[or-cvs] r15782: forward-port the 0.2.0.29-rc changelog (tor/trunk)

arma at seul.org arma at seul.org
Wed Jul 9 10:10:38 UTC 2008


Author: arma
Date: 2008-07-09 06:10:37 -0400 (Wed, 09 Jul 2008)
New Revision: 15782

Modified:
   tor/trunk/ChangeLog
Log:
forward-port the 0.2.0.29-rc changelog


Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2008-07-09 09:59:39 UTC (rev 15781)
+++ tor/trunk/ChangeLog	2008-07-09 10:10:37 UTC (rev 15782)
@@ -23,6 +23,46 @@
       coderman.
 
 
+Changes in version 0.2.0.29-rc - 2008-07-08
+  o Major bugfixes:
+    - If you have more than one bridge but don't know their keys,
+      you would only launch a request for the descriptor of the first one
+      on your list. (Tor considered launching requests for the others, but
+      found that it already had a connection on the way for $0000...0000
+      so it didn't open another.) Bugfix on 0.2.0.x.
+    - If you have more than one bridge but don't know their keys, and the
+      connection to one of the bridges failed, you would cancel all
+      pending bridge connections. (After all, they all have the same
+      digest.) Bugfix on 0.2.0.x.
+    - When a hidden service was trying to establish an introduction point,
+      and Tor had built circuits preemptively for such purposes, we
+      were ignoring all the preemptive circuits and launching a new one
+      instead. Bugfix on 0.2.0.14-alpha.
+    - When a hidden service was trying to establish an introduction point,
+      and Tor *did* manage to reuse one of the preemptively built
+      circuits, it didn't correctly remember which one it used,
+      so it asked for another one soon after, until there were no
+      more preemptive circuits, at which point it launched one from
+      scratch. Bugfix on 0.0.9.x.
+    - Make directory servers include the X-Your-Address-Is: http header in
+      their responses even for begin_dir conns. Now clients who only
+      ever use begin_dir connections still have a way to learn their IP
+      address. Fixes bug 737; bugfix on 0.2.0.22-rc. Reported by goldy.
+
+  o Minor bugfixes:
+    - Fix a macro/CPP interactions that was confusing some compilers:
+      some GCCs don't like #if/#endif pairs inside macro arguments.
+      Fix for bug 707.
+    - Fix macro collision between OpenSSL 0.9.8h and Windows headers.
+      Fixes bug 704; fix from Steven Murdoch.
+    - When opening /dev/null in finish_daemonize(), do not pass the
+      O_CREAT flag. Fortify was complaining, and correctly so. Fixes
+      bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
+    - Correctly detect transparent proxy support on Linux hosts that
+      require in.h to be included before netfilter_ipv4.h.  Patch
+      from coderman.
+
+
 Changes in version 0.2.1.2-alpha - 2008-06-20
   Tor 0.2.1.2-alpha includes a new "TestingTorNetwork" config option to
   make it easier to set up your own private Tor network; fixes several



More information about the tor-commits mailing list