aboutsummaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
Diffstat (limited to 'changes')
-rw-r--r--changes/1863_bwhist16
-rw-r--r--changes/annotations_fix10
-rw-r--r--changes/bug103513
-rw-r--r--changes/bug1090-general73
-rw-r--r--changes/bug1090-launch-warning5
-rw-r--r--changes/bug11258
-rw-r--r--changes/bug11415
-rw-r--r--changes/bug134513
-rw-r--r--changes/bug13524
-rw-r--r--changes/bug18407
-rw-r--r--changes/bug18599
-rw-r--r--changes/bug19816
-rw-r--r--changes/bug20044
-rw-r--r--changes/bug20505
-rw-r--r--changes/bug20604
-rw-r--r--changes/bug2081_followup9
-rw-r--r--changes/bug2097-more6
-rw-r--r--changes/bug2146.14
-rw-r--r--changes/bug21814
-rw-r--r--changes/bug21905
-rw-r--r--changes/bug22036
-rw-r--r--changes/bug22105
-rw-r--r--changes/bug2230_clean_14
-rw-r--r--changes/bug2230_part17
-rw-r--r--changes/bug2230_part25
-rw-r--r--changes/bug2230_part46
-rw-r--r--changes/bug22353
-rw-r--r--changes/bug22505
-rw-r--r--changes/bug227915
-rw-r--r--changes/bug23144
-rw-r--r--changes/bug23179
-rw-r--r--changes/bug23307
-rw-r--r--changes/bug23317
-rw-r--r--changes/bug23373
-rw-r--r--changes/bug23466
-rw-r--r--changes/bug23585
-rw-r--r--changes/bug23636
-rw-r--r--changes/bug23644
-rw-r--r--changes/bug23668
-rw-r--r--changes/bug23788
-rw-r--r--changes/bug23795
-rw-r--r--changes/bug2402_redux6
-rw-r--r--changes/bug24036
-rw-r--r--changes/bug24094
-rw-r--r--changes/bug24325
-rw-r--r--changes/bug24335
-rw-r--r--changes/bug24505
-rw-r--r--changes/bug25034
-rw-r--r--changes/bug25045
-rw-r--r--changes/bug25108
-rw-r--r--changes/bug25116
-rw-r--r--changes/bug25725
-rw-r--r--changes/bug25733
-rw-r--r--changes/bug26607
-rw-r--r--changes/bug2683a3
-rw-r--r--changes/bug26965
-rw-r--r--changes/bug26986
-rw-r--r--changes/bug27045
-rw-r--r--changes/bug2704_part15
-rw-r--r--changes/bug2704_part25
-rw-r--r--changes/bug27165
-rw-r--r--changes/bug272211
-rw-r--r--changes/bug2732-simple7
-rw-r--r--changes/bug275611
-rw-r--r--changes/bug27576
-rw-r--r--changes/bug28994
-rw-r--r--changes/bug29174
-rw-r--r--changes/bug29487
-rw-r--r--changes/bug29716
-rw-r--r--changes/bug29799
-rw-r--r--changes/bug30125
-rw-r--r--changes/bug30207
-rw-r--r--changes/bug30226
-rw-r--r--changes/bug30264
-rw-r--r--changes/bug30395
-rw-r--r--changes/bug539_removal6
-rw-r--r--changes/bytecount5
-rw-r--r--changes/cbt_hi_res7
-rw-r--r--changes/cbt_parallel_intro4
-rw-r--r--changes/clear_trackexithost5
-rw-r--r--changes/connect_err_reporting6
-rw-r--r--changes/count_overflow5
-rw-r--r--changes/dirvote_null_deref4
-rw-r--r--changes/doxygen6
-rw-r--r--changes/exitnodes_reliable7
-rw-r--r--changes/feature27114
-rw-r--r--changes/feature307614
-rw-r--r--changes/fix2195-fix6
-rw-r--r--changes/fix22047
-rw-r--r--changes/forget-rend-descs-on-newnym12
-rw-r--r--changes/full_ap_circuits6
-rw-r--r--changes/geoip-oct20103
-rw-r--r--changes/geoip-sep20103
-rw-r--r--changes/geoip-update-august20103
-rw-r--r--changes/geoip-update-june20102
-rw-r--r--changes/gmtime_null6
-rw-r--r--changes/hsdir_assignment8
-rw-r--r--changes/kill_ftime7
-rw-r--r--changes/log-typo-2011-03-15-013
-rw-r--r--changes/log_domains12
-rw-r--r--changes/maatuska-new-v3auth3
-rw-r--r--changes/md_cache_replace6
-rw-r--r--changes/mdesc_null_deref5
-rw-r--r--changes/microdesc-double-free7
-rw-r--r--changes/misc-reason3
-rw-r--r--changes/new-geoip-db5
-rw-r--r--changes/noroute5
-rw-r--r--changes/openbsd-sysheaders4
-rw-r--r--changes/osx_forgotten_compilefix4
-rw-r--r--changes/remove-debian5
-rw-r--r--changes/task21965
-rw-r--r--changes/ticket24974
-rw-r--r--changes/warn-if-get_digest-fails6
-rw-r--r--changes/win_tmp_dir4
114 files changed, 656 insertions, 94 deletions
diff --git a/changes/1863_bwhist b/changes/1863_bwhist
new file mode 100644
index 000000000..b94250906
--- /dev/null
+++ b/changes/1863_bwhist
@@ -0,0 +1,16 @@
+ o Minor features
+ - Servers now save observed maximum bandwidth throughput rates
+ to their state file (along with total usage, which was already
+ saved) so that they can determine their correct estimated
+ bandwidth on restart. Resolves bug 1863, where Tor servers
+ would reset their estimated bandwidth to 0 after restarting.
+
+ o Minor bugfixes
+ - Fix a bug in banwidth history state parsing that could have been
+ triggered if a future version of Tor ever changed the timing
+ granularity at which bandwidth history is measured. Bugfix on
+ Tor 0.1.1.11-alpha.
+ - Correctly clear out dir_read/dir_write history when there is an
+ error parsing any bw history value from the state file. Bugfix on
+ Tor 0.2.2.15-alpha.
+
diff --git a/changes/annotations_fix b/changes/annotations_fix
deleted file mode 100644
index b259a306d..000000000
--- a/changes/annotations_fix
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes
- - Do even more to reject (and not just ignore) annotations on
- router descriptors received anywhere but from the cache.
- Previously we would ignore such annotations at first, but cache
- them to disk anyway. Bugfix on 0.2.0.8-alpha. Found by piebeer.
-
- o Minor bugfixes
- - Enforce multiplicity rules when parsing annotations. Bugfix on
- 0.2.0.8-alpha. Found by piebeer.
-
diff --git a/changes/bug1035 b/changes/bug1035
new file mode 100644
index 000000000..3d86330e6
--- /dev/null
+++ b/changes/bug1035
@@ -0,0 +1,13 @@
+ o Minor features (authorities)
+ - Take altered router IP addresses and ORPorts into account when
+ determining router stability. Previously, if a router changed
+ its IP or ORPort, the authorities would not treat it as having
+ any downtime for the purposes of stability calculation, whereas
+ clients would experience downtime since the change could take a
+ while to propagate to them. Resolves issue 1035.
+ o Minor bugfixes (authorities)
+ - Try to be more robust to hops back in time when calculating
+ router stability. Previously, if a run of uptime or downtime
+ appeared to be negative, the calculation could give incorrect
+ results. Bugfix on 0.2.0.6-alpha.
+
diff --git a/changes/bug1090-general b/changes/bug1090-general
new file mode 100644
index 000000000..465631592
--- /dev/null
+++ b/changes/bug1090-general
@@ -0,0 +1,73 @@
+ o Major features and bugfixes (node selection)
+
+ - Revise and unify the meaning of the ExitNodes, EntryNodes,
+ ExcludeEntryNodes, ExcludeExitNodes, ExcludeNodes, and
+ StrictNodes options. Previously, we had been ambiguous in
+ describing what counted as an "exit" node, and what operations
+ exactly "StrictNodes 0" would permit. This created confusion
+ when people saw nodes built through unexpected circuits, and
+ made it hard to tell real bugs from surprises. We now stipulate
+ that the intended behavior is:
+
+ . "Exit", in the context of ExitNodes and ExcludeExitNodes,
+ means a node that delivers user traffic outside the Tor
+ network.
+ . "Entry", in the context of EntryNodes and ExcludeEntryNodes,
+ means a node used as the first hop of a multihop circuit:
+ it doesn't include direct connections to directory servers.
+ . "ExcludeNodes" applies to all nodes.
+ . "StrictNodes" changes the behavior of ExcludeNodes only.
+ When StrictNodes is set, Tor should avoid all nodes listed
+ in ExcludeNodes, even when it will make user requests
+ fail. When StrictNodes is *not* set, then Tor should
+ follow ExcludeNodes whenever it can, except when it must
+ use an excluded node to perform self-tests, connect to a
+ hidden service, provide a hidden service, fulfill a .exit
+ request, upload directory information, or fetch directory
+ information.
+
+ Collectively, the changes to implement the behavior are a fix for
+ bug 1090.
+
+ - ExcludeNodes now takes precedence over EntryNodes and ExitNodes:
+ if a node is listed in both, it's treated as excluded.
+
+ - ExcludeNodes now applies to directory nodes: as a preference if
+ StrictNodes is 0, or an absolute requirement if StrictNodes is 1.
+ (Don't exclude all the directory authorities and set StrictNodes
+ to 1 unless you really want your Tor to break.)
+
+ - ExcludeNodes and ExcludeExitNodes now override exit enclaving.
+
+ - ExcludeExitNodes now overrides .exit requests.
+
+ - We don't use bridges from ExcludeNodes.
+
+ - When StrictNodes is 1:
+ . We now apply ExcludeNodes to hidden service introduction points
+ and to rendezvous points selected by hidden service users.
+ This can make your hidden service less reliable: use it with
+ caution!
+ . If we have used ExcludeNodes on ourself, do not try self-tests.
+ . If we have excluded all the directory authorities, we will
+ not even try to upload our descriptor if we're a server.
+ . Do not honor .exit requests to an excluded node.
+
+ - Remove a misfeature that caused us to ignore the Fast/Stable flags
+ if ExitNodes was set. Bugfix on 0.2.2.7-alpha.
+
+ - When the set of permitted nodes changes, we now remove any
+ mappings introduced via TrackExitHosts to now-excluded nodes.
+ Bugfix on 0.1.0.1-rc.
+
+ - We never cannibalize a circuit that had excluded nodes on it,
+ even if StrictNodes is 0. Bugfix on 0.1.0.1-rc.
+
+ - Improve log messages related to excluded nodes.
+
+ - Revert a change where we would be laxer about attaching streams to
+ circuits than when building the circuits. This was meant to
+ prevent a set of bugs where streams were never attachable, but our
+ improved code here should make this unnecessary. Bugfix on
+ 0.2.2.7-alpha.
+
diff --git a/changes/bug1090-launch-warning b/changes/bug1090-launch-warning
new file mode 100644
index 000000000..3f3fbcb4d
--- /dev/null
+++ b/changes/bug1090-launch-warning
@@ -0,0 +1,5 @@
+ o Minor features:
+ - Keep track of how many times we launch a new circuit to handle
+ a given stream. Too many launches could indicate an inconsistency
+ between our "launch a circuit to handle this stream" logic and our
+ "attach our stream to one of the available circuits" logic.
diff --git a/changes/bug1125 b/changes/bug1125
deleted file mode 100644
index 1331246a1..000000000
--- a/changes/bug1125
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes
- - Do not log messages to the controller while shrinking buffer
- freelists. Doing so would sometimes make the controller
- connection try to allocate a buffer chunk, which would mess
- up the internals of the freelist and cause an assertion
- failure. Fixes bug 1125; fixed by Robert Ransom. Bugfix on
- Tor 0.2.0.16-alpha.
-
diff --git a/changes/bug1141 b/changes/bug1141
deleted file mode 100644
index 9975e418d..000000000
--- a/changes/bug1141
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes:
- - Fix an assertion failure that could occur in caches or bridge users
- when using a very short voting interval on a testing network.
- Diagnosed by Robert Hogan. Fixes bug 1141; bugfix on 0.2.0.8-alpha.
-
diff --git a/changes/bug1345 b/changes/bug1345
new file mode 100644
index 000000000..0c9375a35
--- /dev/null
+++ b/changes/bug1345
@@ -0,0 +1,13 @@
+ o Minor bugfixes:
+ - On SIGHUP, do not clear out all TrackHostExits mappings, client DNS
+ cache entries, and virtual address mappings: that's what NEWNYM is
+ for. Bugfix on Tor 0.1.0.1-rc; fixes bug 1345.
+ - When TrackHostExits is changed from a controller, remove any
+ mappings for hosts that should no longer have their exits tracked.
+ Bugfix on Tor 0.1.0.1-rc.
+ - When VirtualAddrNetwork option is changed from a controller,
+ remove any mappings for hosts that were automapped to
+ that network. Bugfix on 0.1.1.19-rc.
+ - When one of the AutomapHosts* options is changed from a
+ controller, remove any mappings for hosts that should no longer be
+ automapped. Bugfix on 0.2.0.1-alpha.
diff --git a/changes/bug1352 b/changes/bug1352
new file mode 100644
index 000000000..bde019240
--- /dev/null
+++ b/changes/bug1352
@@ -0,0 +1,4 @@
+ o Minor features
+ - Rate-limit a warning about failures to download v2 networkstatus
+ documents. Resolves part of bug 1352.
+
diff --git a/changes/bug1840 b/changes/bug1840
deleted file mode 100644
index 0ef2b98a3..000000000
--- a/changes/bug1840
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes:
- - Allow handshaking OR connections to take a full KeepalivePeriod
- seconds to handshake. Previously, we would close them after
- IDLE_OR_CONN_TIMEOUT seconds, as if they were open. This is a
- bugfix on 0.2.1.26. Thanks to mingw-san for analysis help. Fixes
- bug 1840.
-
diff --git a/changes/bug1859 b/changes/bug1859
deleted file mode 100644
index 5b139f357..000000000
--- a/changes/bug1859
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes:
- - Bring the logic that gathers routerinfos and assesses the
- acceptability of circuits into line. This prevents a Tor OP from getting
- locked in a cycle of choosing its local OR as an exit for a path (due to
- a .exit request) and then rejecting the circuit because its OR is not
- listed yet. Also prevent Tor clients from using an OR running in the same
- instance as an exit (due to a .exit request) if the OR does not meet the
- same requirements expected of an OR running elsewhere.
- Fixes bug 1859; bugfix on 0.2.0-alpha.
diff --git a/changes/bug1981 b/changes/bug1981
deleted file mode 100644
index 3e5e1d36f..000000000
--- a/changes/bug1981
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes:
- - When you use bridges and your network goes away and your bridges
- get marked as down, recover when you attempt a new socks connection
- (if the network is back) rather than waiting up to an hour to try
- fetching new descriptors for your bridges. Bugfix on 0.2.0.3-alpha;
- fixes bug 1981.
diff --git a/changes/bug2004 b/changes/bug2004
new file mode 100644
index 000000000..4fd6c91a0
--- /dev/null
+++ b/changes/bug2004
@@ -0,0 +1,4 @@
+ o Minor features
+ - Log less aggressively about circuit timeout changes, and improve some
+ other circuit timeout messages. Resolves bug 2004.
+
diff --git a/changes/bug2050 b/changes/bug2050
deleted file mode 100644
index 3e45d3463..000000000
--- a/changes/bug2050
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes:
- - Learn our external IP address when we're a relay or bridge, even if
- we set PublishServerDescriptor to 0. Bugfix on 0.2.0.3-alpha,
- where we introduced bridge relays that don't need to publish to
- be useful. Fixes bug 2050.
diff --git a/changes/bug2060 b/changes/bug2060
new file mode 100644
index 000000000..eb95aedb2
--- /dev/null
+++ b/changes/bug2060
@@ -0,0 +1,4 @@
+ o Minor features
+ - Make sure to disable DirPort if running as a bridge. DirPorts aren't
+ used on bridges, and it makes bridge scanning way too easy.
+
diff --git a/changes/bug2081_followup b/changes/bug2081_followup
new file mode 100644
index 000000000..a53227c38
--- /dev/null
+++ b/changes/bug2081_followup
@@ -0,0 +1,9 @@
+ o Minor features (authorities)
+ - Directory authorities now reject relays running any versions of
+ Tor between 0.2.1.3-alpha and 0.2.1.18 inclusive; they have
+ known bugs that keep RELAY_EARLY cells from working on rendezvous
+ circuits. Followup to fix for bug 2081.
+ - Directory authorities now reject relays running any version of Tor
+ older than 0.2.0.26-rc. That is the earliest version that fetches
+ current directory information correctly. Fix for bug 2156.
+
diff --git a/changes/bug2097-more b/changes/bug2097-more
new file mode 100644
index 000000000..52351cc01
--- /dev/null
+++ b/changes/bug2097-more
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Fix a logic error in directory_fetches_from_authorities that
+ would cause all _non_-exits refusing single-hop-like circuits to
+ fetch from authorities, when we wanted to have _exits_ fetch
+ from authorities. Fix by boboper; fixes more of 2097; bugfix on
+ 0.2.2.16-alpha.
diff --git a/changes/bug2146.1 b/changes/bug2146.1
new file mode 100644
index 000000000..5b91c59a6
--- /dev/null
+++ b/changes/bug2146.1
@@ -0,0 +1,4 @@
+ - Major bugfixes:
+ o Fix a bug that could break accounting on 64-bit systems with large
+ time_t values, making them hibernate for impossibly long intervals.
+ Bugfix on 0.0.9pre6; fix for bug 2146; fix by boboper.
diff --git a/changes/bug2181 b/changes/bug2181
new file mode 100644
index 000000000..0a095488e
--- /dev/null
+++ b/changes/bug2181
@@ -0,0 +1,4 @@
+ o Minor features
+ - Log a little more clearly about the times at which we're no longer
+ accepting new connections. Resolves bug 2181.
+
diff --git a/changes/bug2190 b/changes/bug2190
index 92ecba7eb..0591acb6f 100644
--- a/changes/bug2190
+++ b/changes/bug2190
@@ -4,3 +4,8 @@
running Libevent with debug logging enabled, and running Tor
with a controller watching for low-severity log messages.
Bugfix on 0.1.0.2-rc. Fixes bug 2190.
+ - Make Libevent log messages get delievered to controllers later,
+ and not from inside the Libevent log handler. This prevents
+ unsafe reentrant Libevent calls while still letting the log
+ messages get through.
+
diff --git a/changes/bug2203 b/changes/bug2203
new file mode 100644
index 000000000..9cfbedf14
--- /dev/null
+++ b/changes/bug2203
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Clients should not weight BadExit nodes as Exits in their node
+ selection. Similarly, directory authorities should not count
+ BadExit bandwidth as Exit bandwidth when computing bandwidth-weights.
+ Bugfix on 0.2.2.10-alpha; fixes bug 2203.
+
diff --git a/changes/bug2210 b/changes/bug2210
new file mode 100644
index 000000000..fe1c049fc
--- /dev/null
+++ b/changes/bug2210
@@ -0,0 +1,5 @@
+ o ?? bugfixes:
+ - Fix a bug that would cause newer streams on a given circuit to
+ get preference when reading bytes from the network. Fixes bug
+ 2210. Fix by Mashael AlSabah. This bug was introduced before
+ the first Tor release, in svn revision r152.
diff --git a/changes/bug2230_clean_1 b/changes/bug2230_clean_1
new file mode 100644
index 000000000..a4edf9439
--- /dev/null
+++ b/changes/bug2230_clean_1
@@ -0,0 +1,4 @@
+ o Minor features
+ - Backport code from 0.2.3.x to allow directory authorities to clean
+ their microdescriptor caches.
+
diff --git a/changes/bug2230_part1 b/changes/bug2230_part1
new file mode 100644
index 000000000..79f725410
--- /dev/null
+++ b/changes/bug2230_part1
@@ -0,0 +1,7 @@
+ o Minor bugfixes
+ - When loading the microdesc journal, remember its current size.
+ In 0.2.2, this helps prevent the microdesc journal from growing
+ without limit on authorities (who are the only ones to use it in
+ 0.2.2). Fixes a part of bug 2230; bugfix on 0.2.2.6-alpha.
+ Fix posted by "cypherpunks."
+
diff --git a/changes/bug2230_part2 b/changes/bug2230_part2
new file mode 100644
index 000000000..2664ecc1a
--- /dev/null
+++ b/changes/bug2230_part2
@@ -0,0 +1,5 @@
+ o Minor bugfixes
+ - The microdesc journal is supposed to get rebuilt only if it is
+ at least _half_ the length of the store, not _twice_ the length
+ of the store. Bugfix on 0.2.2.6-alpha; fixes part of bug 2230.
+
diff --git a/changes/bug2230_part4 b/changes/bug2230_part4
new file mode 100644
index 000000000..f7721fad3
--- /dev/null
+++ b/changes/bug2230_part4
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Authorities now clean their microdesc cache periodically and when
+ reading from disk initially, not only when adding new descriptors.
+ This prevents a bug where we could lose microdescriptors. Bugfix
+ on 0.2.2.6-alpha.
+
diff --git a/changes/bug2235 b/changes/bug2235
new file mode 100644
index 000000000..0c3bafa44
--- /dev/null
+++ b/changes/bug2235
@@ -0,0 +1,3 @@
+ o Minor bugfixes
+ - Avoid crashes when AccountingMax is set on clients. Fixes bug 2235;
+ Bugfix on 0.2.2.18-alpha. Diagnosed by boboper.
diff --git a/changes/bug2250 b/changes/bug2250
new file mode 100644
index 000000000..95eb55d7f
--- /dev/null
+++ b/changes/bug2250
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Fix an assert that got triggered when using the TestingTorNetwork
+ configuration option and then issuing a GETINFO config-text control
+ command. Fixes bug 2250; bugfix on 0.2.1.2-alpha.
+
diff --git a/changes/bug2279 b/changes/bug2279
new file mode 100644
index 000000000..d31300978
--- /dev/null
+++ b/changes/bug2279
@@ -0,0 +1,15 @@
+ o Minor bugfixes
+ - Avoid a double mark-for-free warning when failing to attach a
+ transparent proxy connection. Fixes bug 2279. Bugfix on
+ Tor 0.1.2.1 alpha.
+
+ o Minor features
+ - Detect attempts at the client side to open connections to private
+ IP addresses (like 127.0.0.1, 10.0.0.1, and so on) with a randomly
+ chosen exit node. Attempts to do so are always ill-defined, generally
+ prevented by exit policies, and usually in error. This will also
+ help to detect loops in transparent proxy configurations. You can
+ disable this feature by setting "ClientRejectInternalAddresses 0"
+ in your torrc.
+
+
diff --git a/changes/bug2314 b/changes/bug2314
new file mode 100644
index 000000000..41a232812
--- /dev/null
+++ b/changes/bug2314
@@ -0,0 +1,4 @@
+ o Minor bugfixes:
+ - Fix a bunch of compile warnings revealed by mingw with gcc 4.5. Fixes
+ bug 2314.
+
diff --git a/changes/bug2317 b/changes/bug2317
new file mode 100644
index 000000000..0b9366c36
--- /dev/null
+++ b/changes/bug2317
@@ -0,0 +1,9 @@
+ o Major features:
+ - Introduce minimum/maximum values that a client is going to believe
+ in a consensus. This helps to avoid crashes or worse when a param
+ has a weird value.
+
+ o Major bugfixes:
+ - Prevent crash/heap corruption when cbtnumnodes consensus parameter is
+ set to 0 or large values. Fixes bug 2317.
+
diff --git a/changes/bug2330 b/changes/bug2330
new file mode 100644
index 000000000..fc0c4d8c3
--- /dev/null
+++ b/changes/bug2330
@@ -0,0 +1,7 @@
+ o Minor bugfixes
+ - Handle SOCKS messages longer than 128 bytes long correctly, rather
+ than waiting forever for them to finish. Fixes bug 2330. Bugfix on
+ 0.2.0.16-alpha. Found by doorss.
+
+
+
diff --git a/changes/bug2331 b/changes/bug2331
new file mode 100644
index 000000000..9940b591c
--- /dev/null
+++ b/changes/bug2331
@@ -0,0 +1,7 @@
+ o Minor bugfixes:
+ - Add assertions to check for overflow in arguments to
+ base32_encode and base32_decode; fix a signed-unsigned
+ comparison there too. These bugs are not actually reachable in
+ Tor, but it's good to prevent future errors too. Found by
+ doorss.
+
diff --git a/changes/bug2337 b/changes/bug2337
new file mode 100644
index 000000000..a4f052dc3
--- /dev/null
+++ b/changes/bug2337
@@ -0,0 +1,3 @@
+ o Minor bugfixes
+ - Detect broken platforms with a signed size_t, and refuse to
+ build there. Found and analyzed by doorss and rransom.
diff --git a/changes/bug2346 b/changes/bug2346
new file mode 100644
index 000000000..0f78b8461
--- /dev/null
+++ b/changes/bug2346
@@ -0,0 +1,6 @@
+ o Minor features
+ - If writing the state file to disk fails, wait up to an hour
+ before retrying again. (Our old code would retry the write
+ immediately.) Fixes bug 2346. Bugfix on Tor 0.1.1.3-alpha.
+
+
diff --git a/changes/bug2358 b/changes/bug2358
new file mode 100644
index 000000000..5e44bb9f8
--- /dev/null
+++ b/changes/bug2358
@@ -0,0 +1,5 @@
+ o Minor features
+ - Enable Address Space Layout Randomization (ASLR) and Data Execution
+ Prevention (DEP) by default on Windows to make it harder for
+ attackers to exploit vulnerabilities. Patch from John Brooks.
+
diff --git a/changes/bug2363 b/changes/bug2363
new file mode 100644
index 000000000..179925f65
--- /dev/null
+++ b/changes/bug2363
@@ -0,0 +1,6 @@
+ o Minor bugfixes
+ - Correctly detect failures to create DNS requests when using Libevent
+ versions before v2. (Before Libevent 2, we used our own evdns
+ implementation. Its return values for Libevent's evdns_resolve_*()
+ functions are not consistent with those from Libevent.) Found by
+ Lodger; fixes bug 2363; bugfix on 0.2.2.6-alpha.
diff --git a/changes/bug2364 b/changes/bug2364
new file mode 100644
index 000000000..37de6ef52
--- /dev/null
+++ b/changes/bug2364
@@ -0,0 +1,4 @@
+ o Documentation
+ - Document the default socks host and port (127.0.0.1:9050) for
+ tor-resolve.
+
diff --git a/changes/bug2366 b/changes/bug2366
new file mode 100644
index 000000000..d171be453
--- /dev/null
+++ b/changes/bug2366
@@ -0,0 +1,8 @@
+ o Minor bugfixes
+ - When a relay decides that its DNS is too broken for it to serve
+ as an exit server, it advertised itself as a non-exit, but
+ continued to act as an exit. This could create accidental
+ partitioning opportunities for users. Instead, if a relay is
+ going to advertise reject *:* as its exit policy, it should
+ really act with exit policy "reject *:*". Fixes bug 2366.
+ Bugfix on Tor 0.1.2.5-alpha. Bugfix by user "postman" on trac.
diff --git a/changes/bug2378 b/changes/bug2378
new file mode 100644
index 000000000..227968869
--- /dev/null
+++ b/changes/bug2378
@@ -0,0 +1,8 @@
+ o Minor bugfixes
+ - Correctly detect failure to allocate an OpenSSL BIO. Fixes bug 2378;
+ found by "cypherpunks". This bug was introduced before the
+ first Tor release, in svn commit r110.
+
+ o Minor code simplifications and refactorings
+ - Always treat failure to allocate an RSA key as an unrecoverable
+ allocation error.
diff --git a/changes/bug2379 b/changes/bug2379
new file mode 100644
index 000000000..0d378b7c1
--- /dev/null
+++ b/changes/bug2379
@@ -0,0 +1,5 @@
+ o Documentation:
+ - Add missing documentation for the authority-related torrc options
+ RephistTrackTime, BridgePassword, and V3AuthUseLegacyKey. Resolves
+ issue 2379.
+
diff --git a/changes/bug2402_redux b/changes/bug2402_redux
deleted file mode 100644
index 84be04a02..000000000
--- a/changes/bug2402_redux
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes
- - Use micro-revision numbers in 0.2.1.x instead: apparently, they
- were more used than we had known. (Bugfix on 0.2.1.30).
- - Instead of generating our micro-version numbers using SVN revisions,
- use git revisions instead. Bugfix on 0.2.1.15-rc; fixes bug 2402.
-
diff --git a/changes/bug2403 b/changes/bug2403
new file mode 100644
index 000000000..3b29b37fb
--- /dev/null
+++ b/changes/bug2403
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - In the special case where you configure a public exit relay as your
+ bridge, Tor would be willing to use that exit relay as the last
+ hop in your circuit as well. Now we fail that circuit instead.
+ Bugfix on 0.2.0.12-alpha. Fixes bug 2403. Reported by "piebeer".
+
diff --git a/changes/bug2409 b/changes/bug2409
new file mode 100644
index 000000000..5523458b6
--- /dev/null
+++ b/changes/bug2409
@@ -0,0 +1,4 @@
+ o Minor bugfixes
+ - Resolve a bug in verifying signatures of directory objects
+ with digests longer than SHA1. Bugfix on 0.2.2.20-alpha;
+ fixes bug 2409; found by "piebeer".
diff --git a/changes/bug2432 b/changes/bug2432
new file mode 100644
index 000000000..407c56ba9
--- /dev/null
+++ b/changes/bug2432
@@ -0,0 +1,5 @@
+ o Minor features:
+ - Provide a log message stating which geoip file we're parsing
+ instead of just stating that we're parsing the geoip file.
+ Implements ticket 2432.
+
diff --git a/changes/bug2433 b/changes/bug2433
new file mode 100644
index 000000000..8e47c4f02
--- /dev/null
+++ b/changes/bug2433
@@ -0,0 +1,5 @@
+ o Major bugfixes:
+ - Don't assert when changing from bridge to relay or vice versa with a controller.
+ The assert happened because we didn't properly initialize our keys in this case.
+ Bugfix on 0.2.2.18, fixes bug 2433. Issue first discovered by bastik.
+
diff --git a/changes/bug2450 b/changes/bug2450
new file mode 100644
index 000000000..b3b50ddb0
--- /dev/null
+++ b/changes/bug2450
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Country codes aren't supported in EntryNodes until 0.2.3.x.
+ Don't mention them in the manpage. Fixes bug 2450, issue
+ spotted by keb and G-Lo.
+
diff --git a/changes/bug2503 b/changes/bug2503
new file mode 100644
index 000000000..50b8bf50c
--- /dev/null
+++ b/changes/bug2503
@@ -0,0 +1,4 @@
+ o Minor features:
+ - When an HTTPS proxy reports "403 Forbidden", we now explain
+ what it means rather than calling it an unexpected status code.
+ Closes bug 2503. Patch from "mikey".
diff --git a/changes/bug2504 b/changes/bug2504
new file mode 100644
index 000000000..791600e59
--- /dev/null
+++ b/changes/bug2504
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Fix a bug with our locking implementation on windows that couldn't
+ correctly detect when a file was already locked. Fixes bug 2504,
+ bugfix on 0.2.1.6-alpha.
+
diff --git a/changes/bug2510 b/changes/bug2510
new file mode 100644
index 000000000..2c3f61355
--- /dev/null
+++ b/changes/bug2510
@@ -0,0 +1,8 @@
+ o Major bugfixes:
+ - Fix a bug where bridge users who configure the non-canonical
+ address of a bridge automatically switch to its canonical
+ address. If a bridge listens at more than one address, it should be
+ able to advertise those addresses independently and any non-blocked
+ addresses should continue to work. Bugfix on Tor 0.2.0.x. Fixes
+ bug 2510.
+
diff --git a/changes/bug2511 b/changes/bug2511
new file mode 100644
index 000000000..a27696a5f
--- /dev/null
+++ b/changes/bug2511
@@ -0,0 +1,6 @@
+ o Major bugfixes:
+ - If you configured Tor to use bridge A, and then quit and
+ configured Tor to use bridge B instead, it would happily continue
+ to use bridge A if it's still reachable. While this behavior is
+ a feature if your goal is connectivity, in some scenarios it's a
+ dangerous bug. Bugfix on Tor 0.2.0.1-alpha; fixes bug 2511.
diff --git a/changes/bug2572 b/changes/bug2572
new file mode 100644
index 000000000..a5cca284a
--- /dev/null
+++ b/changes/bug2572
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Don't crash a bridge authority on SIGHUP if it can't force itself
+ into its routerlist. Fixes bug 2572.
+
+
diff --git a/changes/bug2573 b/changes/bug2573
new file mode 100644
index 000000000..7a2a80212
--- /dev/null
+++ b/changes/bug2573
@@ -0,0 +1,3 @@
+ o Minor packaging issues
+ - Create the /var/run/tor directory on startup on OpenSUSE if it is
+ not already created. Patch from Andreas Stieger. Fixes bug 2573.
diff --git a/changes/bug2660 b/changes/bug2660
new file mode 100644
index 000000000..2aa06d36f
--- /dev/null
+++ b/changes/bug2660
@@ -0,0 +1,7 @@
+ o Minor bugfixes:
+ - Fix connect() failures on some platforms (BSD, OS X). Bugfix on
+ 0.2.0.3-alpha; fixes first part of bug 2660. Patch by piebeer.
+ - Set target port in get_interface_address6() correctly. Bugfix
+ on 0.1.1.4-alpha and 0.2.0.3-alpha; fixes second part of bug
+ 2660.
+
diff --git a/changes/bug2683a b/changes/bug2683a
new file mode 100644
index 000000000..2fe308b03
--- /dev/null
+++ b/changes/bug2683a
@@ -0,0 +1,3 @@
+ o Minor features
+ - Log the source of a rejected POSTed v3 networkstatus vote.
+
diff --git a/changes/bug2696 b/changes/bug2696
new file mode 100644
index 000000000..6ea41d4a6
--- /dev/null
+++ b/changes/bug2696
@@ -0,0 +1,5 @@
+ o Minor features:
+ - Make compilation with clang possible when using
+ --enable-gcc-warnings by removing two warnings that clang hasn't
+ implemented yet and by fixing a few warnings. Implements ticket
+ 2696.
diff --git a/changes/bug2698 b/changes/bug2698
new file mode 100644
index 000000000..d995788bf
--- /dev/null
+++ b/changes/bug2698
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Fix an issue that prevented static linking of libevent on
+ some platforms (notably Linux). Fixes bug 2698, bugfix on
+ versions 0.2.1.23/0.2.2.8-alpha (the versions introducing
+ the --with-static-libevent configure option).
+
diff --git a/changes/bug2704 b/changes/bug2704
new file mode 100644
index 000000000..821b38bc0
--- /dev/null
+++ b/changes/bug2704
@@ -0,0 +1,5 @@
+ o Major bugfixes:
+ - When writing our maximum bw for the current interval to the state
+ file, don't wrongly inflate that value by a factor of 10 anymore.
+ Fixes more of bug 2704.
+
diff --git a/changes/bug2704_part1 b/changes/bug2704_part1
new file mode 100644
index 000000000..eaf22812c
--- /dev/null
+++ b/changes/bug2704_part1
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Fix an issue causing calculation of Tor's average bandwidth as saved
+ in the state file to be 10 times smaller than it should be. Fixes the
+ first part of bug 2704, bugfix on tor-0.2.2.23-alpha.
+
diff --git a/changes/bug2704_part2 b/changes/bug2704_part2
new file mode 100644
index 000000000..962c8b709
--- /dev/null
+++ b/changes/bug2704_part2
@@ -0,0 +1,5 @@
+ o Major bugfixes:
+ - Prevent relays that read their bandwidth history from their state file
+ from arbitrarily inflating that value. Fixes the second half of bug
+ 2704, bugfix on tor-0.2.2.23-alpha.
+
diff --git a/changes/bug2716 b/changes/bug2716
new file mode 100644
index 000000000..4663ed318
--- /dev/null
+++ b/changes/bug2716
@@ -0,0 +1,5 @@
+ o Minor features:
+ - When a relay has failed several reachability tests, be more accurate
+ at recording when it became unreachable, so we can in turn provide
+ more accuracy at assigning Stable, Guard, HSDir, etc flags. Bugfix
+ on 0.2.0.6-alpha. Resolves bug 2716.
diff --git a/changes/bug2722 b/changes/bug2722
new file mode 100644
index 000000000..ed132fc89
--- /dev/null
+++ b/changes/bug2722
@@ -0,0 +1,11 @@
+ o Minor bugfixes
+ - Ignore the TunnelDirConns option when determining which HSDir
+ relays are responsible for a hidden service descriptor ID.
+ Currently, clients and hidden services with TunnelDirConns off
+ will skip over HSDir relays which do not advertise a DirPort
+ when making a list of HSDirs responsible for a descriptor ID,
+ even though they would never try to use a HSDir's DirPort to
+ upload or fetch a hidden service descriptor. Fixes bug 2722;
+ bugfix on 0.2.1.6-alpha.
+
+
diff --git a/changes/bug2732-simple b/changes/bug2732-simple
new file mode 100644
index 000000000..367836152
--- /dev/null
+++ b/changes/bug2732-simple
@@ -0,0 +1,7 @@
+ o Minor bugfixes
+ - Do not reject hidden service descriptors simply because we don't
+ think we have not been assigned the HSDir flag. Clients and
+ hidden services can have a more up-to-date view of the network
+ consensus, and if they think that the directory authorities
+ list us a HSDir, we might actually be one. Related to bug 2732;
+ bugfix on 0.2.0.10-alpha.
diff --git a/changes/bug2756 b/changes/bug2756
new file mode 100644
index 000000000..0cad515a1
--- /dev/null
+++ b/changes/bug2756
@@ -0,0 +1,11 @@
+ o Minor bugfixes (spec conformance, performance):
+ - We now ask the other side of a stream (the client or the exit)
+ for more data on that stream when the amount of queued data on
+ that stream dips low enough. Previously, we wouldn't ask the
+ other side for more data until either it sent us more data
+ (which it wasn't supposed to do if it had exhausted its
+ window!) or until we had completely flushed all our queued
+ data. Fixing this should improve throughput. Fixes bug 2756;
+ bugfix on the earliest released versions of Tor (svn commit
+ r152).
+
diff --git a/changes/bug2757 b/changes/bug2757
new file mode 100644
index 000000000..f947afaeb
--- /dev/null
+++ b/changes/bug2757
@@ -0,0 +1,6 @@
+ - Minor bugfixes
+ o Avoid a double-mark-for-free warning when failing to attach a
+ transparent proxy connection. (We thought we had fixed this in
+ 0.2.2.23-alpha, but it turns out our fix was checking the wrong
+ connection.) Fixes bug 2757; bugfix on 0.1.2.1-alpha (the original
+ bug) and 0.2.2.23-alpha (the incorrect fix).
diff --git a/changes/bug2899 b/changes/bug2899
new file mode 100644
index 000000000..6af86d067
--- /dev/null
+++ b/changes/bug2899
@@ -0,0 +1,4 @@
+ - Minor bugfixes:
+ o Downgrade "no current certificates known for authority" message from
+ Notice to Info. Bugfix on 0.2.0.10-alpha; fixes bug 2899.
+
diff --git a/changes/bug2917 b/changes/bug2917
new file mode 100644
index 000000000..6b1e64334
--- /dev/null
+++ b/changes/bug2917
@@ -0,0 +1,4 @@
+ o Minor bugfixes
+ - Make the SIGNAL DUMP control-port command work on FreeBSD. Fixes
+ bug 2917. Bugfix on 0.1.1.1-alpha.
+
diff --git a/changes/bug2948 b/changes/bug2948
new file mode 100644
index 000000000..640ef625d
--- /dev/null
+++ b/changes/bug2948
@@ -0,0 +1,7 @@
+ o Minor bugfixes
+ - Only limit the lengths of single HS descriptors, even when
+ multiple HS descriptors are published to an HSDir relay in a
+ single POST operation. Fixes bug 2948; bugfix on 0.2.1.5-alpha.
+ Found by hsdir.
+
+
diff --git a/changes/bug2971 b/changes/bug2971
new file mode 100644
index 000000000..8b71ce040
--- /dev/null
+++ b/changes/bug2971
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Be more consistent in our treatment of file system paths. ~ should
+ get expanded to the user's home directory in the Log config option.
+ Bugfix on 0.2.0.1-alpha, which introduced the feature for the -f and
+ --DataDirectory options.
+
diff --git a/changes/bug2979 b/changes/bug2979
new file mode 100644
index 000000000..fe1f45fe0
--- /dev/null
+++ b/changes/bug2979
@@ -0,0 +1,9 @@
+ o Minor bugfixes:
+ - If the Nickname configuration option wasn't given, Tor used to pick
+ a nickname based on the local hostname as the nickname for a relay.
+ Because nicknames are not very important in today's Tor and the
+ "Unnamed" nickname has been implemented, this is now problematic
+ behaviour: It leaks information about the hostname without being
+ useful at all. Bugfix on tor-0.1.2.2-alpha, which introduced the
+ Unnamed nickname. Fixes bug 2979, reported by tagnaq.
+
diff --git a/changes/bug3012 b/changes/bug3012
new file mode 100644
index 000000000..dfde5fa90
--- /dev/null
+++ b/changes/bug3012
@@ -0,0 +1,5 @@
+ o Minor features:
+ - Relays can go for weeks without writing out their state file. A
+ relay that crashes would lose its bandwidth history (including
+ capacity estimate), client country statistics, and so on. Now relays
+ checkpoint the file at least every 12 hours. Addresses bug 3012.
diff --git a/changes/bug3020 b/changes/bug3020
new file mode 100644
index 000000000..b98716122
--- /dev/null
+++ b/changes/bug3020
@@ -0,0 +1,7 @@
+ o Minor bugfixes:
+ - When checking whether a hibernation period has fully elapsed, use
+ the amount of seconds we expect for that period instead of using
+ the new period that just started. This would cause an issue because
+ February is a really short month. Bugfix on 0.2.2.17-alpha;
+ fixes bug 3020.
+
diff --git a/changes/bug3022 b/changes/bug3022
new file mode 100644
index 000000000..9472e6d19
--- /dev/null
+++ b/changes/bug3022
@@ -0,0 +1,6 @@
+ o Removed features
+ - Caches no longer download and serve v2 networkstatus documents
+ unless FetchV2Networkstatus flag is set: these documents haven't
+ haven't been used by clients or relays since 0.2.0.x. Resolves
+ bug 3022.
+
diff --git a/changes/bug3026 b/changes/bug3026
new file mode 100644
index 000000000..c0c0a3860
--- /dev/null
+++ b/changes/bug3026
@@ -0,0 +1,4 @@
+ o Minor bugfixes (directory authority)
+ - Do not upload our own vote or signature set to ourself. It would
+ tell us nothing new. Also, as of Tor 0.2.2.24-alpha, we started
+ to warn about receiving duplicate votes. Resolves bug 3026.
diff --git a/changes/bug3039 b/changes/bug3039
new file mode 100644
index 000000000..7347ee38e
--- /dev/null
+++ b/changes/bug3039
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Write the current time into the LastWritten line in our state file,
+ rather than the time from the previous write attempt. Also, stop
+ trying to use a time of -1 in our log statements. Fixes bug 3039;
+ bugfix on 0.2.2.14-alpha.
diff --git a/changes/bug539_removal b/changes/bug539_removal
new file mode 100644
index 000000000..dbff43de1
--- /dev/null
+++ b/changes/bug539_removal
@@ -0,0 +1,6 @@
+ o Removed code
+ - Removed workaround code to handle directory responses from
+ servers that had bug 539 (they would send HTTP status 503
+ responses _and_ send a body too). Since only server versions
+ before 0.2.0.16-alpha/0.1.2.19 were affected, there is no longer
+ reason to keep the workaround in place.
diff --git a/changes/bytecount b/changes/bytecount
new file mode 100644
index 000000000..50c4d6b35
--- /dev/null
+++ b/changes/bytecount
@@ -0,0 +1,5 @@
+ o Minor bugfixes
+ - Fix a off-by-one error in calculating some controller command argument
+ lengths. Fortunately, this is harmless, the controller code does
+ redundant NUL termination too. Found by boboper. Bugfix on
+ 0.1.1.1-alpha.
diff --git a/changes/cbt_hi_res b/changes/cbt_hi_res
new file mode 100644
index 000000000..c0df1183c
--- /dev/null
+++ b/changes/cbt_hi_res
@@ -0,0 +1,7 @@
+ o Minor features
+ - When expiring circuits, use microsecond timers rather than one-second
+ timers. This can avoid an unpleasant situation where a circuit is
+ launched near the end of one second and expired right near the
+ beginning of the next, and prevent fluctuations in circuit timeout
+ values.
+
diff --git a/changes/cbt_parallel_intro b/changes/cbt_parallel_intro
new file mode 100644
index 000000000..44e377fb3
--- /dev/null
+++ b/changes/cbt_parallel_intro
@@ -0,0 +1,4 @@
+ o Minor features
+ - Use computed circuit-build timeouts to decide when to launch
+ parallel introdution circuits. (Previously, we would retry
+ after 15 seconds.)
diff --git a/changes/clear_trackexithost b/changes/clear_trackexithost
new file mode 100644
index 000000000..b9ac6fec4
--- /dev/null
+++ b/changes/clear_trackexithost
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Fix a bug in the code where we could keep trying to use a
+ TrackHostExits-based mapping after we failed to reach the intended
+ destination node. Fixes bug 2999. Bugfix on 0.2.0.20-rc.
+
diff --git a/changes/connect_err_reporting b/changes/connect_err_reporting
new file mode 100644
index 000000000..61a46b658
--- /dev/null
+++ b/changes/connect_err_reporting
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Be more careful about reporting the correct error from a failed
+ connect() operation. Under some circumstances, it was possible to
+ look at an incorrect value for errno when sending the end reason.
+ Bugfix on Tor-0.1.0.1-rc.
+
diff --git a/changes/count_overflow b/changes/count_overflow
new file mode 100644
index 000000000..f302ff2d7
--- /dev/null
+++ b/changes/count_overflow
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Correctly handle an "impossible" overflow cases in connection
+ byte counting, where we write or read more than 4GB on an edge
+ connection in single second. Bugfix on 0.1.2.8-beta.
+
diff --git a/changes/dirvote_null_deref b/changes/dirvote_null_deref
new file mode 100644
index 000000000..65dc519f5
--- /dev/null
+++ b/changes/dirvote_null_deref
@@ -0,0 +1,4 @@
+ o Minor bugfixes:
+ - Fix a potential null-pointer dereference while computing a consensus.
+ Bugfix on tor-0.2.0.3-alpha, found with the help of clang's analyzer.
+
diff --git a/changes/doxygen b/changes/doxygen
new file mode 100644
index 000000000..5e5fcd12d
--- /dev/null
+++ b/changes/doxygen
@@ -0,0 +1,6 @@
+ o Documentation changes
+ - Modernize the doxygen configuration file slightly. Fixes bug 2707.
+ - Resolve all doxygen warnings except those for missing documentation.
+ Fixes bug 2705.
+ - Add doxygen documentation for more functions, fields, and types.
+
diff --git a/changes/exitnodes_reliable b/changes/exitnodes_reliable
new file mode 100644
index 000000000..62ef03a0c
--- /dev/null
+++ b/changes/exitnodes_reliable
@@ -0,0 +1,7 @@
+ o Minor features:
+ - If ExitNodes is set, still pay attention to the Fast/Stable
+ status of exits when picking exit nodes. (We used to ignore
+ these flags when ExitNodes was set, on the grounds that people
+ who set exitnodes wanted all of those nodes to get used, but
+ with the ability to pick exits by country and IP range, this
+ doesn't necessarily make sense any more.)
diff --git a/changes/feature2711 b/changes/feature2711
new file mode 100644
index 000000000..7cdcfbfe1
--- /dev/null
+++ b/changes/feature2711
@@ -0,0 +1,4 @@
+ o Minor features
+ - Export GeoIP information on usage to bridge controller even if we have
+ not yet been running for 24 hours.
+
diff --git a/changes/feature3076 b/changes/feature3076
new file mode 100644
index 000000000..a3dcec874
--- /dev/null
+++ b/changes/feature3076
@@ -0,0 +1,14 @@
+ o Minor features
+ - The options SocksPort, ControlPort, and so on now all accept an
+ optional value "auto" that opens a socket on an OS-selected port.
+ o Minor features (controller)
+ - GETINFO net/listeners/(type) now returns a list of the addresses
+ and ports that are bound for listeners for a given connection
+ type. This is useful for if the user has selected SocksPort
+ "auto", and you need to know which port got chosen.
+ - There is a ControlPortWriteToFile option that tells Tor to write
+ its actual control port or ports to a chosen file. If the option
+ ControlPortFileGroupReadable is set, the file is created as
+ group-readable.
+
+
diff --git a/changes/fix2195-fix b/changes/fix2195-fix
new file mode 100644
index 000000000..9f03c2465
--- /dev/null
+++ b/changes/fix2195-fix
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - Do not dereference NULL if a bridge fails to build its
+ extra-info descriptor. Previously, we would have dereferenced
+ NULL. Found by an anonymous commenter on Trac. Bugfix on
+ 0.2.2.19-alpha.
+
diff --git a/changes/fix2204 b/changes/fix2204
deleted file mode 100644
index fb2771a7f..000000000
--- a/changes/fix2204
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes
- - Do not set the tlsext_host_name extension on server SSL objects;
- only on client SSL objects. We set it to immitate a browser, not a
- vhosting server. This resolves an incompatibility with openssl 0.9.8p
- and openssl 1.0.0b. Fixes bug 2204; bugfix on 0.2.1.1-alpha.
-
-
diff --git a/changes/forget-rend-descs-on-newnym b/changes/forget-rend-descs-on-newnym
index ab2fd61f3..da7afbe20 100644
--- a/changes/forget-rend-descs-on-newnym
+++ b/changes/forget-rend-descs-on-newnym
@@ -2,6 +2,18 @@
- Forget all hidden service descriptors cached as a client when
processing a SIGNAL NEWNYM command. Fixes bug 3000. Bugfix on
0.0.6.
+ o Major bugfixes:
+ - When we find that we have extended a hidden service's introduction
+ circuit to a relay which isn't listed as an introduction point in
+ the HS descriptor we currently have for the service, we now retry
+ one of the introduction points in the current HS descriptor.
+ Previously we would just give up. Bugfix on 0.2.0.10-alpha; fixes
+ bugs 1024 and 1930.
+ o Minor bugfixes:
+ - Don't allow v0 hidden service authorities to act as clients.
+ Required by fix for bug 3000.
+ - Ignore SIGNAL NEWNYM commands on relay-only Tor instances.
+ Required by fix for bug 3000.
o Code simplifications and refactoring:
- Allow rend_client_send_introduction to fail without closing the
AP connection permanently.
diff --git a/changes/full_ap_circuits b/changes/full_ap_circuits
new file mode 100644
index 000000000..379a1a1b7
--- /dev/null
+++ b/changes/full_ap_circuits
@@ -0,0 +1,6 @@
+ o Minor bugfixes
+ - When a client finds that an origin circuit has run out of 16-bit
+ stream IDs, we now mark it as unusable for new streams.
+ Previously, we would try to close the entire circuit. Bugfix on
+ Tor version 0.0.6.
+
diff --git a/changes/geoip-oct2010 b/changes/geoip-oct2010
deleted file mode 100644
index a7235faaa..000000000
--- a/changes/geoip-oct2010
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Update to the October 1 2010 Maxmind GeoLite Country database.
-
diff --git a/changes/geoip-sep2010 b/changes/geoip-sep2010
deleted file mode 100644
index 47eb00699..000000000
--- a/changes/geoip-sep2010
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Update to the September 1 2010 Maxmind GeoLite Country database.
-
diff --git a/changes/geoip-update-august2010 b/changes/geoip-update-august2010
deleted file mode 100644
index 8f127852f..000000000
--- a/changes/geoip-update-august2010
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features
- - Update to the August 1 2010 Maxmind GeoLite Country database.
-
diff --git a/changes/geoip-update-june2010 b/changes/geoip-update-june2010
deleted file mode 100644
index 7a15c0066..000000000
--- a/changes/geoip-update-june2010
+++ /dev/null
@@ -1,2 +0,0 @@
- o Minor features
- - Update to the June 1 2010 Maxmind GeoLite Country database.
diff --git a/changes/gmtime_null b/changes/gmtime_null
new file mode 100644
index 000000000..16a25408b
--- /dev/null
+++ b/changes/gmtime_null
@@ -0,0 +1,6 @@
+ o Minor bugfixes
+ - On some platforms, gmtime and localtime can return NULL under
+ certain circumstances even for well-defined values of time_t.
+ Try to detect and make up for this deficiency. Possible fix for
+ bug 2077. Bugfix on all versions of Tor. Found by boboper.
+
diff --git a/changes/hsdir_assignment b/changes/hsdir_assignment
new file mode 100644
index 000000000..5c04b9b9b
--- /dev/null
+++ b/changes/hsdir_assignment
@@ -0,0 +1,8 @@
+ o Security fixes:
+ - Directory authorities now use data collected from rephist when
+ choosing whether to assign the HSDir flag to relays, instead of
+ trusting the uptime value the relay reports in its descriptor.
+ This helps prevent an attack where a small set of nodes with
+ frequently-changing identity keys can blackhole a hidden service.
+ (Only authorities need upgrade; others will be fine once they do.)
+ Bugfix on 0.2.0.10-alpha; fixes bug 2709.
diff --git a/changes/kill_ftime b/changes/kill_ftime
new file mode 100644
index 000000000..47f476973
--- /dev/null
+++ b/changes/kill_ftime
@@ -0,0 +1,7 @@
+ o Code simplification and refactoring
+ - Remove the old 'fuzzy time' logic. It was supposed to be used
+ for handling calculations where we have a known amount of clock
+ skew and an allowed amount of unknown skew. But we only used it
+ in three places, and we never adjusted the known/unknown skew
+ values. This is still something we might want to do someday,
+ but if we do, we'll want to do it differently.
diff --git a/changes/log-typo-2011-03-15-01 b/changes/log-typo-2011-03-15-01
new file mode 100644
index 000000000..3830df388
--- /dev/null
+++ b/changes/log-typo-2011-03-15-01
@@ -0,0 +1,3 @@
+ o Minor bugfixes
+ - Fix a minor typo in a log message. Bugfix on 0.2.2.6-alpha.
+
diff --git a/changes/log_domains b/changes/log_domains
new file mode 100644
index 000000000..7fc0506cd
--- /dev/null
+++ b/changes/log_domains
@@ -0,0 +1,12 @@
+ o Minor features
+ - Make it simpler to specify "All log domains except for A and B".
+ Previously you needed to say "[*,~A,~B]". Now you can just say
+ "[~A,~B]".
+ - Add a LogMessageDomains option to include the domains of log messages
+ along with the messages. Without this, there's no way to use
+ log domains without reading the source or doing a lot of guessing
+
+ o Documentation
+ - Add documentation for configuring logging at different severities in
+ different log domains. We've had this feature since 0.2.1.1-alpha, but
+ for some reason it never made it into the manpage. Fixes bug 2215.
diff --git a/changes/maatuska-new-v3auth b/changes/maatuska-new-v3auth
deleted file mode 100644
index 9508b30a2..000000000
--- a/changes/maatuska-new-v3auth
+++ /dev/null
@@ -1,3 +0,0 @@
- o New directory authorities:
- - Set up maatuska (run by Linus Nordberg) as the eighth v3 directory
- authority.
diff --git a/changes/md_cache_replace b/changes/md_cache_replace
new file mode 100644
index 000000000..88e029c00
--- /dev/null
+++ b/changes/md_cache_replace
@@ -0,0 +1,6 @@
+ o Minor bugfixes
+ - Avoid a bug that would keep us from replacing a microdescriptor
+ cache on Windows. (We would try to replace the file while still
+ holding it open. That's fine on Unix, but Windows doesn't let us
+ do that.) Bugfix on 0.2.2.6-alpha; bug found by wanoskarnet.
+
diff --git a/changes/mdesc_null_deref b/changes/mdesc_null_deref
new file mode 100644
index 000000000..30f028053
--- /dev/null
+++ b/changes/mdesc_null_deref
@@ -0,0 +1,5 @@
+ o Minor bugfixes:
+ - Avoid a possible null-pointer dereference when rebuilding the mdesc
+ cache without actually having any descriptors to cache. Bugfix on
+ 0.2.2.6-alpha. Issue discovered using clang's static analyzer.
+
diff --git a/changes/microdesc-double-free b/changes/microdesc-double-free
new file mode 100644
index 000000000..932cc754b
--- /dev/null
+++ b/changes/microdesc-double-free
@@ -0,0 +1,7 @@
+ o Security fixes:
+ - Don't double-free a parsable, but invalid, microdescriptor, even
+ if it is followed in the blob we're parsing by an unparsable
+ microdescriptor. Fixes an issue reported in a comment on bug 2954.
+ Bugfix on 0.2.2.6-alpha; fix by "cypherpunks".
+
+
diff --git a/changes/misc-reason b/changes/misc-reason
deleted file mode 100644
index 80db2d257..000000000
--- a/changes/misc-reason
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features:
- - Have clients begin understanding the new END_STREAM_REASON_NOROUTE
- error code.
diff --git a/changes/new-geoip-db b/changes/new-geoip-db
deleted file mode 100644
index 06d69ea47..000000000
--- a/changes/new-geoip-db
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major features:
- - Move to the Maxmind GeoIP db (rather than the June 2009
- ip-to-country GeoIP db) for our statistics that count how many
- users relays are seeing from each country. Now we have more accurate
- data for many African countries.
diff --git a/changes/noroute b/changes/noroute
new file mode 100644
index 000000000..644deec45
--- /dev/null
+++ b/changes/noroute
@@ -0,0 +1,5 @@
+ - Minor features
+ - Send END_STREAM_REASON_NOROUTE in response to EHOSTUNREACH errors.
+ Clients before 0.2.1.27 didn't handle NOROUTE correctly, but
+ such clients are already deprecated because of security bugs.
+
diff --git a/changes/openbsd-sysheaders b/changes/openbsd-sysheaders
deleted file mode 100644
index 2babde2d7..000000000
--- a/changes/openbsd-sysheaders
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes:
- - When building with --enable-gcc-warnings on OpenBSD, disable
- warnings in system headers. This makes --enable-gcc-warnings
- pass on OpenBSD 4.8. \ No newline at end of file
diff --git a/changes/osx_forgotten_compilefix b/changes/osx_forgotten_compilefix
new file mode 100644
index 000000000..754e09cfe
--- /dev/null
+++ b/changes/osx_forgotten_compilefix
@@ -0,0 +1,4 @@
+ o Minor bugfixes:
+ - Added a forgotten cast that caused a compile warning on OS X 10.6. Bugfix
+ on 0.2.2.24-alpha.
+
diff --git a/changes/remove-debian b/changes/remove-debian
deleted file mode 100644
index 6eb1896ba..000000000
--- a/changes/remove-debian
+++ /dev/null
@@ -1,5 +0,0 @@
- o Removed files:
- - Remove the old debian/ directory from the main Tor distribution.
- The official Tor-for-debian git repository lives at the URL
- https://git.torproject.org/debian/tor.git .
-
diff --git a/changes/task2196 b/changes/task2196
new file mode 100644
index 000000000..e629fccac
--- /dev/null
+++ b/changes/task2196
@@ -0,0 +1,5 @@
+ o Minor features:
+ - Report only the top 10 ports in exit-port stats in order not to
+ exceed the maximum extra-info descriptor length of 50 KB. Implements
+ task 2196.
+
diff --git a/changes/ticket2497 b/changes/ticket2497
new file mode 100644
index 000000000..51171412b
--- /dev/null
+++ b/changes/ticket2497
@@ -0,0 +1,4 @@
+ o Minor features:
+ - Ensure that no empty [dirreq-](read|write)-history lines are added
+ to an extrainfo document. Implements ticket 2497.
+
diff --git a/changes/warn-if-get_digest-fails b/changes/warn-if-get_digest-fails
new file mode 100644
index 000000000..6cfc1082a
--- /dev/null
+++ b/changes/warn-if-get_digest-fails
@@ -0,0 +1,6 @@
+ o Minor bugfixes:
+ - If we fail to compute the identity digest of a v3 legacy
+ keypair, warn, and don't use a buffer-full of junk instead.
+ Bugfix on 0.2.1.1-alpha; fixes bug 3106.
+
+
diff --git a/changes/win_tmp_dir b/changes/win_tmp_dir
new file mode 100644
index 000000000..13f6e7f1c
--- /dev/null
+++ b/changes/win_tmp_dir
@@ -0,0 +1,4 @@
+ o Unit tests:
+ - Use GetTempDir to find the proper temporary directory location on
+ Windows when generating temporary files for the unit tests. Patch
+ by Gisle Vanem.