[or-cvs] r18367: {tor} mark r17887 as needing a backport: some windowses let you ex (tor/branches/tor-0_2_0-patches/doc)

arma at seul.org arma at seul.org
Mon Feb 2 09:20:49 UTC 2009


Author: arma
Date: 2009-02-02 04:20:48 -0500 (Mon, 02 Feb 2009)
New Revision: 18367

Modified:
   tor/branches/tor-0_2_0-patches/doc/TODO.020
Log:
mark r17887 as needing a backport:
some windowses let you exploit them if you can hand them the
argument to inet_addr().


Modified: tor/branches/tor-0_2_0-patches/doc/TODO.020
===================================================================
--- tor/branches/tor-0_2_0-patches/doc/TODO.020	2009-02-02 09:19:04 UTC (rev 18366)
+++ tor/branches/tor-0_2_0-patches/doc/TODO.020	2009-02-02 09:20:48 UTC (rev 18367)
@@ -3,21 +3,13 @@
 description of the patch.)
 
 Backport for 0.2.0:
-   o r17891: Fix a fun OpenBSD warning.
-   o r17892: Fix another fun OpenBSD warning.
-   o r17920: bridge relays don't fetch descriptors much
+  - r17887: Don't accept 1.2.3 as a valid IP address.
 
 Backport for 0.2.0 once better tested:
-  Xo r16621: Make some DNS code more robust (partial; see also libevent
-            approach). (Also maybe r16674)
-    [Partially backported.  Instead of the basic name checking, I backported
-     r17171 instead, to be even more resistant to poisoning.]
   - r17208,r17209,r7211,r17212,r17214: Avoid gotterdammerung when an
     authority has an expired certificate.
   - r17886: Don't remove routerinfos as unlisted unless we have a
     consensus.
-  - r17887: Don't accept 1.2.3 as a valid IP address.
-  o r17917, r17993: tors that haven't run lately take 10+ minutes to start
   - r17924: Close streams when an exit hands us a local IP.
   - r18210: Call crypto_global_init() with hardwareaccel flag set right in
     all cases.



More information about the tor-commits mailing list