aboutsummaryrefslogtreecommitdiff
path: root/ChangeLog
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2008-07-09 10:10:37 +0000
committerRoger Dingledine <arma@torproject.org>2008-07-09 10:10:37 +0000
commitdbbcb92cf0a36a4d8d8814f47d2d98d93a9b8d8d (patch)
treeb99657c336871f5f2f0ff2fe45061f016107edd0 /ChangeLog
parent133f011c495670dbac2ce141f02e64869d6f5b62 (diff)
downloadtor-dbbcb92cf0a36a4d8d8814f47d2d98d93a9b8d8d.tar
tor-dbbcb92cf0a36a4d8d8814f47d2d98d93a9b8d8d.tar.gz
forward-port the 0.2.0.29-rc changelog
svn:r15782
Diffstat (limited to 'ChangeLog')
-rw-r--r--ChangeLog40
1 files changed, 40 insertions, 0 deletions
diff --git a/ChangeLog b/ChangeLog
index eaa8781ad..b06787078 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -23,6 +23,46 @@ Changes in version 0.2.1.3-alpha - 2008-07-xx
coderman.
+Changes in version 0.2.0.29-rc - 2008-07-08
+ o Major bugfixes:
+ - If you have more than one bridge but don't know their keys,
+ you would only launch a request for the descriptor of the first one
+ on your list. (Tor considered launching requests for the others, but
+ found that it already had a connection on the way for $0000...0000
+ so it didn't open another.) Bugfix on 0.2.0.x.
+ - If you have more than one bridge but don't know their keys, and the
+ connection to one of the bridges failed, you would cancel all
+ pending bridge connections. (After all, they all have the same
+ digest.) Bugfix on 0.2.0.x.
+ - When a hidden service was trying to establish an introduction point,
+ and Tor had built circuits preemptively for such purposes, we
+ were ignoring all the preemptive circuits and launching a new one
+ instead. Bugfix on 0.2.0.14-alpha.
+ - When a hidden service was trying to establish an introduction point,
+ and Tor *did* manage to reuse one of the preemptively built
+ circuits, it didn't correctly remember which one it used,
+ so it asked for another one soon after, until there were no
+ more preemptive circuits, at which point it launched one from
+ scratch. Bugfix on 0.0.9.x.
+ - Make directory servers include the X-Your-Address-Is: http header in
+ their responses even for begin_dir conns. Now clients who only
+ ever use begin_dir connections still have a way to learn their IP
+ address. Fixes bug 737; bugfix on 0.2.0.22-rc. Reported by goldy.
+
+ o Minor bugfixes:
+ - Fix a macro/CPP interactions that was confusing some compilers:
+ some GCCs don't like #if/#endif pairs inside macro arguments.
+ Fix for bug 707.
+ - Fix macro collision between OpenSSL 0.9.8h and Windows headers.
+ Fixes bug 704; fix from Steven Murdoch.
+ - When opening /dev/null in finish_daemonize(), do not pass the
+ O_CREAT flag. Fortify was complaining, and correctly so. Fixes
+ bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
+ - Correctly detect transparent proxy support on Linux hosts that
+ require in.h to be included before netfilter_ipv4.h. Patch
+ from coderman.
+
+
Changes in version 0.2.1.2-alpha - 2008-06-20
Tor 0.2.1.2-alpha includes a new "TestingTorNetwork" config option to
make it easier to set up your own private Tor network; fixes several