aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2012-06-06 00:30:25 -0400
committerRoger Dingledine <arma@torproject.org>2012-06-06 00:30:25 -0400
commit0ee13dc287320c0b1aeffb0854534ee1d8b561b2 (patch)
tree8e50d7207f6a85880f9f78db99daa5b53671c008
parentf136e835d8f98a0508bfa418d01c40f0b73935a3 (diff)
downloadtor-0ee13dc287320c0b1aeffb0854534ee1d8b561b2.tar
tor-0ee13dc287320c0b1aeffb0854534ee1d8b561b2.tar.gz
use my time machine to fix a few more typos
-rw-r--r--ChangeLog10
-rw-r--r--ReleaseNotes2
2 files changed, 6 insertions, 6 deletions
diff --git a/ChangeLog b/ChangeLog
index c0cf4c1c2..ceb26daa3 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -201,7 +201,7 @@ Changes in version 0.2.3.16-alpha - 2012-06-05
Fixes bug 5891; bugfix on 0.2.3.6-alpha. Also fixes bug 5508 in
a better way.
- Don't try to open non-control listeners when DisableNetwork is set.
- Previousy, we'd open all listeners, then immediately close them.
+ Previously, we'd open all listeners, then immediately close them.
Fixes bug 5604; bugfix on 0.2.3.9-alpha.
- Don't abort the managed proxy protocol if the managed proxy
sends us an unrecognized line; ignore it instead. Fixes bug
@@ -211,7 +211,7 @@ Changes in version 0.2.3.16-alpha - 2012-06-05
- Fix a compilation issue on GNU Hurd, which doesn't have PATH_MAX.
Fixes bug 5355; bugfix on 0.2.3.11-alpha.
- Remove bogus definition of "_WIN32" from src/win32/orconfig.h, to
- unbreak the MSVC build. Fies bug 5858; bugfix on 0.2.3.12-alpha.
+ unbreak the MSVC build. Fixes bug 5858; bugfix on 0.2.3.12-alpha.
- Resolve numerous small warnings and build issues with MSVC. Resolves
bug 5859.
@@ -268,7 +268,7 @@ Changes in version 0.2.2.36 - 2012-05-24
- Provide controllers with a safer way to implement the cookie
authentication mechanism. With the old method, if another locally
running program could convince a controller that it was the Tor
- process, then that program could trick the contoller into telling
+ process, then that program could trick the controller into telling
it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE"
authentication method uses a challenge-response approach to prevent
this attack. Fixes bug 5185; implements proposal 193.
@@ -397,7 +397,7 @@ Changes in version 0.2.3.15-alpha - 2012-04-30
- When Tor is built with kernel headers from a recent (last few
years) Linux kernel, do not fail to run on older (pre-2.6.28
Linux kernels). Fixes bug 5112; bugfix on 0.2.3.1-alpha.
- - Fix cross-compilation isssues with mingw. Bugfixes on 0.2.3.6-alpha
+ - Fix cross-compilation issues with mingw. Bugfixes on 0.2.3.6-alpha
and 0.2.3.12-alpha.
- Fix compilation with miniupnpc version 1.6; patch from
Anthony G. Basile. Fixes bug 5434; bugfix on 0.2.3.12-alpha.
@@ -539,7 +539,7 @@ Changes in version 0.2.3.13-alpha - 2012-03-26
- Provide controllers with a safer way to implement the cookie
authentication mechanism. With the old method, if another locally
running program could convince a controller that it was the Tor
- process, then that program could trick the contoller into telling
+ process, then that program could trick the controller into telling
it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE"
authentication method uses a challenge-response approach to prevent
this attack. Fixes bug 5185, implements proposal 193.
diff --git a/ReleaseNotes b/ReleaseNotes
index 98f80349f..563f94dbb 100644
--- a/ReleaseNotes
+++ b/ReleaseNotes
@@ -42,7 +42,7 @@ Changes in version 0.2.2.36 - 2012-05-24
- Provide controllers with a safer way to implement the cookie
authentication mechanism. With the old method, if another locally
running program could convince a controller that it was the Tor
- process, then that program could trick the contoller into telling
+ process, then that program could trick the controller into telling
it the contents of an arbitrary 32-byte file. The new "SAFECOOKIE"
authentication method uses a challenge-response approach to prevent
this attack. Fixes bug 5185; implements proposal 193.