tor-commits
Threads by month
- ----- 2025 -----
- June
- May
- April
- March
- February
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
January 2019
- 15 participants
- 2081 discussions

23 Jan '19
commit 7022ff30fc657e53be8ca1726ae73259174a322b
Author: juga0 <juga(a)riseup.net>
Date: Wed Dec 12 15:21:47 2018 +0000
scanner: refactor, move HTTP headers to constants
---
sbws/core/scanner.py | 7 ++++---
sbws/globals.py | 5 +++++
2 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/sbws/core/scanner.py b/sbws/core/scanner.py
index 51e7076..f6e226a 100644
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@ -9,7 +9,7 @@ from ..lib.relayprioritizer import …
[View More]RelayPrioritizer
from ..lib.destination import DestinationList
from ..util.timestamp import now_isodt_str
from ..util.state import State
-from sbws.globals import fail_hard
+from sbws.globals import fail_hard, HTTP_GET_HEADERS
import sbws.util.stem as stem_utils
import sbws.util.requests as requests_utils
from argparse import ArgumentDefaultsHelpFormatter
@@ -31,14 +31,15 @@ def timed_recv_from_server(session, dest, byte_range):
''' Request the **byte_range** from the URL at **dest**. If successful,
return True and the time it took to download. Otherwise return False and an
exception. '''
- headers = {'Range': byte_range, 'Accept-Encoding': 'identity'}
+
start_time = time.time()
+ HTTP_GET_HEADERS['Range'] = byte_range
# TODO:
# - What other exceptions can this throw?
# - Do we have to read the content, or did requests already do so?
try:
# headers are merged with the session ones, not overwritten.
- session.get(dest.url, headers=headers, verify=dest.verify)
+ session.get(dest.url, headers=HTTP_GET_HEADERS, verify=dest.verify)
except requests.exceptions.ConnectionError as e:
return False, e
except requests.exceptions.ReadTimeout as e:
diff --git a/sbws/globals.py b/sbws/globals.py
index 2277850..7196736 100644
--- a/sbws/globals.py
+++ b/sbws/globals.py
@@ -53,6 +53,11 @@ MAX_BW_DIFF_PERC = 50
BW_LINE_SIZE = 510
+HTTP_GET_HEADERS = {
+ 'Range': '{}',
+ 'Accept-Encoding': 'identity',
+}
+
def fail_hard(*a, **kw):
''' Log something ... and then exit as fast as possible '''
[View Less]
1
0

23 Jan '19
commit 225d880b24a5cf4860a406169ae803a7ae866fba
Author: juga0 <juga(a)riseup.net>
Date: Wed Dec 12 14:39:26 2018 +0000
Add HTTP headers to send in every request
create a constant, set the headers in the session.
---
sbws/__init__.py | 17 +++++++++++++++++
sbws/core/scanner.py | 15 +++++++++++++++
sbws/globals.py | 28 ++++++++++++++++++++++++++++
sbws/util/requests.py | 3 +++
4 files changed, 63 insertions(+)
diff --git a/sbws/__init__.py b/sbws/__init__.…
[View More]py
index 4256404..eea7006 100644
--- a/sbws/__init__.py
+++ b/sbws/__init__.py
@@ -1 +1,18 @@
__version__ = '1.0.3-dev0'
+
+from . import globals # noqa
+
+
+class Settings:
+ def __init__(self):
+ # update this dict from globals (but only for ALL_CAPS settings)
+ for setting in dir(globals):
+ if setting.isupper():
+ setattr(self, setting, getattr(globals, setting))
+
+ def init_http_headers(self, nickname, uuid, tor_version):
+ self.HTTP_HEADERS['Tor-Bandwidth-Scanner-Nickname'] = nickname
+ self.HTTP_HEADERS['Tor-Bandwidth-Scanner-UUID'] = uuid
+ self.HTTP_HEADERS['User-Agent'] += tor_version
+
+settings = Settings() # noqa
diff --git a/sbws/core/scanner.py b/sbws/core/scanner.py
index f461824..a6e46a4 100644
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@ -1,5 +1,7 @@
''' Measure the relays. '''
+import uuid
+
from ..lib.circuitbuilder import GapsCircuitBuilder as CB
from ..lib.resultdump import ResultDump
from ..lib.resultdump import ResultSuccess, ResultErrorCircuit
@@ -21,6 +23,8 @@ import logging
import requests
import random
+from sbws import settings
+
rng = random.SystemRandom()
end_event = Event()
@@ -335,6 +339,14 @@ def run_speedtest(args, conf):
'even lead to messed up results.',
conf.getpath('tor', 'control_socket'))
time.sleep(15)
+
+ # When there will be a refactor where conf is global, this can be removed
+ # from here.
+ state = State(conf.getpath('paths', 'state_fname'))
+ # Call only once to initialize http_headers
+ settings.init_http_headers(conf.get('scanner', 'nickname'), state['uuid'],
+ str(controller.get_version()))
+
rl = RelayList(args, conf, controller)
cb = CB(args, conf, controller, rl)
rd = ResultDump(args, conf, end_event)
@@ -394,6 +406,9 @@ def main(args, conf):
state = State(conf.getpath('paths', 'state_fname'))
state['scanner_started'] = now_isodt_str()
+ # Generate an unique identifier for each scanner
+ if 'uuid' not in state:
+ state['uuid'] = str(uuid.uuid4())
try:
run_speedtest(args, conf)
diff --git a/sbws/globals.py b/sbws/globals.py
index 7196736..cda6a54 100644
--- a/sbws/globals.py
+++ b/sbws/globals.py
@@ -1,5 +1,12 @@
import os
import logging
+import platform
+
+from requests import __version__ as requests_version
+from stem import __version__ as stem_version
+
+from sbws import __version__
+
log = logging.getLogger(__name__)
@@ -53,6 +60,27 @@ MAX_BW_DIFF_PERC = 50
BW_LINE_SIZE = 510
+# Metadata to send in every requests, so that data servers can know which
+# scanners are using them.
+# In Requests these keys are case insensitive.
+HTTP_HEADERS = {
+ # This would be ignored if changing to HTTP/2
+ 'Connection': 'keep-alive',
+ # Needs to get Tor version from the controller
+ 'User-Agent': 'sbws/{} ({}) Python/{} Requests/{} Stem/{} Tor/'.format(
+ __version__, platform.platform(),
+ platform.python_version(),
+ requests_version, stem_version),
+ # Organization defined names (:rfc:`7239`)
+ # Needs to get the nickname from the user config file.
+ 'Tor-Bandwidth-Scanner-Nickname': '{}',
+ 'Tor-Bandwidth-Scanner-UUID': '{}',
+ # In case of including IP address.
+ # 'Forwarded': 'for={}' # IPv6 part, if there's
+ }
+# In the case of having ipv6 it's concatenated to forwarder.
+IPV6_FORWARDED = ', for="[{}]"'
+
HTTP_GET_HEADERS = {
'Range': '{}',
'Accept-Encoding': 'identity',
diff --git a/sbws/util/requests.py b/sbws/util/requests.py
index 103182a..0b1ece2 100644
--- a/sbws/util/requests.py
+++ b/sbws/util/requests.py
@@ -1,4 +1,6 @@
import requests
+
+from sbws import settings
import sbws.util.stem as stem_utils
@@ -10,4 +12,5 @@ def make_session(controller, timeout):
'https': 'socks5h://{}:{}'.format(*socks_info),
}
s.timeout = timeout
+ s.headers = settings.HTTP_HEADERS
return s
[View Less]
1
0
commit c2d3bb98eb76eb15c1a7618993244225cbd03b9b
Author: juga0 <juga(a)riseup.net>
Date: Wed Dec 12 15:27:48 2018 +0000
scanner: refactor, remove unneded line
---
sbws/core/scanner.py | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/sbws/core/scanner.py b/sbws/core/scanner.py
index f6e226a..caf2aaa 100644
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@ -40,9 +40,8 @@ def timed_recv_from_server(session, dest, byte_range):
try:
# headers …
[View More]are merged with the session ones, not overwritten.
session.get(dest.url, headers=HTTP_GET_HEADERS, verify=dest.verify)
- except requests.exceptions.ConnectionError as e:
- return False, e
- except requests.exceptions.ReadTimeout as e:
+ except (requests.exceptions.ConnectionError,
+ requests.exceptions.ReadTimeout) as e:
return False, e
end_time = time.time()
return True, end_time - start_time
[View Less]
1
0
commit 550093645979d4611310e9b34f450802303ddb15
Author: juga0 <juga(a)riseup.net>
Date: Wed Dec 12 15:40:38 2018 +0000
scanner: change comment
---
sbws/core/scanner.py | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/sbws/core/scanner.py b/sbws/core/scanner.py
index caf2aaa..f461824 100644
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@ -36,7 +36,11 @@ def timed_recv_from_server(session, dest, byte_range):
HTTP_GET_HEADERS['Range'] = …
[View More]byte_range
# TODO:
# - What other exceptions can this throw?
- # - Do we have to read the content, or did requests already do so?
+ # - response.elapsed "measures the time taken between sending the first
+ # byte of the request and finishing parsing the headers.
+ # It is therefore unaffected by consuming the response content"
+ # If this mean that the content has arrived, elapsed could be used to
+ # know the time it took.
try:
# headers are merged with the session ones, not overwritten.
session.get(dest.url, headers=HTTP_GET_HEADERS, verify=dest.verify)
[View Less]
1
0
commit 19fa738e2ffe7c0f3cd27122003c31f5baa80e24
Merge: 8dbe890 225d880
Author: juga0 <juga(a)riseup.net>
Date: Wed Jan 23 15:20:22 2019 +0000
Merge branch 'bug28741'
There was merge conflict in the imports, solved adding all of them
sbws/__init__.py | 17 +++++++++++++++++
sbws/core/scanner.py | 34 ++++++++++++++++++++++++++--------
sbws/globals.py | 33 +++++++++++++++++++++++++++++++++
sbws/lib/destination.py | 2 +-
sbws/util/requests.py | 15 ++++…
[View More]+----------
5 files changed, 82 insertions(+), 19 deletions(-)
diff --cc sbws/core/scanner.py
index edf5227,a6e46a4..8fe8a5b
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@@ -1,7 -1,6 +1,8 @@@
''' Measure the relays. '''
+import sys
+import threading
+ import uuid
from ..lib.circuitbuilder import GapsCircuitBuilder as CB
from ..lib.resultdump import ResultDump
@@@ -12,7 -11,7 +13,7 @@@ from ..lib.relayprioritizer import Rela
from ..lib.destination import DestinationList
from ..util.timestamp import now_isodt_str
from ..util.state import State
- from sbws.globals import fail_hard, TIMEOUT_MEASUREMENTS
-from sbws.globals import fail_hard, HTTP_GET_HEADERS
++from sbws.globals import fail_hard, TIMEOUT_MEASUREMENTS, HTTP_GET_HEADERS
import sbws.util.stem as stem_utils
import sbws.util.requests as requests_utils
from argparse import ArgumentDefaultsHelpFormatter
[View Less]
1
0

23 Jan '19
commit a550d73178d6fc8158bb5ae518e719c0f81b8ae7
Author: juga0 <juga(a)riseup.net>
Date: Fri Dec 21 05:19:54 2018 +0000
scanner: log backtrace when not progressing
When sbws stalls after the prioritization loop waiting for thread
results, give it some minutes and otherwise log the backtrace.
This way if there's any bug or deadlock, operators can help to
debug it.
---
sbws/core/scanner.py | 26 +++++++++++++++++++++++++-
1 file changed, 25 insertions(+), 1 …
[View More]deletion(-)
diff --git a/sbws/core/scanner.py b/sbws/core/scanner.py
index 80251ec..9c7dff5 100644
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@ -1,5 +1,8 @@
''' Measure the relays. '''
+import sys
+import threading
+
from ..lib.circuitbuilder import GapsCircuitBuilder as CB
from ..lib.resultdump import ResultDump
from ..lib.resultdump import ResultSuccess, ResultErrorCircuit
@@ -27,6 +30,20 @@ end_event = Event()
log = logging.getLogger(__name__)
+def dumpstacks():
+ import pdb
+ import traceback
+ log.warning("sbws stop measuring relays, probably because of a bug."
+ "Please, open a ticket in trac.torproject.org with this"
+ "backtrace.")
+ thread_id2name = dict([(t.ident, t.name) for t in threading.enumerate()])
+ for thread_id, stack in sys._current_frames().items():
+ log.critical("Thread: %s(%d)",
+ thread_id2name.get(thread_id, ""), thread_id)
+ log.critical(traceback.print_stack(stack))
+ pdb.set_trace()
+
+
def timed_recv_from_server(session, dest, byte_range):
''' Request the **byte_range** from the URL at **dest**. If successful,
return True and the time it took to download. Otherwise return False and an
@@ -359,9 +376,16 @@ def run_speedtest(args, conf):
while len(pending_results) >= max_pending_results:
time.sleep(5)
pending_results = [r for r in pending_results if not r.ready()]
- while len(pending_results) > 0:
+ counter = 0
+ # give it 3min, otherwise there's a bug or deadlock
+ while len(pending_results) > 0 and counter <= 36:
+ counter += 1
+ log.debug("Number of pending measurement threads %s after "
+ "a prioritization loop.", len(pending_results))
time.sleep(5)
pending_results = [r for r in pending_results if not r.ready()]
+ if counter > 36:
+ dumpstacks()
loop_tstop = time.time()
loop_tdelta = (loop_tstop - loop_tstart) / 60
log.debug("Measured %s relays in %s minutes", num_relays, loop_tdelta)
[View Less]
1
0

23 Jan '19
commit 5dae9b99d2cda373b5f05139faf1b7a8710fc5d8
Author: juga0 <juga(a)riseup.net>
Date: Wed Jan 23 10:22:17 2019 +0000
fixup! scanner: log backtrace when not progressing
---
sbws/core/scanner.py | 29 ++++++++++++++++++-----------
sbws/globals.py | 1 +
2 files changed, 19 insertions(+), 11 deletions(-)
diff --git a/sbws/core/scanner.py b/sbws/core/scanner.py
index 9c7dff5..67fa30b 100644
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@ -12,7 +12,7 @@ from ..lib.…
[View More]relayprioritizer import RelayPrioritizer
from ..lib.destination import DestinationList
from ..util.timestamp import now_isodt_str
from ..util.state import State
-from sbws.globals import fail_hard
+from sbws.globals import fail_hard, TIMEOUT_MEASUREMENTS
import sbws.util.stem as stem_utils
import sbws.util.requests as requests_utils
from argparse import ArgumentDefaultsHelpFormatter
@@ -31,17 +31,24 @@ log = logging.getLogger(__name__)
def dumpstacks():
- import pdb
import traceback
- log.warning("sbws stop measuring relays, probably because of a bug."
- "Please, open a ticket in trac.torproject.org with this"
- "backtrace.")
+ log.critical("sbws stop measuring relays, probably because of a bug."
+ "Please, open a ticket in trac.torproject.org with this"
+ "backtrace.")
thread_id2name = dict([(t.ident, t.name) for t in threading.enumerate()])
for thread_id, stack in sys._current_frames().items():
log.critical("Thread: %s(%d)",
thread_id2name.get(thread_id, ""), thread_id)
log.critical(traceback.print_stack(stack))
- pdb.set_trace()
+ # If logging level is less than DEBUG (more verbose), start pdb so that
+ # developers can debug the issue.
+ if log.getEffectiveLevel() < logging.DEBUG:
+ import pdb
+ pdb.set_trace()
+ # Otherwise exit.
+ else:
+ # Change to stop threads when #28869 is merged
+ sys.exit(1)
def timed_recv_from_server(session, dest, byte_range):
@@ -376,15 +383,15 @@ def run_speedtest(args, conf):
while len(pending_results) >= max_pending_results:
time.sleep(5)
pending_results = [r for r in pending_results if not r.ready()]
- counter = 0
- # give it 3min, otherwise there's a bug or deadlock
- while len(pending_results) > 0 and counter <= 36:
- counter += 1
+ time_waiting = 0
+ while (len(pending_results) > 0
+ and time_waiting <= TIMEOUT_MEASUREMENTS):
log.debug("Number of pending measurement threads %s after "
"a prioritization loop.", len(pending_results))
time.sleep(5)
+ time_waiting += 5
pending_results = [r for r in pending_results if not r.ready()]
- if counter > 36:
+ if time_waiting > TIMEOUT_MEASUREMENTS:
dumpstacks()
loop_tstop = time.time()
loop_tdelta = (loop_tstop - loop_tstart) / 60
diff --git a/sbws/globals.py b/sbws/globals.py
index 2277850..50caaf7 100644
--- a/sbws/globals.py
+++ b/sbws/globals.py
@@ -34,6 +34,7 @@ SUPERVISED_USER_CONFIG_PATH = "/etc/sbws/sbws.ini"
SUPERVISED_RUN_DPATH = "/run/sbws/tor"
SOCKET_TIMEOUT = 60 # seconds
+TIMEOUT_MEASUREMENTS = 60 * 3 # 3 minutes
SBWS_SCALE_CONSTANT = 7500
TORFLOW_SCALING = 1
[View Less]
1
0
commit 8dbe89057d7eebd7f470fa28aed5d419a76df8cb
Merge: 12ad99d 5dae9b9
Author: juga0 <juga(a)riseup.net>
Date: Wed Jan 23 15:17:08 2019 +0000
Merge branch 'bug28932'
sbws/core/scanner.py | 35 +++++++++++++++++++++++++++++++++--
sbws/globals.py | 1 +
2 files changed, 34 insertions(+), 2 deletions(-)
diff --cc sbws/core/scanner.py
index 1ba0e8e,67fa30b..edf5227
--- a/sbws/core/scanner.py
+++ b/sbws/core/scanner.py
@@@ -377,12 -383,19 +401,19 @@@ def run_speedtest(args, …
[View More]conf)
while len(pending_results) >= max_pending_results:
time.sleep(5)
pending_results = [r for r in pending_results if not r.ready()]
- while len(pending_results) > 0:
+ time_waiting = 0
+ while (len(pending_results) > 0
+ and time_waiting <= TIMEOUT_MEASUREMENTS):
+ log.debug("Number of pending measurement threads %s after "
+ "a prioritization loop.", len(pending_results))
time.sleep(5)
+ time_waiting += 5
pending_results = [r for r in pending_results if not r.ready()]
+ if time_waiting > TIMEOUT_MEASUREMENTS:
+ dumpstacks()
loop_tstop = time.time()
loop_tdelta = (loop_tstop - loop_tstart) / 60
- log.debug("Measured %s relays in %s minutes", num_relays, loop_tdelta)
+ log.info("Measured %s relays in %s minutes", num_relays, loop_tdelta)
def gen_parser(sub):
[View Less]
1
0

[tor/maint-0.2.9] maint-0.2.9: remove changes files that are merged in 0.2.9 releases
by nickm@torproject.org 23 Jan '19
by nickm@torproject.org 23 Jan '19
23 Jan '19
commit dd6c2b0ad77b5bfbf7f06b1d73f8ab85d81154bf
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Wed Jan 23 09:48:28 2019 -0500
maint-0.2.9: remove changes files that are merged in 0.2.9 releases
Many of these files cause check-changes to fail, which will be a
long-term problem as we continue to support 0.2.9.
---
changes/19974 | 5 -----
changes/20460 | 4 ----
changes/20492 | 4 ----
changes/21359 | …
[View More] 8 --------
changes/bastet_v6 | 4 ----
changes/bug15582 | 4 ----
changes/bug18100 | 5 -----
changes/bug18329-minimal | 6 ------
changes/bug19025 | 4 ----
changes/bug19869 | 4 ----
changes/bug19926_029_info | 3 ---
changes/bug19960 | 4 ----
changes/bug19968 | 11 -----------
changes/bug19969 | 10 ----------
changes/bug20059 | 3 ---
changes/bug20085 | 4 ----
changes/bug20235 | 4 ----
changes/bug20247 | 4 ----
changes/bug20306_029 | 4 ----
changes/bug20307 | 7 -------
changes/bug20401 | 4 ----
changes/bug20423 | 6 ------
changes/bug20424_029_minimal | 4 ----
changes/bug20472 | 5 -----
changes/bug20484 | 5 -----
changes/bug20487 | 4 ----
changes/bug20509 | 5 -----
changes/bug20529 | 4 ----
changes/bug20533 | 7 -------
changes/bug20534 | 8 --------
changes/bug20536 | 6 ------
changes/bug20551 | 3 ---
changes/bug20553 | 3 ---
changes/bug20560 | 4 ----
changes/bug20587 | 5 -----
changes/bug20588 | 3 ---
changes/bug20591 | 3 ---
changes/bug20593 | 6 ------
changes/bug20597 | 5 -----
changes/bug20613 | 6 ------
changes/bug20634 | 3 ---
changes/bug20638 | 5 -----
changes/bug20710_025 | 4 ----
changes/bug20715 | 4 ----
changes/bug20716 | 3 ---
changes/bug20810 | 4 ----
changes/bug20864 | 4 ----
changes/bug20875 | 4 ----
changes/bug20935 | 3 ---
changes/bug21018 | 11 -----------
changes/bug21035 | 6 ------
changes/bug21051 | 3 ---
changes/bug21074_downgrade | 4 ----
changes/bug21108_029 | 6 ------
changes/bug21278_extras | 3 ---
changes/bug21278_prevention | 4 ----
changes/bug21280 | 5 -----
changes/bug21357 | 7 -------
changes/bug21394 | 9 ---------
changes/bug21450 | 4 ----
changes/bug21507 | 5 -----
changes/bug21576 | 4 ----
changes/bug21943 | 6 ------
changes/bug22034 | 4 ----
changes/bug22245 | 5 -----
changes/bug22349 | 9 ---------
changes/bug22370 | 4 ----
changes/bug22446 | 4 ----
changes/bug22460_case2 | 8 --------
changes/bug22490 | 3 ---
changes/bug22516 | 5 -----
changes/bug22636 | 8 --------
changes/bug22644 | 5 -----
changes/bug22737 | 12 ------------
changes/bug22789 | 7 -------
changes/bug22797 | 4 ----
changes/bug22801 | 5 -----
changes/bug22838_028 | 5 -----
changes/bug22915 | 3 ---
changes/bug22916_027 | 3 ---
changes/bug23030_029 | 7 -------
changes/bug23081 | 8 --------
changes/bug23291 | 3 ---
changes/bug23318 | 11 -----------
changes/bug23470 | 6 ------
changes/bug23690 | 5 -----
changes/bug23693 | 6 ------
changes/bug23874 | 3 ---
changes/bug23985 | 9 ---------
changes/bug24167 | 7 -------
changes/bug24170 | 3 ---
changes/bug24198 | 4 ----
changes/bug24313 | 5 -----
changes/bug24480 | 3 ---
changes/bug24633 | 5 -----
changes/bug24666 | 7 -------
changes/bug24736 | 6 ------
changes/bug24854 | 3 ---
changes/bug24895 | 8 --------
changes/bug24898-029 | 6 ------
changes/bug24952 | 5 -----
changes/bug24969 | 3 ---
changes/bug24978 | 7 -------
changes/bug25223 | 4 ----
changes/bug25249 | 3 ---
changes/bug25249.2 | 3 ---
changes/bug25440 | 5 -----
changes/bug25629 | 3 ---
changes/bug26007 | 5 -----
changes/bug26072 | 5 -----
changes/bug26116 | 7 -------
changes/bug26196 | 4 ----
changes/bug26269 | 5 -----
changes/bug26485 | 4 ----
changes/bug26535.029 | 5 -----
changes/bug26787 | 3 ---
changes/bug26830 | 3 ---
changes/bug26924 | 4 ----
changes/bug27081 | 4 ----
changes/bug27088 | 5 -----
changes/bug27185 | 3 ---
changes/bug27226 | 5 -----
changes/bug27295 | 3 ---
changes/bug27344 | 4 ----
changes/bug27418 | 3 ---
changes/bug27453 | 3 ---
changes/bug27461 | 5 -----
changes/bug27463 | 3 ---
changes/bug27465 | 5 -----
changes/bug8185_025 | 6 ------
changes/coveralls | 3 ---
changes/feature25313 | 4 ----
changes/feature26372_029 | 4 ----
changes/geoip-2017-11-06 | 4 ----
changes/geoip-2017-12-06 | 4 ----
changes/geoip-2018-01-05 | 4 ----
changes/geoip-2018-02-07 | 4 ----
changes/geoip-2018-03-08 | 4 ----
changes/geoip-2018-04-03 | 4 ----
changes/geoip-2018-05-01 | 4 ----
changes/geoip-2018-06-07 | 4 ----
changes/geoip-2018-07-03 | 4 ----
changes/geoip-2018-08-07 | 4 ----
changes/geoip-april2017 | 4 ----
changes/geoip-august2017 | 4 ----
changes/geoip-december2016 | 4 ----
changes/geoip-february2017 | 4 ----
changes/geoip-january2017 | 4 ----
changes/geoip-july2017 | 4 ----
changes/geoip-june2017 | 4 ----
changes/geoip-march2017 | 4 ----
changes/geoip-may2017 | 4 ----
changes/geoip-november2016 | 4 ----
changes/geoip-october2017 | 4 ----
changes/geoip-september2017 | 4 ----
changes/longclaw-ipv6 | 6 ------
changes/longclaw_23592 | 3 ---
changes/more_module_docs | 4 ----
changes/prop275-minimal | 9 ---------
changes/task26771 | 4 ----
changes/ticket19769 | 7 -------
changes/ticket20170-v3 | 5 -----
changes/ticket21564 | 6 ------
changes/ticket21953 | 6 ------
changes/ticket22895 | 3 ---
changes/ticket23856 | 4 ----
changes/ticket23910 | 3 ---
changes/ticket24315 | 3 ---
changes/ticket24629 | 3 ---
changes/ticket24681 | 6 ------
changes/ticket24902 | 13 -------------
changes/ticket25122 | 4 ----
changes/ticket25170 | 5 -----
changes/ticket25202 | 4 ----
changes/ticket26062 | 3 ---
changes/ticket26343 | 3 ---
changes/ticket26467 | 3 ---
changes/ticket26560 | 3 ---
changes/ticket26952-ccache | 3 ---
changes/ticket27087 | 3 ---
changes/ticket_24801 | 5 -----
changes/travis_distcheck | 4 ----
changes/trove-2017-001 | 8 --------
changes/trove-2017-001.2 | 8 --------
changes/trove-2017-005 | 7 -------
changes/trove-2017-008 | 5 -----
changes/trove-2017-009 | 10 ----------
changes/trove-2017-010 | 6 ------
changes/trove-2017-011 | 8 --------
changes/trove-2017-012-part1 | 6 ------
changes/trove-2018-001.1 | 6 ------
changes/trove-2018-004 | 8 --------
192 files changed, 941 deletions(-)
diff --git a/changes/19974 b/changes/19974
deleted file mode 100644
index 5496143dd..000000000
--- a/changes/19974
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (unit tests):
- - Fix tolerances in unit tests for monotonic time comparisons between
- nanoseconds and microseconds. Previously, we accepted a 10 us
- difference only, which is not realistic on every platform's
- clock_gettime(). Fixes bug 19974; bugfix on 0.2.9.1-alpha.
diff --git a/changes/20460 b/changes/20460
deleted file mode 100644
index 9fbb4a798..000000000
--- a/changes/20460
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (testing):
- - Use ECDHE ciphers instead of ECDH in tortls tests. LibreSSL has
- removed the ECDH ciphers which caused the tests to fail on
- platforms which use it. Fixes bug 20460; bugfix on 0.2.8.1-alpha.
diff --git a/changes/20492 b/changes/20492
deleted file mode 100644
index fdcd4d0b4..000000000
--- a/changes/20492
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfix (build):
- - The current Git revision when building from a local repository is now
- detected correctly when using git worktrees. Fixes bug 20492; bugfix on
- 0.2.3.9-alpha.
diff --git a/changes/21359 b/changes/21359
deleted file mode 100644
index cc9b377d5..000000000
--- a/changes/21359
+++ /dev/null
@@ -1,8 +0,0 @@
-
- o Minor features (portability, compilationc)
- - Support building with recent LibreSSL code that uses opaque
- structures. Closes ticket 21359.
- - Autoconf now check to determine if OpenSSL
- structures are opaque, instead of explicitly checking for
- OpenSSL version numbers.
- Part of ticket 21359.
diff --git a/changes/bastet_v6 b/changes/bastet_v6
deleted file mode 100644
index ee4e2c809..000000000
--- a/changes/bastet_v6
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (directory authority):
- - Add an IPv6 address for the "bastet" directory authority.
- Closes ticket 24394.
-
diff --git a/changes/bug15582 b/changes/bug15582
deleted file mode 100644
index 5ea6431cf..000000000
--- a/changes/bug15582
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation):
- - Avoid compiler warnings in the unit tests for running tor_sscanf()
- with wide string outputs. Fixes bug 15582; bugfix on 0.2.6.2-alpha.
-
diff --git a/changes/bug18100 b/changes/bug18100
deleted file mode 100644
index cd3ba2c97..000000000
--- a/changes/bug18100
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (linux TPROXY support):
- - Fix a typo that had prevented TPROXY-based transparent proxying from
- working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha.
- Patch from "d4fq0fQAgoJ".
-
diff --git a/changes/bug18329-minimal b/changes/bug18329-minimal
deleted file mode 100644
index 804c4e8dd..000000000
--- a/changes/bug18329-minimal
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (bridge):
- - Bridges now include notice in their descriptors that they are bridges,
- and notice of their distribution status, based on their publication
- settings. Implements ticket 18329. For more fine-grained control of
- how a bridge is distributed, upgrade to 0.3.2.x or later.
-
diff --git a/changes/bug19025 b/changes/bug19025
deleted file mode 100644
index 0f365f52b..000000000
--- a/changes/bug19025
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (DNS):
- - Fix a bug that prevented exit nodes from caching DNS records for more
- than 60 seconds.
- Fixes bug 19025; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug19869 b/changes/bug19869
deleted file mode 100644
index 430048f16..000000000
--- a/changes/bug19869
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DNSPort):
- - On DNSPort, stop logging a BUG warning on a failed hostname lookup.
- Fixes bug 19869; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug19926_029_info b/changes/bug19926_029_info
deleted file mode 100644
index 93fd81b6c..000000000
--- a/changes/bug19926_029_info
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (logging):
- - Downgrade a harmless log message about the pending_entry_connections
- list from "warn" to "info". Mitigates bug 19926.
diff --git a/changes/bug19960 b/changes/bug19960
deleted file mode 100644
index 5d655859a..000000000
--- a/changes/bug19960
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (netbsd, unit tests):
- - Stop expecting NetBSD unit tests to report success for ipfw;
- on NetBSD, it's only pf that's supported.
- Part of a fix for bug 19960; bugfix on 0.2.9.5-alpha.
diff --git a/changes/bug19968 b/changes/bug19968
deleted file mode 100644
index b285706e7..000000000
--- a/changes/bug19968
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes (relay):
- - Do not try to parallelize workers more than 16x without the
- user explicitly configuring us to do so, even if we do detect more than
- 16 CPU cores. Fixes bug 19968; bugfix on
- 0.2.3.1-alpha.
-
-
- o Minor bugfixes (testing):
- - Avoid a unit test failure on systems with over 16 detectable
- CPU cores. Fixes bug 19968; bugfix on
- 0.2.3.1-alpha.
diff --git a/changes/bug19969 b/changes/bug19969
deleted file mode 100644
index c760c6de0..000000000
--- a/changes/bug19969
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes (client performance):
- - Clients now respond to new application stream requests when
- they arrive, rather than waiting up to one second before starting
- to handle them. Fixes part of bug 19969; bugfix on 0.2.8.1-alpha.
-
- o Major bugfixes (clients on flaky network connections):
- - When Tor leaves standby because of a new application request, open
- circuits as needed to serve that request. Previously, we would
- potentially wait a very long time. Fixes part of bug 19969; bugfix
- on 0.2.8.1-alpha.
diff --git a/changes/bug20059 b/changes/bug20059
deleted file mode 100644
index 091fab06d..000000000
--- a/changes/bug20059
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (relay):
- - Avoid a double-marked-circuit warning that can happen when we receive
- DESTROY cells under heavy load. Fixes bug 20059; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug20085 b/changes/bug20085
deleted file mode 100644
index fd10e7eee..000000000
--- a/changes/bug20085
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Correct the minimum bandwidth value in torrc.sample, and queue a
- corresponding change for torrc.minimal. Closes ticket 20085.
-
diff --git a/changes/bug20235 b/changes/bug20235
deleted file mode 100644
index 54026a894..000000000
--- a/changes/bug20235
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compatibility):
- - Work around a bug in the OSX 10.12 SDK that would prevent us
- from successfully targetting earlier versions of OSX.
- Resolves ticket 20235.
diff --git a/changes/bug20247 b/changes/bug20247
deleted file mode 100644
index 731cf0046..000000000
--- a/changes/bug20247
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Avoid a sandbox failure when trying to re-bind to a socket and mark
- it as IPv6-only. Fixes bug 20247; bugfix on 0.2.5.1-alpha.
-
diff --git a/changes/bug20306_029 b/changes/bug20306_029
deleted file mode 100644
index ada2676b2..000000000
--- a/changes/bug20306_029
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (fascistfirewall):
- - Avoid spurious warnings when ReachableAddresses or FascistFirewall
- is set. Fixes bug 20306; bugfix on 0.2.8.2-alpha.
-
diff --git a/changes/bug20307 b/changes/bug20307
deleted file mode 100644
index 9112c9c78..000000000
--- a/changes/bug20307
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (circuit, hidden service)
- - When closing a circuit, the reason for doing so was assigned from an int
- value to a uint16_t which is quite a problem for negative values that are
- our internal reasons (ex: END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS
- side, this was causing introduction points to be flagged as unusable
- because the reason wasn't the right one due to the bad conversion.
- Partially fixes bug 21056 and fixes bug 20307; Bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20401 b/changes/bug20401
deleted file mode 100644
index 85ab3c732..000000000
--- a/changes/bug20401
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (relay):
- - Avoid a small memory leak when informing worker threads about rotated
- onion keys. Fixes bug 20401; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug20423 b/changes/bug20423
deleted file mode 100644
index 32bdc3f08..000000000
--- a/changes/bug20423
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes:
- - For relays that don't know their own address, avoid attempting
- a local hostname resolve for each descriptor we download. Also cut
- down on the number of "Success: chose address 'x.x.x.x'" log lines.
- Fixes bugs 20423 and 20610; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20424_029_minimal b/changes/bug20424_029_minimal
deleted file mode 100644
index eb7886233..000000000
--- a/changes/bug20424_029_minimal
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation):
- - When compiling with --enable-openbsd-malloc or --enable-tcmalloc, tell
- the compiler not to include the system malloc implementation. Fixes bug
- 20424; bugfix on 0.2.0.20-rc.
diff --git a/changes/bug20472 b/changes/bug20472
deleted file mode 100644
index 4d90c39f5..000000000
--- a/changes/bug20472
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (circuits):
- - Remove a BUG warning in circuit_pick_extend_handshake. Instead, assume
- all nodes support EXTEND2. Use ntor whenever a key is available.
- Fixes bug 20472; bugfix on 0.2.9.3-alpha.
-
diff --git a/changes/bug20484 b/changes/bug20484
deleted file mode 100644
index 9a0b95cb3..000000000
--- a/changes/bug20484
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (single onion services):
- - Start correctly when creating a single onion service in a
- directory that did not previously exist. Fixes bug 20484; bugfix on
- 0.2.9.3-alpha.
-
diff --git a/changes/bug20487 b/changes/bug20487
deleted file mode 100644
index 4435f14a9..000000000
--- a/changes/bug20487
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Clarify that setting HiddenServiceNonAnonymousMode requires
- you to also set "SOCKSPort 0". Fixes bug 20487; bugfix on
- 0.2.9.3-alpha.
diff --git a/changes/bug20509 b/changes/bug20509
deleted file mode 100644
index a39ca9f60..000000000
--- a/changes/bug20509
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features:
- - Directory authorities now reject relays running versions
- 0.2.9.1-alpha through 0.2.9.4-alpha, because those relays
- suffer from bug 20499 and don't keep their consensus cache
- up-to-date. Resolves ticket 20509.
diff --git a/changes/bug20529 b/changes/bug20529
deleted file mode 100644
index 276be5b2b..000000000
--- a/changes/bug20529
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (hidden services):
- - When configuring hidden services, check every hidden service directory's
- permissions. Previously, we only checked the last hidden service.
- Fixes bug 20529; bugfix on 13942 commit 85bfad1 in 0.2.6.2-alpha.
diff --git a/changes/bug20533 b/changes/bug20533
deleted file mode 100644
index 7d1a45632..000000000
--- a/changes/bug20533
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (consensus downloads):
- - If a consensus expires while we are waiting for certificates to download,
- stop waiting for certificates.
- - If we stop waiting for certificates less than a minute after we started
- downloading them, do not consider the certificate download failure a
- separate failure.
- Fixes bug 20533; bugfix on commit e0204f21 in 0.2.0.9-alpha.
diff --git a/changes/bug20534 b/changes/bug20534
deleted file mode 100644
index 49db433a0..000000000
--- a/changes/bug20534
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (directory download scheduling):
- - Remove the maximum delay on exponential-backoff scheduling.
- Since we now allow an infinite number of failures (see ticket
- 20536), we must now allow the time to grow longer on each failure.
- Fixes part of bug 20534; bugfix on 0.2.9.1-alpha.
- - Use initial delays and decrements in download scheduling closer to
- those from 0.2.8. Fixes another part of bug 20534; bugfix on
- 0.2.9.1-alpha.
diff --git a/changes/bug20536 b/changes/bug20536
deleted file mode 100644
index 9e0dd164b..000000000
--- a/changes/bug20536
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (download scheduling):
- - When using an exponential backoff schedule, do not give up on
- dowloading just because we have failed a bunch of times. Since
- each delay is longer than the last, retrying indefinitely won't
- hurt. Fixes bug 20536; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug20551 b/changes/bug20551
deleted file mode 100644
index b7ec4ca7c..000000000
--- a/changes/bug20551
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix implicit conversion warnings under OpenSSL 1.1.
- Fixes bug 20551; bugfix on 0.2.1.1-alpha.
diff --git a/changes/bug20553 b/changes/bug20553
deleted file mode 100644
index 12a278030..000000000
--- a/changes/bug20553
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory leak):
- - Work around a memory leak in OpenSSL 1.1 when encoding public keys.
- Fixes bug 20553; bugfix on 0.0.2pre8.
diff --git a/changes/bug20560 b/changes/bug20560
deleted file mode 100644
index 43d605b29..000000000
--- a/changes/bug20560
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (portability):
- - Run correctly when built on Windows build environments that require
- _vcsprintf(). Fixes bug 20560; bugfix on 0.2.2.11-alpha.
-
diff --git a/changes/bug20587 b/changes/bug20587
deleted file mode 100644
index 341b00136..000000000
--- a/changes/bug20587
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (download timing):
- - When determining when to download a directory object, handle times
- after 2038 if the operating system supports that. (Someday this will be
- important!) Fixes bug 20587; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20588 b/changes/bug20588
deleted file mode 100644
index 832ef8133..000000000
--- a/changes/bug20588
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (portability):
- - Fix compilation with OpenSSL 1.1 and less commonly-used
- CPU architectures. Closes ticket 20588.
diff --git a/changes/bug20591 b/changes/bug20591
deleted file mode 100644
index deaa738f5..000000000
--- a/changes/bug20591
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (relay bootstrap):
- - Ensure relays don't make multiple connections during bootstrap.
- Fixes bug 20591; bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20593 b/changes/bug20593
deleted file mode 100644
index e9f54d317..000000000
--- a/changes/bug20593
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (client directory scheduling):
- - Treat "relay too busy to answer request" as a failed request and a
- reason to back off on our retry frequency. This is safe now that
- exponential backups retry indefinitely, and avoids a bug where we would
- reset our download schedule erroneously.
- Fixes bug 20593; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug20597 b/changes/bug20597
deleted file mode 100644
index f199b6393..000000000
--- a/changes/bug20597
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (test networks, exponential backoff):
- - When using exponential backoff in test networks, use a lower exponent,
- so the delays do not vary as much. This helps test networks bootstrap
- consistently. Fixes bug 20597; bugfix on 20499; not in any released
- version of tor.
diff --git a/changes/bug20613 b/changes/bug20613
deleted file mode 100644
index 19bb61f4e..000000000
--- a/changes/bug20613
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (single onion services, Tor2web):
- - Stop logging long-term one-hop circuits deliberately created by single
- onion services and Tor2web. These log messages are intended to diagnose
- issue 8387, which relates to circuits hanging around forever for no
- reason.
- Fixes bug 20613; bugfix on 0.2.9.1-alpha. Reported by "pastly".
diff --git a/changes/bug20634 b/changes/bug20634
deleted file mode 100644
index 62fc9f478..000000000
--- a/changes/bug20634
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (unit tests):
- - Stop spurious failures in the local interface address discovery unit
- tests. Fixes bug 20634; bugfix on 0.2.8.1-alpha; patch by Neel Chauhan.
diff --git a/changes/bug20638 b/changes/bug20638
deleted file mode 100644
index 260d7d0a7..000000000
--- a/changes/bug20638
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (hidden services):
- - Stop ignoring hidden service key anonymity when first starting tor.
- Instead, refuse to start tor if any hidden service key has been used in
- a different hidden service anonymity mode.
- Fixes bug 20638; bugfix on 17178 in 0.2.9.3-alpha; reported by ahf.
diff --git a/changes/bug20710_025 b/changes/bug20710_025
deleted file mode 100644
index 12bd07536..000000000
--- a/changes/bug20710_025
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory leak, use-after-free, linux seccomp2 sandbox):
- - Fix a memory leak and use-after-free error when removing entries
- from the sandbox's getaddrinfo() cache. Fixes bug 20710; bugfix on
- 0.2.5.5-alpha. Patch from "cypherpunks".
diff --git a/changes/bug20715 b/changes/bug20715
deleted file mode 100644
index 737a560ce..000000000
--- a/changes/bug20715
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory leak)
- - When moving a signed descriptor object from a source to an existing
- destination, free the allocated memory inside that destination object.
- Bugfix on tor-0.2.8.3-alpha; Closes #20715.
diff --git a/changes/bug20716 b/changes/bug20716
deleted file mode 100644
index 37fd6feec..000000000
--- a/changes/bug20716
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (client, memory leak):
- - Fix a small memory leak when receiving AF_UNIX connections on
- a SocksPort. Fixes bug 20716; bugfix on 0.2.6.3-alpha.
diff --git a/changes/bug20810 b/changes/bug20810
deleted file mode 100644
index 5420a7317..000000000
--- a/changes/bug20810
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (relay)
- - When computing old Tor protocol line version in protover, we were
- looking at 0.2.7.5 twice instead of a specific case for 0.2.9.1-alpha.
- Bugfix on tor-0.2.9.4-alpha.
diff --git a/changes/bug20864 b/changes/bug20864
deleted file mode 100644
index 7b8c70fad..000000000
--- a/changes/bug20864
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (unit tests, hidden services):
- - Remove a double-free in the single onion service unit test. Stop
- ignoring a return value. Make future changes less error-prone.
- Fixes bug 20864; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug20875 b/changes/bug20875
deleted file mode 100644
index 6bba2cbc1..000000000
--- a/changes/bug20875
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (download scheduling)
- - Resolve a "bug" warning when considering a download schedule whose
- delay had approached INT_MAX. Fixes 20875; bugfix on 0.2.9.5-alpha.
-
diff --git a/changes/bug20935 b/changes/bug20935
deleted file mode 100644
index 78068c7c0..000000000
--- a/changes/bug20935
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (portability):
- - Use the correct spelling of MAC_OS_X_VERSION_10_12 on configure.ac
- Fixes bug 20935; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug21018 b/changes/bug21018
deleted file mode 100644
index 49a8b47a2..000000000
--- a/changes/bug21018
+++ /dev/null
@@ -1,11 +0,0 @@
- o Major bugfixes (parsing, security):
-
- - Fix a bug in parsing that could cause clients to read a single
- byte past the end of an allocated region. This bug could be
- used to cause hardened clients (built with
- --enable-expensive-hardening) to crash if they tried to visit
- a hostile hidden service. Non-hardened clients are only
- affected depending on the details of their platform's memory
- allocator. Fixes bug 21018; bugfix on 0.2.0.8-alpha. Found by
- using libFuzzer. Also tracked as TROVE-2016-12-002 and as
- CVE-2016-1254.
diff --git a/changes/bug21035 b/changes/bug21035
deleted file mode 100644
index bbf334078..000000000
--- a/changes/bug21035
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (portability):
- - Avoid crashing when Tor is built using headers that contain
- CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
- without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix on
- 0.2.9.1-alpha.
-
diff --git a/changes/bug21051 b/changes/bug21051
deleted file mode 100644
index 8bb4f80c8..000000000
--- a/changes/bug21051
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix Libevent detection on platforms without Libevent 1 headers
- installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug21074_downgrade b/changes/bug21074_downgrade
deleted file mode 100644
index 1bc1f8523..000000000
--- a/changes/bug21074_downgrade
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (portability):
- - Don't exit the Tor process if setrlimit() fails to change the file
- limit (which can happen sometimes on some versions of OSX). Fixes
- bug 21074; bugfix on 0.0.9pre5.
diff --git a/changes/bug21108_029 b/changes/bug21108_029
deleted file mode 100644
index 3a3f004fc..000000000
--- a/changes/bug21108_029
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (directory authority):
- - During voting, when marking a node as a probable sybil, do not
- clear its BadExit flag: sybils can still be bad in other ways
- too. (We still clear the other flags.) Fixes bug 21108; bugfix
- on 0.2.0.13-alpha.
-
diff --git a/changes/bug21278_extras b/changes/bug21278_extras
deleted file mode 100644
index ffdf4a047..000000000
--- a/changes/bug21278_extras
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (code correctness):
- - Repair a couple of (unreachable or harmless) cases of the risky
- comparison-by-subtraction pattern that caused bug 21278.
diff --git a/changes/bug21278_prevention b/changes/bug21278_prevention
deleted file mode 100644
index e07f0a670..000000000
--- a/changes/bug21278_prevention
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (directory authority):
- - Directory authorities now reject descriptors that claim to be
- malformed versions of Tor. Helps prevent exploitation of bug 21278.
-
diff --git a/changes/bug21280 b/changes/bug21280
deleted file mode 100644
index e9f0bc174..000000000
--- a/changes/bug21280
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (tor-resolve):
- - The tor-resolve command line tool now rejects hostnames over 255
- characters in length. Previously, it would silently truncate
- them, which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
- Patch by "junglefowl".
diff --git a/changes/bug21357 b/changes/bug21357
deleted file mode 100644
index a1cb43a78..000000000
--- a/changes/bug21357
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (IPv6 Exits):
- - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects IPv6
- addresses. Instead, only reject a port over IPv6 if the exit policy
- rejects that port on more than an IPv6 /16 of addresses. This bug was
- made worse by 17027 in 0.2.8.1-alpha, which rejects a relay's own IPv6
- address by default.
- Fixes bug 21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.
diff --git a/changes/bug21394 b/changes/bug21394
deleted file mode 100644
index e5452e20b..000000000
--- a/changes/bug21394
+++ /dev/null
@@ -1,9 +0,0 @@
- o Major bugfixes (Exit nodes):
- - Fix an issue causing high-bandwidth exit nodes to fail a majority
- or all of their DNS requests, making them basically unsuitable for
- regular usage in Tor circuits. The problem is related to
- libevent's DNS handling, but we can work around it in Tor. Fixes
- bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced
- eventdns. Credit goes to Dhalgren for identifying and finding a
- workaround to this bug and to gamambel, arthuredelstein and
- arma in helping to track it down and analyze it.
diff --git a/changes/bug21450 b/changes/bug21450
deleted file mode 100644
index a1cf89ab4..000000000
--- a/changes/bug21450
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (voting consistency):
- - Reject version numbers with components that exceed INT32_MAX.
- Otherwise 32-bit and 64-bit platforms would behave inconsistently.
- Fixes bug 21450; bugfix on 0.0.8pre1.
diff --git a/changes/bug21507 b/changes/bug21507
deleted file mode 100644
index f83e291b6..000000000
--- a/changes/bug21507
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (voting consistency):
- - Reject version numbers with non-numeric prefixes (such as +, -, and
- whitespace). Disallowing whitespace prevents differential version
- parsing between POSIX-based and Windows platforms.
- Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1.
diff --git a/changes/bug21576 b/changes/bug21576
deleted file mode 100644
index 68d847119..000000000
--- a/changes/bug21576
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (crash, directory connections):
- - Fix a rare crash when sending a begin cell on a circuit whose linked
- directory connection has already been closed. Fixes bug 21576;
- bugfix on Tor 0.2.9.3-alpha. Reported by alecmuffett.
diff --git a/changes/bug21943 b/changes/bug21943
deleted file mode 100644
index dbe2c726d..000000000
--- a/changes/bug21943
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (Linux seccomp2 sandbox):
- - The getpid() system call is now permitted under the Linux seccomp2
- sandbox, to avoid crashing with versions of OpenSSL (and other
- libraries) that attempt to learn the process's PID by using the
- syscall rather than the VDSO code. Fixes bug 21943; bugfix on
- 0.2.5.1-alpha.
diff --git a/changes/bug22034 b/changes/bug22034
deleted file mode 100644
index 6d9e18874..000000000
--- a/changes/bug22034
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (control port, regression):
- - The GETINFO extra-info/digest/<digest> command was broken because of a
- wrong base16 decode return value check. In was introduced in a refactor
- of that API. Fixex bug #22034; bugfix on tor-0.2.9.1-alpha.
diff --git a/changes/bug22245 b/changes/bug22245
deleted file mode 100644
index 6ae18593e..000000000
--- a/changes/bug22245
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (bandwidth accounting):
- - Roll over monthly accounting at the configured hour and minute,
- rather than always at 00:00.
- Fixes bug 22245; bugfix on 0.0.9rc1.
- Found by Andrey Karpov with PVS-Studio.
diff --git a/changes/bug22349 b/changes/bug22349
deleted file mode 100644
index bb43404bf..000000000
--- a/changes/bug22349
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes (directory authority):
- - When a directory authority rejects a descriptor or extrainfo with
- a given digest, mark that digest as undownloadable, so that we
- do not attempt to download it again over and over. We previously
- tried to avoid downloading such descriptors by other means, but
- we didn't notice if we accidentally downloaded one anyway. This
- behavior became problematic in 0.2.7.2-alpha, when authorities
- began pinning Ed25519 keys. Fixes ticket
- 22349; bugfix on 0.2.1.19-alpha.
diff --git a/changes/bug22370 b/changes/bug22370
deleted file mode 100644
index e0e87e333..000000000
--- a/changes/bug22370
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory handling):
- - When directory authorities reject a router descriptor due to keypinning,
- free the router descriptor rather than leaking the memory.
- Fixes bug 22370; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug22446 b/changes/bug22446
deleted file mode 100644
index eab65aac0..000000000
--- a/changes/bug22446
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (code style, backport from 0.3.1.3-alpha):
- - Add "Falls through" comments to our codebase, in order to silence
- GCC 7's -Wimplicit-fallthrough warnings. Patch from Andreas
- Stieger. Closes ticket 22446.
diff --git a/changes/bug22460_case2 b/changes/bug22460_case2
deleted file mode 100644
index 0a1175983..000000000
--- a/changes/bug22460_case2
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (relay, link handshake):
-
- - When performing the v3 link handshake on a TLS connection, report that
- we have the x509 certificate that we actually used on that connection,
- even if we have changed certificates since that connection was first
- opened. Previously, we would claim to have used our most recent x509
- link certificate, which would sometimes make the link handshake fail.
- Fixes one case of bug 22460; bugfix on 0.2.3.6-alpha.
diff --git a/changes/bug22490 b/changes/bug22490
deleted file mode 100644
index 244dd50b3..000000000
--- a/changes/bug22490
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (correctness):
- - Avoid undefined behavior when parsing IPv6 entries from the geoip6
- file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
diff --git a/changes/bug22516 b/changes/bug22516
deleted file mode 100644
index f024a3c47..000000000
--- a/changes/bug22516
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Permit the fchmod system call, to avoid crashing on startup when
- starting with the seccomp2 sandbox and an unexpected set of permissions
- on the data directory or its contents. Fixes bug 22516; bugfix on
- 0.2.5.4-alpha.
diff --git a/changes/bug22636 b/changes/bug22636
deleted file mode 100644
index 770cac72e..000000000
--- a/changes/bug22636
+++ /dev/null
@@ -1,8 +0,0 @@
- o Build features:
- - Tor's repository now includes a Travis Continuous Integration (CI)
- configuration file (.travis.yml). This is meant to help new developers and
- contributors who fork Tor to a Github repository be better able to test
- their changes, and understand what we expect to pass. To use this new build
- feature, you must fork Tor to your Github account, then go into the
- "Integrations" menu in the repository settings for your fork and enable
- Travis, then push your changes.
diff --git a/changes/bug22644 b/changes/bug22644
deleted file mode 100644
index 9b8742eda..000000000
--- a/changes/bug22644
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (controller):
- - Do not crash when receiving a POSTDESCRIPTOR command with an
- empty body. Fixes part of bug 22644; bugfix on 0.2.0.1-alpha.
- - Do not crash when receiving a HSPOST command with an empty body.
- Fixes part of bug 22644; bugfix on 0.2.7.1-alpha.
diff --git a/changes/bug22737 b/changes/bug22737
deleted file mode 100644
index f0de8e6c4..000000000
--- a/changes/bug22737
+++ /dev/null
@@ -1,12 +0,0 @@
- o Minor bugfixes (defensive programming, undefined behavior):
-
- - Fix a memset() off the end of an array when packing cells. This
- bug should be harmless in practice, since the corrupted bytes
- are still in the same structure, and are always padding bytes,
- ignored, or immediately overwritten, depending on compiler
- behavior. Nevertheless, because the memset()'s purpose is to
- make sure that any other cell-handling bugs can't expose bytes
- to the network, we need to fix it. Fixes bug 22737; bugfix on
- 0.2.4.11-alpha. Fixes CID 1401591.
-
-
diff --git a/changes/bug22789 b/changes/bug22789
deleted file mode 100644
index a65359284..000000000
--- a/changes/bug22789
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (openbsd, denial-of-service):
- - Avoid an assertion failure bug affecting our implementation of
- inet_pton(AF_INET6) on certain OpenBSD systems whose strtol()
- handling of "0xfoo" differs from what we had expected.
- Fixes bug 22789; bugfix on 0.2.3.8-alpha. Also tracked as
- TROVE-2017-007.
-
diff --git a/changes/bug22797 b/changes/bug22797
deleted file mode 100644
index 619baaa40..000000000
--- a/changes/bug22797
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (file limits):
- - When setting the maximum number of connections allowed by the OS,
- always allow some extra file descriptors for other files.
- Fixes bug 22797; bugfix on 0.2.0.10-alpha.
diff --git a/changes/bug22801 b/changes/bug22801
deleted file mode 100644
index 7edc79bc8..000000000
--- a/changes/bug22801
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - When building with certain versions the mingw C header files, avoid
- float-conversion warnings when calling the C functions isfinite(),
- isnan(), and signbit(). Fixes bug 22801; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug22838_028 b/changes/bug22838_028
deleted file mode 100644
index 1d0a4fbfd..000000000
--- a/changes/bug22838_028
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation, mingw, backport from 0.3.1.1-alpha):
- - Backport a fix for an "unused variable" warning that appeared
- in some versions of mingw. Fixes bug 22838; bugfix on
- 0.2.8.1-alpha.
-
diff --git a/changes/bug22915 b/changes/bug22915
deleted file mode 100644
index 17a9c6018..000000000
--- a/changes/bug22915
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation warnings):
- - Suppress -Wdouble-promotion warnings with clang 4.0. Fixes bug 22915;
- bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug22916_027 b/changes/bug22916_027
deleted file mode 100644
index 5cf99c7d1..000000000
--- a/changes/bug22916_027
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Compilation):
- - Fix warnings when building with libscrypt and openssl scrypt support
- on Clang. Fixes bug 22916; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug23030_029 b/changes/bug23030_029
deleted file mode 100644
index 89a1b507d..000000000
--- a/changes/bug23030_029
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (coverity builds):
- - Avoid Coverity build warnings related to our BUG() macro. By
- default, Coverity treats BUG() as the Linux kernel does: an
- instant abort(). We need to override that so our BUG() macro
- doesn't prevent Coverity from analyzing functions that use it.
- Fixes bug 23030; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug23081 b/changes/bug23081
deleted file mode 100644
index 76c4e3097..000000000
--- a/changes/bug23081
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (Windows service):
- - When running as a Windows service, set the ID of the main thread
- correctly. Failure to do so made us fail to send log messages
- to the controller in 0.2.1.16-rc, slowed down controller
- event delivery in 0.2.7.3-rc and later, and crash with an assertion
- failure in 0.3.1.1-alpha. Fixes bug 23081; bugfix on 0.2.1.6-alpha.
- Patch and diagnosis from "Vort".
-
diff --git a/changes/bug23291 b/changes/bug23291
deleted file mode 100644
index a5b0efda0..000000000
--- a/changes/bug23291
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing):
- - Fix an undersized buffer in test-memwipe.c. Fixes bug 23291; bugfix on
- 0.2.7.2-alpha. Found and patched by Ties Stuij.
diff --git a/changes/bug23318 b/changes/bug23318
deleted file mode 100644
index 7fcb8d448..000000000
--- a/changes/bug23318
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes (path selection):
- - When selecting relays by bandwidth, avoid a rounding error that
- could sometimes cause load to be imbalanced incorrectly. Previously,
- we would always round upwards; now, we round towards the nearest
- integer. This had the biggest effect when a relay's weight adjustments
- should have given it weight 0, but it got weight 1 instead.
- Fixes bug 23318; bugfix on 0.2.4.3-alpha.
- - When calculating the fraction of nodes that have descriptors, and all
- all nodes in the network have zero bandwidths, count the number of nodes
- instead.
- Fixes bug 23318; bugfix on 0.2.4.10-alpha.
diff --git a/changes/bug23470 b/changes/bug23470
deleted file mode 100644
index 33367b3a3..000000000
--- a/changes/bug23470
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfix (relay address resolution):
- - Avoid unnecessary calls to directory_fetches_from_authorities()
- on relays. This avoids spurious address resolutions and
- descriptor rebuilds. This is a mitigation for 21789. The original
- bug was introduced in commit 35bbf2e as part of prop210.
- Fixes 23470 in 0.2.8.1-alpha.
diff --git a/changes/bug23690 b/changes/bug23690
deleted file mode 100644
index 36ff32e49..000000000
--- a/changes/bug23690
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (relay, crash, assertion failure):
- - Fix a timing-based assertion failure that could occur when the
- circuit out-of-memory handler freed a connection's output buffer.
- Fixes bug 23690; bugfix on 0.2.6.1-alpha.
-
diff --git a/changes/bug23693 b/changes/bug23693
deleted file mode 100644
index 796398be5..000000000
--- a/changes/bug23693
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay, crash):
- - Avoid a crash when transitioning from client mode to bridge mode.
- Previously, we would launch the worker threads whenever our "public
- server" mode changed, but not when our "server" mode changed.
- Fixes bug 23693; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug23874 b/changes/bug23874
deleted file mode 100644
index bf6620553..000000000
--- a/changes/bug23874
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory safety):
- - Clear the address when node_get_prim_orport() returns early.
- Fixes bug 23874; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug23985 b/changes/bug23985
deleted file mode 100644
index 9cb593796..000000000
--- a/changes/bug23985
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes (bootstrapping):
- - Fetch descriptors aggressively whenever we lack enough
- to build circuits, regardless of how many descriptors we are missing.
- Previously, we would delay launching the fetch when we had fewer than
- 15 missing descriptors, even if some of those descriptors were
- blocking circuits from building. Fixes bug 23985; bugfix on
- 0.1.1.11-alpha. The effects of this bug became worse in 0.3.0.3-alpha,
- when we began treating missing descriptors from our primary guards
- as a reason to delay circuits.
diff --git a/changes/bug24167 b/changes/bug24167
deleted file mode 100644
index fd0d87eff..000000000
--- a/changes/bug24167
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (network layer):
- - When closing a connection via close_connection_immediately(), we
- mark it as "not blocked on bandwidth", to prevent later calls
- from trying to unblock it, and give it permission to read. This
- fixes a backtrace warning that can happen on relays under various
- circumstances. Fixes bug 24167; bugfix on 0.1.0.1-rc.
-
diff --git a/changes/bug24170 b/changes/bug24170
deleted file mode 100644
index d3d734769..000000000
--- a/changes/bug24170
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (path selection):
- - Actually log the total bandwidth in compute_weighted_bandwidths().
- Fixes bug 24170; bugfix on 0.2.4.3-alpha.
diff --git a/changes/bug24198 b/changes/bug24198
deleted file mode 100644
index 679070687..000000000
--- a/changes/bug24198
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (controller, linux seccomp2 sandbox):
- - Avoid a crash when attempting to use the seccomp2 sandbox
- together with the OwningControllerProcess feature.
- Fixes bug 24198; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24313 b/changes/bug24313
deleted file mode 100644
index b927ec3ba..000000000
--- a/changes/bug24313
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (security, hidden service v2):
- - Fix a use-after-free error that could crash v2 Tor hidden services
- when it failed to open circuits while expiring introductions
- points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This
- issue is also tracked as TROVE-2017-013 and CVE-2017-8823.
diff --git a/changes/bug24480 b/changes/bug24480
deleted file mode 100644
index 94e5b91a0..000000000
--- a/changes/bug24480
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix a signed/unsigned comparison warning introduced by our
- fix to TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
diff --git a/changes/bug24633 b/changes/bug24633
deleted file mode 100644
index 028c7cc14..000000000
--- a/changes/bug24633
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (portability, msvc):
- - Fix a bug in the bit-counting parts of our timing-wheel code on
- MSVC. (Note that MSVC is still not a supported build platform,
- due to cyptographic timing channel risks.) Fixes bug 24633;
- bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug24666 b/changes/bug24666
deleted file mode 100644
index 830775f5f..000000000
--- a/changes/bug24666
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (memory usage):
-
- - When queuing DESTROY cells on a channel, only queue the
- circuit-id and reason fields: not the entire 514-byte
- cell. This fix should help mitigate any bugs or attacks that
- fill up these queues, and free more RAM for other uses. Fixes
- bug 24666; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24736 b/changes/bug24736
deleted file mode 100644
index 632560932..000000000
--- a/changes/bug24736
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (address selection):
- - When the fascist_firewall_choose_address_ functions don't find a
- reachable address, set the returned address to the null address and port.
- This is a precautionary measure, because some callers do not check the
- return value.
- Fixes bug 24736; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug24854 b/changes/bug24854
deleted file mode 100644
index 64e10772e..000000000
--- a/changes/bug24854
+++ /dev/null
@@ -1,3 +0,0 @@
- o Code simplification and refactoring:
- - Move the list of default directory authorities to their own file for
- inclusion using the C preprocessor. Closes ticket 24854. Patch by "beastr0".
diff --git a/changes/bug24895 b/changes/bug24895
deleted file mode 100644
index 7edde94a0..000000000
--- a/changes/bug24895
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (onion services):
- - Fix an "off by 2" error in counting rendezvous failures on the onion
- service side. While we thought we would stop the rendezvous attempt
- after one failed circuit, we were actually making three circuit attempts
- before giving up. Now switch to a default of 2, and allow the consensus
- parameter "hs_service_max_rdv_failures" to override. Fixes bug 24895;
- bugfix on 0.0.6.
-
diff --git a/changes/bug24898-029 b/changes/bug24898-029
deleted file mode 100644
index b33f09384..000000000
--- a/changes/bug24898-029
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay):
- - Make the internal channel_is_client() function look at what sort
- of connection handshake the other side used, rather than whether
- the other side ever sent a create_fast cell to us. Backports part
- of the fixes from bugs 22805 and 24898.
-
diff --git a/changes/bug24952 b/changes/bug24952
deleted file mode 100644
index 93174c04f..000000000
--- a/changes/bug24952
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfix (channel connection):
- - The accurate address of a connection is real_addr, not the addr member.
- TLS Channel remote address is now real_addr content instead of addr
- member. Fixes bug 24952; bugfix on 707c1e2e26 in 0.2.4.11-alpha.
- Patch by "ffmancera".
diff --git a/changes/bug24969 b/changes/bug24969
deleted file mode 100644
index 46b2bae6f..000000000
--- a/changes/bug24969
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Linux seccomp2 sandbox):
- - Allow the nanosleep() system call, which glibc uses to implement
- sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24978 b/changes/bug24978
deleted file mode 100644
index 5dc45c744..000000000
--- a/changes/bug24978
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features (compatibility, OpenSSL):
- - Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
- Previous versions of Tor would not have worked with OpenSSL
- 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the
- ciphersuites it requires. Here we enable the TLS 1.3 ciphersuites.
- Closes ticket 24978.
-
diff --git a/changes/bug25223 b/changes/bug25223
deleted file mode 100644
index fdd556350..000000000
--- a/changes/bug25223
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Make sure we don't modify consensus parameters if we aren't a public
- relay when a new consensus arrives. Fixes bug 25223; bugfix on
- 0.3.3.2-alpha.
diff --git a/changes/bug25249 b/changes/bug25249
deleted file mode 100644
index b4153eeae..000000000
--- a/changes/bug25249
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (spec conformance):
- - Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
- 0.2.9.4-alpha.
diff --git a/changes/bug25249.2 b/changes/bug25249.2
deleted file mode 100644
index 9058c1107..000000000
--- a/changes/bug25249.2
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (spec conformance):
- - Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
- bugfix on 0.2.9.4-alpha.
diff --git a/changes/bug25440 b/changes/bug25440
deleted file mode 100644
index f8d9dd4fa..000000000
--- a/changes/bug25440
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Fix a bug in out sandboxing rules for the openat() syscall.
- Previously, no openat() call would be permitted, which would break
- filesystem operations on recent glibc versions. Fixes bug 25440;
- bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
diff --git a/changes/bug25629 b/changes/bug25629
deleted file mode 100644
index 190928a94..000000000
--- a/changes/bug25629
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (C correctness):
- - Fix a very unlikely null pointer dereference. Fixes bug 25629;
- bugfix on 0.2.9.15. Found by Coverity; this is CID 1430932.
diff --git a/changes/bug26007 b/changes/bug26007
deleted file mode 100644
index efcd15084..000000000
--- a/changes/bug26007
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (directory authorities, security):
- - When directory authorities read a zero-byte bandwidth file, they log
- a warning with the contents of an uninitialised buffer. Log a warning
- about the empty file instead.
- Fixes bug 26007; bugfix on 0.2.2.1-alpha.
diff --git a/changes/bug26072 b/changes/bug26072
deleted file mode 100644
index 2489e4fbb..000000000
--- a/changes/bug26072
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (correctness, client):
- - Upon receiving a malformed connected cell, stop processing the cell
- immediately. Previously we would mark the connection for close, but
- continue processing the cell as if the connection were open. Fixes bug
- 26072; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug26116 b/changes/bug26116
deleted file mode 100644
index 3bfde74f7..000000000
--- a/changes/bug26116
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (compatibility, openssl):
- - Work around a change in OpenSSL 1.1.1 where
- return values that would previously indicate "no password" now
- indicate an empty password. Without this workaround, Tor instances
- running with OpenSSL 1.1.1 would accept descriptors that other Tor
- instances would reject. Fixes bug 26116; bugfix on 0.2.5.16.
-
diff --git a/changes/bug26196 b/changes/bug26196
deleted file mode 100644
index 47fcffa0f..000000000
--- a/changes/bug26196
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (hardening):
- - Prevent a possible out-of-bounds smartlist read in
- protover_compute_vote(). Fixes bug 26196; bugfix on
- 0.2.9.4-alpha.
diff --git a/changes/bug26269 b/changes/bug26269
deleted file mode 100644
index 73dcdbf5c..000000000
--- a/changes/bug26269
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix a compilation warning on some versions of GCC when
- building code that calls routerinfo_get_my_routerinfo() twice,
- assuming that the second call will succeed if the first one did.
- Fixes bug 26269; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug26485 b/changes/bug26485
deleted file mode 100644
index 5a40b7a78..000000000
--- a/changes/bug26485
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (directory authority):
- - When voting for recommended versions, make sure that all of the
- versions are well-formed and parsable. Fixes bug 26485; bugfix on
- 0.1.1.6-alpha.
diff --git a/changes/bug26535.029 b/changes/bug26535.029
deleted file mode 100644
index 111b539f1..000000000
--- a/changes/bug26535.029
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (testing, compatibility):
- - When running the ntor_ref.py test, make sure only to pass strings
- (rather than "bytes" objects) to the Python subprocess module.
- Python 3 on Windows seems to require this. Fixes bug 26535; bugfix on
- 0.2.5.5-alpha.
diff --git a/changes/bug26787 b/changes/bug26787
deleted file mode 100644
index b32e519a9..000000000
--- a/changes/bug26787
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing):
- - Disable core dumps in test_bt.sh, to avoid failures in "make
- distcheck". Fixes bug 26787; bugfix on 0.2.5.2-alpha.
diff --git a/changes/bug26830 b/changes/bug26830
deleted file mode 100644
index c002f1953..000000000
--- a/changes/bug26830
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - Skip an unreliable key generation test on Windows, until the underlying
- issue in bug 26076 is resolved. Fixes bug 26830; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug26924 b/changes/bug26924
deleted file mode 100644
index 882db56b4..000000000
--- a/changes/bug26924
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (single onion services, Tor2web):
- - Log a protocol warning when single onion services or Tor2web clients
- fail to authenticate direct connections to relays.
- Fixes bug 26924; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug27081 b/changes/bug27081
deleted file mode 100644
index 74e0efbd2..000000000
--- a/changes/bug27081
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation, windows):
- - Don't link or search for pthreads when building for Windows, even if we
- are using build environment (like mingw) that provides a pthreads
- library. Fixes bug 27081; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug27088 b/changes/bug27088
deleted file mode 100644
index d4d3b292c..000000000
--- a/changes/bug27088
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (continuous integration):
- - Pass the module flags to distcheck configure, and
- log the flags before running configure. (Backported
- to 0.2.9 and later as a precaution.)
- Fixes bug 27088; bugfix on 0.3.4.1-alpha.
diff --git a/changes/bug27185 b/changes/bug27185
deleted file mode 100644
index 79221b3df..000000000
--- a/changes/bug27185
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Windows, compilation):
- - Silence a compilation warning on MSVC 2017 and clang-cl.
- Fixes bug 27185; bugfix on 0.2.2.2-alpha.
diff --git a/changes/bug27226 b/changes/bug27226
deleted file mode 100644
index 9030773cd..000000000
--- a/changes/bug27226
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (testing, openssl compatibility):
- - Our "tortls/cert_matches_key" unit test no longer relies on OpenSSL
- internals. Previously, it relied on unsupported OpenSSL behavior in
- a way that caused it to crash with OpenSSL 1.0.2p. Fixes bug 27226;
- bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug27295 b/changes/bug27295
deleted file mode 100644
index c5a364877..000000000
--- a/changes/bug27295
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing, chutney):
- - Before running make test-network-all, delete old logs and test result
- files, to avoid spurious failures. Fixes bug 27295; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug27344 b/changes/bug27344
deleted file mode 100644
index 9f6685558..000000000
--- a/changes/bug27344
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compatibility):
- - Tell OpenSSL to maintain backward compatibility with previous
- RSA1024/DH1024 users in Tor. With OpenSSL 1.1.1-pre6, these ciphers
- are disabled by default. Closes ticket 27344.
diff --git a/changes/bug27418 b/changes/bug27418
deleted file mode 100644
index 1d99497dc..000000000
--- a/changes/bug27418
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - When we use echo in Travis, don't pass a --flag as the first argument.
- Fixes bug 27418; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27453 b/changes/bug27453
deleted file mode 100644
index 4501346d2..000000000
--- a/changes/bug27453
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - When a Travis build fails, and showing a log fails, keep trying to
- show the other logs. Fixes bug 27453; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27461 b/changes/bug27461
deleted file mode 100644
index 3571ee816..000000000
--- a/changes/bug27461
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Stop calling SetProcessDEPPolicy() on 64-bit Windows. It is not
- supported, and always fails. Some compilers warn about the function
- pointer cast on 64-bit Windows.
- Fixes bug 27461; bugfix on 0.2.2.23-alpha.
diff --git a/changes/bug27463 b/changes/bug27463
deleted file mode 100644
index 073acdd99..000000000
--- a/changes/bug27463
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (onion services):
- - Silence a spurious compiler warning in rend_client_send_introduction().
- Fixes bug 27463; bugfix on 0.1.1.2-alpha.
diff --git a/changes/bug27465 b/changes/bug27465
deleted file mode 100644
index 743b35130..000000000
--- a/changes/bug27465
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Silence a spurious compiler warning on the GetAdaptersAddresses
- function pointer cast. This issue is already fixed by 26481 in
- 0.3.5 and later, by removing the lookup and cast.
- Fixes bug 27465; bugfix on 0.2.3.11-alpha.
diff --git a/changes/bug8185_025 b/changes/bug8185_025
deleted file mode 100644
index 1bfc12b1e..000000000
--- a/changes/bug8185_025
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (logging, relay shutdown, annoyance):
- - When a circuit is marked for close, do not attempt to package any cells
- for channels on that circuit. Previously, we would detect this
- condition lower in the call stack, when we noticed that the circuit had
- no attached channel, and log an annoying message. Fixes bug 8185;
- bugfix on 0.2.5.4-alpha.
diff --git a/changes/coveralls b/changes/coveralls
deleted file mode 100644
index 7fa69bb2b..000000000
--- a/changes/coveralls
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Our Travis CI configuration now integrates with the Coveralls coverage
- analysis tool. Closes ticket 25818.
diff --git a/changes/feature25313 b/changes/feature25313
deleted file mode 100644
index 90f421169..000000000
--- a/changes/feature25313
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (sandbox):
- - Explicitly permit the poll() system call when the Linux seccomp2-based
- sandbox is enabled: apparently, some versions of libc use poll() when
- calling getpwnam(). Closes ticket 25313.
diff --git a/changes/feature26372_029 b/changes/feature26372_029
deleted file mode 100644
index 150ac3055..000000000
--- a/changes/feature26372_029
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compilation):
-
- - When building Tor, prefer to use Python 3 over Python 2, and more
- recent (contemplated) versions over older ones. Closes ticket 26372.
diff --git a/changes/geoip-2017-11-06 b/changes/geoip-2017-11-06
deleted file mode 100644
index f034be900..000000000
--- a/changes/geoip-2017-11-06
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2017-12-06 b/changes/geoip-2017-12-06
deleted file mode 100644
index ae4fb1149..000000000
--- a/changes/geoip-2017-12-06
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the December 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-01-05 b/changes/geoip-2018-01-05
deleted file mode 100644
index 59aba02d0..000000000
--- a/changes/geoip-2018-01-05
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the January 5 2018 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-02-07 b/changes/geoip-2018-02-07
deleted file mode 100644
index f45228fd7..000000000
--- a/changes/geoip-2018-02-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-03-08 b/changes/geoip-2018-03-08
deleted file mode 100644
index d9696aab5..000000000
--- a/changes/geoip-2018-03-08
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2
- Country database. Closes ticket 25469.
-
diff --git a/changes/geoip-2018-04-03 b/changes/geoip-2018-04-03
deleted file mode 100644
index 987cc450b..000000000
--- a/changes/geoip-2018-04-03
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 25718.
-
diff --git a/changes/geoip-2018-05-01 b/changes/geoip-2018-05-01
deleted file mode 100644
index 1528bb0c3..000000000
--- a/changes/geoip-2018-05-01
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2
- Country database. Closes ticket 26104.
-
diff --git a/changes/geoip-2018-06-07 b/changes/geoip-2018-06-07
deleted file mode 100644
index 0f8cff97a..000000000
--- a/changes/geoip-2018-06-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the June 7 2018 Maxmind GeoLite2
- Country database. Closes ticket 26351.
-
diff --git a/changes/geoip-2018-07-03 b/changes/geoip-2018-07-03
deleted file mode 100644
index e921d63c9..000000000
--- a/changes/geoip-2018-07-03
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 26674.
-
diff --git a/changes/geoip-2018-08-07 b/changes/geoip-2018-08-07
deleted file mode 100644
index 9ddbe7b1b..000000000
--- a/changes/geoip-2018-08-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the August 7 2018 Maxmind GeoLite2
- Country database. Closes ticket 27089.
-
diff --git a/changes/geoip-april2017 b/changes/geoip-april2017
deleted file mode 100644
index b489eaf01..000000000
--- a/changes/geoip-april2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-august2017 b/changes/geoip-august2017
deleted file mode 100644
index 2dab18a63..000000000
--- a/changes/geoip-august2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the August 3 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-december2016 b/changes/geoip-december2016
deleted file mode 100644
index 60754ea21..000000000
--- a/changes/geoip-december2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the December 7 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-february2017 b/changes/geoip-february2017
deleted file mode 100644
index ec54b6122..000000000
--- a/changes/geoip-february2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-january2017 b/changes/geoip-january2017
deleted file mode 100644
index 77bc9a599..000000000
--- a/changes/geoip-january2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-july2017 b/changes/geoip-july2017
deleted file mode 100644
index ed10369f1..000000000
--- a/changes/geoip-july2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the July 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-june2017 b/changes/geoip-june2017
deleted file mode 100644
index 2ea7bf105..000000000
--- a/changes/geoip-june2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the June 8 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-march2017 b/changes/geoip-march2017
deleted file mode 100644
index 6dc92baa2..000000000
--- a/changes/geoip-march2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the March 7 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-may2017 b/changes/geoip-may2017
deleted file mode 100644
index 4e504d7a0..000000000
--- a/changes/geoip-may2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-november2016 b/changes/geoip-november2016
deleted file mode 100644
index b3f9913bb..000000000
--- a/changes/geoip-november2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (ge0oip):
- - Update geoip and geoip6 to the November 3 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-october2017 b/changes/geoip-october2017
deleted file mode 100644
index 11f623e85..000000000
--- a/changes/geoip-october2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-september2017 b/changes/geoip-september2017
deleted file mode 100644
index be01ff952..000000000
--- a/changes/geoip-september2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the September 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/longclaw-ipv6 b/changes/longclaw-ipv6
deleted file mode 100644
index 75899c9d0..000000000
--- a/changes/longclaw-ipv6
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (directory authorities):
- - Remove longclaw's IPv6 address, as it will soon change.
- Authority IPv6 addresses were originally added in 0.2.8.1-alpha.
- This leaves 3/8 directory authorities with IPv6 addresses, but there
- are also 52 fallback directory mirrors with IPv6 addresses.
- Resolves 19760.
diff --git a/changes/longclaw_23592 b/changes/longclaw_23592
deleted file mode 100644
index 91e2da897..000000000
--- a/changes/longclaw_23592
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
- - The directory authority "Longclaw" has changed its IP address.
- Closes ticket 23592.
diff --git a/changes/more_module_docs b/changes/more_module_docs
deleted file mode 100644
index 0066ddfcf..000000000
--- a/changes/more_module_docs
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Module-level documentation for several more modules. Closes tickets
- 19287 and
- 19290.
diff --git a/changes/prop275-minimal b/changes/prop275-minimal
deleted file mode 100644
index 83d42f850..000000000
--- a/changes/prop275-minimal
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor features (future-proofing):
-
- - Tor no longer refuses to download microdescriptors or descriptors if
- they are listed as "published in the future". This change will
- eventually allow us to stop listing meaningful "published" dates
- in microdescriptor consensuses, and thereby allow us to reduce the
- resources required to download consensus diffs by over 50%.
- Implements part of ticket 21642; implements part of proposal 275.
-
diff --git a/changes/task26771 b/changes/task26771
deleted file mode 100644
index fd700900f..000000000
--- a/changes/task26771
+++ /dev/null
@@ -1,4 +0,0 @@
- o Directory authority changes:
- - The "Bifroest" bridge authority has been retired; the new bridge
- authority is "Serge", and it is operated by George from the
- TorBSD project. Closes ticket 26771.
diff --git a/changes/ticket19769 b/changes/ticket19769
deleted file mode 100644
index 9fc05c3e9..000000000
--- a/changes/ticket19769
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major features (security):
- - Change the algorithm used to decide DNS TTLs on client and server side,
- to better resist DNS-based correlation attacks like the DefecTor attack
- of Greschbach, Pulls, Roberts, Winter, and Feamster). Now
- relays only return one of two possible DNS TTL values, and clients
- are willing to believe DNS TTL values up to 3 hours long.
- Closes ticket 19769.
diff --git a/changes/ticket20170-v3 b/changes/ticket20170-v3
deleted file mode 100644
index d634e7205..000000000
--- a/changes/ticket20170-v3
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features (fallback directory list):
- - Replace the 81 remaining fallbacks of the 100 originally introduced
- in Tor 0.2.8.3-alpha in March 2016, with a list of 177 fallbacks
- (123 new, 54 existing, 27 removed) generated in December 2016.
- Resolves ticket 20170.
diff --git a/changes/ticket21564 b/changes/ticket21564
deleted file mode 100644
index 7e01f41f8..000000000
--- a/changes/ticket21564
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (fallback directory list):
- - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in
- December 2016 (of which ~126 were still functional), with a list of
- 151 fallbacks (32 new, 119 existing, 58 removed) generated in
- May 2017.
- Resolves ticket 21564.
diff --git a/changes/ticket21953 b/changes/ticket21953
deleted file mode 100644
index 7cc84f506..000000000
--- a/changes/ticket21953
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features:
- - Enable a couple of pieces of Windows hardening: one
- (HeapEnableTerminationOnCorruption) that has been on-by-default since
- Windows 8, and unavailable before Windows 7, and one
- (PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION) which we believe doesn't
- affect us, but shouldn't do any harm. Closes ticket 21953.
diff --git a/changes/ticket22895 b/changes/ticket22895
deleted file mode 100644
index a3f7b8601..000000000
--- a/changes/ticket22895
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix unused variable warnings in donna's Curve25519 SSE2 code.
- Fixes bug 22895; bugfix on 0.2.7.2-alpha.
diff --git a/changes/ticket23856 b/changes/ticket23856
deleted file mode 100644
index 049da18d0..000000000
--- a/changes/ticket23856
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor feature (relay statistics):
- - Change relay bandwidth reporting stats interval from 4 hours to 24 hours
- in order to reduce the efficiency of guard discovery attacks. Fixes
- ticket 23856.
diff --git a/changes/ticket23910 b/changes/ticket23910
deleted file mode 100644
index eb38fcf32..000000000
--- a/changes/ticket23910
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
- - Add bastet as a ninth directory authority to the default list. Closes
- ticket 23910.
diff --git a/changes/ticket24315 b/changes/ticket24315
deleted file mode 100644
index df34dbf41..000000000
--- a/changes/ticket24315
+++ /dev/null
@@ -1,3 +0,0 @@
- o Major features (linux seccomp2 sandbox):
- - Update the sandbox rules so that they should now work correctly with
- Glibc 2.26. Closes ticket 24315.
diff --git a/changes/ticket24629 b/changes/ticket24629
deleted file mode 100644
index 482c0a1a6..000000000
--- a/changes/ticket24629
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Enable macOS builds in our Travis CI configuration.
- Closes ticket 24629.
diff --git a/changes/ticket24681 b/changes/ticket24681
deleted file mode 100644
index cc0a42b2e..000000000
--- a/changes/ticket24681
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (fallback directory mirrors):
- - Make the default DirAuthorityFallbackRate 0.1, so that clients on the
- public tor network prefer to bootstrap off fallback directory mirrors.
- This is a follow-up to 24679, which removed weights from the default
- fallbacks.
- Implements ticket 24681.
diff --git a/changes/ticket24902 b/changes/ticket24902
deleted file mode 100644
index 1a2ef95cc..000000000
--- a/changes/ticket24902
+++ /dev/null
@@ -1,13 +0,0 @@
- o Major features (denial of service mitigation):
- - Give relays some defenses against the recent network overload. We start
- with three defenses (default parameters in parentheses). First: if a
- single client address makes too many concurrent connections (>100), hang
- up on further connections. Second: if a single client address makes
- circuits too quickly (more than 3 per second, with an allowed burst of
- 90) while also having too many connections open (3), refuse new create
- cells for the next while (1-2 hours). Third: if a client asks to
- establish a rendezvous point to you directly, ignore the request. These
- defenses can be manually controlled by new torrc options, but relays
- will also take guidance from consensus parameters, so there's no need to
- configure anything manually. Implements ticket 24902.
-
diff --git a/changes/ticket25122 b/changes/ticket25122
deleted file mode 100644
index 2921811b2..000000000
--- a/changes/ticket25122
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor feature (geoip cache):
- - Make our OOM handler aware of the geoip client history cache so it
- doesn't fill up the memory which is especially important for IPv6 and
- our DoS mitigation subsystem. Closes ticket 25122.
diff --git a/changes/ticket25170 b/changes/ticket25170
deleted file mode 100644
index 065213940..000000000
--- a/changes/ticket25170
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfix (directory authority, documentation):
- - When a fingerprint or network address is marked as rejected, the
- returned message by the authority now explicitly mention to set a valid
- ContactInfo address and contact the bad-relays@ mailing list. Fixes bug
- 25170; bugfix on 0.2.9.1.
diff --git a/changes/ticket25202 b/changes/ticket25202
deleted file mode 100644
index ba64abad7..000000000
--- a/changes/ticket25202
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Add extra safety checks when refilling the circuit creation bucket to
- ensure we never set a value that is above the allowed burst. Fixes
- bug 25202; bugfix on 0.3.3.2-alpha.
diff --git a/changes/ticket26062 b/changes/ticket26062
deleted file mode 100644
index 1ee49d860..000000000
--- a/changes/ticket26062
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (client):
- - Don't consider Tor running as a client if the ControlPort is open. Fixes
- bug 26062; bugfix on 0.2.9.4-alpha.
diff --git a/changes/ticket26343 b/changes/ticket26343
deleted file mode 100644
index ab5f332ee..000000000
--- a/changes/ticket26343
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (directory authority):
- - Add an IPv6 address for the "dannenberg" directory
- authority. Closes ticket 26343.
diff --git a/changes/ticket26467 b/changes/ticket26467
deleted file mode 100644
index 45883786c..000000000
--- a/changes/ticket26467
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory, correctness):
- - Fix a number of small memory leaks identified by coverity. Fixes
- bug 26467; bugfix on numerous Tor versions.
diff --git a/changes/ticket26560 b/changes/ticket26560
deleted file mode 100644
index 5b4fb1bfe..000000000
--- a/changes/ticket26560
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Install libcap-dev and libseccomp2-dev so these optional
- dependencies get tested on Travis CI. Closes ticket 26560.
diff --git a/changes/ticket26952-ccache b/changes/ticket26952-ccache
deleted file mode 100644
index edc115e9d..000000000
--- a/changes/ticket26952-ccache
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Use ccache in our Travis CI configuration.
- Closes ticket 26952.
diff --git a/changes/ticket27087 b/changes/ticket27087
deleted file mode 100644
index b8af70aaa..000000000
--- a/changes/ticket27087
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Run asciidoc during Travis CI.
- Implements ticket 27087.
diff --git a/changes/ticket_24801 b/changes/ticket_24801
deleted file mode 100644
index f5f6c831a..000000000
--- a/changes/ticket_24801
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features (new fallback directories):
- - The fallback directory list has been re-generated based on the
- current status of the network. Tor uses fallback directories to
- bootstrap it doesn't yet have up-to-date directory
- information. Closes ticket 24801.
diff --git a/changes/travis_distcheck b/changes/travis_distcheck
deleted file mode 100644
index 0f278fe7e..000000000
--- a/changes/travis_distcheck
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (continuous integration):
- - Our .travis.yml configuration now includes support for testing
- the results of "make distcheck". (It's not uncommon for "make check" to
- pass but "make distcheck" to fail.) Closes ticket 25814.
diff --git a/changes/trove-2017-001 b/changes/trove-2017-001
deleted file mode 100644
index 5187e6d5f..000000000
--- a/changes/trove-2017-001
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (security):
- - Downgrade the "-ftrapv" option from "always on" to "only on when
- --enable-expensive-hardening is provided." This hardening option, like
- others, can turn survivable bugs into crashes--and having it on by
- default made a (relatively harmless) integer overflow bug into a
- denial-of-service bug. Fixes bug 21278 (TROVE-2017-001); bugfix on
- 0.2.9.1-alpha.
-
diff --git a/changes/trove-2017-001.2 b/changes/trove-2017-001.2
deleted file mode 100644
index 3ef073cf9..000000000
--- a/changes/trove-2017-001.2
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (parsing):
- - Fix an integer underflow bug when comparing malformed Tor versions.
- This bug is harmless, except when Tor has been built with
- --enable-expensive-hardening, which would turn it into a crash;
- or on Tor 0.2.9.1-alpha through Tor 0.2.9.8, which were built with
- -ftrapv by default.
- Part of TROVE-2017-001. Fixes bug 21278; bugfix on
- 0.0.8pre1. Found by OSS-Fuzz.
diff --git a/changes/trove-2017-005 b/changes/trove-2017-005
deleted file mode 100644
index cebb013f8..000000000
--- a/changes/trove-2017-005
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (hidden service, relay, security):
- - Fix an assertion failure caused by receiving a BEGIN_DIR cell on
- a hidden service rendezvous circuit. Fixes bug 22494, tracked as
- TROVE-2017-005 and CVE-2017-0376; bugfix on 0.2.2.1-alpha. Found
- by armadev.
-
-
diff --git a/changes/trove-2017-008 b/changes/trove-2017-008
deleted file mode 100644
index 4b9c5b0a1..000000000
--- a/changes/trove-2017-008
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (security, hidden services, loggging):
- - Fix a bug where we could log uninitialized stack when a certain
- hidden service error occurred while SafeLogging was disabled.
- Fixes bug #23490; bugfix on 0.2.7.2-alpha.
- This is also tracked as TROVE-2017-008 and CVE-2017-0380.
diff --git a/changes/trove-2017-009 b/changes/trove-2017-009
deleted file mode 100644
index 166a5faec..000000000
--- a/changes/trove-2017-009
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes (security):
- - When checking for replays in the INTRODUCE1 cell data for a (legacy)
- hiddden service, correctly detect replays in the RSA-encrypted part of
- the cell. We were previously checking for replays on the entire cell,
- but those can be circumvented due to the malleability of Tor's legacy
- hybrid encryption. This fix helps prevent a traffic confirmation
- attack. Fixes bug 24244; bugfix on 0.2.4.1-alpha. This issue is also
- tracked as TROVE-2017-009 and CVE-2017-8819.
-
-
diff --git a/changes/trove-2017-010 b/changes/trove-2017-010
deleted file mode 100644
index d5bf9333d..000000000
--- a/changes/trove-2017-010
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (security):
- - Fix a denial-of-service issue where an attacker could crash
- a directory authority using a malformed router descriptor.
- Fixes bug 24245; bugfix on 0.2.9.4-alpha. Also tracked
- as TROVE-2017-010 and CVE-2017-8820.
-
diff --git a/changes/trove-2017-011 b/changes/trove-2017-011
deleted file mode 100644
index 82d20d9e7..000000000
--- a/changes/trove-2017-011
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (security):
- - Fix a denial of service bug where an attacker could use a malformed
- directory object to cause a Tor instance to pause while OpenSSL would
- try to read a passphrase from the terminal. (If the terminal was not
- available, tor would continue running.) Fixes bug 24246; bugfix on
- every version of Tor. Also tracked as TROVE-2017-011 and
- CVE-2017-8821. Found by OSS-Fuzz as testcase 6360145429790720.
-
diff --git a/changes/trove-2017-012-part1 b/changes/trove-2017-012-part1
deleted file mode 100644
index 9fccc2cf6..000000000
--- a/changes/trove-2017-012-part1
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (security, relay):
- - When running as a relay, make sure that we never build a path through
- ourselves, even in the case where we have somehow lost the version of
- our descriptor appearing in the consensus. Fixes part of bug 21534;
- bugfix on 0.2.0.1-alpha. This issue is also tracked as TROVE-2017-012
- and CVE-2017-8822.
diff --git a/changes/trove-2018-001.1 b/changes/trove-2018-001.1
deleted file mode 100644
index f0ee92f40..000000000
--- a/changes/trove-2018-001.1
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (denial-of-service, directory authority):
- - Fix a protocol-list handling bug that could be used to remotely crash
- directory authorities with a null-pointer exception. Fixes bug 25074;
- bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001.
-
-
diff --git a/changes/trove-2018-004 b/changes/trove-2018-004
deleted file mode 100644
index 37e0a89b0..000000000
--- a/changes/trove-2018-004
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (denial-of-service):
- - Fix a possible crash on malformed consensus. If a consensus had
- contained an unparseable protocol line, it could have made clients
- and relays crash with a null-pointer exception. To exploit this
- issue, however, an attacker would need to be able to subvert the
- directory-authority system. Fixes bug 25251; bugfix on
- 0.2.9.4-alpha. Also tracked as TROVE-2018-004.
-
[View Less]
1
0

[tor/maint-0.3.3] maint-0.2.9: remove changes files that are merged in 0.2.9 releases
by nickm@torproject.org 23 Jan '19
by nickm@torproject.org 23 Jan '19
23 Jan '19
commit dd6c2b0ad77b5bfbf7f06b1d73f8ab85d81154bf
Author: Nick Mathewson <nickm(a)torproject.org>
Date: Wed Jan 23 09:48:28 2019 -0500
maint-0.2.9: remove changes files that are merged in 0.2.9 releases
Many of these files cause check-changes to fail, which will be a
long-term problem as we continue to support 0.2.9.
---
changes/19974 | 5 -----
changes/20460 | 4 ----
changes/20492 | 4 ----
changes/21359 | …
[View More] 8 --------
changes/bastet_v6 | 4 ----
changes/bug15582 | 4 ----
changes/bug18100 | 5 -----
changes/bug18329-minimal | 6 ------
changes/bug19025 | 4 ----
changes/bug19869 | 4 ----
changes/bug19926_029_info | 3 ---
changes/bug19960 | 4 ----
changes/bug19968 | 11 -----------
changes/bug19969 | 10 ----------
changes/bug20059 | 3 ---
changes/bug20085 | 4 ----
changes/bug20235 | 4 ----
changes/bug20247 | 4 ----
changes/bug20306_029 | 4 ----
changes/bug20307 | 7 -------
changes/bug20401 | 4 ----
changes/bug20423 | 6 ------
changes/bug20424_029_minimal | 4 ----
changes/bug20472 | 5 -----
changes/bug20484 | 5 -----
changes/bug20487 | 4 ----
changes/bug20509 | 5 -----
changes/bug20529 | 4 ----
changes/bug20533 | 7 -------
changes/bug20534 | 8 --------
changes/bug20536 | 6 ------
changes/bug20551 | 3 ---
changes/bug20553 | 3 ---
changes/bug20560 | 4 ----
changes/bug20587 | 5 -----
changes/bug20588 | 3 ---
changes/bug20591 | 3 ---
changes/bug20593 | 6 ------
changes/bug20597 | 5 -----
changes/bug20613 | 6 ------
changes/bug20634 | 3 ---
changes/bug20638 | 5 -----
changes/bug20710_025 | 4 ----
changes/bug20715 | 4 ----
changes/bug20716 | 3 ---
changes/bug20810 | 4 ----
changes/bug20864 | 4 ----
changes/bug20875 | 4 ----
changes/bug20935 | 3 ---
changes/bug21018 | 11 -----------
changes/bug21035 | 6 ------
changes/bug21051 | 3 ---
changes/bug21074_downgrade | 4 ----
changes/bug21108_029 | 6 ------
changes/bug21278_extras | 3 ---
changes/bug21278_prevention | 4 ----
changes/bug21280 | 5 -----
changes/bug21357 | 7 -------
changes/bug21394 | 9 ---------
changes/bug21450 | 4 ----
changes/bug21507 | 5 -----
changes/bug21576 | 4 ----
changes/bug21943 | 6 ------
changes/bug22034 | 4 ----
changes/bug22245 | 5 -----
changes/bug22349 | 9 ---------
changes/bug22370 | 4 ----
changes/bug22446 | 4 ----
changes/bug22460_case2 | 8 --------
changes/bug22490 | 3 ---
changes/bug22516 | 5 -----
changes/bug22636 | 8 --------
changes/bug22644 | 5 -----
changes/bug22737 | 12 ------------
changes/bug22789 | 7 -------
changes/bug22797 | 4 ----
changes/bug22801 | 5 -----
changes/bug22838_028 | 5 -----
changes/bug22915 | 3 ---
changes/bug22916_027 | 3 ---
changes/bug23030_029 | 7 -------
changes/bug23081 | 8 --------
changes/bug23291 | 3 ---
changes/bug23318 | 11 -----------
changes/bug23470 | 6 ------
changes/bug23690 | 5 -----
changes/bug23693 | 6 ------
changes/bug23874 | 3 ---
changes/bug23985 | 9 ---------
changes/bug24167 | 7 -------
changes/bug24170 | 3 ---
changes/bug24198 | 4 ----
changes/bug24313 | 5 -----
changes/bug24480 | 3 ---
changes/bug24633 | 5 -----
changes/bug24666 | 7 -------
changes/bug24736 | 6 ------
changes/bug24854 | 3 ---
changes/bug24895 | 8 --------
changes/bug24898-029 | 6 ------
changes/bug24952 | 5 -----
changes/bug24969 | 3 ---
changes/bug24978 | 7 -------
changes/bug25223 | 4 ----
changes/bug25249 | 3 ---
changes/bug25249.2 | 3 ---
changes/bug25440 | 5 -----
changes/bug25629 | 3 ---
changes/bug26007 | 5 -----
changes/bug26072 | 5 -----
changes/bug26116 | 7 -------
changes/bug26196 | 4 ----
changes/bug26269 | 5 -----
changes/bug26485 | 4 ----
changes/bug26535.029 | 5 -----
changes/bug26787 | 3 ---
changes/bug26830 | 3 ---
changes/bug26924 | 4 ----
changes/bug27081 | 4 ----
changes/bug27088 | 5 -----
changes/bug27185 | 3 ---
changes/bug27226 | 5 -----
changes/bug27295 | 3 ---
changes/bug27344 | 4 ----
changes/bug27418 | 3 ---
changes/bug27453 | 3 ---
changes/bug27461 | 5 -----
changes/bug27463 | 3 ---
changes/bug27465 | 5 -----
changes/bug8185_025 | 6 ------
changes/coveralls | 3 ---
changes/feature25313 | 4 ----
changes/feature26372_029 | 4 ----
changes/geoip-2017-11-06 | 4 ----
changes/geoip-2017-12-06 | 4 ----
changes/geoip-2018-01-05 | 4 ----
changes/geoip-2018-02-07 | 4 ----
changes/geoip-2018-03-08 | 4 ----
changes/geoip-2018-04-03 | 4 ----
changes/geoip-2018-05-01 | 4 ----
changes/geoip-2018-06-07 | 4 ----
changes/geoip-2018-07-03 | 4 ----
changes/geoip-2018-08-07 | 4 ----
changes/geoip-april2017 | 4 ----
changes/geoip-august2017 | 4 ----
changes/geoip-december2016 | 4 ----
changes/geoip-february2017 | 4 ----
changes/geoip-january2017 | 4 ----
changes/geoip-july2017 | 4 ----
changes/geoip-june2017 | 4 ----
changes/geoip-march2017 | 4 ----
changes/geoip-may2017 | 4 ----
changes/geoip-november2016 | 4 ----
changes/geoip-october2017 | 4 ----
changes/geoip-september2017 | 4 ----
changes/longclaw-ipv6 | 6 ------
changes/longclaw_23592 | 3 ---
changes/more_module_docs | 4 ----
changes/prop275-minimal | 9 ---------
changes/task26771 | 4 ----
changes/ticket19769 | 7 -------
changes/ticket20170-v3 | 5 -----
changes/ticket21564 | 6 ------
changes/ticket21953 | 6 ------
changes/ticket22895 | 3 ---
changes/ticket23856 | 4 ----
changes/ticket23910 | 3 ---
changes/ticket24315 | 3 ---
changes/ticket24629 | 3 ---
changes/ticket24681 | 6 ------
changes/ticket24902 | 13 -------------
changes/ticket25122 | 4 ----
changes/ticket25170 | 5 -----
changes/ticket25202 | 4 ----
changes/ticket26062 | 3 ---
changes/ticket26343 | 3 ---
changes/ticket26467 | 3 ---
changes/ticket26560 | 3 ---
changes/ticket26952-ccache | 3 ---
changes/ticket27087 | 3 ---
changes/ticket_24801 | 5 -----
changes/travis_distcheck | 4 ----
changes/trove-2017-001 | 8 --------
changes/trove-2017-001.2 | 8 --------
changes/trove-2017-005 | 7 -------
changes/trove-2017-008 | 5 -----
changes/trove-2017-009 | 10 ----------
changes/trove-2017-010 | 6 ------
changes/trove-2017-011 | 8 --------
changes/trove-2017-012-part1 | 6 ------
changes/trove-2018-001.1 | 6 ------
changes/trove-2018-004 | 8 --------
192 files changed, 941 deletions(-)
diff --git a/changes/19974 b/changes/19974
deleted file mode 100644
index 5496143dd..000000000
--- a/changes/19974
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (unit tests):
- - Fix tolerances in unit tests for monotonic time comparisons between
- nanoseconds and microseconds. Previously, we accepted a 10 us
- difference only, which is not realistic on every platform's
- clock_gettime(). Fixes bug 19974; bugfix on 0.2.9.1-alpha.
diff --git a/changes/20460 b/changes/20460
deleted file mode 100644
index 9fbb4a798..000000000
--- a/changes/20460
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (testing):
- - Use ECDHE ciphers instead of ECDH in tortls tests. LibreSSL has
- removed the ECDH ciphers which caused the tests to fail on
- platforms which use it. Fixes bug 20460; bugfix on 0.2.8.1-alpha.
diff --git a/changes/20492 b/changes/20492
deleted file mode 100644
index fdcd4d0b4..000000000
--- a/changes/20492
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfix (build):
- - The current Git revision when building from a local repository is now
- detected correctly when using git worktrees. Fixes bug 20492; bugfix on
- 0.2.3.9-alpha.
diff --git a/changes/21359 b/changes/21359
deleted file mode 100644
index cc9b377d5..000000000
--- a/changes/21359
+++ /dev/null
@@ -1,8 +0,0 @@
-
- o Minor features (portability, compilationc)
- - Support building with recent LibreSSL code that uses opaque
- structures. Closes ticket 21359.
- - Autoconf now check to determine if OpenSSL
- structures are opaque, instead of explicitly checking for
- OpenSSL version numbers.
- Part of ticket 21359.
diff --git a/changes/bastet_v6 b/changes/bastet_v6
deleted file mode 100644
index ee4e2c809..000000000
--- a/changes/bastet_v6
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (directory authority):
- - Add an IPv6 address for the "bastet" directory authority.
- Closes ticket 24394.
-
diff --git a/changes/bug15582 b/changes/bug15582
deleted file mode 100644
index 5ea6431cf..000000000
--- a/changes/bug15582
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation):
- - Avoid compiler warnings in the unit tests for running tor_sscanf()
- with wide string outputs. Fixes bug 15582; bugfix on 0.2.6.2-alpha.
-
diff --git a/changes/bug18100 b/changes/bug18100
deleted file mode 100644
index cd3ba2c97..000000000
--- a/changes/bug18100
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (linux TPROXY support):
- - Fix a typo that had prevented TPROXY-based transparent proxying from
- working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha.
- Patch from "d4fq0fQAgoJ".
-
diff --git a/changes/bug18329-minimal b/changes/bug18329-minimal
deleted file mode 100644
index 804c4e8dd..000000000
--- a/changes/bug18329-minimal
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (bridge):
- - Bridges now include notice in their descriptors that they are bridges,
- and notice of their distribution status, based on their publication
- settings. Implements ticket 18329. For more fine-grained control of
- how a bridge is distributed, upgrade to 0.3.2.x or later.
-
diff --git a/changes/bug19025 b/changes/bug19025
deleted file mode 100644
index 0f365f52b..000000000
--- a/changes/bug19025
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (DNS):
- - Fix a bug that prevented exit nodes from caching DNS records for more
- than 60 seconds.
- Fixes bug 19025; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug19869 b/changes/bug19869
deleted file mode 100644
index 430048f16..000000000
--- a/changes/bug19869
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DNSPort):
- - On DNSPort, stop logging a BUG warning on a failed hostname lookup.
- Fixes bug 19869; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug19926_029_info b/changes/bug19926_029_info
deleted file mode 100644
index 93fd81b6c..000000000
--- a/changes/bug19926_029_info
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (logging):
- - Downgrade a harmless log message about the pending_entry_connections
- list from "warn" to "info". Mitigates bug 19926.
diff --git a/changes/bug19960 b/changes/bug19960
deleted file mode 100644
index 5d655859a..000000000
--- a/changes/bug19960
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (netbsd, unit tests):
- - Stop expecting NetBSD unit tests to report success for ipfw;
- on NetBSD, it's only pf that's supported.
- Part of a fix for bug 19960; bugfix on 0.2.9.5-alpha.
diff --git a/changes/bug19968 b/changes/bug19968
deleted file mode 100644
index b285706e7..000000000
--- a/changes/bug19968
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes (relay):
- - Do not try to parallelize workers more than 16x without the
- user explicitly configuring us to do so, even if we do detect more than
- 16 CPU cores. Fixes bug 19968; bugfix on
- 0.2.3.1-alpha.
-
-
- o Minor bugfixes (testing):
- - Avoid a unit test failure on systems with over 16 detectable
- CPU cores. Fixes bug 19968; bugfix on
- 0.2.3.1-alpha.
diff --git a/changes/bug19969 b/changes/bug19969
deleted file mode 100644
index c760c6de0..000000000
--- a/changes/bug19969
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes (client performance):
- - Clients now respond to new application stream requests when
- they arrive, rather than waiting up to one second before starting
- to handle them. Fixes part of bug 19969; bugfix on 0.2.8.1-alpha.
-
- o Major bugfixes (clients on flaky network connections):
- - When Tor leaves standby because of a new application request, open
- circuits as needed to serve that request. Previously, we would
- potentially wait a very long time. Fixes part of bug 19969; bugfix
- on 0.2.8.1-alpha.
diff --git a/changes/bug20059 b/changes/bug20059
deleted file mode 100644
index 091fab06d..000000000
--- a/changes/bug20059
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (relay):
- - Avoid a double-marked-circuit warning that can happen when we receive
- DESTROY cells under heavy load. Fixes bug 20059; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug20085 b/changes/bug20085
deleted file mode 100644
index fd10e7eee..000000000
--- a/changes/bug20085
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Correct the minimum bandwidth value in torrc.sample, and queue a
- corresponding change for torrc.minimal. Closes ticket 20085.
-
diff --git a/changes/bug20235 b/changes/bug20235
deleted file mode 100644
index 54026a894..000000000
--- a/changes/bug20235
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compatibility):
- - Work around a bug in the OSX 10.12 SDK that would prevent us
- from successfully targetting earlier versions of OSX.
- Resolves ticket 20235.
diff --git a/changes/bug20247 b/changes/bug20247
deleted file mode 100644
index 731cf0046..000000000
--- a/changes/bug20247
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Avoid a sandbox failure when trying to re-bind to a socket and mark
- it as IPv6-only. Fixes bug 20247; bugfix on 0.2.5.1-alpha.
-
diff --git a/changes/bug20306_029 b/changes/bug20306_029
deleted file mode 100644
index ada2676b2..000000000
--- a/changes/bug20306_029
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (fascistfirewall):
- - Avoid spurious warnings when ReachableAddresses or FascistFirewall
- is set. Fixes bug 20306; bugfix on 0.2.8.2-alpha.
-
diff --git a/changes/bug20307 b/changes/bug20307
deleted file mode 100644
index 9112c9c78..000000000
--- a/changes/bug20307
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (circuit, hidden service)
- - When closing a circuit, the reason for doing so was assigned from an int
- value to a uint16_t which is quite a problem for negative values that are
- our internal reasons (ex: END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS
- side, this was causing introduction points to be flagged as unusable
- because the reason wasn't the right one due to the bad conversion.
- Partially fixes bug 21056 and fixes bug 20307; Bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20401 b/changes/bug20401
deleted file mode 100644
index 85ab3c732..000000000
--- a/changes/bug20401
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (relay):
- - Avoid a small memory leak when informing worker threads about rotated
- onion keys. Fixes bug 20401; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug20423 b/changes/bug20423
deleted file mode 100644
index 32bdc3f08..000000000
--- a/changes/bug20423
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes:
- - For relays that don't know their own address, avoid attempting
- a local hostname resolve for each descriptor we download. Also cut
- down on the number of "Success: chose address 'x.x.x.x'" log lines.
- Fixes bugs 20423 and 20610; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20424_029_minimal b/changes/bug20424_029_minimal
deleted file mode 100644
index eb7886233..000000000
--- a/changes/bug20424_029_minimal
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation):
- - When compiling with --enable-openbsd-malloc or --enable-tcmalloc, tell
- the compiler not to include the system malloc implementation. Fixes bug
- 20424; bugfix on 0.2.0.20-rc.
diff --git a/changes/bug20472 b/changes/bug20472
deleted file mode 100644
index 4d90c39f5..000000000
--- a/changes/bug20472
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (circuits):
- - Remove a BUG warning in circuit_pick_extend_handshake. Instead, assume
- all nodes support EXTEND2. Use ntor whenever a key is available.
- Fixes bug 20472; bugfix on 0.2.9.3-alpha.
-
diff --git a/changes/bug20484 b/changes/bug20484
deleted file mode 100644
index 9a0b95cb3..000000000
--- a/changes/bug20484
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (single onion services):
- - Start correctly when creating a single onion service in a
- directory that did not previously exist. Fixes bug 20484; bugfix on
- 0.2.9.3-alpha.
-
diff --git a/changes/bug20487 b/changes/bug20487
deleted file mode 100644
index 4435f14a9..000000000
--- a/changes/bug20487
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Clarify that setting HiddenServiceNonAnonymousMode requires
- you to also set "SOCKSPort 0". Fixes bug 20487; bugfix on
- 0.2.9.3-alpha.
diff --git a/changes/bug20509 b/changes/bug20509
deleted file mode 100644
index a39ca9f60..000000000
--- a/changes/bug20509
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features:
- - Directory authorities now reject relays running versions
- 0.2.9.1-alpha through 0.2.9.4-alpha, because those relays
- suffer from bug 20499 and don't keep their consensus cache
- up-to-date. Resolves ticket 20509.
diff --git a/changes/bug20529 b/changes/bug20529
deleted file mode 100644
index 276be5b2b..000000000
--- a/changes/bug20529
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (hidden services):
- - When configuring hidden services, check every hidden service directory's
- permissions. Previously, we only checked the last hidden service.
- Fixes bug 20529; bugfix on 13942 commit 85bfad1 in 0.2.6.2-alpha.
diff --git a/changes/bug20533 b/changes/bug20533
deleted file mode 100644
index 7d1a45632..000000000
--- a/changes/bug20533
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (consensus downloads):
- - If a consensus expires while we are waiting for certificates to download,
- stop waiting for certificates.
- - If we stop waiting for certificates less than a minute after we started
- downloading them, do not consider the certificate download failure a
- separate failure.
- Fixes bug 20533; bugfix on commit e0204f21 in 0.2.0.9-alpha.
diff --git a/changes/bug20534 b/changes/bug20534
deleted file mode 100644
index 49db433a0..000000000
--- a/changes/bug20534
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (directory download scheduling):
- - Remove the maximum delay on exponential-backoff scheduling.
- Since we now allow an infinite number of failures (see ticket
- 20536), we must now allow the time to grow longer on each failure.
- Fixes part of bug 20534; bugfix on 0.2.9.1-alpha.
- - Use initial delays and decrements in download scheduling closer to
- those from 0.2.8. Fixes another part of bug 20534; bugfix on
- 0.2.9.1-alpha.
diff --git a/changes/bug20536 b/changes/bug20536
deleted file mode 100644
index 9e0dd164b..000000000
--- a/changes/bug20536
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (download scheduling):
- - When using an exponential backoff schedule, do not give up on
- dowloading just because we have failed a bunch of times. Since
- each delay is longer than the last, retrying indefinitely won't
- hurt. Fixes bug 20536; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug20551 b/changes/bug20551
deleted file mode 100644
index b7ec4ca7c..000000000
--- a/changes/bug20551
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix implicit conversion warnings under OpenSSL 1.1.
- Fixes bug 20551; bugfix on 0.2.1.1-alpha.
diff --git a/changes/bug20553 b/changes/bug20553
deleted file mode 100644
index 12a278030..000000000
--- a/changes/bug20553
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory leak):
- - Work around a memory leak in OpenSSL 1.1 when encoding public keys.
- Fixes bug 20553; bugfix on 0.0.2pre8.
diff --git a/changes/bug20560 b/changes/bug20560
deleted file mode 100644
index 43d605b29..000000000
--- a/changes/bug20560
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (portability):
- - Run correctly when built on Windows build environments that require
- _vcsprintf(). Fixes bug 20560; bugfix on 0.2.2.11-alpha.
-
diff --git a/changes/bug20587 b/changes/bug20587
deleted file mode 100644
index 341b00136..000000000
--- a/changes/bug20587
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (download timing):
- - When determining when to download a directory object, handle times
- after 2038 if the operating system supports that. (Someday this will be
- important!) Fixes bug 20587; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20588 b/changes/bug20588
deleted file mode 100644
index 832ef8133..000000000
--- a/changes/bug20588
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (portability):
- - Fix compilation with OpenSSL 1.1 and less commonly-used
- CPU architectures. Closes ticket 20588.
diff --git a/changes/bug20591 b/changes/bug20591
deleted file mode 100644
index deaa738f5..000000000
--- a/changes/bug20591
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (relay bootstrap):
- - Ensure relays don't make multiple connections during bootstrap.
- Fixes bug 20591; bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20593 b/changes/bug20593
deleted file mode 100644
index e9f54d317..000000000
--- a/changes/bug20593
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (client directory scheduling):
- - Treat "relay too busy to answer request" as a failed request and a
- reason to back off on our retry frequency. This is safe now that
- exponential backups retry indefinitely, and avoids a bug where we would
- reset our download schedule erroneously.
- Fixes bug 20593; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug20597 b/changes/bug20597
deleted file mode 100644
index f199b6393..000000000
--- a/changes/bug20597
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (test networks, exponential backoff):
- - When using exponential backoff in test networks, use a lower exponent,
- so the delays do not vary as much. This helps test networks bootstrap
- consistently. Fixes bug 20597; bugfix on 20499; not in any released
- version of tor.
diff --git a/changes/bug20613 b/changes/bug20613
deleted file mode 100644
index 19bb61f4e..000000000
--- a/changes/bug20613
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (single onion services, Tor2web):
- - Stop logging long-term one-hop circuits deliberately created by single
- onion services and Tor2web. These log messages are intended to diagnose
- issue 8387, which relates to circuits hanging around forever for no
- reason.
- Fixes bug 20613; bugfix on 0.2.9.1-alpha. Reported by "pastly".
diff --git a/changes/bug20634 b/changes/bug20634
deleted file mode 100644
index 62fc9f478..000000000
--- a/changes/bug20634
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (unit tests):
- - Stop spurious failures in the local interface address discovery unit
- tests. Fixes bug 20634; bugfix on 0.2.8.1-alpha; patch by Neel Chauhan.
diff --git a/changes/bug20638 b/changes/bug20638
deleted file mode 100644
index 260d7d0a7..000000000
--- a/changes/bug20638
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (hidden services):
- - Stop ignoring hidden service key anonymity when first starting tor.
- Instead, refuse to start tor if any hidden service key has been used in
- a different hidden service anonymity mode.
- Fixes bug 20638; bugfix on 17178 in 0.2.9.3-alpha; reported by ahf.
diff --git a/changes/bug20710_025 b/changes/bug20710_025
deleted file mode 100644
index 12bd07536..000000000
--- a/changes/bug20710_025
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory leak, use-after-free, linux seccomp2 sandbox):
- - Fix a memory leak and use-after-free error when removing entries
- from the sandbox's getaddrinfo() cache. Fixes bug 20710; bugfix on
- 0.2.5.5-alpha. Patch from "cypherpunks".
diff --git a/changes/bug20715 b/changes/bug20715
deleted file mode 100644
index 737a560ce..000000000
--- a/changes/bug20715
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory leak)
- - When moving a signed descriptor object from a source to an existing
- destination, free the allocated memory inside that destination object.
- Bugfix on tor-0.2.8.3-alpha; Closes #20715.
diff --git a/changes/bug20716 b/changes/bug20716
deleted file mode 100644
index 37fd6feec..000000000
--- a/changes/bug20716
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (client, memory leak):
- - Fix a small memory leak when receiving AF_UNIX connections on
- a SocksPort. Fixes bug 20716; bugfix on 0.2.6.3-alpha.
diff --git a/changes/bug20810 b/changes/bug20810
deleted file mode 100644
index 5420a7317..000000000
--- a/changes/bug20810
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (relay)
- - When computing old Tor protocol line version in protover, we were
- looking at 0.2.7.5 twice instead of a specific case for 0.2.9.1-alpha.
- Bugfix on tor-0.2.9.4-alpha.
diff --git a/changes/bug20864 b/changes/bug20864
deleted file mode 100644
index 7b8c70fad..000000000
--- a/changes/bug20864
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (unit tests, hidden services):
- - Remove a double-free in the single onion service unit test. Stop
- ignoring a return value. Make future changes less error-prone.
- Fixes bug 20864; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug20875 b/changes/bug20875
deleted file mode 100644
index 6bba2cbc1..000000000
--- a/changes/bug20875
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (download scheduling)
- - Resolve a "bug" warning when considering a download schedule whose
- delay had approached INT_MAX. Fixes 20875; bugfix on 0.2.9.5-alpha.
-
diff --git a/changes/bug20935 b/changes/bug20935
deleted file mode 100644
index 78068c7c0..000000000
--- a/changes/bug20935
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (portability):
- - Use the correct spelling of MAC_OS_X_VERSION_10_12 on configure.ac
- Fixes bug 20935; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug21018 b/changes/bug21018
deleted file mode 100644
index 49a8b47a2..000000000
--- a/changes/bug21018
+++ /dev/null
@@ -1,11 +0,0 @@
- o Major bugfixes (parsing, security):
-
- - Fix a bug in parsing that could cause clients to read a single
- byte past the end of an allocated region. This bug could be
- used to cause hardened clients (built with
- --enable-expensive-hardening) to crash if they tried to visit
- a hostile hidden service. Non-hardened clients are only
- affected depending on the details of their platform's memory
- allocator. Fixes bug 21018; bugfix on 0.2.0.8-alpha. Found by
- using libFuzzer. Also tracked as TROVE-2016-12-002 and as
- CVE-2016-1254.
diff --git a/changes/bug21035 b/changes/bug21035
deleted file mode 100644
index bbf334078..000000000
--- a/changes/bug21035
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (portability):
- - Avoid crashing when Tor is built using headers that contain
- CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
- without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix on
- 0.2.9.1-alpha.
-
diff --git a/changes/bug21051 b/changes/bug21051
deleted file mode 100644
index 8bb4f80c8..000000000
--- a/changes/bug21051
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix Libevent detection on platforms without Libevent 1 headers
- installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug21074_downgrade b/changes/bug21074_downgrade
deleted file mode 100644
index 1bc1f8523..000000000
--- a/changes/bug21074_downgrade
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (portability):
- - Don't exit the Tor process if setrlimit() fails to change the file
- limit (which can happen sometimes on some versions of OSX). Fixes
- bug 21074; bugfix on 0.0.9pre5.
diff --git a/changes/bug21108_029 b/changes/bug21108_029
deleted file mode 100644
index 3a3f004fc..000000000
--- a/changes/bug21108_029
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (directory authority):
- - During voting, when marking a node as a probable sybil, do not
- clear its BadExit flag: sybils can still be bad in other ways
- too. (We still clear the other flags.) Fixes bug 21108; bugfix
- on 0.2.0.13-alpha.
-
diff --git a/changes/bug21278_extras b/changes/bug21278_extras
deleted file mode 100644
index ffdf4a047..000000000
--- a/changes/bug21278_extras
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (code correctness):
- - Repair a couple of (unreachable or harmless) cases of the risky
- comparison-by-subtraction pattern that caused bug 21278.
diff --git a/changes/bug21278_prevention b/changes/bug21278_prevention
deleted file mode 100644
index e07f0a670..000000000
--- a/changes/bug21278_prevention
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (directory authority):
- - Directory authorities now reject descriptors that claim to be
- malformed versions of Tor. Helps prevent exploitation of bug 21278.
-
diff --git a/changes/bug21280 b/changes/bug21280
deleted file mode 100644
index e9f0bc174..000000000
--- a/changes/bug21280
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (tor-resolve):
- - The tor-resolve command line tool now rejects hostnames over 255
- characters in length. Previously, it would silently truncate
- them, which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
- Patch by "junglefowl".
diff --git a/changes/bug21357 b/changes/bug21357
deleted file mode 100644
index a1cb43a78..000000000
--- a/changes/bug21357
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (IPv6 Exits):
- - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects IPv6
- addresses. Instead, only reject a port over IPv6 if the exit policy
- rejects that port on more than an IPv6 /16 of addresses. This bug was
- made worse by 17027 in 0.2.8.1-alpha, which rejects a relay's own IPv6
- address by default.
- Fixes bug 21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.
diff --git a/changes/bug21394 b/changes/bug21394
deleted file mode 100644
index e5452e20b..000000000
--- a/changes/bug21394
+++ /dev/null
@@ -1,9 +0,0 @@
- o Major bugfixes (Exit nodes):
- - Fix an issue causing high-bandwidth exit nodes to fail a majority
- or all of their DNS requests, making them basically unsuitable for
- regular usage in Tor circuits. The problem is related to
- libevent's DNS handling, but we can work around it in Tor. Fixes
- bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced
- eventdns. Credit goes to Dhalgren for identifying and finding a
- workaround to this bug and to gamambel, arthuredelstein and
- arma in helping to track it down and analyze it.
diff --git a/changes/bug21450 b/changes/bug21450
deleted file mode 100644
index a1cf89ab4..000000000
--- a/changes/bug21450
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (voting consistency):
- - Reject version numbers with components that exceed INT32_MAX.
- Otherwise 32-bit and 64-bit platforms would behave inconsistently.
- Fixes bug 21450; bugfix on 0.0.8pre1.
diff --git a/changes/bug21507 b/changes/bug21507
deleted file mode 100644
index f83e291b6..000000000
--- a/changes/bug21507
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (voting consistency):
- - Reject version numbers with non-numeric prefixes (such as +, -, and
- whitespace). Disallowing whitespace prevents differential version
- parsing between POSIX-based and Windows platforms.
- Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1.
diff --git a/changes/bug21576 b/changes/bug21576
deleted file mode 100644
index 68d847119..000000000
--- a/changes/bug21576
+++ /dev/null
@@ -1,4 +0,0 @@
- o Major bugfixes (crash, directory connections):
- - Fix a rare crash when sending a begin cell on a circuit whose linked
- directory connection has already been closed. Fixes bug 21576;
- bugfix on Tor 0.2.9.3-alpha. Reported by alecmuffett.
diff --git a/changes/bug21943 b/changes/bug21943
deleted file mode 100644
index dbe2c726d..000000000
--- a/changes/bug21943
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (Linux seccomp2 sandbox):
- - The getpid() system call is now permitted under the Linux seccomp2
- sandbox, to avoid crashing with versions of OpenSSL (and other
- libraries) that attempt to learn the process's PID by using the
- syscall rather than the VDSO code. Fixes bug 21943; bugfix on
- 0.2.5.1-alpha.
diff --git a/changes/bug22034 b/changes/bug22034
deleted file mode 100644
index 6d9e18874..000000000
--- a/changes/bug22034
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (control port, regression):
- - The GETINFO extra-info/digest/<digest> command was broken because of a
- wrong base16 decode return value check. In was introduced in a refactor
- of that API. Fixex bug #22034; bugfix on tor-0.2.9.1-alpha.
diff --git a/changes/bug22245 b/changes/bug22245
deleted file mode 100644
index 6ae18593e..000000000
--- a/changes/bug22245
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (bandwidth accounting):
- - Roll over monthly accounting at the configured hour and minute,
- rather than always at 00:00.
- Fixes bug 22245; bugfix on 0.0.9rc1.
- Found by Andrey Karpov with PVS-Studio.
diff --git a/changes/bug22349 b/changes/bug22349
deleted file mode 100644
index bb43404bf..000000000
--- a/changes/bug22349
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes (directory authority):
- - When a directory authority rejects a descriptor or extrainfo with
- a given digest, mark that digest as undownloadable, so that we
- do not attempt to download it again over and over. We previously
- tried to avoid downloading such descriptors by other means, but
- we didn't notice if we accidentally downloaded one anyway. This
- behavior became problematic in 0.2.7.2-alpha, when authorities
- began pinning Ed25519 keys. Fixes ticket
- 22349; bugfix on 0.2.1.19-alpha.
diff --git a/changes/bug22370 b/changes/bug22370
deleted file mode 100644
index e0e87e333..000000000
--- a/changes/bug22370
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (memory handling):
- - When directory authorities reject a router descriptor due to keypinning,
- free the router descriptor rather than leaking the memory.
- Fixes bug 22370; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug22446 b/changes/bug22446
deleted file mode 100644
index eab65aac0..000000000
--- a/changes/bug22446
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (code style, backport from 0.3.1.3-alpha):
- - Add "Falls through" comments to our codebase, in order to silence
- GCC 7's -Wimplicit-fallthrough warnings. Patch from Andreas
- Stieger. Closes ticket 22446.
diff --git a/changes/bug22460_case2 b/changes/bug22460_case2
deleted file mode 100644
index 0a1175983..000000000
--- a/changes/bug22460_case2
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (relay, link handshake):
-
- - When performing the v3 link handshake on a TLS connection, report that
- we have the x509 certificate that we actually used on that connection,
- even if we have changed certificates since that connection was first
- opened. Previously, we would claim to have used our most recent x509
- link certificate, which would sometimes make the link handshake fail.
- Fixes one case of bug 22460; bugfix on 0.2.3.6-alpha.
diff --git a/changes/bug22490 b/changes/bug22490
deleted file mode 100644
index 244dd50b3..000000000
--- a/changes/bug22490
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (correctness):
- - Avoid undefined behavior when parsing IPv6 entries from the geoip6
- file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
diff --git a/changes/bug22516 b/changes/bug22516
deleted file mode 100644
index f024a3c47..000000000
--- a/changes/bug22516
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Permit the fchmod system call, to avoid crashing on startup when
- starting with the seccomp2 sandbox and an unexpected set of permissions
- on the data directory or its contents. Fixes bug 22516; bugfix on
- 0.2.5.4-alpha.
diff --git a/changes/bug22636 b/changes/bug22636
deleted file mode 100644
index 770cac72e..000000000
--- a/changes/bug22636
+++ /dev/null
@@ -1,8 +0,0 @@
- o Build features:
- - Tor's repository now includes a Travis Continuous Integration (CI)
- configuration file (.travis.yml). This is meant to help new developers and
- contributors who fork Tor to a Github repository be better able to test
- their changes, and understand what we expect to pass. To use this new build
- feature, you must fork Tor to your Github account, then go into the
- "Integrations" menu in the repository settings for your fork and enable
- Travis, then push your changes.
diff --git a/changes/bug22644 b/changes/bug22644
deleted file mode 100644
index 9b8742eda..000000000
--- a/changes/bug22644
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (controller):
- - Do not crash when receiving a POSTDESCRIPTOR command with an
- empty body. Fixes part of bug 22644; bugfix on 0.2.0.1-alpha.
- - Do not crash when receiving a HSPOST command with an empty body.
- Fixes part of bug 22644; bugfix on 0.2.7.1-alpha.
diff --git a/changes/bug22737 b/changes/bug22737
deleted file mode 100644
index f0de8e6c4..000000000
--- a/changes/bug22737
+++ /dev/null
@@ -1,12 +0,0 @@
- o Minor bugfixes (defensive programming, undefined behavior):
-
- - Fix a memset() off the end of an array when packing cells. This
- bug should be harmless in practice, since the corrupted bytes
- are still in the same structure, and are always padding bytes,
- ignored, or immediately overwritten, depending on compiler
- behavior. Nevertheless, because the memset()'s purpose is to
- make sure that any other cell-handling bugs can't expose bytes
- to the network, we need to fix it. Fixes bug 22737; bugfix on
- 0.2.4.11-alpha. Fixes CID 1401591.
-
-
diff --git a/changes/bug22789 b/changes/bug22789
deleted file mode 100644
index a65359284..000000000
--- a/changes/bug22789
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (openbsd, denial-of-service):
- - Avoid an assertion failure bug affecting our implementation of
- inet_pton(AF_INET6) on certain OpenBSD systems whose strtol()
- handling of "0xfoo" differs from what we had expected.
- Fixes bug 22789; bugfix on 0.2.3.8-alpha. Also tracked as
- TROVE-2017-007.
-
diff --git a/changes/bug22797 b/changes/bug22797
deleted file mode 100644
index 619baaa40..000000000
--- a/changes/bug22797
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (file limits):
- - When setting the maximum number of connections allowed by the OS,
- always allow some extra file descriptors for other files.
- Fixes bug 22797; bugfix on 0.2.0.10-alpha.
diff --git a/changes/bug22801 b/changes/bug22801
deleted file mode 100644
index 7edc79bc8..000000000
--- a/changes/bug22801
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - When building with certain versions the mingw C header files, avoid
- float-conversion warnings when calling the C functions isfinite(),
- isnan(), and signbit(). Fixes bug 22801; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug22838_028 b/changes/bug22838_028
deleted file mode 100644
index 1d0a4fbfd..000000000
--- a/changes/bug22838_028
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation, mingw, backport from 0.3.1.1-alpha):
- - Backport a fix for an "unused variable" warning that appeared
- in some versions of mingw. Fixes bug 22838; bugfix on
- 0.2.8.1-alpha.
-
diff --git a/changes/bug22915 b/changes/bug22915
deleted file mode 100644
index 17a9c6018..000000000
--- a/changes/bug22915
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation warnings):
- - Suppress -Wdouble-promotion warnings with clang 4.0. Fixes bug 22915;
- bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug22916_027 b/changes/bug22916_027
deleted file mode 100644
index 5cf99c7d1..000000000
--- a/changes/bug22916_027
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Compilation):
- - Fix warnings when building with libscrypt and openssl scrypt support
- on Clang. Fixes bug 22916; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug23030_029 b/changes/bug23030_029
deleted file mode 100644
index 89a1b507d..000000000
--- a/changes/bug23030_029
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (coverity builds):
- - Avoid Coverity build warnings related to our BUG() macro. By
- default, Coverity treats BUG() as the Linux kernel does: an
- instant abort(). We need to override that so our BUG() macro
- doesn't prevent Coverity from analyzing functions that use it.
- Fixes bug 23030; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug23081 b/changes/bug23081
deleted file mode 100644
index 76c4e3097..000000000
--- a/changes/bug23081
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (Windows service):
- - When running as a Windows service, set the ID of the main thread
- correctly. Failure to do so made us fail to send log messages
- to the controller in 0.2.1.16-rc, slowed down controller
- event delivery in 0.2.7.3-rc and later, and crash with an assertion
- failure in 0.3.1.1-alpha. Fixes bug 23081; bugfix on 0.2.1.6-alpha.
- Patch and diagnosis from "Vort".
-
diff --git a/changes/bug23291 b/changes/bug23291
deleted file mode 100644
index a5b0efda0..000000000
--- a/changes/bug23291
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing):
- - Fix an undersized buffer in test-memwipe.c. Fixes bug 23291; bugfix on
- 0.2.7.2-alpha. Found and patched by Ties Stuij.
diff --git a/changes/bug23318 b/changes/bug23318
deleted file mode 100644
index 7fcb8d448..000000000
--- a/changes/bug23318
+++ /dev/null
@@ -1,11 +0,0 @@
- o Minor bugfixes (path selection):
- - When selecting relays by bandwidth, avoid a rounding error that
- could sometimes cause load to be imbalanced incorrectly. Previously,
- we would always round upwards; now, we round towards the nearest
- integer. This had the biggest effect when a relay's weight adjustments
- should have given it weight 0, but it got weight 1 instead.
- Fixes bug 23318; bugfix on 0.2.4.3-alpha.
- - When calculating the fraction of nodes that have descriptors, and all
- all nodes in the network have zero bandwidths, count the number of nodes
- instead.
- Fixes bug 23318; bugfix on 0.2.4.10-alpha.
diff --git a/changes/bug23470 b/changes/bug23470
deleted file mode 100644
index 33367b3a3..000000000
--- a/changes/bug23470
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfix (relay address resolution):
- - Avoid unnecessary calls to directory_fetches_from_authorities()
- on relays. This avoids spurious address resolutions and
- descriptor rebuilds. This is a mitigation for 21789. The original
- bug was introduced in commit 35bbf2e as part of prop210.
- Fixes 23470 in 0.2.8.1-alpha.
diff --git a/changes/bug23690 b/changes/bug23690
deleted file mode 100644
index 36ff32e49..000000000
--- a/changes/bug23690
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (relay, crash, assertion failure):
- - Fix a timing-based assertion failure that could occur when the
- circuit out-of-memory handler freed a connection's output buffer.
- Fixes bug 23690; bugfix on 0.2.6.1-alpha.
-
diff --git a/changes/bug23693 b/changes/bug23693
deleted file mode 100644
index 796398be5..000000000
--- a/changes/bug23693
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay, crash):
- - Avoid a crash when transitioning from client mode to bridge mode.
- Previously, we would launch the worker threads whenever our "public
- server" mode changed, but not when our "server" mode changed.
- Fixes bug 23693; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug23874 b/changes/bug23874
deleted file mode 100644
index bf6620553..000000000
--- a/changes/bug23874
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory safety):
- - Clear the address when node_get_prim_orport() returns early.
- Fixes bug 23874; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug23985 b/changes/bug23985
deleted file mode 100644
index 9cb593796..000000000
--- a/changes/bug23985
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor bugfixes (bootstrapping):
- - Fetch descriptors aggressively whenever we lack enough
- to build circuits, regardless of how many descriptors we are missing.
- Previously, we would delay launching the fetch when we had fewer than
- 15 missing descriptors, even if some of those descriptors were
- blocking circuits from building. Fixes bug 23985; bugfix on
- 0.1.1.11-alpha. The effects of this bug became worse in 0.3.0.3-alpha,
- when we began treating missing descriptors from our primary guards
- as a reason to delay circuits.
diff --git a/changes/bug24167 b/changes/bug24167
deleted file mode 100644
index fd0d87eff..000000000
--- a/changes/bug24167
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (network layer):
- - When closing a connection via close_connection_immediately(), we
- mark it as "not blocked on bandwidth", to prevent later calls
- from trying to unblock it, and give it permission to read. This
- fixes a backtrace warning that can happen on relays under various
- circumstances. Fixes bug 24167; bugfix on 0.1.0.1-rc.
-
diff --git a/changes/bug24170 b/changes/bug24170
deleted file mode 100644
index d3d734769..000000000
--- a/changes/bug24170
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (path selection):
- - Actually log the total bandwidth in compute_weighted_bandwidths().
- Fixes bug 24170; bugfix on 0.2.4.3-alpha.
diff --git a/changes/bug24198 b/changes/bug24198
deleted file mode 100644
index 679070687..000000000
--- a/changes/bug24198
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (controller, linux seccomp2 sandbox):
- - Avoid a crash when attempting to use the seccomp2 sandbox
- together with the OwningControllerProcess feature.
- Fixes bug 24198; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24313 b/changes/bug24313
deleted file mode 100644
index b927ec3ba..000000000
--- a/changes/bug24313
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (security, hidden service v2):
- - Fix a use-after-free error that could crash v2 Tor hidden services
- when it failed to open circuits while expiring introductions
- points. Fixes bug 24313; bugfix on 0.2.7.2-alpha. This
- issue is also tracked as TROVE-2017-013 and CVE-2017-8823.
diff --git a/changes/bug24480 b/changes/bug24480
deleted file mode 100644
index 94e5b91a0..000000000
--- a/changes/bug24480
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix a signed/unsigned comparison warning introduced by our
- fix to TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
diff --git a/changes/bug24633 b/changes/bug24633
deleted file mode 100644
index 028c7cc14..000000000
--- a/changes/bug24633
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (portability, msvc):
- - Fix a bug in the bit-counting parts of our timing-wheel code on
- MSVC. (Note that MSVC is still not a supported build platform,
- due to cyptographic timing channel risks.) Fixes bug 24633;
- bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug24666 b/changes/bug24666
deleted file mode 100644
index 830775f5f..000000000
--- a/changes/bug24666
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (memory usage):
-
- - When queuing DESTROY cells on a channel, only queue the
- circuit-id and reason fields: not the entire 514-byte
- cell. This fix should help mitigate any bugs or attacks that
- fill up these queues, and free more RAM for other uses. Fixes
- bug 24666; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24736 b/changes/bug24736
deleted file mode 100644
index 632560932..000000000
--- a/changes/bug24736
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (address selection):
- - When the fascist_firewall_choose_address_ functions don't find a
- reachable address, set the returned address to the null address and port.
- This is a precautionary measure, because some callers do not check the
- return value.
- Fixes bug 24736; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug24854 b/changes/bug24854
deleted file mode 100644
index 64e10772e..000000000
--- a/changes/bug24854
+++ /dev/null
@@ -1,3 +0,0 @@
- o Code simplification and refactoring:
- - Move the list of default directory authorities to their own file for
- inclusion using the C preprocessor. Closes ticket 24854. Patch by "beastr0".
diff --git a/changes/bug24895 b/changes/bug24895
deleted file mode 100644
index 7edde94a0..000000000
--- a/changes/bug24895
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (onion services):
- - Fix an "off by 2" error in counting rendezvous failures on the onion
- service side. While we thought we would stop the rendezvous attempt
- after one failed circuit, we were actually making three circuit attempts
- before giving up. Now switch to a default of 2, and allow the consensus
- parameter "hs_service_max_rdv_failures" to override. Fixes bug 24895;
- bugfix on 0.0.6.
-
diff --git a/changes/bug24898-029 b/changes/bug24898-029
deleted file mode 100644
index b33f09384..000000000
--- a/changes/bug24898-029
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (relay):
- - Make the internal channel_is_client() function look at what sort
- of connection handshake the other side used, rather than whether
- the other side ever sent a create_fast cell to us. Backports part
- of the fixes from bugs 22805 and 24898.
-
diff --git a/changes/bug24952 b/changes/bug24952
deleted file mode 100644
index 93174c04f..000000000
--- a/changes/bug24952
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfix (channel connection):
- - The accurate address of a connection is real_addr, not the addr member.
- TLS Channel remote address is now real_addr content instead of addr
- member. Fixes bug 24952; bugfix on 707c1e2e26 in 0.2.4.11-alpha.
- Patch by "ffmancera".
diff --git a/changes/bug24969 b/changes/bug24969
deleted file mode 100644
index 46b2bae6f..000000000
--- a/changes/bug24969
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Linux seccomp2 sandbox):
- - Allow the nanosleep() system call, which glibc uses to implement
- sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24978 b/changes/bug24978
deleted file mode 100644
index 5dc45c744..000000000
--- a/changes/bug24978
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor features (compatibility, OpenSSL):
- - Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
- Previous versions of Tor would not have worked with OpenSSL
- 1.1.1, since they neither disabled TLS 1.3 nor enabled any of the
- ciphersuites it requires. Here we enable the TLS 1.3 ciphersuites.
- Closes ticket 24978.
-
diff --git a/changes/bug25223 b/changes/bug25223
deleted file mode 100644
index fdd556350..000000000
--- a/changes/bug25223
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Make sure we don't modify consensus parameters if we aren't a public
- relay when a new consensus arrives. Fixes bug 25223; bugfix on
- 0.3.3.2-alpha.
diff --git a/changes/bug25249 b/changes/bug25249
deleted file mode 100644
index b4153eeae..000000000
--- a/changes/bug25249
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (spec conformance):
- - Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
- 0.2.9.4-alpha.
diff --git a/changes/bug25249.2 b/changes/bug25249.2
deleted file mode 100644
index 9058c1107..000000000
--- a/changes/bug25249.2
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (spec conformance):
- - Forbid UINT32_MAX as a protocol version. Fixes part of bug 25249;
- bugfix on 0.2.9.4-alpha.
diff --git a/changes/bug25440 b/changes/bug25440
deleted file mode 100644
index f8d9dd4fa..000000000
--- a/changes/bug25440
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (linux seccomp2 sandbox):
- - Fix a bug in out sandboxing rules for the openat() syscall.
- Previously, no openat() call would be permitted, which would break
- filesystem operations on recent glibc versions. Fixes bug 25440;
- bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
diff --git a/changes/bug25629 b/changes/bug25629
deleted file mode 100644
index 190928a94..000000000
--- a/changes/bug25629
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (C correctness):
- - Fix a very unlikely null pointer dereference. Fixes bug 25629;
- bugfix on 0.2.9.15. Found by Coverity; this is CID 1430932.
diff --git a/changes/bug26007 b/changes/bug26007
deleted file mode 100644
index efcd15084..000000000
--- a/changes/bug26007
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (directory authorities, security):
- - When directory authorities read a zero-byte bandwidth file, they log
- a warning with the contents of an uninitialised buffer. Log a warning
- about the empty file instead.
- Fixes bug 26007; bugfix on 0.2.2.1-alpha.
diff --git a/changes/bug26072 b/changes/bug26072
deleted file mode 100644
index 2489e4fbb..000000000
--- a/changes/bug26072
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (correctness, client):
- - Upon receiving a malformed connected cell, stop processing the cell
- immediately. Previously we would mark the connection for close, but
- continue processing the cell as if the connection were open. Fixes bug
- 26072; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug26116 b/changes/bug26116
deleted file mode 100644
index 3bfde74f7..000000000
--- a/changes/bug26116
+++ /dev/null
@@ -1,7 +0,0 @@
- o Minor bugfixes (compatibility, openssl):
- - Work around a change in OpenSSL 1.1.1 where
- return values that would previously indicate "no password" now
- indicate an empty password. Without this workaround, Tor instances
- running with OpenSSL 1.1.1 would accept descriptors that other Tor
- instances would reject. Fixes bug 26116; bugfix on 0.2.5.16.
-
diff --git a/changes/bug26196 b/changes/bug26196
deleted file mode 100644
index 47fcffa0f..000000000
--- a/changes/bug26196
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (hardening):
- - Prevent a possible out-of-bounds smartlist read in
- protover_compute_vote(). Fixes bug 26196; bugfix on
- 0.2.9.4-alpha.
diff --git a/changes/bug26269 b/changes/bug26269
deleted file mode 100644
index 73dcdbf5c..000000000
--- a/changes/bug26269
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix a compilation warning on some versions of GCC when
- building code that calls routerinfo_get_my_routerinfo() twice,
- assuming that the second call will succeed if the first one did.
- Fixes bug 26269; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug26485 b/changes/bug26485
deleted file mode 100644
index 5a40b7a78..000000000
--- a/changes/bug26485
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (directory authority):
- - When voting for recommended versions, make sure that all of the
- versions are well-formed and parsable. Fixes bug 26485; bugfix on
- 0.1.1.6-alpha.
diff --git a/changes/bug26535.029 b/changes/bug26535.029
deleted file mode 100644
index 111b539f1..000000000
--- a/changes/bug26535.029
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (testing, compatibility):
- - When running the ntor_ref.py test, make sure only to pass strings
- (rather than "bytes" objects) to the Python subprocess module.
- Python 3 on Windows seems to require this. Fixes bug 26535; bugfix on
- 0.2.5.5-alpha.
diff --git a/changes/bug26787 b/changes/bug26787
deleted file mode 100644
index b32e519a9..000000000
--- a/changes/bug26787
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing):
- - Disable core dumps in test_bt.sh, to avoid failures in "make
- distcheck". Fixes bug 26787; bugfix on 0.2.5.2-alpha.
diff --git a/changes/bug26830 b/changes/bug26830
deleted file mode 100644
index c002f1953..000000000
--- a/changes/bug26830
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - Skip an unreliable key generation test on Windows, until the underlying
- issue in bug 26076 is resolved. Fixes bug 26830; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug26924 b/changes/bug26924
deleted file mode 100644
index 882db56b4..000000000
--- a/changes/bug26924
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (single onion services, Tor2web):
- - Log a protocol warning when single onion services or Tor2web clients
- fail to authenticate direct connections to relays.
- Fixes bug 26924; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug27081 b/changes/bug27081
deleted file mode 100644
index 74e0efbd2..000000000
--- a/changes/bug27081
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (compilation, windows):
- - Don't link or search for pthreads when building for Windows, even if we
- are using build environment (like mingw) that provides a pthreads
- library. Fixes bug 27081; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug27088 b/changes/bug27088
deleted file mode 100644
index d4d3b292c..000000000
--- a/changes/bug27088
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (continuous integration):
- - Pass the module flags to distcheck configure, and
- log the flags before running configure. (Backported
- to 0.2.9 and later as a precaution.)
- Fixes bug 27088; bugfix on 0.3.4.1-alpha.
diff --git a/changes/bug27185 b/changes/bug27185
deleted file mode 100644
index 79221b3df..000000000
--- a/changes/bug27185
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (Windows, compilation):
- - Silence a compilation warning on MSVC 2017 and clang-cl.
- Fixes bug 27185; bugfix on 0.2.2.2-alpha.
diff --git a/changes/bug27226 b/changes/bug27226
deleted file mode 100644
index 9030773cd..000000000
--- a/changes/bug27226
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (testing, openssl compatibility):
- - Our "tortls/cert_matches_key" unit test no longer relies on OpenSSL
- internals. Previously, it relied on unsupported OpenSSL behavior in
- a way that caused it to crash with OpenSSL 1.0.2p. Fixes bug 27226;
- bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug27295 b/changes/bug27295
deleted file mode 100644
index c5a364877..000000000
--- a/changes/bug27295
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (testing, chutney):
- - Before running make test-network-all, delete old logs and test result
- files, to avoid spurious failures. Fixes bug 27295; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug27344 b/changes/bug27344
deleted file mode 100644
index 9f6685558..000000000
--- a/changes/bug27344
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compatibility):
- - Tell OpenSSL to maintain backward compatibility with previous
- RSA1024/DH1024 users in Tor. With OpenSSL 1.1.1-pre6, these ciphers
- are disabled by default. Closes ticket 27344.
diff --git a/changes/bug27418 b/changes/bug27418
deleted file mode 100644
index 1d99497dc..000000000
--- a/changes/bug27418
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - When we use echo in Travis, don't pass a --flag as the first argument.
- Fixes bug 27418; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27453 b/changes/bug27453
deleted file mode 100644
index 4501346d2..000000000
--- a/changes/bug27453
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (continuous integration):
- - When a Travis build fails, and showing a log fails, keep trying to
- show the other logs. Fixes bug 27453; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27461 b/changes/bug27461
deleted file mode 100644
index 3571ee816..000000000
--- a/changes/bug27461
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Stop calling SetProcessDEPPolicy() on 64-bit Windows. It is not
- supported, and always fails. Some compilers warn about the function
- pointer cast on 64-bit Windows.
- Fixes bug 27461; bugfix on 0.2.2.23-alpha.
diff --git a/changes/bug27463 b/changes/bug27463
deleted file mode 100644
index 073acdd99..000000000
--- a/changes/bug27463
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (onion services):
- - Silence a spurious compiler warning in rend_client_send_introduction().
- Fixes bug 27463; bugfix on 0.1.1.2-alpha.
diff --git a/changes/bug27465 b/changes/bug27465
deleted file mode 100644
index 743b35130..000000000
--- a/changes/bug27465
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfixes (compilation):
- - Silence a spurious compiler warning on the GetAdaptersAddresses
- function pointer cast. This issue is already fixed by 26481 in
- 0.3.5 and later, by removing the lookup and cast.
- Fixes bug 27465; bugfix on 0.2.3.11-alpha.
diff --git a/changes/bug8185_025 b/changes/bug8185_025
deleted file mode 100644
index 1bfc12b1e..000000000
--- a/changes/bug8185_025
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor bugfixes (logging, relay shutdown, annoyance):
- - When a circuit is marked for close, do not attempt to package any cells
- for channels on that circuit. Previously, we would detect this
- condition lower in the call stack, when we noticed that the circuit had
- no attached channel, and log an annoying message. Fixes bug 8185;
- bugfix on 0.2.5.4-alpha.
diff --git a/changes/coveralls b/changes/coveralls
deleted file mode 100644
index 7fa69bb2b..000000000
--- a/changes/coveralls
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Our Travis CI configuration now integrates with the Coveralls coverage
- analysis tool. Closes ticket 25818.
diff --git a/changes/feature25313 b/changes/feature25313
deleted file mode 100644
index 90f421169..000000000
--- a/changes/feature25313
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (sandbox):
- - Explicitly permit the poll() system call when the Linux seccomp2-based
- sandbox is enabled: apparently, some versions of libc use poll() when
- calling getpwnam(). Closes ticket 25313.
diff --git a/changes/feature26372_029 b/changes/feature26372_029
deleted file mode 100644
index 150ac3055..000000000
--- a/changes/feature26372_029
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (compilation):
-
- - When building Tor, prefer to use Python 3 over Python 2, and more
- recent (contemplated) versions over older ones. Closes ticket 26372.
diff --git a/changes/geoip-2017-11-06 b/changes/geoip-2017-11-06
deleted file mode 100644
index f034be900..000000000
--- a/changes/geoip-2017-11-06
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2017-12-06 b/changes/geoip-2017-12-06
deleted file mode 100644
index ae4fb1149..000000000
--- a/changes/geoip-2017-12-06
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the December 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-01-05 b/changes/geoip-2018-01-05
deleted file mode 100644
index 59aba02d0..000000000
--- a/changes/geoip-2018-01-05
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the January 5 2018 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-02-07 b/changes/geoip-2018-02-07
deleted file mode 100644
index f45228fd7..000000000
--- a/changes/geoip-2018-02-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-2018-03-08 b/changes/geoip-2018-03-08
deleted file mode 100644
index d9696aab5..000000000
--- a/changes/geoip-2018-03-08
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2
- Country database. Closes ticket 25469.
-
diff --git a/changes/geoip-2018-04-03 b/changes/geoip-2018-04-03
deleted file mode 100644
index 987cc450b..000000000
--- a/changes/geoip-2018-04-03
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 25718.
-
diff --git a/changes/geoip-2018-05-01 b/changes/geoip-2018-05-01
deleted file mode 100644
index 1528bb0c3..000000000
--- a/changes/geoip-2018-05-01
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2
- Country database. Closes ticket 26104.
-
diff --git a/changes/geoip-2018-06-07 b/changes/geoip-2018-06-07
deleted file mode 100644
index 0f8cff97a..000000000
--- a/changes/geoip-2018-06-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the June 7 2018 Maxmind GeoLite2
- Country database. Closes ticket 26351.
-
diff --git a/changes/geoip-2018-07-03 b/changes/geoip-2018-07-03
deleted file mode 100644
index e921d63c9..000000000
--- a/changes/geoip-2018-07-03
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2
- Country database. Closes ticket 26674.
-
diff --git a/changes/geoip-2018-08-07 b/changes/geoip-2018-08-07
deleted file mode 100644
index 9ddbe7b1b..000000000
--- a/changes/geoip-2018-08-07
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the August 7 2018 Maxmind GeoLite2
- Country database. Closes ticket 27089.
-
diff --git a/changes/geoip-april2017 b/changes/geoip-april2017
deleted file mode 100644
index b489eaf01..000000000
--- a/changes/geoip-april2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-august2017 b/changes/geoip-august2017
deleted file mode 100644
index 2dab18a63..000000000
--- a/changes/geoip-august2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the August 3 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-december2016 b/changes/geoip-december2016
deleted file mode 100644
index 60754ea21..000000000
--- a/changes/geoip-december2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the December 7 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-february2017 b/changes/geoip-february2017
deleted file mode 100644
index ec54b6122..000000000
--- a/changes/geoip-february2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-january2017 b/changes/geoip-january2017
deleted file mode 100644
index 77bc9a599..000000000
--- a/changes/geoip-january2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-july2017 b/changes/geoip-july2017
deleted file mode 100644
index ed10369f1..000000000
--- a/changes/geoip-july2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the July 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-june2017 b/changes/geoip-june2017
deleted file mode 100644
index 2ea7bf105..000000000
--- a/changes/geoip-june2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the June 8 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-march2017 b/changes/geoip-march2017
deleted file mode 100644
index 6dc92baa2..000000000
--- a/changes/geoip-march2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the March 7 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-may2017 b/changes/geoip-may2017
deleted file mode 100644
index 4e504d7a0..000000000
--- a/changes/geoip-may2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-november2016 b/changes/geoip-november2016
deleted file mode 100644
index b3f9913bb..000000000
--- a/changes/geoip-november2016
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (ge0oip):
- - Update geoip and geoip6 to the November 3 2016 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-october2017 b/changes/geoip-october2017
deleted file mode 100644
index 11f623e85..000000000
--- a/changes/geoip-october2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (geoip):
- - Update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/geoip-september2017 b/changes/geoip-september2017
deleted file mode 100644
index be01ff952..000000000
--- a/changes/geoip-september2017
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features:
- - Update geoip and geoip6 to the September 6 2017 Maxmind GeoLite2
- Country database.
-
diff --git a/changes/longclaw-ipv6 b/changes/longclaw-ipv6
deleted file mode 100644
index 75899c9d0..000000000
--- a/changes/longclaw-ipv6
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (directory authorities):
- - Remove longclaw's IPv6 address, as it will soon change.
- Authority IPv6 addresses were originally added in 0.2.8.1-alpha.
- This leaves 3/8 directory authorities with IPv6 addresses, but there
- are also 52 fallback directory mirrors with IPv6 addresses.
- Resolves 19760.
diff --git a/changes/longclaw_23592 b/changes/longclaw_23592
deleted file mode 100644
index 91e2da897..000000000
--- a/changes/longclaw_23592
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
- - The directory authority "Longclaw" has changed its IP address.
- Closes ticket 23592.
diff --git a/changes/more_module_docs b/changes/more_module_docs
deleted file mode 100644
index 0066ddfcf..000000000
--- a/changes/more_module_docs
+++ /dev/null
@@ -1,4 +0,0 @@
- o Documentation:
- - Module-level documentation for several more modules. Closes tickets
- 19287 and
- 19290.
diff --git a/changes/prop275-minimal b/changes/prop275-minimal
deleted file mode 100644
index 83d42f850..000000000
--- a/changes/prop275-minimal
+++ /dev/null
@@ -1,9 +0,0 @@
- o Minor features (future-proofing):
-
- - Tor no longer refuses to download microdescriptors or descriptors if
- they are listed as "published in the future". This change will
- eventually allow us to stop listing meaningful "published" dates
- in microdescriptor consensuses, and thereby allow us to reduce the
- resources required to download consensus diffs by over 50%.
- Implements part of ticket 21642; implements part of proposal 275.
-
diff --git a/changes/task26771 b/changes/task26771
deleted file mode 100644
index fd700900f..000000000
--- a/changes/task26771
+++ /dev/null
@@ -1,4 +0,0 @@
- o Directory authority changes:
- - The "Bifroest" bridge authority has been retired; the new bridge
- authority is "Serge", and it is operated by George from the
- TorBSD project. Closes ticket 26771.
diff --git a/changes/ticket19769 b/changes/ticket19769
deleted file mode 100644
index 9fc05c3e9..000000000
--- a/changes/ticket19769
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major features (security):
- - Change the algorithm used to decide DNS TTLs on client and server side,
- to better resist DNS-based correlation attacks like the DefecTor attack
- of Greschbach, Pulls, Roberts, Winter, and Feamster). Now
- relays only return one of two possible DNS TTL values, and clients
- are willing to believe DNS TTL values up to 3 hours long.
- Closes ticket 19769.
diff --git a/changes/ticket20170-v3 b/changes/ticket20170-v3
deleted file mode 100644
index d634e7205..000000000
--- a/changes/ticket20170-v3
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features (fallback directory list):
- - Replace the 81 remaining fallbacks of the 100 originally introduced
- in Tor 0.2.8.3-alpha in March 2016, with a list of 177 fallbacks
- (123 new, 54 existing, 27 removed) generated in December 2016.
- Resolves ticket 20170.
diff --git a/changes/ticket21564 b/changes/ticket21564
deleted file mode 100644
index 7e01f41f8..000000000
--- a/changes/ticket21564
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (fallback directory list):
- - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in
- December 2016 (of which ~126 were still functional), with a list of
- 151 fallbacks (32 new, 119 existing, 58 removed) generated in
- May 2017.
- Resolves ticket 21564.
diff --git a/changes/ticket21953 b/changes/ticket21953
deleted file mode 100644
index 7cc84f506..000000000
--- a/changes/ticket21953
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features:
- - Enable a couple of pieces of Windows hardening: one
- (HeapEnableTerminationOnCorruption) that has been on-by-default since
- Windows 8, and unavailable before Windows 7, and one
- (PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION) which we believe doesn't
- affect us, but shouldn't do any harm. Closes ticket 21953.
diff --git a/changes/ticket22895 b/changes/ticket22895
deleted file mode 100644
index a3f7b8601..000000000
--- a/changes/ticket22895
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (compilation):
- - Fix unused variable warnings in donna's Curve25519 SSE2 code.
- Fixes bug 22895; bugfix on 0.2.7.2-alpha.
diff --git a/changes/ticket23856 b/changes/ticket23856
deleted file mode 100644
index 049da18d0..000000000
--- a/changes/ticket23856
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor feature (relay statistics):
- - Change relay bandwidth reporting stats interval from 4 hours to 24 hours
- in order to reduce the efficiency of guard discovery attacks. Fixes
- ticket 23856.
diff --git a/changes/ticket23910 b/changes/ticket23910
deleted file mode 100644
index eb38fcf32..000000000
--- a/changes/ticket23910
+++ /dev/null
@@ -1,3 +0,0 @@
- o Directory authority changes:
- - Add bastet as a ninth directory authority to the default list. Closes
- ticket 23910.
diff --git a/changes/ticket24315 b/changes/ticket24315
deleted file mode 100644
index df34dbf41..000000000
--- a/changes/ticket24315
+++ /dev/null
@@ -1,3 +0,0 @@
- o Major features (linux seccomp2 sandbox):
- - Update the sandbox rules so that they should now work correctly with
- Glibc 2.26. Closes ticket 24315.
diff --git a/changes/ticket24629 b/changes/ticket24629
deleted file mode 100644
index 482c0a1a6..000000000
--- a/changes/ticket24629
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Enable macOS builds in our Travis CI configuration.
- Closes ticket 24629.
diff --git a/changes/ticket24681 b/changes/ticket24681
deleted file mode 100644
index cc0a42b2e..000000000
--- a/changes/ticket24681
+++ /dev/null
@@ -1,6 +0,0 @@
- o Minor features (fallback directory mirrors):
- - Make the default DirAuthorityFallbackRate 0.1, so that clients on the
- public tor network prefer to bootstrap off fallback directory mirrors.
- This is a follow-up to 24679, which removed weights from the default
- fallbacks.
- Implements ticket 24681.
diff --git a/changes/ticket24902 b/changes/ticket24902
deleted file mode 100644
index 1a2ef95cc..000000000
--- a/changes/ticket24902
+++ /dev/null
@@ -1,13 +0,0 @@
- o Major features (denial of service mitigation):
- - Give relays some defenses against the recent network overload. We start
- with three defenses (default parameters in parentheses). First: if a
- single client address makes too many concurrent connections (>100), hang
- up on further connections. Second: if a single client address makes
- circuits too quickly (more than 3 per second, with an allowed burst of
- 90) while also having too many connections open (3), refuse new create
- cells for the next while (1-2 hours). Third: if a client asks to
- establish a rendezvous point to you directly, ignore the request. These
- defenses can be manually controlled by new torrc options, but relays
- will also take guidance from consensus parameters, so there's no need to
- configure anything manually. Implements ticket 24902.
-
diff --git a/changes/ticket25122 b/changes/ticket25122
deleted file mode 100644
index 2921811b2..000000000
--- a/changes/ticket25122
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor feature (geoip cache):
- - Make our OOM handler aware of the geoip client history cache so it
- doesn't fill up the memory which is especially important for IPv6 and
- our DoS mitigation subsystem. Closes ticket 25122.
diff --git a/changes/ticket25170 b/changes/ticket25170
deleted file mode 100644
index 065213940..000000000
--- a/changes/ticket25170
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor bugfix (directory authority, documentation):
- - When a fingerprint or network address is marked as rejected, the
- returned message by the authority now explicitly mention to set a valid
- ContactInfo address and contact the bad-relays@ mailing list. Fixes bug
- 25170; bugfix on 0.2.9.1.
diff --git a/changes/ticket25202 b/changes/ticket25202
deleted file mode 100644
index ba64abad7..000000000
--- a/changes/ticket25202
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor bugfixes (DoS mitigation):
- - Add extra safety checks when refilling the circuit creation bucket to
- ensure we never set a value that is above the allowed burst. Fixes
- bug 25202; bugfix on 0.3.3.2-alpha.
diff --git a/changes/ticket26062 b/changes/ticket26062
deleted file mode 100644
index 1ee49d860..000000000
--- a/changes/ticket26062
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (client):
- - Don't consider Tor running as a client if the ControlPort is open. Fixes
- bug 26062; bugfix on 0.2.9.4-alpha.
diff --git a/changes/ticket26343 b/changes/ticket26343
deleted file mode 100644
index ab5f332ee..000000000
--- a/changes/ticket26343
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (directory authority):
- - Add an IPv6 address for the "dannenberg" directory
- authority. Closes ticket 26343.
diff --git a/changes/ticket26467 b/changes/ticket26467
deleted file mode 100644
index 45883786c..000000000
--- a/changes/ticket26467
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor bugfixes (memory, correctness):
- - Fix a number of small memory leaks identified by coverity. Fixes
- bug 26467; bugfix on numerous Tor versions.
diff --git a/changes/ticket26560 b/changes/ticket26560
deleted file mode 100644
index 5b4fb1bfe..000000000
--- a/changes/ticket26560
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Install libcap-dev and libseccomp2-dev so these optional
- dependencies get tested on Travis CI. Closes ticket 26560.
diff --git a/changes/ticket26952-ccache b/changes/ticket26952-ccache
deleted file mode 100644
index edc115e9d..000000000
--- a/changes/ticket26952-ccache
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Use ccache in our Travis CI configuration.
- Closes ticket 26952.
diff --git a/changes/ticket27087 b/changes/ticket27087
deleted file mode 100644
index b8af70aaa..000000000
--- a/changes/ticket27087
+++ /dev/null
@@ -1,3 +0,0 @@
- o Minor features (continuous integration):
- - Run asciidoc during Travis CI.
- Implements ticket 27087.
diff --git a/changes/ticket_24801 b/changes/ticket_24801
deleted file mode 100644
index f5f6c831a..000000000
--- a/changes/ticket_24801
+++ /dev/null
@@ -1,5 +0,0 @@
- o Minor features (new fallback directories):
- - The fallback directory list has been re-generated based on the
- current status of the network. Tor uses fallback directories to
- bootstrap it doesn't yet have up-to-date directory
- information. Closes ticket 24801.
diff --git a/changes/travis_distcheck b/changes/travis_distcheck
deleted file mode 100644
index 0f278fe7e..000000000
--- a/changes/travis_distcheck
+++ /dev/null
@@ -1,4 +0,0 @@
- o Minor features (continuous integration):
- - Our .travis.yml configuration now includes support for testing
- the results of "make distcheck". (It's not uncommon for "make check" to
- pass but "make distcheck" to fail.) Closes ticket 25814.
diff --git a/changes/trove-2017-001 b/changes/trove-2017-001
deleted file mode 100644
index 5187e6d5f..000000000
--- a/changes/trove-2017-001
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (security):
- - Downgrade the "-ftrapv" option from "always on" to "only on when
- --enable-expensive-hardening is provided." This hardening option, like
- others, can turn survivable bugs into crashes--and having it on by
- default made a (relatively harmless) integer overflow bug into a
- denial-of-service bug. Fixes bug 21278 (TROVE-2017-001); bugfix on
- 0.2.9.1-alpha.
-
diff --git a/changes/trove-2017-001.2 b/changes/trove-2017-001.2
deleted file mode 100644
index 3ef073cf9..000000000
--- a/changes/trove-2017-001.2
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (parsing):
- - Fix an integer underflow bug when comparing malformed Tor versions.
- This bug is harmless, except when Tor has been built with
- --enable-expensive-hardening, which would turn it into a crash;
- or on Tor 0.2.9.1-alpha through Tor 0.2.9.8, which were built with
- -ftrapv by default.
- Part of TROVE-2017-001. Fixes bug 21278; bugfix on
- 0.0.8pre1. Found by OSS-Fuzz.
diff --git a/changes/trove-2017-005 b/changes/trove-2017-005
deleted file mode 100644
index cebb013f8..000000000
--- a/changes/trove-2017-005
+++ /dev/null
@@ -1,7 +0,0 @@
- o Major bugfixes (hidden service, relay, security):
- - Fix an assertion failure caused by receiving a BEGIN_DIR cell on
- a hidden service rendezvous circuit. Fixes bug 22494, tracked as
- TROVE-2017-005 and CVE-2017-0376; bugfix on 0.2.2.1-alpha. Found
- by armadev.
-
-
diff --git a/changes/trove-2017-008 b/changes/trove-2017-008
deleted file mode 100644
index 4b9c5b0a1..000000000
--- a/changes/trove-2017-008
+++ /dev/null
@@ -1,5 +0,0 @@
- o Major bugfixes (security, hidden services, loggging):
- - Fix a bug where we could log uninitialized stack when a certain
- hidden service error occurred while SafeLogging was disabled.
- Fixes bug #23490; bugfix on 0.2.7.2-alpha.
- This is also tracked as TROVE-2017-008 and CVE-2017-0380.
diff --git a/changes/trove-2017-009 b/changes/trove-2017-009
deleted file mode 100644
index 166a5faec..000000000
--- a/changes/trove-2017-009
+++ /dev/null
@@ -1,10 +0,0 @@
- o Major bugfixes (security):
- - When checking for replays in the INTRODUCE1 cell data for a (legacy)
- hiddden service, correctly detect replays in the RSA-encrypted part of
- the cell. We were previously checking for replays on the entire cell,
- but those can be circumvented due to the malleability of Tor's legacy
- hybrid encryption. This fix helps prevent a traffic confirmation
- attack. Fixes bug 24244; bugfix on 0.2.4.1-alpha. This issue is also
- tracked as TROVE-2017-009 and CVE-2017-8819.
-
-
diff --git a/changes/trove-2017-010 b/changes/trove-2017-010
deleted file mode 100644
index d5bf9333d..000000000
--- a/changes/trove-2017-010
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (security):
- - Fix a denial-of-service issue where an attacker could crash
- a directory authority using a malformed router descriptor.
- Fixes bug 24245; bugfix on 0.2.9.4-alpha. Also tracked
- as TROVE-2017-010 and CVE-2017-8820.
-
diff --git a/changes/trove-2017-011 b/changes/trove-2017-011
deleted file mode 100644
index 82d20d9e7..000000000
--- a/changes/trove-2017-011
+++ /dev/null
@@ -1,8 +0,0 @@
- o Major bugfixes (security):
- - Fix a denial of service bug where an attacker could use a malformed
- directory object to cause a Tor instance to pause while OpenSSL would
- try to read a passphrase from the terminal. (If the terminal was not
- available, tor would continue running.) Fixes bug 24246; bugfix on
- every version of Tor. Also tracked as TROVE-2017-011 and
- CVE-2017-8821. Found by OSS-Fuzz as testcase 6360145429790720.
-
diff --git a/changes/trove-2017-012-part1 b/changes/trove-2017-012-part1
deleted file mode 100644
index 9fccc2cf6..000000000
--- a/changes/trove-2017-012-part1
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (security, relay):
- - When running as a relay, make sure that we never build a path through
- ourselves, even in the case where we have somehow lost the version of
- our descriptor appearing in the consensus. Fixes part of bug 21534;
- bugfix on 0.2.0.1-alpha. This issue is also tracked as TROVE-2017-012
- and CVE-2017-8822.
diff --git a/changes/trove-2018-001.1 b/changes/trove-2018-001.1
deleted file mode 100644
index f0ee92f40..000000000
--- a/changes/trove-2018-001.1
+++ /dev/null
@@ -1,6 +0,0 @@
- o Major bugfixes (denial-of-service, directory authority):
- - Fix a protocol-list handling bug that could be used to remotely crash
- directory authorities with a null-pointer exception. Fixes bug 25074;
- bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001.
-
-
diff --git a/changes/trove-2018-004 b/changes/trove-2018-004
deleted file mode 100644
index 37e0a89b0..000000000
--- a/changes/trove-2018-004
+++ /dev/null
@@ -1,8 +0,0 @@
- o Minor bugfixes (denial-of-service):
- - Fix a possible crash on malformed consensus. If a consensus had
- contained an unparseable protocol line, it could have made clients
- and relays crash with a null-pointer exception. To exploit this
- issue, however, an attacker would need to be able to subvert the
- directory-authority system. Fixes bug 25251; bugfix on
- 0.2.9.4-alpha. Also tracked as TROVE-2018-004.
-
[View Less]
1
0