commit eae0c00ddaa8ee29c345b08773db28dd29005e42
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Oct 17 14:06:20 2016 -0400
changelog typo fixes from Rubiate
---
ChangeLog | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 068ef68..5bf4ebd 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -11,7 +11,7 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
- Tor directory authorities now vote on a set of recommended
subprotocol …
[View More]versions, and on a set of required subprotocol
versions. Clients and relays that lack support for a _required_
- suprotocol version will not start; those that lack support for a
+ subprotocol version will not start; those that lack support for a
_recommended_ subprotocol version will warn the user to upgrade.
Closes ticket 19958; implements part of proposal 264.
- Tor now uses "subprotocol versions" to indicate compatibility.
@@ -59,7 +59,7 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
on 0.2.4.7-alpha.
o Minor bugfixes (address discovery):
- - Stop reordering IP addresses returned by the OS. This makes is
+ - Stop reordering IP addresses returned by the OS. This makes it
more likely that Tor will guess the same relay IP address every
time. Fixes issue 20163; bugfix on 0.2.7.1-alpha, ticket 17027.
Reported by René Mayrhofer, patch by "cypherpunks".
[View Less]
commit 80530f706ace4e5061770c2163fa0bdde2f4a6bd
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Oct 17 14:03:48 2016 -0400
edits to changelog from kate and david
---
ChangeLog | 14 +++++++-------
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index a014a5c..068ef68 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -19,9 +19,9 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
a relay to tell whether they could use a given feature. Now, …
[View More]they
should be able to rely on its declared subprotocol versions. This
change allows compatible implementations of the Tor protocol(s) to
- exist without declaring compatibility with pretending to be
- particular releases of Tor itself. Closes ticket 19958; implements
- part of proposal 264.
+ exist without pretending to be 100% bug-compatible with particular
+ releases of Tor itself. Closes ticket 19958; implements part of
+ proposal 264.
o Minor feature (fallback directories):
- Remove broken fallbacks from the hard-coded fallback directory
@@ -34,7 +34,7 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
proposal 272.
o Minor features (compilation, portability):
- - Tor now compiles correctly on MacOS 10.12 (aka "Sierra"). Closes
+ - Compile correctly on MacOS 10.12 (aka "Sierra"). Closes
ticket 20241.
o Minor features (development tools, etags):
@@ -81,7 +81,7 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
o Minor bugfixes (getpass):
- Defensively fix a non-triggerable heap corruption at do_getpass()
- tow protect ourselves from mistakes in the future. Fixes bug
+ to protect ourselves from mistakes in the future. Fixes bug
#19223; bugfix on 0.2.7.3-rc. Bug found by Guido Vranken, patch
by nherring.
@@ -91,8 +91,8 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
on 0.2.4.7-alpha.
o Documentation:
- - Added module-level internal documentation for 36 C files that
- previously didn't have a high-level overview.
+ - Add module-level internal documentation for 36 C files that
+ previously didn't have a high-level overview. Closes ticket #20385.
o Required libraries:
- When building with OpenSSL, Tor now requires version 1.0.1 or
[View Less]
commit 6d968a1507ae074ab17f914522f25b68138efd42
Author: David Goulet <dgoulet(a)torproject.org>
Date: Mon Oct 17 12:05:09 2016 -0400
prop224: Add a section on the number of introduction points
Acked-by: George Kadianakis <desnacked(a)riseup.net>
Signed-off-by: David Goulet <dgoulet(a)torproject.org>
---
proposals/224-rend-spec-ng.txt | 19 ++++++++++++++++++-
1 file changed, 18 insertions(+), 1 deletion(-)
diff --git a/proposals/224-rend-spec-ng.txt b/…
[View More]proposals/224-rend-spec-ng.txt
index 558cf1f..1fe738d 100644
--- a/proposals/224-rend-spec-ng.txt
+++ b/proposals/224-rend-spec-ng.txt
@@ -37,6 +37,7 @@ Table of contents:
2.3.2. Hidden services and changing shared random values
2.4. Hidden service descriptors: outer wrapper [DESC-OUTER]
2.5. Hidden service descriptors: encryption format [ENCRYPTED-DATA]
+ 2.5.1. Number of introduction points [NUM_INTRO_POINT]
3. The introduction protocol
3.1. Registering an introduction point [REG_INTRO_POINT]
3.1.1. Extensible ESTABLISH_INTRO protocol. [EST_INTRO]
@@ -999,7 +1000,8 @@ Table of contents:
able to contact the host. Recognized types are: 'password' and
'ed25519'. See [INTRO-AUTH] below.
- Followed by zero or more introduction points as follows:
+ Followed by zero or more introduction points as follows (see section
+ [NUM_INTRO_POINT] below for accepted values):
"introduction-point" SP link-specifiers NL
@@ -1058,6 +1060,21 @@ Table of contents:
Other encryption and authentication key formats are allowed; clients
should ignore ones they do not recognize.
+2.5.1. Number of introduction points [NUM_INTRO_POINT]
+
+ This section defines how many introduction points an hidden service
+ descriptor can have at minimum, by default and the maximum:
+
+ Minimum: 0 - Default: 3 - Maximum: 20
+
+ A value of 0 would means that the service is still alive but doesn't want
+ to be reached by any client at the moment. Note that the descriptor size
+ increases considerably as more introduction points are added.
+
+ The reason for a maximum value of 20 is to give enough scalability to tools
+ like OnionBalance to be able to load balance up to 120 servers (20 x 6
+ HSDirs) but also in order for the descriptor size to not overwhelmed hidden
+ service directories with user defined values that could be gigantic.
3. The introduction protocol
[View Less]
commit 20e9220d3d6981adf847e1a098f3c451d76b3916
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Oct 17 10:57:50 2016 -0400
Start on an 0.2.9.4-alpha changelog
---
ChangeLog | 95 ++++++++++++++++++++++++++++++++++++++++++++
changes/16869 | 4 --
changes/20163 | 6 ---
changes/broken-028-fallbacks | 3 --
changes/bug18357 | 5 ---
changes/bug19167 | 4 --
changes/bug19223 | 4 --
…
[View More]changes/bug19904 | 4 --
changes/bug20261 | 4 --
changes/feature18753 | 6 ---
changes/geoip-october2016 | 4 --
changes/mod_docs | 3 --
changes/no_openssl_100 | 4 --
changes/prop264 | 18 ---------
changes/ticket20001 | 6 ---
changes/ticket20151 | 7 ----
changes/ticket20241 | 3 --
17 files changed, 95 insertions(+), 85 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index c1f40dc..ef4cb6e 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,98 @@
+Changes in version 0.2.9.4-alpha - 2016-10-17
+ Foo bar
+
+ o Major features (subprotocol versions):
+ - Tor directory authorities now vote on a set of recommended subprotocol
+ versions, and on a set of required subprotocol versions. Clients and
+ relays that lack support for a _required_ suprotocol version will not
+ start; those that lack support for a _recommended_ subprotocol version
+ will warn the user to upgrade. Closes ticket 19958; implements part of
+ proposal 264.
+ - Tor now uses "subprotocol versions" to indicate
+ compatibility. Previously, versions of Tor looked at the declared Tor
+ version of a relay to tell whether they could use a given feature.
+ Now, they should be able to rely on its declared subprotocol versions.
+ This change allows compatible implementations of the Tor protocol(s) to
+ exist without declaring compatibility with pretending to be particular
+ releases of Tor itself. Closes ticket 19958; implements part of
+ proposal 264.
+
+ o Minor feature (fallback directories):
+ - Remove broken fallbacks from the hard-coded fallback directory list.
+ Closes ticket 20190; patch by teor.
+
+ o Minor features (client, directory):
+ - Since authorities now omit all routers that lack the Running and Valid
+ flags, we assume that any relay listed in the consensus must
+ have those flags. Closes ticket 20001; implements part of proposal
+ 272.
+
+ o Minor features (compilation, portability):
+ - Tor now compiles correctly on MacOS 10.12 (aka "Sierra"). Closes
+ ticket 20241.
+
+ o Minor features (development tools, etags):
+ - Teach the "make tags" Makefile target how to correctly find
+ "MOCK_IMPL" function definitions. Patch from nherring; closes
+ ticket 16869.
+
+ o Minor features (unix domain sockets):
+ - When configuring a unix domain socket for a SocksPort,
+ ControlPort, or Hidden service, you can now wrap the address
+ in quotes, using C-style escapes inside the quotes. This
+ allows unix domain socket paths to contain spaces.
+
+ o Minor features (geoip):
+ - Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2
+ Country database.
+
+ o Minor features (virtual addresses):
+ - Increase the maximum number of bits for the IPv6 virtual network prefix
+ from 16 to 104. In this way, the condition for address allocation is less
+ restrictive.
+ Closes ticket 20151; feature on 0.2.4.7-alpha.
+
+ o Minor bugfixes (address discovery):
+ - Stop reordering IP addresses returned by the OS.
+ This makes is more likely that Tor will guess the same relay IP address every time.
+ Fixes issue 20163; bugfix on 0.2.7.1-alpha, ticket 17027.
+ Reported by René Mayrhofer, patch by "cypherpunks".
+
+ o Minor bugfixes (client, unix domain sockets):
+ - Disable IsolateClientAddr when using AF_UNIX backed SocksPorts
+ as the client address is meaningless. Fixes bug 20261; bugfix on
+ 0.2.6.3-alpha.
+
+ o Minor bugfixes (compilation, OpenBSD):
+ - Detect Libevent2 functions correctly on systems that provide
+ libevent2, but where libevent1 is linked with -levent. Fixes bug
+ 19904; bugfix on 0.2.2.24-alpha. Patch from Rubiate.
+
+ o Minor bugfixes (configuration):
+ - When parsing quoted configuration values from the torrc file,
+ handle windows line endings correctly. Fixes bug 19167; bugfix on
+ 0.2.0.16-alpha. Patch from "Pingl".
+
+ o Minor bugfixes (getpass):
+ - Defensively fix a non-triggerable heap corruption at do_getpass() tow
+ protect ourselves from mistakes in the future. Fixes bug #19223; bugfix
+ on 0.2.7.3-rc. Bug found by Guido Vranken, patch by nherring.
+
+ o Minor bugfixes (hidden service):
+ - Allow hidden services to run on IPv6 addresses even when the
+ IPv6Exit option is not set. Fixes bug 18357; bugfix on
+ 0.2.4.7-alpha.
+
+ o Documentation:
+ - Added module-level internal documentation for 36 C files that
+ previously didn't have a high-level overview.
+
+ o Required libraries:
+ - When building with OpenSSL, Tor now requires version 1.0.1 or later.
+ OpenSSL 1.0.0 and earlier are no longer supported by the OpenSSL team,
+ and should not be used. Closes ticket 20303.
+
+
Changes in version 0.2.9.3-alpha - 2016-09-23
Tor 0.2.9.3-alpha adds improved support for entities that want to make
high-performance services available through the Tor .onion mechanism
diff --git a/changes/16869 b/changes/16869
deleted file mode 100644
index 6687243..0000000
--- a/changes/16869
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (development tools, etags):
- - Teach the "make tags" Makefile target how to correctly find
- "MOCK_IMPL" function definitions. Patch from nherring; closes
- ticket 16869.
diff --git a/changes/20163 b/changes/20163
deleted file mode 100644
index 04074de..0000000
--- a/changes/20163
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (address discovery):
- - Stop reordering IP addresses returned by the OS.
-This makes is more likely that Tor will guess the same relay IP address every time.
-Fixes issue 20163; bugfix on 0.2.7.1-alpha, ticket 17027.
-Reported by René Mayrhofer, patch by "cypherpunks".
-
diff --git a/changes/broken-028-fallbacks b/changes/broken-028-fallbacks
deleted file mode 100644
index 698fd6e..0000000
--- a/changes/broken-028-fallbacks
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor feature (fallback directories):
- - Remove broken fallbacks from the hard-coded fallback directory list.
- Closes ticket 20190; patch by teor.
diff --git a/changes/bug18357 b/changes/bug18357
deleted file mode 100644
index 5f19d14..0000000
--- a/changes/bug18357
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (hidden service):
- - Allow hidden services to run on IPv6 addresses even when the
- IPv6Exit option is not set. Fixes bug 18357; bugfix on
- 0.2.4.7-alpha.
-
diff --git a/changes/bug19167 b/changes/bug19167
deleted file mode 100644
index 4a6c22d..0000000
--- a/changes/bug19167
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (configuration):
- - When parsing quoted configuration values from the torrc file,
- handle windows line endings correctly. Fixes bug 19167; bugfix on
- 0.2.0.16-alpha. Patch from "Pingl".
diff --git a/changes/bug19223 b/changes/bug19223
deleted file mode 100644
index e8ca6d4..0000000
--- a/changes/bug19223
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (getpass):
- - Defensively fix a non-triggerable heap corruption at do_getpass() tow
- protect ourselves from mistakes in the future. Fixes bug #19223; bugfix
- on 0.2.7.3-rc. Bug found by Guido Vranken, patch by nherring.
\ No newline at end of file
diff --git a/changes/bug19904 b/changes/bug19904
deleted file mode 100644
index cdfb6fe..0000000
--- a/changes/bug19904
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation, OpenBSD):
- - Detect Libevent2 functions correctly on systems that provide
- libevent2, but where libevent1 is linked with -levent. Fixes bug
- 19904; bugfix on 0.2.2.24-alpha. Patch from Rubiate.
diff --git a/changes/bug20261 b/changes/bug20261
deleted file mode 100644
index dfdd159..0000000
--- a/changes/bug20261
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (client, unix domain sockets):
- - Disable IsolateClientAddr when using AF_UNIX backed SocksPorts
- as the client address is meaningless. Fixes bug 20261; bugfix on
- 0.2.6.3-alpha.
diff --git a/changes/feature18753 b/changes/feature18753
deleted file mode 100644
index 2eb0e35..0000000
--- a/changes/feature18753
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (unix domain sockets):
- - When configuring a unix domain socket for a SocksPort,
- ControlPort, or Hidden service, you can now wrap the address
- in quotes, using C-style escapes inside the quotes. This
- allows unix domain socket paths to contain spaces.
-
diff --git a/changes/geoip-october2016 b/changes/geoip-october2016
deleted file mode 100644
index fff9a1e..0000000
--- a/changes/geoip-october2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/mod_docs b/changes/mod_docs
deleted file mode 100644
index 57e4cae..0000000
--- a/changes/mod_docs
+++ /dev/null
@@ -1,3 +0,0 @@
- o Documentation:
- - Added module-level internal documentation for 36 C files that
- previously didn't have a high-level overview.
diff --git a/changes/no_openssl_100 b/changes/no_openssl_100
deleted file mode 100644
index dd89da8..0000000
--- a/changes/no_openssl_100
+++ /dev/null
@@ -1,4 +0,0 @@
- o Required libraries:
- - When building with OpenSSL, Tor now requires version 1.0.1 or later.
- OpenSSL 1.0.0 and earlier are no longer supported by the openssl team,
- and should not be used. Closes ticket 20303.
diff --git a/changes/prop264 b/changes/prop264
deleted file mode 100644
index bab8a40..0000000
--- a/changes/prop264
+++ /dev/null
@@ -1,18 +0,0 @@
- o Major features (subprotocol versions):
-
- - Tor now uses "subprotocol versions" to indicate
- compatibility. Previously, versions of Tor looked at the declared Tor
- version of a relay to tell whether they could use a given feature.
- Now, they should be able to rely on its declared subprotocol versions.
- This change allows compatible implementations of the Tor protocol(s) to
- exist without declaring compatibility with pretending to be particular
- releases of Tor itself. Closes ticket 19958; implements part of
- proposal 264.
-
- - Tor directory authorities now vote on a set of recommended subprotocol
- versions, and on a set of required subprotocol versions. Clients and
- relays that lack support for a _required_ suprotocol version will not
- start; those that lack support for a _recommended_ subprotocol version
- will warn the user to upgrade. Closes ticket 19958; implements part of
- proposal 264.
-
diff --git a/changes/ticket20001 b/changes/ticket20001
deleted file mode 100644
index a096e3a..0000000
--- a/changes/ticket20001
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (client, directory):
- - Since authorities now omit all routers that lack the Running and Valid
- flags, we assume that any authority present in the consensus must
- have those flags. Closes ticket 20001; implements part of proposal
- 272.
-
diff --git a/changes/ticket20151 b/changes/ticket20151
deleted file mode 100644
index 5d246d9..0000000
--- a/changes/ticket20151
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features:
- - Increase the maximum number of bits for the IPv6 virtual network prefix
- from 16 to 104. In this way, the condition for address allocation is less
- restrictive. Also, the variable max_bits is called max_prefix_bits,
- making it clearer the meaning of the condition (bits > max_prefix_bits).
- Closes ticket 20151; feature on 0.2.4.7-alpha.
-
diff --git a/changes/ticket20241 b/changes/ticket20241
deleted file mode 100644
index 7c592f7..0000000
--- a/changes/ticket20241
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (compilation, portability):
- - Tor now compiles correctly on MacOS 10.12 (aka "Sierra"). Closes
- ticket 20241.
[View Less]
commit 949bfaf22b7becd683bd32e7385407dca7691f2a
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Mon Oct 17 11:04:11 2016 -0400
Wrap the changelog, add a blurb
---
ChangeLog | 99 ++++++++++++++++++++++++++++++++++-----------------------------
1 file changed, 53 insertions(+), 46 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index ef4cb6e..a014a5c 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,31 +1,37 @@
Changes in version 0.2.9.4-alpha - 2016-10-17
- Foo bar
+ Tor 0.2.9.…
[View More]4-alpha adds numerous small features and fix-ups to previous
+ versions of Tor, including the implementation of a feature to future-
+ proof the Tor ecosystem against protocol changes, some bug fixes
+ necessary for Tor Browser to use unix domain sockets correctly, and
+ several portability improvements. We anticipate that this will be the
+ last alpha in the Tor 0.2.9 series, and that the next release will be
+ a release candidate.
o Major features (subprotocol versions):
- - Tor directory authorities now vote on a set of recommended subprotocol
- versions, and on a set of required subprotocol versions. Clients and
- relays that lack support for a _required_ suprotocol version will not
- start; those that lack support for a _recommended_ subprotocol version
- will warn the user to upgrade. Closes ticket 19958; implements part of
- proposal 264.
- - Tor now uses "subprotocol versions" to indicate
- compatibility. Previously, versions of Tor looked at the declared Tor
- version of a relay to tell whether they could use a given feature.
- Now, they should be able to rely on its declared subprotocol versions.
- This change allows compatible implementations of the Tor protocol(s) to
- exist without declaring compatibility with pretending to be particular
- releases of Tor itself. Closes ticket 19958; implements part of
- proposal 264.
+ - Tor directory authorities now vote on a set of recommended
+ subprotocol versions, and on a set of required subprotocol
+ versions. Clients and relays that lack support for a _required_
+ suprotocol version will not start; those that lack support for a
+ _recommended_ subprotocol version will warn the user to upgrade.
+ Closes ticket 19958; implements part of proposal 264.
+ - Tor now uses "subprotocol versions" to indicate compatibility.
+ Previously, versions of Tor looked at the declared Tor version of
+ a relay to tell whether they could use a given feature. Now, they
+ should be able to rely on its declared subprotocol versions. This
+ change allows compatible implementations of the Tor protocol(s) to
+ exist without declaring compatibility with pretending to be
+ particular releases of Tor itself. Closes ticket 19958; implements
+ part of proposal 264.
o Minor feature (fallback directories):
- - Remove broken fallbacks from the hard-coded fallback directory list.
- Closes ticket 20190; patch by teor.
+ - Remove broken fallbacks from the hard-coded fallback directory
+ list. Closes ticket 20190; patch by teor.
o Minor features (client, directory):
- - Since authorities now omit all routers that lack the Running and Valid
- flags, we assume that any relay listed in the consensus must
- have those flags. Closes ticket 20001; implements part of proposal
- 272.
+ - Since authorities now omit all routers that lack the Running and
+ Valid flags, we assume that any relay listed in the consensus must
+ have those flags. Closes ticket 20001; implements part of
+ proposal 272.
o Minor features (compilation, portability):
- Tor now compiles correctly on MacOS 10.12 (aka "Sierra"). Closes
@@ -36,32 +42,32 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
"MOCK_IMPL" function definitions. Patch from nherring; closes
ticket 16869.
- o Minor features (unix domain sockets):
- - When configuring a unix domain socket for a SocksPort,
- ControlPort, or Hidden service, you can now wrap the address
- in quotes, using C-style escapes inside the quotes. This
- allows unix domain socket paths to contain spaces.
-
o Minor features (geoip):
- Update geoip and geoip6 to the October 4 2016 Maxmind GeoLite2
Country database.
+ o Minor features (unix domain sockets):
+ - When configuring a unix domain socket for a SocksPort,
+ ControlPort, or Hidden service, you can now wrap the address in
+ quotes, using C-style escapes inside the quotes. This allows unix
+ domain socket paths to contain spaces.
+
o Minor features (virtual addresses):
- - Increase the maximum number of bits for the IPv6 virtual network prefix
- from 16 to 104. In this way, the condition for address allocation is less
- restrictive.
- Closes ticket 20151; feature on 0.2.4.7-alpha.
+ - Increase the maximum number of bits for the IPv6 virtual network
+ prefix from 16 to 104. In this way, the condition for address
+ allocation is less restrictive. Closes ticket 20151; feature
+ on 0.2.4.7-alpha.
o Minor bugfixes (address discovery):
- - Stop reordering IP addresses returned by the OS.
- This makes is more likely that Tor will guess the same relay IP address every time.
- Fixes issue 20163; bugfix on 0.2.7.1-alpha, ticket 17027.
+ - Stop reordering IP addresses returned by the OS. This makes is
+ more likely that Tor will guess the same relay IP address every
+ time. Fixes issue 20163; bugfix on 0.2.7.1-alpha, ticket 17027.
Reported by René Mayrhofer, patch by "cypherpunks".
o Minor bugfixes (client, unix domain sockets):
- - Disable IsolateClientAddr when using AF_UNIX backed SocksPorts
- as the client address is meaningless. Fixes bug 20261; bugfix on
- 0.2.6.3-alpha.
+ - Disable IsolateClientAddr when using AF_UNIX backed SocksPorts as
+ the client address is meaningless. Fixes bug 20261; bugfix
+ on 0.2.6.3-alpha.
o Minor bugfixes (compilation, OpenBSD):
- Detect Libevent2 functions correctly on systems that provide
@@ -71,26 +77,27 @@ Changes in version 0.2.9.4-alpha - 2016-10-17
o Minor bugfixes (configuration):
- When parsing quoted configuration values from the torrc file,
handle windows line endings correctly. Fixes bug 19167; bugfix on
- 0.2.0.16-alpha. Patch from "Pingl".
+ 0.2.0.16-alpha. Patch from "Pingl".
o Minor bugfixes (getpass):
- - Defensively fix a non-triggerable heap corruption at do_getpass() tow
- protect ourselves from mistakes in the future. Fixes bug #19223; bugfix
- on 0.2.7.3-rc. Bug found by Guido Vranken, patch by nherring.
+ - Defensively fix a non-triggerable heap corruption at do_getpass()
+ tow protect ourselves from mistakes in the future. Fixes bug
+ #19223; bugfix on 0.2.7.3-rc. Bug found by Guido Vranken, patch
+ by nherring.
o Minor bugfixes (hidden service):
- Allow hidden services to run on IPv6 addresses even when the
- IPv6Exit option is not set. Fixes bug 18357; bugfix on
- 0.2.4.7-alpha.
+ IPv6Exit option is not set. Fixes bug 18357; bugfix
+ on 0.2.4.7-alpha.
o Documentation:
- Added module-level internal documentation for 36 C files that
previously didn't have a high-level overview.
o Required libraries:
- - When building with OpenSSL, Tor now requires version 1.0.1 or later.
- OpenSSL 1.0.0 and earlier are no longer supported by the OpenSSL team,
- and should not be used. Closes ticket 20303.
+ - When building with OpenSSL, Tor now requires version 1.0.1 or
+ later. OpenSSL 1.0.0 and earlier are no longer supported by the
+ OpenSSL team, and should not be used. Closes ticket 20303.
Changes in version 0.2.9.3-alpha - 2016-09-23
[View Less]