+++ /dev/null
- o Major bugfixes (bridge authority)
- - Do not allow encrypte requests for "all" bridges to return all
- bridges.
-
+++ /dev/null
- o Major bugfixes
- - Do even more to reject (and not just ignore) annotations on
- router descriptors received anywhere but from the cache.
- Previously we would ignore such annotations at first, but cache
- them to disk anyway. Bugfix on 0.2.0.8-alpha. Found by piebeer.
-
- o Minor bugfixes
- - Enforce multiplicity rules when parsing annotations. Bugfix on
- 0.2.0.8-alpha. Found by piebeer.
-
+++ /dev/null
- o Major bugfixes:
- - Stop sending a CLOCK_SKEW controller status event whenever
- we fetch directory information from a relay that has a wrong clock.
- Instead, only inform the controller when it's a trusted authority
- that claims our clock is wrong. Bugfix on tor-0.1.2.6-alpha;
- fixes the other half of bug 1074.
+++ /dev/null
- o Major bugfixes
- - Do not log messages to the controller while shrinking buffer
- freelists. Doing so would sometimes make the controller
- connection try to allocate a buffer chunk, which would mess
- up the internals of the freelist and cause an assertion
- failure. Fixes bug 1125; fixed by Robert Ransom. Bugfix on
- Tor 0.2.0.16-alpha.
-
+++ /dev/null
- o Minor bugfixes:
- - Fix an assertion failure that could occur in caches or bridge users
- when using a very short voting interval on a testing network.
- Diagnosed by Robert Hogan. Fixes bug 1141; bugfix on 0.2.0.8-alpha.
-
+++ /dev/null
- o Minor bugfixes:
- - When we restart our relay, we might get a successful connection
- from the outside before we've started our reachability tests,
- triggering a warning: "ORPort found reachable, but I have no
- routerinfo yet. Failing to inform controller of success." This
- bug was harmless unless Tor is running under a controller
- like Vidalia, in which case the controller would never get a
- REACHABILITY_SUCCEEDED status event. Bugfix on 0.1.2.6-alpha;
- fixes bug 1172.
+++ /dev/null
- o Minor bugfixes:
- - Allow handshaking OR connections to take a full KeepalivePeriod
- seconds to handshake. Previously, we would close them after
- IDLE_OR_CONN_TIMEOUT seconds, as if they were open. This is a
- bugfix on 0.2.1.26. Thanks to mingw-san for analysis help. Fixes
- bug 1840.
-
+++ /dev/null
- o Minor bugfixes:
- - Bring the logic that gathers routerinfos and assesses the
- acceptability of circuits into line. This prevents a Tor OP from getting
- locked in a cycle of choosing its local OR as an exit for a path (due to
- a .exit request) and then rejecting the circuit because its OR is not
- listed yet. Also prevent Tor clients from using an OR running in the same
- instance as an exit (due to a .exit request) if the OR does not meet the
- same requirements expected of an OR running elsewhere.
- Fixes bug 1859; bugfix on 0.2.0-alpha.
+++ /dev/null
- o Major bugfixes:
- - When you use bridges and your network goes away and your bridges
- get marked as down, recover when you attempt a new socks connection
- (if the network is back) rather than waiting up to an hour to try
- fetching new descriptors for your bridges. Bugfix on 0.2.0.3-alpha;
- fixes bug 1981.
+++ /dev/null
- o Major bugfixes:
- - Learn our external IP address when we're a relay or bridge, even if
- we set PublishServerDescriptor to 0. Bugfix on 0.2.0.3-alpha,
- where we introduced bridge relays that don't need to publish to
- be useful. Fixes bug 2050.
+++ /dev/null
- o Minor bugfixes
- - Prevent calls from Libevent from inside Libevent log handlers.
- This had potential to cause a nasty set of crashes, especially if
- running Libevent with debug logging enabled, and running Tor
- with a controller watching for low-severity log messages.
- Bugfix on 0.1.0.2-rc. Fixes bug 2190.
+++ /dev/null
- o Build changes
- - Tor does not build packages correctly with Automake 1.6 and earlier;
- added a check to Makefile.am to make sure that we're building with
- Automake 1.7 or later.
-
+++ /dev/null
- o Minor bugfixes
- - Fix compilation on mingw when a pthreads compatibility library
- has been installed. (We don't want to use it, so we shouldn't
- be including pthread.h.) Fixes bug 2313; bugfix on 0.1.0.1-rc.
+++ /dev/null
- o Minor bugfixes
- - Add a check for SIZE_T_MAX to tor_realloc to try to avoid
- underflow errors there too. Fixes bug 2324.
-
+++ /dev/null
- o Major bugfixes (security):
- - Prevent a DoS attack by disallowing any zlib-compressed data
- whose compression factor is implausibly high. Fixes the
- second part of bug2324; found by doors.
-
+++ /dev/null
- o Minor bugfixes
- - Fix a bug where we would assert if we ever had a
- cached-descriptors.new file (or another file read directly into
- memory) of exactly SIZE_T_CEILING bytes. Found by doors; fixes
- bug 2326; bugfix on 0.2.1.25.
-
+++ /dev/null
- o Minor bugfixes
- - Fix a bug where we would declare that we had run out of virtual
- addresses when the address space was only half-exhausted. Bugfix
- on 0.1.2.1-alpha.
- - Correctly handle the case where AutomapHostsOnResolve is set but no
- virtual addresses are available. Fixes bug2328, bugfix on
- 0.1.2.1-alpha. Bug found by doorss.
- - Correctly handle wrapping around to when we run out of virtual address
- space. Found by cypherpunks, bugfix on 0.2.0.5-alpha.
+++ /dev/null
- o Minor bugfixes
- - Fix a bug with handling misformed replies to reverse DNS lookup
- requests in DNSPort. Bugfix on Tor 0.2.0.1-alpha. Related to a bug
- reported by doorss.
+++ /dev/null
- o Minor bugfixes
- - Fix some potential asserts and partsing issues with grossly
- malformed router caches. Fixes bug 2352. Found by doorss.
- Bugfix on Tor 0.2.1.27.
-
-
+++ /dev/null
- o Minor bugfixes
- - Zero out a few more keys in memory before freeing them. Fixes bug
- 2384 and part of bug 2385. These key instances found by
- "cypherpunks". Bugfix on 0.0.2pre9.
-
-
+++ /dev/null
- o Minor bugfixes
- - Use micro-revision numbers in 0.2.1.x instead: apparently, they
- were more used than we had known. (Bugfix on 0.2.1.30).
- - Instead of generating our micro-version numbers using SVN revisions,
- use git revisions instead. Bugfix on 0.2.1.15-rc; fixes bug 2402.
-
+++ /dev/null
- o Major bugfixes
- - Ignore and warn about "PublishServerDescriptor hidserv" torrc
- options. The 'hidserv' argument never controlled publication
- of hidden service descriptors. Bugfix on 0.2.0.1-alpha.
-
-
+++ /dev/null
- o Major bugfixes:
- - If relays set RelayBandwidthBurst but not RelayBandwidthRate,
- Tor would ignore their RelayBandwidthBurst setting,
- potentially using more bandwidth than expected. Bugfix on
- 0.2.0.1-alpha. Reported by Paul Wouters. Fixes bug 2470.
+++ /dev/null
- o Minor bugfixes:
- - Avoid signed/unsigned comparisons by making SIZE_T_CEILING unsigned.
- (None of the cases where we did this before were wrong, but by making
- this change we can avoid warnings.) Fixes bug2475; bugfix on
- Tor 0.2.1.28.
+++ /dev/null
- o Minor bugfixes
- - Fix a crash bug that could occur occasionally when a client was
- configured with a large number of bridges. Fixes bug 2629; bugfix
- on 0.2.1.2-alpha. Bugfix by trac user "shitlei".
-
+++ /dev/null
- o Minor bugfixes
- - Correct the warning displayed when a rendezvous descriptor exceeds
- the maximum size. Fixes bug 2750; bugfix on 0.2.1.5-alpha. Found
- by John Brooks.
-
-
+++ /dev/null
- o Minor bugfixes
- - Fix an uncommon assertion failure when running with DNSPort under
- heavy load. Fixes bug 2933; bugfix on 2.0.1-alpha.
-
+++ /dev/null
- o Minor features
- - Adjust our TLS Diffie-Hellman parameters to match those used by
- Apache's mod_ssl.
+++ /dev/null
- o Major bugfixes
- - Do not set the tlsext_host_name extension on server SSL objects;
- only on client SSL objects. We set it to immitate a browser, not a
- vhosting server. This resolves an incompatibility with openssl 0.9.8p
- and openssl 1.0.0b. Fixes bug 2204; bugfix on 0.2.1.1-alpha.
-
-
+++ /dev/null
- o Security fixes:
- - Forget all hidden service descriptors cached as a client when
- processing a SIGNAL NEWNYM command. Fixes bug 3000. Bugfix on
- 0.0.6.
- o Code simplifications and refactoring:
- - Allow rend_client_send_introduction to fail without closing the
- AP connection permanently.
-
-
+++ /dev/null
- o Directory authority changes:
- - Change IP address and ports for gabelmoo (v3 directory authority).
-
+++ /dev/null
- o Minor features:
- - Update to the April 1 2011 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features:
- - Update to the December 1 2010 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features:
- - Update to the February 1 2011 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features:
- - Update to the January 1 2011 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features:
- - Update to the March 1 2011 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features:
- - Update to the October 1 2010 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features:
- - Update to the September 1 2010 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features
- - Update to the August 1 2010 Maxmind GeoLite Country database.
-
+++ /dev/null
- o Minor features
- - Update to the June 1 2010 Maxmind GeoLite Country database.
+++ /dev/null
- o Major bugfixes:
- - Fix a crash in parsing router descriptors containing IPv6
- addresses. This one crashed the directory authorities when somebody
- fired up some experimental code. Bugfix on 0.2.1.3-alpha.
+++ /dev/null
- o New directory authorities:
- - Set up maatuska (run by Linus Nordberg) as the eighth v3 directory
- authority.
+++ /dev/null
- o Minor features
- - Build correctly on mingw with more recent version of OpenSSL 0.9.8.
- Patch from mingw-san.
+++ /dev/null
- o Minor features:
- - Have clients begin understanding the new END_STREAM_REASON_NOROUTE
- error code.
+++ /dev/null
- o Major features:
- - Move to the Maxmind GeoIP db (rather than the June 2009
- ip-to-country GeoIP db) for our statistics that count how many
- users relays are seeing from each country. Now we have more accurate
- data for many African countries.
+++ /dev/null
- o Minor bugfixes:
- - When building with --enable-gcc-warnings on OpenBSD, disable
- warnings in system headers. This makes --enable-gcc-warnings
- pass on OpenBSD 4.8.
\ No newline at end of file
+++ /dev/null
- o Major bugfixes (security)
- - Fix a bounds-checking error that could allow an attacker to
- remotely crash a directory authority. Found by piebeer.
- Bugfix on 0.2.1.5-alpha.
-
-
+++ /dev/null
- o Removed files:
- - Remove the old debian/ directory from the main Tor distribution.
- The official Tor-for-debian git repository lives at the URL
- https://git.torproject.org/debian/tor.git .
-
+++ /dev/null
- o Removed files:
- - Stop shipping the old doc/website/ directory in the tarball. We
- changed the website format in late 2010, and what we shipped in
- 0.2.1.26 really wasn't that useful anyway.
-
+++ /dev/null
- o Minor bugfixes
- - Check for and reject overly long directory certificates and
- directory tokens before they have a chance to hit any
- assertions. Bugfix on 0.2.1.28. Found by doorss.
+++ /dev/null
- o Major bugfixes:
- - Fix a remotely exploitable bug that could be used to crash instances
- of Tor remotely by overflowing on the heap. Remove-code execution
- hasn't been confirmed, but can't be ruled out. Obviously, everyone
- should upgrade. Bugfix on the 0.1.1 series and later.
+++ /dev/null
- o Major bugfixes (security)
- - Fix a heap overflow bug where an adversary could cause heap
- corruption. This bug potentially allows remote code execution
- attacks. Found by debuger. Fixes CVE-2011-0427. Bugfix on
- 0.1.2.10-rc.
- o Defensive programming
- - Introduce output size checks on all of our decryption functions.
-
+++ /dev/null
- o Packaging changes:
- - Stop shipping the Tor specs files and development proposal documents
- in the tarball. They are now in a separate git repository at
- git://git.torproject.org/torspec.git
-
+++ /dev/null
- o Minor bugfixes
- - When warning about missing zlib development packages, give the
- correct package names. Bugfix on 0.2.0.1-alpha.