tor/changes
Nick Mathewson 5193752ca8 Exits don't need to fetch certs for unknown authorities
When we started RefuseUnknownExits back in 0.2.2.11-alpha, we
started making exits act like they cache directory info (since they
need an up-to-date idea of who is really a router).  But this
included fetching needless (unrecognized) authorities' certs, which
doesn't make any sense for them.

This is related to, but not necessarily the same as, the issue that
Ian reported for bug #2297.

(This patch is based on a patch from a user who I believe has asked
not to be named.  If I'm wrong about that, please add the
appropriate name onto the changelog.)
2012-03-30 15:20:06 -04:00
..
bug2297-related Exits don't need to fetch certs for unknown authorities 2012-03-30 15:20:06 -04:00
bug2987 Write initial documentation for the contents of the state file 2012-03-28 04:08:56 -04:00
bug4011 Keep separate time-to-downloads for each consensus flavor 2012-03-28 02:55:33 -04:00
bug4091_debugging Log statement to help track down bug4091 2012-03-27 18:28:39 -04:00
bug4875 Make relays handle an address suggestion from a directory server giving an IPv6 address. 2012-03-28 22:16:55 +02:00
bug5053 Count IPv6 connections in bridge and entry stats. 2012-02-09 11:12:30 +01:00
bug5151 note that bug 5151 is on 0.2.3.9-alpha 2012-03-28 17:19:24 -04:00
bug5180 Changelog for torify changes 2012-03-27 18:46:47 -04:00
bug5449 Provide large enough buffer in test_util_sscanf() 2012-03-27 15:16:22 +02:00
bug5508 Add changes file. 2012-03-30 12:06:53 +02:00
crypto_api Refactor the API for setting up a block cipher. 2012-03-27 22:37:56 -04:00
memleak_safecookie Fix a memory leak in an error case of SAFECOOKIE authentication. 2012-03-30 10:20:48 -04:00
openssl101_aes Use OpenSSL 1.0.1's EVP aes_ctr implementation when available 2012-03-27 22:38:06 -04:00
pad_rsa_always Excise PK_NO_PADDING entirely: Unpadded RSA is silly. 2012-03-27 22:38:06 -04:00