Burst to INT32_MAX, update manpage
...
All other bandwidthrate settings are restricted to INT32_MAX, but
this check was forgotten for PerConnBWRate and PerConnBWBurst. Also
update the manpage to reflect the fact that specifying a bandwidth
in terabytes does not make sense, because that value will be too
large.
2010-02-25 12:33:15 +01:00
Sebastian Hahn
f31db269a0
Update a section of the exit notice file, give it a changelog.
2010-02-23 20:11:07 +01:00
Sebastian Hahn
c8f154e173
Proper NULL checking for hsdesc publication
...
Fix a dereference-then-NULL-check sequence. This bug wasn't triggered
in the wild, but we should fix it anyways in case it ever happens.
Also make sure users get a note about this being a bug when they
see it in their log.
Thanks to ekir for discovering and reporting this bug.
2010-02-23 17:09:02 +01:00
Sebastian Hahn
7681e355ed
Fix another coverity-spotted memleak
2010-02-23 15:05:39 +01:00
Mike Perry
bce0021d96
Add a changelog entry for the bandwidth weightings.
2010-02-22 17:12:48 -08:00
Roger Dingledine
8ce1cb174d
elevate a changelog entry, and get my mailto out of the man page
2010-02-22 16:19:35 -05:00
Nick Mathewson
c084ae145e
Merge remote branch 'sebastian/bug1254'
2010-02-22 12:45:01 -05:00
Sebastian Hahn
d41030436c
Expand homedirs in paths passed to tor-checkkey
...
This is so that coverity stops complaining about using a user-supplied
string with the open() syscall. Let's see if it works.
2010-02-22 12:13:58 +01:00
Sebastian Hahn
f5112fa487
Zero a cipher completely before freeing it
...
We used to only zero the first ptrsize bytes of the cipher. Since
cipher is large enough, we didn't zero too many bytes. Discovered
and fixed by ekir. Fixes bug 1254.
2010-02-22 11:41:39 +01:00
Sebastian Hahn
5aa9610dd6
network-status-version must come first in a vote/consensus
...
Spec conformance issue: The code didn't force the network-status-version
token to be the first token in a v3 vote or consensus.
Problem discovered by Parakeep.
2010-02-22 09:16:26 +01:00
Roger Dingledine
eb842c0022
Merge branch 'maint-0.2.1' into new
...
Conflicts:
ChangeLog
configure.in
contrib/tor-mingw.nsi.in
src/win32/orconfig.h
2010-02-22 00:24:33 -05:00
Roger Dingledine
5e8c611673
prepare for 0.2.2.9-alpha
2010-02-22 00:20:55 -05:00
Roger Dingledine
b9696b96da
bump to 0.2.1.24
2010-02-21 17:27:12 -05:00
Nick Mathewson
0eb03bc6dd
Merge remote branch 'public/cbt-status'
...
Conflicts:
ChangeLog
2010-02-20 18:35:19 -05:00
Nick Mathewson
391f75d792
Merge remote branch 'sebastian/bug1143'
2010-02-19 16:58:24 -05:00
Sebastian Hahn
408a828b1f
Make the DNSPort option work with libevent 2.x
...
We need to use evdns_add_server_port_with_base() when configuring
our DNS listener, because libevent segfaults otherwise. Add a macro
in compat_libevent.h to pick the correct implementation depending
on the libevent version.
Fixes bug 1143, found by SwissTorExit
2010-02-19 22:36:53 +01:00
Nick Mathewson
061ffbd7d5
Future-proof the control protocol by ignoring unrecognized keyword args
2010-02-18 12:49:48 -05:00
Nick Mathewson
2d95e02914
Make more arguments in control.c properly case-insensitive.
2010-02-18 12:49:26 -05:00
Mike Perry
54f1f2e558
Add changelog entry for CBT testing work.
2010-02-18 09:40:15 -08:00
Nick Mathewson
715f104eeb
Merge remote branch 'origin/maint-0.2.1'
...
Conflicts:
ChangeLog
configure.in
contrib/tor-mingw.nsi.in
src/win32/orconfig.h
2010-02-18 12:01:56 -05:00
Nick Mathewson
428c07ea0d
Add changelog for latest openssl fix
2010-02-18 11:54:26 -05:00
Roger Dingledine
de0330b092
Merge commit 'sebastian/oldstuff'
...
Conflicts:
ChangeLog
2010-02-16 02:34:52 -05:00
Sebastian Hahn
f164a76f72
Remove legacy files from main source distribution
...
The AUTHORS file was pretty outdated. Its contents moved onto the
people page. Design paper and roadmaps moved to the projects
directory in svn.
2010-02-16 06:41:36 +01:00
Roger Dingledine
c9a3781580
give it a blurb, update the date
2010-02-13 14:10:57 -05:00
Nick Mathewson
79bdfb63e9
Remove the --enable-iphone option as needless.
...
On or-talk, Marco Bonetti reports that recent iPhone SDKs build
Tor fine without it.
2010-02-12 23:06:05 -05:00
Roger Dingledine
3e6a37e61e
new dannenberg address; make moria2's demise official.
2010-02-12 14:31:08 -05:00
Roger Dingledine
33f8dcae6a
prepare for 0.2.1.23
2010-02-12 12:35:40 -05:00
Nick Mathewson
a4ef33a3f8
Add changelog for memcpy bug, with credit for "memcpyfail"
2010-02-09 13:08:49 -05:00
Nick Mathewson
a6a1b8b815
Merge remote branch 'origin/maint-0.2.1'
2010-02-09 12:58:25 -05:00
Sebastian Hahn
b2b99a70c0
Don't spam controllers with TOO_MANY_CONNECTIONS events
...
We implemented ratelimiting for warnings going into the logfile, but didn't
rate-limit controller events. Now both log warnings and controller events
are rate-limited.
2010-02-08 16:45:36 +01:00
Sebastian Hahn
a168cd2a54
Don't use gethostbyname() in resolve_my_address()
...
Tor has tor_lookup_hostname(), which prefers ipv4 addresses automatically.
Bug 1244 occured because gethostbyname() returned an ipv6 address, which
Tor cannot handle currently. Fixes bug 1244; bugfix on 0.0.2pre25.
Reported by Mike Mestnik.
2010-02-08 15:49:54 +01:00