[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r11920: remove some done items; futz with changelog (in tor/branches/tor-0_1_2-patches: . doc src/or)
Author: arma
Date: 2007-10-14 03:31:57 -0400 (Sun, 14 Oct 2007)
New Revision: 11920
Modified:
tor/branches/tor-0_1_2-patches/ChangeLog
tor/branches/tor-0_1_2-patches/doc/TODO.012
tor/branches/tor-0_1_2-patches/src/or/circuituse.c
Log:
remove some done items; futz with changelog
Modified: tor/branches/tor-0_1_2-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_1_2-patches/ChangeLog 2007-10-14 07:19:39 UTC (rev 11919)
+++ tor/branches/tor-0_1_2-patches/ChangeLog 2007-10-14 07:31:57 UTC (rev 11920)
@@ -8,19 +8,17 @@
--list-fingerprint or --verify-config or --hash-password. (Resolves
bug 499.)
- When generating information telling us how to extend to a given
- router, do not try to include the nickname if it is absent. (Resolves
- bug 467.)
- - Fix a user-triggerable segfault in expand_filename(). (There isn't
+ router, do not try to include the nickname if it is
+ absent. (Resolves bug 467.)
+ - Fix a user-triggerable segfault in expand_filename(). (There isn't
a way to trigger this remotely.)
+ - When sending a status event to the controller telling it that an
+ OR address is readable, set the port correctly. (Previously we
+ were reporting the dir port.)
- Fix a minor memory leak whenever a controller sends the PROTOCOLINFO
command. Bugfix on 0.1.2.17.
- o Minor bugfixes (controller):
- - When sending a status event to the controller telling it that an
- OR address is readable, set the port correctly. (Previously we
- were reporting the dir port.)
-
Changes in version 0.1.2.17 - 2007-08-30
o Major bugfixes (security):
- We removed support for the old (v0) control protocol. It has been
Modified: tor/branches/tor-0_1_2-patches/doc/TODO.012
===================================================================
--- tor/branches/tor-0_1_2-patches/doc/TODO.012 2007-10-14 07:19:39 UTC (rev 11919)
+++ tor/branches/tor-0_1_2-patches/doc/TODO.012 2007-10-14 07:31:57 UTC (rev 11920)
@@ -2,16 +2,7 @@
description of the patch.)
Backport items for 0.1.2:
- o r10939: Choose with complete fairness when exits are weighted.
- o r10956: fix the math for exit bandwidth weighting
- o r10994: Disable SENTINELS checking in order to use less RAM in
- buffer allocation.
- o r11117: cookie auth more usable
- o disable v0 control protocol
- o r11138: PROTOCOLINFO support.
- D r11141: CookieAuthFile and CookieAuthFileGroupReadable.
N - r11166: Don't believe future dates from the state file.
- o r11566: make r11438 not actually break things.
N - r11828+: Detect bad sa_family from accept().
N - r11882: Avoid crash-bug 451.
N - r11886: Consider family as well as identity when cannibalizing circuits.
@@ -19,19 +10,10 @@
Backport for 0.1.2.x once better tested:
P - r10579: new addsysuser implementation for osx (??)
- X coderman's constrained socket buffers patch (r10843)
- (this is a non-critical new feature. if people want it badly they
- should run the dev branch.)
- o r10964: control.c grammar conformance. could conceivably break
- old controllers that were relying on non-conformance.
- X some subset of r11229 (unexpected whitespace in malformed descriptors)?
- (no need, I don't think any of the 0.1.2.x code calls the buggy parts)
D r11287: Reject address mappings to internal addresses. (??)
(this will break some existing test-network configurations, yes?)
R - r11499, r11500, r11501: hidserv hexdigests rather than nicknames
P - r11548, the osx /tmp fix
- o r11293: Bulletproof code to generate extend info.
- o r11332: Fix user-triggerable segfault in expand_filename("~")
N - r11829: Don't warn when cancel_pending_resolve() finds a cached failure.
R - r11915: just because you hup, don't publish a near-duplicate descriptor
Modified: tor/branches/tor-0_1_2-patches/src/or/circuituse.c
===================================================================
--- tor/branches/tor-0_1_2-patches/src/or/circuituse.c 2007-10-14 07:19:39 UTC (rev 11919)
+++ tor/branches/tor-0_1_2-patches/src/or/circuituse.c 2007-10-14 07:31:57 UTC (rev 11920)
@@ -94,7 +94,6 @@
} else {
if (conn->socks_request->command == SOCKS_COMMAND_CONNECT_DIR) {
/* don't use three-hop circuits -- that could hurt our anonymity. */
- log_debug(LD_CIRC,"Skipping multi-hop circuit for CONNECT_DIR.");
return 0;
}
}