Tor 0.1.0.15 is a minor bugfix release. It fixes a crash bug when exit
nodes run out of file descriptors, and rejects two more ports in the
default exit policy.
(I'm afraid we don't have RPM packages up yet since I converted my Red
Hat development machine over to Debian, but we plan to have some up soon.)
http://tor.eff.org/download.html
o Bugfixes on 0.1.0.x:
- Reject ports 465 and 587 (spam targets) in default exit policy.
- Don't crash when we don't have any spare file descriptors and we
try to spawn a dns or cpu worker.
- Get rid of IgnoreVersion undocumented config option, and make us
only warn, never exit, when we're running an obsolete version.
- Don't try to print a null string when your server finds itself to
be unreachable and the Address config option is empty.
- Make the numbers in read-history and write-history into uint64s,
so they don't overflow and publish negatives in the descriptor.
- Fix a minor memory leak in smartlist_string_remove().
- We were only allowing ourselves to upload a server descriptor at
most every 20 minutes, even if it changed earlier than that.
- Clean up log entries that pointed to old URLs.
Attachment:
signature.asc
Description: Digital signature