commit 079c6cce5ee981247d015dc94280027f5e5d4ee3 Author: Roger Dingledine arma@torproject.org Date: Thu Jul 12 20:19:07 2018 -0400
fold changes into 0.3.2.11 --- ChangeLog | 149 ++++++++++++++++++++++++++++++++++++++++++++ ReleaseNotes | 149 ++++++++++++++++++++++++++++++++++++++++++++ changes/bug23693.1 | 4 -- changes/bug24854 | 3 - changes/bug24969 | 3 - changes/bug25296_032 | 5 -- changes/bug25450 | 8 --- changes/bug25474 | 5 -- changes/bug25629 | 3 - changes/bug25686_diagnostic | 4 -- changes/bug25761 | 3 - changes/bug25901 | 3 - changes/bug26007 | 5 -- changes/bug26069 | 5 -- changes/bug26072 | 5 -- changes/bug26116 | 7 --- changes/bug26158 | 5 -- changes/bug26196 | 4 -- changes/bug26269 | 5 -- changes/bug26272 | 3 - changes/bug26535.029 | 5 -- changes/bug26535.032 | 5 -- changes/coveralls | 3 - changes/feature25313 | 4 -- changes/feature26372_029 | 4 -- changes/geoip-2018-03-08 | 4 -- changes/geoip-2018-04-03 | 4 -- changes/geoip-2018-05-01 | 4 -- changes/geoip-2018-06-07 | 4 -- changes/geoip-2018-07-03 | 4 -- changes/task26771 | 4 -- changes/ticket25714 | 4 -- changes/ticket26062 | 3 - changes/ticket26343 | 3 - changes/ticket26467 | 3 - changes/travis_distcheck | 4 -- 36 files changed, 298 insertions(+), 142 deletions(-)
diff --git a/ChangeLog b/ChangeLog index 870f8ebd5..8de71e0ee 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,152 @@ +Changes in version 0.3.2.11 - 2018-07-13 + Tor 0.3.2.11 moves to a new bridge authority, meaning people running + bridge relays should upgrade. We also take this opportunity to backport + other minor fixes. + + o Directory authority changes: + - The "Bifroest" bridge authority has been retired; the new bridge + authority is "Serge", and it is operated by George from the + TorBSD project. Closes ticket 26771. + + o Directory authority changes (backport from 0.3.3.7): + - Add an IPv6 address for the "dannenberg" directory authority. + Closes ticket 26343. + + o Major bugfixes (directory authorities, backport from 0.3.4.1-alpha): + - When directory authorities read a zero-byte bandwidth file, they + would previously log a warning with the contents of an + uninitialised buffer. They now log a warning about the empty file + instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha. + + o Major bugfixes (onion service, backport from 0.3.4.1-alpha): + - Correctly detect when onion services get disabled after HUP. Fixes + bug 25761; bugfix on 0.3.2.1. + + o Minor features (sandbox, backport from 0.3.3.4-alpha): + - Explicitly permit the poll() system call when the Linux + seccomp2-based sandbox is enabled: apparently, some versions of + libc use poll() when calling getpwnam(). Closes ticket 25313. + + o Minor feature (continuous integration, backport from 0.3.3.5-rc): + - Update the Travis CI configuration to use the stable Rust channel, + now that we have decided to require that. Closes ticket 25714. + + o Minor features (continuous integration, backport from 0.3.4.1-alpha): + - Our .travis.yml configuration now includes support for testing the + results of "make distcheck". (It's not uncommon for "make check" + to pass but "make distcheck" to fail.) Closes ticket 25814. + - Our Travis CI configuration now integrates with the Coveralls + coverage analysis tool. Closes ticket 25818. + + o Minor features (relay, diagnostic, backport from 0.3.4.3-alpha): + - Add several checks to detect whether Tor relays are uploading + their descriptors without specifying why they regenerated them. + Diagnostic for ticket 25686. + + o Minor features (compilation, backport from 0.3.4.4-rc): + - When building Tor, prefer to use Python 3 over Python 2, and more + recent (contemplated) versions over older ones. Closes + ticket 26372. + + o Minor features (geoip): + - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2 + Country database. Closes ticket 26674. + + o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha): + - Upon receiving a malformed connected cell, stop processing the + cell immediately. Previously we would mark the connection for + close, but continue processing the cell as if the connection were + open. Fixes bug 26072; bugfix on 0.2.4.7-alpha. + + o Minor bugfixes (Linux seccomp2 sandbox, backport from 0.3.4.1-alpha): + - Allow the nanosleep() system call, which glibc uses to implement + sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha. + + o Minor bugfixes (testing, compatibility, backport from 0.3.4.4-rc): + - When running the hs_ntor_ref.py test, make sure only to pass + strings (rather than "bytes" objects) to the Python subprocess + module. Python 3 on Windows seems to require this. Fixes bug + 26535; bugfix on 0.3.1.1-alpha. + - When running the ntor_ref.py test, make sure only to pass strings + (rather than "bytes" objects) to the Python subprocess module. + Python 3 on Windows seems to require this. Fixes bug 26535; bugfix + on 0.2.5.5-alpha. + + o Minor bugfixes (compatibility, openssl, backport from 0.3.4.2-alpha): + - Work around a change in OpenSSL 1.1.1 where return values that + would previously indicate "no password" now indicate an empty + password. Without this workaround, Tor instances running with + OpenSSL 1.1.1 would accept descriptors that other Tor instances + would reject. Fixes bug 26116; bugfix on 0.2.5.16. + + o Minor bugfixes (documentation, backport from 0.3.3.5-rc): + - Document that the PerConnBW{Rate,Burst} options will fall back to + their corresponding consensus parameters only if those parameters + are set. Previously we had claimed that these values would always + be set in the consensus. Fixes bug 25296; bugfix on 0.2.2.7-alpha. + + o Minor bugfixes (compilation, backport from 0.3.4.4-rc): + - Fix a compilation warning on some versions of GCC when building + code that calls routerinfo_get_my_routerinfo() twice, assuming + that the second call will succeed if the first one did. Fixes bug + 26269; bugfix on 0.2.8.2-alpha. + + o Minor bugfixes (client, backport from 0.3.4.1-alpha): + - Don't consider Tor running as a client if the ControlPort is open, + but no actual client ports are open. Fixes bug 26062; bugfix + on 0.2.9.4-alpha. + + o Minor bugfixes (hardening, backport from 0.3.4.2-alpha): + - Prevent a possible out-of-bounds smartlist read in + protover_compute_vote(). Fixes bug 26196; bugfix on 0.2.9.4-alpha. + + o Minor bugfixes (C correctness, backport from 0.3.3.4-alpha): + - Fix a very unlikely (impossible, we believe) null pointer + dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by + Coverity; this is CID 1430932. + + o Minor bugfixes (onion service, backport from 0.3.4.1-alpha): + - Fix a memory leak when a v3 onion service is configured and gets a + SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha. + - When parsing the descriptor signature, look for the token plus an + extra white-space at the end. This is more correct but also will + allow us to support new fields that might start with "signature". + Fixes bug 26069; bugfix on 0.3.0.1-alpha. + + o Minor bugfixes (relay, backport from 0.3.4.3-alpha): + - Relays now correctly block attempts to re-extend to the previous + relay by Ed25519 identity. Previously they would warn in this + case, but not actually reject the attempt. Fixes bug 26158; bugfix + on 0.3.0.1-alpha. + + o Minor bugfixes (relay, crash, backport from 0.3.4.1-alpha): + - Avoid a crash when running with DirPort set but ORPort turned off. + Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha. + + o Minor bugfixes (compilation, backport from 0.3.4.2-alpha): + - Silence unused-const-variable warnings in zstd.h with some GCC + versions. Fixes bug 26272; bugfix on 0.3.1.1-alpha. + + o Minor bugfixes (testing, backport from 0.3.3.4-alpha): + - Avoid intermittent test failures due to a test that had relied on + onion service introduction point creation finishing within 5 + seconds of real clock time. Fixes bug 25450; bugfix + on 0.3.1.3-alpha. + + o Minor bugfixes (compilation, backport from 0.3.3.4-alpha): + - Fix a C99 compliance issue in our configuration script that caused + compilation issues when compiling Tor with certain versions of + xtools. Fixes bug 25474; bugfix on 0.3.2.5-alpha. + + o Minor bugfixes (memory, correctness, backport from 0.3.4.4-rc): + - Fix a number of small memory leaks identified by coverity. Fixes + bug 26467; bugfix on numerous Tor versions. + + o Code simplification and refactoring (backport from 0.3.3.5-rc): + - Move the list of default directory authorities to its own file. + Closes ticket 24854. Patch by "beastr0". + + Changes in version 0.3.2.10 - 2018-03-03 Tor 0.3.2.10 is the second stable release in the 0.3.2 series. It backports a number of bugfixes, including important fixes for security diff --git a/ReleaseNotes b/ReleaseNotes index 1ce162c8b..ccaf16d98 100644 --- a/ReleaseNotes +++ b/ReleaseNotes @@ -2,6 +2,155 @@ This document summarizes new features and bugfixes in each stable release of Tor. If you want to see more detailed descriptions of the changes in each development snapshot, see the ChangeLog file.
+Changes in version 0.3.2.11 - 2018-07-13 + Tor 0.3.2.11 moves to a new bridge authority, meaning people running + bridge relays should upgrade. We also take this opportunity to backport + other minor fixes. + + o Directory authority changes: + - The "Bifroest" bridge authority has been retired; the new bridge + authority is "Serge", and it is operated by George from the + TorBSD project. Closes ticket 26771. + + o Directory authority changes (backport from 0.3.3.7): + - Add an IPv6 address for the "dannenberg" directory authority. + Closes ticket 26343. + + o Major bugfixes (directory authorities, backport from 0.3.4.1-alpha): + - When directory authorities read a zero-byte bandwidth file, they + would previously log a warning with the contents of an + uninitialised buffer. They now log a warning about the empty file + instead. Fixes bug 26007; bugfix on 0.2.2.1-alpha. + + o Major bugfixes (onion service, backport from 0.3.4.1-alpha): + - Correctly detect when onion services get disabled after HUP. Fixes + bug 25761; bugfix on 0.3.2.1. + + o Minor features (sandbox, backport from 0.3.3.4-alpha): + - Explicitly permit the poll() system call when the Linux + seccomp2-based sandbox is enabled: apparently, some versions of + libc use poll() when calling getpwnam(). Closes ticket 25313. + + o Minor feature (continuous integration, backport from 0.3.3.5-rc): + - Update the Travis CI configuration to use the stable Rust channel, + now that we have decided to require that. Closes ticket 25714. + + o Minor features (continuous integration, backport from 0.3.4.1-alpha): + - Our .travis.yml configuration now includes support for testing the + results of "make distcheck". (It's not uncommon for "make check" + to pass but "make distcheck" to fail.) Closes ticket 25814. + - Our Travis CI configuration now integrates with the Coveralls + coverage analysis tool. Closes ticket 25818. + + o Minor features (relay, diagnostic, backport from 0.3.4.3-alpha): + - Add several checks to detect whether Tor relays are uploading + their descriptors without specifying why they regenerated them. + Diagnostic for ticket 25686. + + o Minor features (compilation, backport from 0.3.4.4-rc): + - When building Tor, prefer to use Python 3 over Python 2, and more + recent (contemplated) versions over older ones. Closes + ticket 26372. + + o Minor features (geoip): + - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2 + Country database. Closes ticket 26674. + + o Minor bugfixes (correctness, client, backport from 0.3.4.1-alpha): + - Upon receiving a malformed connected cell, stop processing the + cell immediately. Previously we would mark the connection for + close, but continue processing the cell as if the connection were + open. Fixes bug 26072; bugfix on 0.2.4.7-alpha. + + o Minor bugfixes (Linux seccomp2 sandbox, backport from 0.3.4.1-alpha): + - Allow the nanosleep() system call, which glibc uses to implement + sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha. + + o Minor bugfixes (testing, compatibility, backport from 0.3.4.4-rc): + - When running the hs_ntor_ref.py test, make sure only to pass + strings (rather than "bytes" objects) to the Python subprocess + module. Python 3 on Windows seems to require this. Fixes bug + 26535; bugfix on 0.3.1.1-alpha. + - When running the ntor_ref.py test, make sure only to pass strings + (rather than "bytes" objects) to the Python subprocess module. + Python 3 on Windows seems to require this. Fixes bug 26535; bugfix + on 0.2.5.5-alpha. + + o Minor bugfixes (compatibility, openssl, backport from 0.3.4.2-alpha): + - Work around a change in OpenSSL 1.1.1 where return values that + would previously indicate "no password" now indicate an empty + password. Without this workaround, Tor instances running with + OpenSSL 1.1.1 would accept descriptors that other Tor instances + would reject. Fixes bug 26116; bugfix on 0.2.5.16. + + o Minor bugfixes (documentation, backport from 0.3.3.5-rc): + - Document that the PerConnBW{Rate,Burst} options will fall back to + their corresponding consensus parameters only if those parameters + are set. Previously we had claimed that these values would always + be set in the consensus. Fixes bug 25296; bugfix on 0.2.2.7-alpha. + + o Minor bugfixes (compilation, backport from 0.3.4.4-rc): + - Fix a compilation warning on some versions of GCC when building + code that calls routerinfo_get_my_routerinfo() twice, assuming + that the second call will succeed if the first one did. Fixes bug + 26269; bugfix on 0.2.8.2-alpha. + + o Minor bugfixes (client, backport from 0.3.4.1-alpha): + - Don't consider Tor running as a client if the ControlPort is open, + but no actual client ports are open. Fixes bug 26062; bugfix + on 0.2.9.4-alpha. + + o Minor bugfixes (hardening, backport from 0.3.4.2-alpha): + - Prevent a possible out-of-bounds smartlist read in + protover_compute_vote(). Fixes bug 26196; bugfix on 0.2.9.4-alpha. + + o Minor bugfixes (C correctness, backport from 0.3.3.4-alpha): + - Fix a very unlikely (impossible, we believe) null pointer + dereference. Fixes bug 25629; bugfix on 0.2.9.15. Found by + Coverity; this is CID 1430932. + + o Minor bugfixes (onion service, backport from 0.3.4.1-alpha): + - Fix a memory leak when a v3 onion service is configured and gets a + SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha. + - When parsing the descriptor signature, look for the token plus an + extra white-space at the end. This is more correct but also will + allow us to support new fields that might start with "signature". + Fixes bug 26069; bugfix on 0.3.0.1-alpha. + + o Minor bugfixes (relay, backport from 0.3.4.3-alpha): + - Relays now correctly block attempts to re-extend to the previous + relay by Ed25519 identity. Previously they would warn in this + case, but not actually reject the attempt. Fixes bug 26158; bugfix + on 0.3.0.1-alpha. + + o Minor bugfixes (relay, crash, backport from 0.3.4.1-alpha): + - Avoid a crash when running with DirPort set but ORPort turned off. + Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha. + + o Minor bugfixes (compilation, backport from 0.3.4.2-alpha): + - Silence unused-const-variable warnings in zstd.h with some GCC + versions. Fixes bug 26272; bugfix on 0.3.1.1-alpha. + + o Minor bugfixes (testing, backport from 0.3.3.4-alpha): + - Avoid intermittent test failures due to a test that had relied on + onion service introduction point creation finishing within 5 + seconds of real clock time. Fixes bug 25450; bugfix + on 0.3.1.3-alpha. + + o Minor bugfixes (compilation, backport from 0.3.3.4-alpha): + - Fix a C99 compliance issue in our configuration script that caused + compilation issues when compiling Tor with certain versions of + xtools. Fixes bug 25474; bugfix on 0.3.2.5-alpha. + + o Minor bugfixes (memory, correctness, backport from 0.3.4.4-rc): + - Fix a number of small memory leaks identified by coverity. Fixes + bug 26467; bugfix on numerous Tor versions. + + o Code simplification and refactoring (backport from 0.3.3.5-rc): + - Move the list of default directory authorities to its own file. + Closes ticket 24854. Patch by "beastr0". + + Changes in version 0.3.2.10 - 2018-03-03 Tor 0.3.2.10 is the second stable release in the 0.3.2 series. It backports a number of bugfixes, including important fixes for security diff --git a/changes/bug23693.1 b/changes/bug23693.1 deleted file mode 100644 index 4b1678881..000000000 --- a/changes/bug23693.1 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (relay, crash): - - Avoid a crash when running with DirPort set but ORPort tuned off. - Fixes a case of bug 23693; bugfix on 0.3.1.1-alpha. - diff --git a/changes/bug24854 b/changes/bug24854 deleted file mode 100644 index 64e10772e..000000000 --- a/changes/bug24854 +++ /dev/null @@ -1,3 +0,0 @@ - o Code simplification and refactoring: - - Move the list of default directory authorities to their own file for - inclusion using the C preprocessor. Closes ticket 24854. Patch by "beastr0". diff --git a/changes/bug24969 b/changes/bug24969 deleted file mode 100644 index 46b2bae6f..000000000 --- a/changes/bug24969 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (Linux seccomp2 sandbox): - - Allow the nanosleep() system call, which glibc uses to implement - sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha. diff --git a/changes/bug25296_032 b/changes/bug25296_032 deleted file mode 100644 index f60048ca6..000000000 --- a/changes/bug25296_032 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (documentation): - - Document that the PerConnBW{Rate,Burst} options will fall back to their - corresponding consensus parameters only if those parameters are - set. Previously we had claimed that these values would always be - set in the consensus. Fixes bug 25296; bugfix on 0.2.2.7-alpha. diff --git a/changes/bug25450 b/changes/bug25450 deleted file mode 100644 index ae14135a7..000000000 --- a/changes/bug25450 +++ /dev/null @@ -1,8 +0,0 @@ - o Minor bugfixes (testing): - - Avoid intermittent test failures due to relying on hidden service - introductory point creation within 5 seconds of real clock time. The - time limit for the test has been increased to 500 seconds, which may - still result in intermittent failures (e.g. if the system doing the - testing enters sleep/hibernation or experiences some other clock jump). - However, this should elliminate test failures currently happening on - developer and CI systems. Fixes bug 25450; bugfix on 0.3.1.3-alpha. diff --git a/changes/bug25474 b/changes/bug25474 deleted file mode 100644 index 7d3bd1c5f..000000000 --- a/changes/bug25474 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (compilation): - - Fix a c99 compliance issue in our configuration script that was - causing compilation issues when compiling Tor with certain - versions of xtools. Fixes bug 25474; bugfix on 0.3.2.5-alpha. - diff --git a/changes/bug25629 b/changes/bug25629 deleted file mode 100644 index 190928a94..000000000 --- a/changes/bug25629 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (C correctness): - - Fix a very unlikely null pointer dereference. Fixes bug 25629; - bugfix on 0.2.9.15. Found by Coverity; this is CID 1430932. diff --git a/changes/bug25686_diagnostic b/changes/bug25686_diagnostic deleted file mode 100644 index 96323145d..000000000 --- a/changes/bug25686_diagnostic +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (relay, diagnostic): - - Add several checks to detect whether Tor relays are uploading their - descriptors without specifying why they regenerated. Diagnostic for - ticket 25686. diff --git a/changes/bug25761 b/changes/bug25761 deleted file mode 100644 index 096fadcf0..000000000 --- a/changes/bug25761 +++ /dev/null @@ -1,3 +0,0 @@ - o Major bugfixes (onion service): - - Correctly detect when onion services get disabled after HUP. - Fixes bug 25761; bugfix on 0.3.2.1. diff --git a/changes/bug25901 b/changes/bug25901 deleted file mode 100644 index 3ad30c767..000000000 --- a/changes/bug25901 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (hidden service v3): - - Fix a memory leak when an hidden service v3 is configured and gets a - SIGHUP signal. Fixes bug 25901; bugfix on 0.3.2.1-alpha. diff --git a/changes/bug26007 b/changes/bug26007 deleted file mode 100644 index efcd15084..000000000 --- a/changes/bug26007 +++ /dev/null @@ -1,5 +0,0 @@ - o Major bugfixes (directory authorities, security): - - When directory authorities read a zero-byte bandwidth file, they log - a warning with the contents of an uninitialised buffer. Log a warning - about the empty file instead. - Fixes bug 26007; bugfix on 0.2.2.1-alpha. diff --git a/changes/bug26069 b/changes/bug26069 deleted file mode 100644 index 192e97d78..000000000 --- a/changes/bug26069 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (hidden service v3): - - When parsing the descriptor signature, look for the token plus an extra - white-space at the end. This is more correct but also will allow us to - support new fields that might start with "signature". Fixes bug 26069; - bugfix on 0.3.0.1-alpha. diff --git a/changes/bug26072 b/changes/bug26072 deleted file mode 100644 index 2489e4fbb..000000000 --- a/changes/bug26072 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (correctness, client): - - Upon receiving a malformed connected cell, stop processing the cell - immediately. Previously we would mark the connection for close, but - continue processing the cell as if the connection were open. Fixes bug - 26072; bugfix on 0.2.4.7-alpha. diff --git a/changes/bug26116 b/changes/bug26116 deleted file mode 100644 index 3bfde74f7..000000000 --- a/changes/bug26116 +++ /dev/null @@ -1,7 +0,0 @@ - o Minor bugfixes (compatibility, openssl): - - Work around a change in OpenSSL 1.1.1 where - return values that would previously indicate "no password" now - indicate an empty password. Without this workaround, Tor instances - running with OpenSSL 1.1.1 would accept descriptors that other Tor - instances would reject. Fixes bug 26116; bugfix on 0.2.5.16. - diff --git a/changes/bug26158 b/changes/bug26158 deleted file mode 100644 index 0d74cf116..000000000 --- a/changes/bug26158 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (relay): - - Relays now correctly block attempts to re-extend to the previous - relay by Ed25519 identity. Previously they would warn in this case, - but not actually reject the attempt. Fixes bug 26158; bugfix on - 0.3.0.1-alpha. diff --git a/changes/bug26196 b/changes/bug26196 deleted file mode 100644 index 47fcffa0f..000000000 --- a/changes/bug26196 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor bugfixes (hardening): - - Prevent a possible out-of-bounds smartlist read in - protover_compute_vote(). Fixes bug 26196; bugfix on - 0.2.9.4-alpha. diff --git a/changes/bug26269 b/changes/bug26269 deleted file mode 100644 index 73dcdbf5c..000000000 --- a/changes/bug26269 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (compilation): - - Fix a compilation warning on some versions of GCC when - building code that calls routerinfo_get_my_routerinfo() twice, - assuming that the second call will succeed if the first one did. - Fixes bug 26269; bugfix on 0.2.8.2-alpha. diff --git a/changes/bug26272 b/changes/bug26272 deleted file mode 100644 index 9dcf42f0e..000000000 --- a/changes/bug26272 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (compilation): - - Silence unused-const-variable warnings in zstd.h on some gcc versions. - Fixes bug 26272; bugfix on 0.3.1.1-alpha. diff --git a/changes/bug26535.029 b/changes/bug26535.029 deleted file mode 100644 index 111b539f1..000000000 --- a/changes/bug26535.029 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (testing, compatibility): - - When running the ntor_ref.py test, make sure only to pass strings - (rather than "bytes" objects) to the Python subprocess module. - Python 3 on Windows seems to require this. Fixes bug 26535; bugfix on - 0.2.5.5-alpha. diff --git a/changes/bug26535.032 b/changes/bug26535.032 deleted file mode 100644 index 395d08d81..000000000 --- a/changes/bug26535.032 +++ /dev/null @@ -1,5 +0,0 @@ - o Minor bugfixes (testing, compatibility): - - When running the hs_ntor_ref.py test, make sure only to pass strings - (rather than "bytes" objects) to the Python subprocess module. - Python 3 on Windows seems to require this. Fixes bug 26535; bugfix on - 0.3.1.1-alpha. diff --git a/changes/coveralls b/changes/coveralls deleted file mode 100644 index 7fa69bb2b..000000000 --- a/changes/coveralls +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (continuous integration): - - Our Travis CI configuration now integrates with the Coveralls coverage - analysis tool. Closes ticket 25818. diff --git a/changes/feature25313 b/changes/feature25313 deleted file mode 100644 index 90f421169..000000000 --- a/changes/feature25313 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (sandbox): - - Explicitly permit the poll() system call when the Linux seccomp2-based - sandbox is enabled: apparently, some versions of libc use poll() when - calling getpwnam(). Closes ticket 25313. diff --git a/changes/feature26372_029 b/changes/feature26372_029 deleted file mode 100644 index 150ac3055..000000000 --- a/changes/feature26372_029 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (compilation): - - - When building Tor, prefer to use Python 3 over Python 2, and more - recent (contemplated) versions over older ones. Closes ticket 26372. diff --git a/changes/geoip-2018-03-08 b/changes/geoip-2018-03-08 deleted file mode 100644 index d9696aab5..000000000 --- a/changes/geoip-2018-03-08 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (geoip): - - Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2 - Country database. Closes ticket 25469. - diff --git a/changes/geoip-2018-04-03 b/changes/geoip-2018-04-03 deleted file mode 100644 index 987cc450b..000000000 --- a/changes/geoip-2018-04-03 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (geoip): - - Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2 - Country database. Closes ticket 25718. - diff --git a/changes/geoip-2018-05-01 b/changes/geoip-2018-05-01 deleted file mode 100644 index 1528bb0c3..000000000 --- a/changes/geoip-2018-05-01 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (geoip): - - Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2 - Country database. Closes ticket 26104. - diff --git a/changes/geoip-2018-06-07 b/changes/geoip-2018-06-07 deleted file mode 100644 index 0f8cff97a..000000000 --- a/changes/geoip-2018-06-07 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (geoip): - - Update geoip and geoip6 to the June 7 2018 Maxmind GeoLite2 - Country database. Closes ticket 26351. - diff --git a/changes/geoip-2018-07-03 b/changes/geoip-2018-07-03 deleted file mode 100644 index e921d63c9..000000000 --- a/changes/geoip-2018-07-03 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (geoip): - - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2 - Country database. Closes ticket 26674. - diff --git a/changes/task26771 b/changes/task26771 deleted file mode 100644 index fd700900f..000000000 --- a/changes/task26771 +++ /dev/null @@ -1,4 +0,0 @@ - o Directory authority changes: - - The "Bifroest" bridge authority has been retired; the new bridge - authority is "Serge", and it is operated by George from the - TorBSD project. Closes ticket 26771. diff --git a/changes/ticket25714 b/changes/ticket25714 deleted file mode 100644 index 63823fc6c..000000000 --- a/changes/ticket25714 +++ /dev/null @@ -1,4 +0,0 @@ - o Minor feature (continuous integration): - - Update the Travis CI configuration to use the stable Rust - channel, now that we have decided to require that. Closes - ticket 25714. diff --git a/changes/ticket26062 b/changes/ticket26062 deleted file mode 100644 index 1ee49d860..000000000 --- a/changes/ticket26062 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (client): - - Don't consider Tor running as a client if the ControlPort is open. Fixes - bug 26062; bugfix on 0.2.9.4-alpha. diff --git a/changes/ticket26343 b/changes/ticket26343 deleted file mode 100644 index ab5f332ee..000000000 --- a/changes/ticket26343 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor features (directory authority): - - Add an IPv6 address for the "dannenberg" directory - authority. Closes ticket 26343. diff --git a/changes/ticket26467 b/changes/ticket26467 deleted file mode 100644 index 45883786c..000000000 --- a/changes/ticket26467 +++ /dev/null @@ -1,3 +0,0 @@ - o Minor bugfixes (memory, correctness): - - Fix a number of small memory leaks identified by coverity. Fixes - bug 26467; bugfix on numerous Tor versions. diff --git a/changes/travis_distcheck b/changes/travis_distcheck deleted file mode 100644 index 0f278fe7e..000000000 --- a/changes/travis_distcheck +++ /dev/null @@ -1,4 +0,0 @@ - o Minor features (continuous integration): - - Our .travis.yml configuration now includes support for testing - the results of "make distcheck". (It's not uncommon for "make check" to - pass but "make distcheck" to fail.) Closes ticket 25814.
tor-commits@lists.torproject.org