[or-cvs] r17141: {tor} remove some done backported items. no new items. (tor/branches/tor-0_2_0-patches/doc)

arma at seul.org arma at seul.org
Tue Oct 21 19:09:47 UTC 2008


Author: arma
Date: 2008-10-21 15:09:47 -0400 (Tue, 21 Oct 2008)
New Revision: 17141

Modified:
   tor/branches/tor-0_2_0-patches/doc/TODO.020
Log:
remove some done backported items. no new items.


Modified: tor/branches/tor-0_2_0-patches/doc/TODO.020
===================================================================
--- tor/branches/tor-0_2_0-patches/doc/TODO.020	2008-10-21 17:09:59 UTC (rev 17140)
+++ tor/branches/tor-0_2_0-patches/doc/TODO.020	2008-10-21 19:09:47 UTC (rev 17141)
@@ -2,22 +2,7 @@
 (Remember to include both the revision number _AND_ an abbreviated
 description of the patch.)
 
-Backport items for 0.2.0:
-  X r14247: tor-spec and dir-spec updates [just backport the whole files]
-
-Backport for 0.2.0 once better tested:
-  d r14830: disable openssl compression.
-  o r15699,15700: react quickly to readiness of rendezvous circuits.
-  o r15821: fix bug related to TLS session negotiation.
-  o r16136: prevent circid collision.  [Also backport to 0.1.2.x??]
-  o r16143: generate stream close events from connection_edge_destroy().
-  o r16450: open /dev/pf before dropping privileges.
-  o r16605: relays reject risky extend cells.
-  o r16698: don't use a new entry guard that's also your exit.
-
-  - r16558: Avoid mis-routing CREATED cells.
-  - r16621: Make some DNS code more robust (partial; see also libevent
-            approach). (Also maybe r16674)
+Backport for 0.2.0:
   - r16915,r16916: Don't fail hidden service request if the descriptor
             fetch fails for one descriptor version, when the other might
             still succeed. (Will be more problematic if not backported
@@ -25,8 +10,16 @@
   - r16808,r16810,r16817,r16818,r16939: Don't send tunneled hidden service
             directory requests to routers for which we don't have a
             router descriptor. (Will significantly improve reliability.)
+
+Backport for 0.2.0 once better tested:
+  o r16136: prevent circid collision.  [Also backport to 0.1.2.x??]
+
+  - r16558: Avoid mis-routing CREATED cells.
+  - r16621: Make some DNS code more robust (partial; see also libevent
+            approach). (Also maybe r16674)
   - r17091: distinguish "no routers support pending circuits" from
             "no circuits are pending."
   - r17137: send END cell in response to connect to nonexistent hidserv port.
   - r17138: reject *:* servers should never do DNS lookups.
   - r17139: Fix another case of overriding .exit choices.
+



More information about the tor-commits mailing list