[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r17895: {tor} declare that we're going to put 0.2.0.33 out this month. (in tor/branches/tor-0_2_0-patches: . doc)



Author: arma
Date: 2009-01-04 21:20:39 -0500 (Sun, 04 Jan 2009)
New Revision: 17895

Modified:
   tor/branches/tor-0_2_0-patches/ChangeLog
   tor/branches/tor-0_2_0-patches/doc/TODO.020
Log:
declare that we're going to put 0.2.0.33 out this month.


Modified: tor/branches/tor-0_2_0-patches/ChangeLog
===================================================================
--- tor/branches/tor-0_2_0-patches/ChangeLog	2009-01-04 23:56:43 UTC (rev 17894)
+++ tor/branches/tor-0_2_0-patches/ChangeLog	2009-01-05 02:20:39 UTC (rev 17895)
@@ -1,4 +1,4 @@
-Changes in version 0.2.0.33 - 2009-??-??
+Changes in version 0.2.0.33 - 2009-01-??
   o Major bugfixes:
     - When a stream at an exit relay is in state "resolving" or
       "connecting" and it receives an "end" relay cell, the exit relay
@@ -8,7 +8,7 @@
       reported by "wood".
     - When sending CREATED cells back for a given circuit, use a 64-bit
       connection ID to find the right connection, rather than an addr:port
-      combination.  Now that we can have multiple OR connections between
+      combination. Now that we can have multiple OR connections between
       the same ORs, it is no longer possible to use addr:port to uniquely
       identify a connection.
 
@@ -47,18 +47,18 @@
       the cache because we already had a v0 descriptor with the same ID.
       Bugfix on 0.2.0.18-alpha.
     - Fix a race condition when freeing keys shared between main thread
-      and CPU workers that could result in a memory leak.  Bugfix on
-      0.1.0.1-rc.  Fixes bug 889.
+      and CPU workers that could result in a memory leak. Bugfix on
+      0.1.0.1-rc. Fixes bug 889.
     - Send a valid END cell back when a client tries to connect to a
-      nonexistent hidden service port.  Bugfix on 0.1.2.15.  Fixes bug
-      840.  Patch from rovv.
+      nonexistent hidden service port. Bugfix on 0.1.2.15. Fixes bug
+      840. Patch from rovv.
     - Check which hops rendezvous stream cells are associated with to
       prevent possible guess-the-streamid injection attacks from
-      intermediate hops.  Fixes another case of bug 446. Based on patch
+      intermediate hops. Fixes another case of bug 446. Based on patch
       from rovv.
     - If a broken client asks a non-exit router to connect somewhere,
       do not even do the DNS lookup before rejecting the connection.
-      Fixes another case of bug 619.  Patch from rovv.
+      Fixes another case of bug 619. Patch from rovv.
 
   o Minor bugfixes (hidden services):
     - Do not throw away existing introduction points on SIGHUP. Bugfix on
@@ -243,7 +243,7 @@
       O_CREAT flag. Fortify was complaining, and correctly so. Fixes
       bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
     - Correctly detect transparent proxy support on Linux hosts that
-      require in.h to be included before netfilter_ipv4.h.  Patch
+      require in.h to be included before netfilter_ipv4.h. Patch
       from coderman.
 
 

Modified: tor/branches/tor-0_2_0-patches/doc/TODO.020
===================================================================
--- tor/branches/tor-0_2_0-patches/doc/TODO.020	2009-01-04 23:56:43 UTC (rev 17894)
+++ tor/branches/tor-0_2_0-patches/doc/TODO.020	2009-01-05 02:20:39 UTC (rev 17895)
@@ -3,36 +3,17 @@
 description of the patch.)
 
 Backport for 0.2.0:
-  o r17135: ClientDNSRejectInternalAddresses not consistently obeyed.
 
 Backport for 0.2.0 once better tested:
-  o r16136: prevent circid collision.  [Also backport to 0.1.2.x??]
-  o r16558: Avoid mis-routing CREATED cells.
   Xo r16621: Make some DNS code more robust (partial; see also libevent
             approach). (Also maybe r16674)
     [Partially backported.  Instead of the basic name checking, I backported
      r17171 instead, to be even more resistant to poisoning.]
-  o r17091: distinguish "no routers support pending circuits" from
-            "no circuits are pending."
-    o See also r17181...
-    o ... and r17184.
-  o r17137: send END cell in response to connect to nonexistent hidserv port.
-  o r17138: reject *:* servers should never do DNS lookups.
-  o r17139: Fix another case of overriding .exit choices.
-  o r17162 and r17164: fix another case of not checking cpath_layer.
   - r17208,r17209,r7211,r17212,r17214: Avoid gotterdammerung when an
     authority has an expired certificate.
-  o r17562: Fix bug 874, wherein a sighup would make us kill all our intro
-    points and leave their corpses for the next set of intro points to
-    stumble over.
-  o r17566: FIx bug 691, wherein failure to run dns_init() would kill Tor
-    dead.
   - r17886:  Don't remove routerinfos as unlisted unless we have a
     consensus.
   - r17887:  Don't accept 1.2.3 as a valid IP address.
 
-
 Backport for 0.2.0, maybe:
-  o r14830: Disable TLS compression.  This saves RAM and CPU, and
-    makes our TLS compression harder to distinguish from
-    firefox's. Win/win/win, right?
+