[or-cvs] r17660: {tor} clean up old changelog a bit while i'm at it (tor/branches/tor-0_2_0-patches)
arma at seul.org
arma at seul.org
Wed Dec 17 22:46:20 UTC 2008
Author: arma
Date: 2008-12-17 17:46:19 -0500 (Wed, 17 Dec 2008)
New Revision: 17660
Modified:
tor/branches/tor-0_2_0-patches/ChangeLog
Log:
clean up old changelog a bit while i'm at it
Modified: tor/branches/tor-0_2_0-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_2_0-patches/ChangeLog 2008-12-17 22:46:00 UTC (rev 17659)
+++ tor/branches/tor-0_2_0-patches/ChangeLog 2008-12-17 22:46:19 UTC (rev 17660)
@@ -8,35 +8,35 @@
reported by "wood".
- When sending CREATED cells back for a given circuit, use a 64-bit
connection ID to find the right connection, rather than an addr:port
- combination. Now that we can have multiple OR connections between the
- same ORs, it is no longer possible to use addr:port to uniquely
+ combination. Now that we can have multiple OR connections between
+ the same ORs, it is no longer possible to use addr:port to uniquely
identify a connection.
o Minor bugfixes:
- - Do not mark smartlist_bsearch_idx() function as ATTR_PURE. This bug
+ - Do not mark smartlist_bsearch_idx() function as ATTR_PURE. This bug
could make gcc generate non-functional binary search code. Bugfix
on 0.2.0.10-alpha.
- Build correctly on platforms without socklen_t.
- Compile without warnings on solaris.
- Avoid potential crash on internal error during signature collection.
- Fixes bug 864. Patch from rovv.
+ Fixes bug 864. Patch from rovv.
- Correct handling of possible malformed authority signing key
- certificates with internal signature types. Fixes bug 880.
+ certificates with internal signature types. Fixes bug 880.
Bugfix on 0.2.0.3-alpha.
- Fix a hard-to-trigger resource leak when logging credential status.
CID 349.
- When we can't initialize DNS because the network is down, do not
- automatically stop Tor from starting. Instead, we retry failed
- dns_inits() every 10 minutes, and change the exit policy to reject *:*
- until one succeeds. Fixes bug 691.
+ automatically stop Tor from starting. Instead, we retry failed
+ dns_inits() every 10 minutes, and change the exit policy to reject
+ *:* until one succeeds. Fixes bug 691.
- Use 64 bits instead of 32 bits for connection identifiers used with
the controller protocol, to greatly reduce risk of identifier reuse.
- - When we're choosing an exit node for a circuit, and we have no pending
- streams, choose a good general exit rather than one that supports "all
- the pending streams". Bugfix on 0.1.1.x. (Fix by rovv.)
+ - When we're choosing an exit node for a circuit, and we have
+ no pending streams, choose a good general exit rather than one that
+ supports "all the pending streams". Bugfix on 0.1.1.x. Fix by rovv.
- Fix another case of assuming, when a specific exit is requested,
that we know more than the user about what hosts it allows.
- Fixes one case of bug 752. Patch from rovv.
+ Fixes one case of bug 752. Patch from rovv.
- Clip the MaxCircuitDirtiness config option to a minimum of 10
seconds. Warn the user if lower values are given in the
configuration. Bugfix on 0.1.0.1-rc. Patch by Sebastian.
@@ -46,11 +46,11 @@
o Minor features:
- Report the case where all signatures in a detached set are rejected
- differently than the case where there is an error handling the detached
- set.
+ differently than the case where there is an error handling the
+ detached set.
- When we realize that another process has modified our cached
descriptors, print out a more useful error message rather than
- triggering an assertion. Fixes bug 885. Patch from Karsten.
+ triggering an assertion. Fixes bug 885. Patch from Karsten.
- Implement the 0x20 hack to better resist DNS poisoning: set the
case on outgoing DNS requests randomly, and reject responses that do
not match the case correctly. This logic can be disabled with the
More information about the tor-commits
mailing list