[tor-commits] [tor/release-0.2.9] maint-0.2.9: remove changes files that are merged in 0.2.9 releases

nickm at torproject.org nickm at torproject.org
Wed Jan 23 14:51:37 UTC 2019


commit dd6c2b0ad77b5bfbf7f06b1d73f8ab85d81154bf
Author: Nick Mathewson <nickm at torproject.org>
Date:   Wed Jan 23 09:48:28 2019 -0500

    maint-0.2.9: remove changes files that are merged in 0.2.9 releases
    
    Many of these files cause check-changes to fail, which will be a
    long-term problem as we continue to support 0.2.9.
---
 changes/19974                |  5 -----
 changes/20460                |  4 ----
 changes/20492                |  4 ----
 changes/21359                |  8 --------
 changes/bastet_v6            |  4 ----
 changes/bug15582             |  4 ----
 changes/bug18100             |  5 -----
 changes/bug18329-minimal     |  6 ------
 changes/bug19025             |  4 ----
 changes/bug19869             |  4 ----
 changes/bug19926_029_info    |  3 ---
 changes/bug19960             |  4 ----
 changes/bug19968             | 11 -----------
 changes/bug19969             | 10 ----------
 changes/bug20059             |  3 ---
 changes/bug20085             |  4 ----
 changes/bug20235             |  4 ----
 changes/bug20247             |  4 ----
 changes/bug20306_029         |  4 ----
 changes/bug20307             |  7 -------
 changes/bug20401             |  4 ----
 changes/bug20423             |  6 ------
 changes/bug20424_029_minimal |  4 ----
 changes/bug20472             |  5 -----
 changes/bug20484             |  5 -----
 changes/bug20487             |  4 ----
 changes/bug20509             |  5 -----
 changes/bug20529             |  4 ----
 changes/bug20533             |  7 -------
 changes/bug20534             |  8 --------
 changes/bug20536             |  6 ------
 changes/bug20551             |  3 ---
 changes/bug20553             |  3 ---
 changes/bug20560             |  4 ----
 changes/bug20587             |  5 -----
 changes/bug20588             |  3 ---
 changes/bug20591             |  3 ---
 changes/bug20593             |  6 ------
 changes/bug20597             |  5 -----
 changes/bug20613             |  6 ------
 changes/bug20634             |  3 ---
 changes/bug20638             |  5 -----
 changes/bug20710_025         |  4 ----
 changes/bug20715             |  4 ----
 changes/bug20716             |  3 ---
 changes/bug20810             |  4 ----
 changes/bug20864             |  4 ----
 changes/bug20875             |  4 ----
 changes/bug20935             |  3 ---
 changes/bug21018             | 11 -----------
 changes/bug21035             |  6 ------
 changes/bug21051             |  3 ---
 changes/bug21074_downgrade   |  4 ----
 changes/bug21108_029         |  6 ------
 changes/bug21278_extras      |  3 ---
 changes/bug21278_prevention  |  4 ----
 changes/bug21280             |  5 -----
 changes/bug21357             |  7 -------
 changes/bug21394             |  9 ---------
 changes/bug21450             |  4 ----
 changes/bug21507             |  5 -----
 changes/bug21576             |  4 ----
 changes/bug21943             |  6 ------
 changes/bug22034             |  4 ----
 changes/bug22245             |  5 -----
 changes/bug22349             |  9 ---------
 changes/bug22370             |  4 ----
 changes/bug22446             |  4 ----
 changes/bug22460_case2       |  8 --------
 changes/bug22490             |  3 ---
 changes/bug22516             |  5 -----
 changes/bug22636             |  8 --------
 changes/bug22644             |  5 -----
 changes/bug22737             | 12 ------------
 changes/bug22789             |  7 -------
 changes/bug22797             |  4 ----
 changes/bug22801             |  5 -----
 changes/bug22838_028         |  5 -----
 changes/bug22915             |  3 ---
 changes/bug22916_027         |  3 ---
 changes/bug23030_029         |  7 -------
 changes/bug23081             |  8 --------
 changes/bug23291             |  3 ---
 changes/bug23318             | 11 -----------
 changes/bug23470             |  6 ------
 changes/bug23690             |  5 -----
 changes/bug23693             |  6 ------
 changes/bug23874             |  3 ---
 changes/bug23985             |  9 ---------
 changes/bug24167             |  7 -------
 changes/bug24170             |  3 ---
 changes/bug24198             |  4 ----
 changes/bug24313             |  5 -----
 changes/bug24480             |  3 ---
 changes/bug24633             |  5 -----
 changes/bug24666             |  7 -------
 changes/bug24736             |  6 ------
 changes/bug24854             |  3 ---
 changes/bug24895             |  8 --------
 changes/bug24898-029         |  6 ------
 changes/bug24952             |  5 -----
 changes/bug24969             |  3 ---
 changes/bug24978             |  7 -------
 changes/bug25223             |  4 ----
 changes/bug25249             |  3 ---
 changes/bug25249.2           |  3 ---
 changes/bug25440             |  5 -----
 changes/bug25629             |  3 ---
 changes/bug26007             |  5 -----
 changes/bug26072             |  5 -----
 changes/bug26116             |  7 -------
 changes/bug26196             |  4 ----
 changes/bug26269             |  5 -----
 changes/bug26485             |  4 ----
 changes/bug26535.029         |  5 -----
 changes/bug26787             |  3 ---
 changes/bug26830             |  3 ---
 changes/bug26924             |  4 ----
 changes/bug27081             |  4 ----
 changes/bug27088             |  5 -----
 changes/bug27185             |  3 ---
 changes/bug27226             |  5 -----
 changes/bug27295             |  3 ---
 changes/bug27344             |  4 ----
 changes/bug27418             |  3 ---
 changes/bug27453             |  3 ---
 changes/bug27461             |  5 -----
 changes/bug27463             |  3 ---
 changes/bug27465             |  5 -----
 changes/bug8185_025          |  6 ------
 changes/coveralls            |  3 ---
 changes/feature25313         |  4 ----
 changes/feature26372_029     |  4 ----
 changes/geoip-2017-11-06     |  4 ----
 changes/geoip-2017-12-06     |  4 ----
 changes/geoip-2018-01-05     |  4 ----
 changes/geoip-2018-02-07     |  4 ----
 changes/geoip-2018-03-08     |  4 ----
 changes/geoip-2018-04-03     |  4 ----
 changes/geoip-2018-05-01     |  4 ----
 changes/geoip-2018-06-07     |  4 ----
 changes/geoip-2018-07-03     |  4 ----
 changes/geoip-2018-08-07     |  4 ----
 changes/geoip-april2017      |  4 ----
 changes/geoip-august2017     |  4 ----
 changes/geoip-december2016   |  4 ----
 changes/geoip-february2017   |  4 ----
 changes/geoip-january2017    |  4 ----
 changes/geoip-july2017       |  4 ----
 changes/geoip-june2017       |  4 ----
 changes/geoip-march2017      |  4 ----
 changes/geoip-may2017        |  4 ----
 changes/geoip-november2016   |  4 ----
 changes/geoip-october2017    |  4 ----
 changes/geoip-september2017  |  4 ----
 changes/longclaw-ipv6        |  6 ------
 changes/longclaw_23592       |  3 ---
 changes/more_module_docs     |  4 ----
 changes/prop275-minimal      |  9 ---------
 changes/task26771            |  4 ----
 changes/ticket19769          |  7 -------
 changes/ticket20170-v3       |  5 -----
 changes/ticket21564          |  6 ------
 changes/ticket21953          |  6 ------
 changes/ticket22895          |  3 ---
 changes/ticket23856          |  4 ----
 changes/ticket23910          |  3 ---
 changes/ticket24315          |  3 ---
 changes/ticket24629          |  3 ---
 changes/ticket24681          |  6 ------
 changes/ticket24902          | 13 -------------
 changes/ticket25122          |  4 ----
 changes/ticket25170          |  5 -----
 changes/ticket25202          |  4 ----
 changes/ticket26062          |  3 ---
 changes/ticket26343          |  3 ---
 changes/ticket26467          |  3 ---
 changes/ticket26560          |  3 ---
 changes/ticket26952-ccache   |  3 ---
 changes/ticket27087          |  3 ---
 changes/ticket_24801         |  5 -----
 changes/travis_distcheck     |  4 ----
 changes/trove-2017-001       |  8 --------
 changes/trove-2017-001.2     |  8 --------
 changes/trove-2017-005       |  7 -------
 changes/trove-2017-008       |  5 -----
 changes/trove-2017-009       | 10 ----------
 changes/trove-2017-010       |  6 ------
 changes/trove-2017-011       |  8 --------
 changes/trove-2017-012-part1 |  6 ------
 changes/trove-2018-001.1     |  6 ------
 changes/trove-2018-004       |  8 --------
 192 files changed, 941 deletions(-)

diff --git a/changes/19974 b/changes/19974
deleted file mode 100644
index 5496143dd..000000000
--- a/changes/19974
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (unit tests):
-    - Fix tolerances in unit tests for monotonic time comparisons between
-      nanoseconds and microseconds. Previously, we accepted a 10 us
-      difference only, which is not realistic on every platform's
-      clock_gettime(). Fixes bug 19974; bugfix on 0.2.9.1-alpha.
diff --git a/changes/20460 b/changes/20460
deleted file mode 100644
index 9fbb4a798..000000000
--- a/changes/20460
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (testing):
-    - Use ECDHE ciphers instead of ECDH in tortls tests. LibreSSL has
-      removed the ECDH ciphers which caused the tests to fail on
-      platforms which use it. Fixes bug 20460; bugfix on 0.2.8.1-alpha.
diff --git a/changes/20492 b/changes/20492
deleted file mode 100644
index fdcd4d0b4..000000000
--- a/changes/20492
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfix (build):
-    - The current Git revision when building from a local repository is now
-      detected correctly when using git worktrees.  Fixes bug 20492; bugfix on
-      0.2.3.9-alpha.
diff --git a/changes/21359 b/changes/21359
deleted file mode 100644
index cc9b377d5..000000000
--- a/changes/21359
+++ /dev/null
@@ -1,8 +0,0 @@
-
-  o Minor features (portability, compilationc)
-    - Support building with recent LibreSSL code that uses opaque
-      structures. Closes ticket 21359.
-    - Autoconf now check to determine if OpenSSL
-      structures are opaque, instead of explicitly checking for
-      OpenSSL version numbers. 
-      Part of ticket 21359.
diff --git a/changes/bastet_v6 b/changes/bastet_v6
deleted file mode 100644
index ee4e2c809..000000000
--- a/changes/bastet_v6
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (directory authority):
-    - Add an IPv6 address for the "bastet" directory authority.
-      Closes ticket 24394.
-
diff --git a/changes/bug15582 b/changes/bug15582
deleted file mode 100644
index 5ea6431cf..000000000
--- a/changes/bug15582
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Avoid compiler warnings in the unit tests for running tor_sscanf()
-      with wide string outputs. Fixes bug 15582; bugfix on 0.2.6.2-alpha.
-
diff --git a/changes/bug18100 b/changes/bug18100
deleted file mode 100644
index cd3ba2c97..000000000
--- a/changes/bug18100
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (linux TPROXY support):
-    - Fix a typo that had prevented TPROXY-based transparent proxying from
-      working under Linux. Fixes bug 18100; bugfix on 0.2.6.3-alpha.
-      Patch from "d4fq0fQAgoJ".
-
diff --git a/changes/bug18329-minimal b/changes/bug18329-minimal
deleted file mode 100644
index 804c4e8dd..000000000
--- a/changes/bug18329-minimal
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor features (bridge):
-    - Bridges now include notice in their descriptors that they are bridges,
-      and notice of their distribution status, based on their publication
-      settings.  Implements ticket 18329.  For more fine-grained control of
-      how a bridge is distributed, upgrade to 0.3.2.x or later.
-
diff --git a/changes/bug19025 b/changes/bug19025
deleted file mode 100644
index 0f365f52b..000000000
--- a/changes/bug19025
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Major bugfixes (DNS):
-    - Fix a bug that prevented exit nodes from caching DNS records for more
-      than 60 seconds.
-      Fixes bug 19025; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug19869 b/changes/bug19869
deleted file mode 100644
index 430048f16..000000000
--- a/changes/bug19869
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (DNSPort):
-    - On DNSPort, stop logging a BUG warning on a failed hostname lookup.
-      Fixes bug 19869; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug19926_029_info b/changes/bug19926_029_info
deleted file mode 100644
index 93fd81b6c..000000000
--- a/changes/bug19926_029_info
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (logging):
-    - Downgrade a harmless log message about the pending_entry_connections
-      list from "warn" to "info". Mitigates bug 19926.
diff --git a/changes/bug19960 b/changes/bug19960
deleted file mode 100644
index 5d655859a..000000000
--- a/changes/bug19960
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (netbsd, unit tests):
-    - Stop expecting NetBSD unit tests to report success for ipfw;
-      on NetBSD, it's only pf that's supported.
-      Part of a fix for bug 19960; bugfix on 0.2.9.5-alpha.
diff --git a/changes/bug19968 b/changes/bug19968
deleted file mode 100644
index b285706e7..000000000
--- a/changes/bug19968
+++ /dev/null
@@ -1,11 +0,0 @@
-  o Minor bugfixes (relay):
-    - Do not try to parallelize workers more than 16x without the
-      user explicitly configuring us to do so, even if we do detect more than
-      16 CPU cores. Fixes bug 19968; bugfix on
-      0.2.3.1-alpha.
-
-
-  o Minor bugfixes (testing):
-    - Avoid a unit test failure on systems with over 16 detectable
-      CPU cores. Fixes bug 19968; bugfix on
-      0.2.3.1-alpha.
diff --git a/changes/bug19969 b/changes/bug19969
deleted file mode 100644
index c760c6de0..000000000
--- a/changes/bug19969
+++ /dev/null
@@ -1,10 +0,0 @@
-  o Major bugfixes (client performance):
-    - Clients now respond to new application stream requests when
-      they arrive, rather than waiting up to one second before starting
-      to handle them. Fixes part of bug 19969; bugfix on 0.2.8.1-alpha.
-
-  o Major bugfixes (clients on flaky network connections):
-    - When Tor leaves standby because of a new application request, open
-      circuits as needed to serve that request. Previously, we would
-      potentially wait a very long time. Fixes part of bug 19969; bugfix
-      on 0.2.8.1-alpha.
diff --git a/changes/bug20059 b/changes/bug20059
deleted file mode 100644
index 091fab06d..000000000
--- a/changes/bug20059
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (relay):
-    - Avoid a double-marked-circuit warning that can happen when we receive
-      DESTROY cells under heavy load. Fixes bug 20059; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug20085 b/changes/bug20085
deleted file mode 100644
index fd10e7eee..000000000
--- a/changes/bug20085
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation:
-    - Correct the minimum bandwidth value in torrc.sample, and queue a
-      corresponding change for torrc.minimal. Closes ticket 20085.
-
diff --git a/changes/bug20235 b/changes/bug20235
deleted file mode 100644
index 54026a894..000000000
--- a/changes/bug20235
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (compatibility):
-    - Work around a bug in the OSX 10.12 SDK that would prevent us
-      from successfully targetting earlier versions of OSX.
-      Resolves ticket 20235.
diff --git a/changes/bug20247 b/changes/bug20247
deleted file mode 100644
index 731cf0046..000000000
--- a/changes/bug20247
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Avoid a sandbox failure when trying to re-bind to a socket and mark
-      it as IPv6-only. Fixes bug 20247; bugfix on 0.2.5.1-alpha.
-
diff --git a/changes/bug20306_029 b/changes/bug20306_029
deleted file mode 100644
index ada2676b2..000000000
--- a/changes/bug20306_029
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (fascistfirewall):
-    - Avoid spurious warnings when ReachableAddresses or FascistFirewall
-      is set. Fixes bug 20306; bugfix on 0.2.8.2-alpha.
-
diff --git a/changes/bug20307 b/changes/bug20307
deleted file mode 100644
index 9112c9c78..000000000
--- a/changes/bug20307
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (circuit, hidden service)
-    - When closing a circuit, the reason for doing so was assigned from an int
-      value to a uint16_t which is quite a problem for negative values that are
-      our internal reasons (ex: END_CIRC_REASON_IP_NOW_REDUNDANT). On the HS
-      side, this was causing introduction points to be flagged as unusable
-      because the reason wasn't the right one due to the bad conversion.
-      Partially fixes bug 21056 and fixes bug 20307; Bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20401 b/changes/bug20401
deleted file mode 100644
index 85ab3c732..000000000
--- a/changes/bug20401
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (relay):
-    - Avoid a small memory leak when informing worker threads about rotated
-      onion keys. Fixes bug 20401; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug20423 b/changes/bug20423
deleted file mode 100644
index 32bdc3f08..000000000
--- a/changes/bug20423
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes:
-    - For relays that don't know their own address, avoid attempting
-      a local hostname resolve for each descriptor we download. Also cut
-      down on the number of "Success: chose address 'x.x.x.x'" log lines.
-      Fixes bugs 20423 and 20610; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20424_029_minimal b/changes/bug20424_029_minimal
deleted file mode 100644
index eb7886233..000000000
--- a/changes/bug20424_029_minimal
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (compilation):
-    - When compiling with --enable-openbsd-malloc or --enable-tcmalloc, tell
-      the compiler not to include the system malloc implementation. Fixes bug
-      20424; bugfix on 0.2.0.20-rc.
diff --git a/changes/bug20472 b/changes/bug20472
deleted file mode 100644
index 4d90c39f5..000000000
--- a/changes/bug20472
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (circuits):
-    - Remove a BUG warning in circuit_pick_extend_handshake. Instead, assume
-      all nodes support EXTEND2. Use ntor whenever a key is available.
-      Fixes bug 20472; bugfix on 0.2.9.3-alpha.
-
diff --git a/changes/bug20484 b/changes/bug20484
deleted file mode 100644
index 9a0b95cb3..000000000
--- a/changes/bug20484
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (single onion services):
-    - Start correctly when creating a single onion service in a
-      directory that did not previously exist. Fixes bug 20484; bugfix on
-      0.2.9.3-alpha.
-
diff --git a/changes/bug20487 b/changes/bug20487
deleted file mode 100644
index 4435f14a9..000000000
--- a/changes/bug20487
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation:
-    - Clarify that setting HiddenServiceNonAnonymousMode requires
-      you to also set "SOCKSPort 0". Fixes bug 20487; bugfix on
-      0.2.9.3-alpha.
diff --git a/changes/bug20509 b/changes/bug20509
deleted file mode 100644
index a39ca9f60..000000000
--- a/changes/bug20509
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor features:
-    - Directory authorities now reject relays running versions
-      0.2.9.1-alpha through 0.2.9.4-alpha, because those relays
-      suffer from bug 20499 and don't keep their consensus cache
-      up-to-date. Resolves ticket 20509.
diff --git a/changes/bug20529 b/changes/bug20529
deleted file mode 100644
index 276be5b2b..000000000
--- a/changes/bug20529
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (hidden services):
-    - When configuring hidden services, check every hidden service directory's
-      permissions. Previously, we only checked the last hidden service.
-      Fixes bug 20529; bugfix on 13942 commit 85bfad1 in 0.2.6.2-alpha.
diff --git a/changes/bug20533 b/changes/bug20533
deleted file mode 100644
index 7d1a45632..000000000
--- a/changes/bug20533
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (consensus downloads):
-    - If a consensus expires while we are waiting for certificates to download,
-      stop waiting for certificates.
-    - If we stop waiting for certificates less than a minute after we started
-      downloading them, do not consider the certificate download failure a
-      separate failure.
-      Fixes bug 20533; bugfix on commit e0204f21 in 0.2.0.9-alpha.
diff --git a/changes/bug20534 b/changes/bug20534
deleted file mode 100644
index 49db433a0..000000000
--- a/changes/bug20534
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (directory download scheduling):
-    - Remove the maximum delay on exponential-backoff scheduling.
-      Since we now allow an infinite number of failures (see ticket
-      20536), we must now allow the time to grow longer on each failure.
-      Fixes part of bug 20534; bugfix on 0.2.9.1-alpha.
-    - Use initial delays and decrements in download scheduling closer to
-      those from 0.2.8. Fixes another part of bug 20534; bugfix on
-      0.2.9.1-alpha.
diff --git a/changes/bug20536 b/changes/bug20536
deleted file mode 100644
index 9e0dd164b..000000000
--- a/changes/bug20536
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (download scheduling):
-    - When using an exponential backoff schedule, do not give up on
-      dowloading just because we have failed a bunch of times.  Since
-      each delay is longer than the last, retrying indefinitely won't
-      hurt. Fixes bug 20536; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug20551 b/changes/bug20551
deleted file mode 100644
index b7ec4ca7c..000000000
--- a/changes/bug20551
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Fix implicit conversion warnings under OpenSSL 1.1.
-      Fixes bug 20551; bugfix on 0.2.1.1-alpha.
diff --git a/changes/bug20553 b/changes/bug20553
deleted file mode 100644
index 12a278030..000000000
--- a/changes/bug20553
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (memory leak):
-    - Work around a memory leak in OpenSSL 1.1 when encoding public keys.
-      Fixes bug 20553; bugfix on 0.0.2pre8.
diff --git a/changes/bug20560 b/changes/bug20560
deleted file mode 100644
index 43d605b29..000000000
--- a/changes/bug20560
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (portability):
-    - Run correctly when built on Windows build environments that require
-      _vcsprintf(). Fixes bug 20560; bugfix on 0.2.2.11-alpha.
-
diff --git a/changes/bug20587 b/changes/bug20587
deleted file mode 100644
index 341b00136..000000000
--- a/changes/bug20587
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (download timing):
-    - When determining when to download a directory object, handle times
-      after 2038 if the operating system supports that.  (Someday this will be
-      important!)  Fixes bug 20587; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug20588 b/changes/bug20588
deleted file mode 100644
index 832ef8133..000000000
--- a/changes/bug20588
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (portability):
-    - Fix compilation with OpenSSL 1.1 and less commonly-used
-      CPU architectures. Closes ticket 20588.
diff --git a/changes/bug20591 b/changes/bug20591
deleted file mode 100644
index deaa738f5..000000000
--- a/changes/bug20591
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (relay bootstrap):
-    - Ensure relays don't make multiple connections during bootstrap.
-      Fixes bug 20591; bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug20593 b/changes/bug20593
deleted file mode 100644
index e9f54d317..000000000
--- a/changes/bug20593
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (client directory scheduling):
-    - Treat "relay too busy to answer request" as a failed request and a
-      reason to back off on our retry frequency. This is safe now that
-      exponential backups retry indefinitely, and avoids a bug where we would
-      reset our download schedule erroneously.
-      Fixes bug 20593; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug20597 b/changes/bug20597
deleted file mode 100644
index f199b6393..000000000
--- a/changes/bug20597
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (test networks, exponential backoff):
-    - When using exponential backoff in test networks, use a lower exponent,
-      so the delays do not vary as much. This helps test networks bootstrap
-      consistently. Fixes bug 20597; bugfix on 20499; not in any released
-      version of tor.
diff --git a/changes/bug20613 b/changes/bug20613
deleted file mode 100644
index 19bb61f4e..000000000
--- a/changes/bug20613
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (single onion services, Tor2web):
-    - Stop logging long-term one-hop circuits deliberately created by single
-      onion services and Tor2web. These log messages are intended to diagnose
-      issue 8387, which relates to circuits hanging around forever for no
-      reason.
-      Fixes bug 20613; bugfix on 0.2.9.1-alpha. Reported by "pastly".
diff --git a/changes/bug20634 b/changes/bug20634
deleted file mode 100644
index 62fc9f478..000000000
--- a/changes/bug20634
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (unit tests):
-    - Stop spurious failures in the local interface address discovery unit
-      tests. Fixes bug 20634; bugfix on 0.2.8.1-alpha; patch by Neel Chauhan.
diff --git a/changes/bug20638 b/changes/bug20638
deleted file mode 100644
index 260d7d0a7..000000000
--- a/changes/bug20638
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (hidden services):
-    - Stop ignoring hidden service key anonymity when first starting tor.
-      Instead, refuse to start tor if any hidden service key has been used in
-      a different hidden service anonymity mode.
-      Fixes bug 20638; bugfix on 17178 in 0.2.9.3-alpha; reported by ahf.
diff --git a/changes/bug20710_025 b/changes/bug20710_025
deleted file mode 100644
index 12bd07536..000000000
--- a/changes/bug20710_025
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (memory leak, use-after-free, linux seccomp2 sandbox):
-    - Fix a memory leak and use-after-free error when removing entries
-      from the sandbox's getaddrinfo() cache. Fixes bug 20710; bugfix on
-      0.2.5.5-alpha. Patch from "cypherpunks".
diff --git a/changes/bug20715 b/changes/bug20715
deleted file mode 100644
index 737a560ce..000000000
--- a/changes/bug20715
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (memory leak)
-    - When moving a signed descriptor object from a source to an existing
-      destination, free the allocated memory inside that destination object.
-      Bugfix on tor-0.2.8.3-alpha; Closes #20715.
diff --git a/changes/bug20716 b/changes/bug20716
deleted file mode 100644
index 37fd6feec..000000000
--- a/changes/bug20716
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (client, memory leak):
-    - Fix a small memory leak when receiving AF_UNIX connections on
-      a SocksPort. Fixes bug 20716; bugfix on 0.2.6.3-alpha.
diff --git a/changes/bug20810 b/changes/bug20810
deleted file mode 100644
index 5420a7317..000000000
--- a/changes/bug20810
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (relay)
-    - When computing old Tor protocol line version in protover, we were
-      looking at 0.2.7.5 twice instead of a specific case for 0.2.9.1-alpha.
-      Bugfix on tor-0.2.9.4-alpha.
diff --git a/changes/bug20864 b/changes/bug20864
deleted file mode 100644
index 7b8c70fad..000000000
--- a/changes/bug20864
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (unit tests, hidden services):
-    - Remove a double-free in the single onion service unit test. Stop
-      ignoring a return value. Make future changes less error-prone.
-      Fixes bug 20864; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug20875 b/changes/bug20875
deleted file mode 100644
index 6bba2cbc1..000000000
--- a/changes/bug20875
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (download scheduling)
-    - Resolve a "bug" warning when considering a download schedule whose
-      delay had approached INT_MAX. Fixes 20875; bugfix on 0.2.9.5-alpha.
-
diff --git a/changes/bug20935 b/changes/bug20935
deleted file mode 100644
index 78068c7c0..000000000
--- a/changes/bug20935
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (portability):
-    - Use the correct spelling of MAC_OS_X_VERSION_10_12 on configure.ac
-      Fixes bug 20935; bugfix on 0.2.9.6-rc.
diff --git a/changes/bug21018 b/changes/bug21018
deleted file mode 100644
index 49a8b47a2..000000000
--- a/changes/bug21018
+++ /dev/null
@@ -1,11 +0,0 @@
-  o Major bugfixes (parsing, security):
-
-    - Fix a bug in parsing that could cause clients to read a single
-      byte past the end of an allocated region. This bug could be
-      used to cause hardened clients (built with
-      --enable-expensive-hardening) to crash if they tried to visit
-      a hostile hidden service.  Non-hardened clients are only
-      affected depending on the details of their platform's memory
-      allocator. Fixes bug 21018; bugfix on 0.2.0.8-alpha. Found by
-      using libFuzzer. Also tracked as TROVE-2016-12-002 and as
-      CVE-2016-1254.
diff --git a/changes/bug21035 b/changes/bug21035
deleted file mode 100644
index bbf334078..000000000
--- a/changes/bug21035
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (portability):
-    - Avoid crashing when Tor is built using headers that contain
-      CLOCK_MONOTONIC_COARSE, but then tries to run on an older kernel
-      without CLOCK_MONOTONIC_COARSE. Fixes bug 21035; bugfix on
-      0.2.9.1-alpha.
-
diff --git a/changes/bug21051 b/changes/bug21051
deleted file mode 100644
index 8bb4f80c8..000000000
--- a/changes/bug21051
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Fix Libevent detection on platforms without Libevent 1 headers
-      installed. Fixes bug 21051; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug21074_downgrade b/changes/bug21074_downgrade
deleted file mode 100644
index 1bc1f8523..000000000
--- a/changes/bug21074_downgrade
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (portability):
-    - Don't exit the Tor process if setrlimit() fails to change the file
-      limit (which can happen sometimes on some versions of OSX). Fixes
-      bug 21074; bugfix on 0.0.9pre5.
diff --git a/changes/bug21108_029 b/changes/bug21108_029
deleted file mode 100644
index 3a3f004fc..000000000
--- a/changes/bug21108_029
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (directory authority):
-    - During voting, when marking a node as a probable sybil, do not
-      clear its BadExit flag: sybils can still be bad in other ways
-      too. (We still clear the other flags.) Fixes bug 21108; bugfix
-      on 0.2.0.13-alpha.
-
diff --git a/changes/bug21278_extras b/changes/bug21278_extras
deleted file mode 100644
index ffdf4a047..000000000
--- a/changes/bug21278_extras
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (code correctness):
-    - Repair a couple of (unreachable or harmless) cases of the risky
-      comparison-by-subtraction pattern that caused bug 21278.
diff --git a/changes/bug21278_prevention b/changes/bug21278_prevention
deleted file mode 100644
index e07f0a670..000000000
--- a/changes/bug21278_prevention
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (directory authority):
-    - Directory authorities now reject descriptors that claim to be
-      malformed versions of Tor. Helps prevent exploitation of bug 21278.
-      
diff --git a/changes/bug21280 b/changes/bug21280
deleted file mode 100644
index e9f0bc174..000000000
--- a/changes/bug21280
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (tor-resolve):
-    - The tor-resolve command line tool now rejects hostnames over 255
-      characters in length. Previously, it would silently truncate
-      them, which could lead to bugs. Fixes bug 21280; bugfix on 0.0.9pre5.
-      Patch by "junglefowl".
diff --git a/changes/bug21357 b/changes/bug21357
deleted file mode 100644
index a1cb43a78..000000000
--- a/changes/bug21357
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major bugfixes (IPv6 Exits):
-    - Stop rejecting all IPv6 traffic on Exits whose exit policy rejects IPv6
-      addresses. Instead, only reject a port over IPv6 if the exit policy
-      rejects that port on more than an IPv6 /16 of addresses. This bug was
-      made worse by 17027 in 0.2.8.1-alpha, which rejects a relay's own IPv6
-      address by default.
-      Fixes bug 21357; bugfix on commit 004f3f4e53 in 0.2.4.7-alpha.
diff --git a/changes/bug21394 b/changes/bug21394
deleted file mode 100644
index e5452e20b..000000000
--- a/changes/bug21394
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Major bugfixes (Exit nodes):
-    - Fix an issue causing high-bandwidth exit nodes to fail a majority
-      or all of their DNS requests, making them basically unsuitable for
-      regular usage in Tor circuits. The problem is related to
-      libevent's DNS handling, but we can work around it in Tor. Fixes
-      bugs 21394 and 18580; bugfix on 0.1.2.2-alpha which introduced
-      eventdns. Credit goes to Dhalgren for identifying and finding a
-      workaround to this bug and to gamambel, arthuredelstein and
-      arma in helping to track it down and analyze it.
diff --git a/changes/bug21450 b/changes/bug21450
deleted file mode 100644
index a1cf89ab4..000000000
--- a/changes/bug21450
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (voting consistency):
-    - Reject version numbers with components that exceed INT32_MAX.
-      Otherwise 32-bit and 64-bit platforms would behave inconsistently.
-      Fixes bug 21450; bugfix on 0.0.8pre1.
diff --git a/changes/bug21507 b/changes/bug21507
deleted file mode 100644
index f83e291b6..000000000
--- a/changes/bug21507
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (voting consistency):
-    - Reject version numbers with non-numeric prefixes (such as +, -, and
-      whitespace). Disallowing whitespace prevents differential version
-      parsing between POSIX-based and Windows platforms.
-      Fixes bug 21507 and part of 21508; bugfix on 0.0.8pre1.
diff --git a/changes/bug21576 b/changes/bug21576
deleted file mode 100644
index 68d847119..000000000
--- a/changes/bug21576
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Major bugfixes (crash, directory connections):
-    - Fix a rare crash when sending a begin cell on a circuit whose linked
-      directory connection has already been closed. Fixes bug 21576;
-      bugfix on Tor 0.2.9.3-alpha. Reported by alecmuffett.
diff --git a/changes/bug21943 b/changes/bug21943
deleted file mode 100644
index dbe2c726d..000000000
--- a/changes/bug21943
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (Linux seccomp2 sandbox):
-    - The getpid() system call is now permitted under the Linux seccomp2
-      sandbox, to avoid crashing with versions of OpenSSL (and other
-      libraries) that attempt to learn the process's PID by using the
-      syscall rather than the VDSO code. Fixes bug 21943; bugfix on
-      0.2.5.1-alpha.
diff --git a/changes/bug22034 b/changes/bug22034
deleted file mode 100644
index 6d9e18874..000000000
--- a/changes/bug22034
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (control port, regression):
-    - The GETINFO extra-info/digest/<digest> command was broken because of a
-      wrong base16 decode return value check. In was introduced in a refactor
-      of that API. Fixex bug #22034; bugfix on tor-0.2.9.1-alpha.
diff --git a/changes/bug22245 b/changes/bug22245
deleted file mode 100644
index 6ae18593e..000000000
--- a/changes/bug22245
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (bandwidth accounting):
-    - Roll over monthly accounting at the configured hour and minute,
-      rather than always at 00:00.
-      Fixes bug 22245; bugfix on 0.0.9rc1.
-      Found by Andrey Karpov with PVS-Studio.
diff --git a/changes/bug22349 b/changes/bug22349
deleted file mode 100644
index bb43404bf..000000000
--- a/changes/bug22349
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor bugfixes (directory authority):
-    - When a directory authority rejects a descriptor or extrainfo with
-      a given digest, mark that digest as undownloadable, so that we
-      do not attempt to download it again over and over. We previously
-      tried to avoid downloading such descriptors by other means, but
-      we didn't notice if we accidentally downloaded one anyway. This
-      behavior became problematic in 0.2.7.2-alpha, when authorities
-      began pinning Ed25519 keys. Fixes ticket
-      22349; bugfix on 0.2.1.19-alpha.
diff --git a/changes/bug22370 b/changes/bug22370
deleted file mode 100644
index e0e87e333..000000000
--- a/changes/bug22370
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (memory handling):
-    - When directory authorities reject a router descriptor due to keypinning,
-      free the router descriptor rather than leaking the memory.
-      Fixes bug 22370; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug22446 b/changes/bug22446
deleted file mode 100644
index eab65aac0..000000000
--- a/changes/bug22446
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (code style, backport from 0.3.1.3-alpha):
-    - Add "Falls through" comments to our codebase, in order to silence
-      GCC 7's -Wimplicit-fallthrough warnings. Patch from Andreas
-      Stieger. Closes ticket 22446.
diff --git a/changes/bug22460_case2 b/changes/bug22460_case2
deleted file mode 100644
index 0a1175983..000000000
--- a/changes/bug22460_case2
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Major bugfixes (relay, link handshake):
-
-    - When performing the v3 link handshake on a TLS connection, report that
-      we have the x509 certificate that we actually used on that connection,
-      even if we have changed certificates since that connection was first
-      opened. Previously, we would claim to have used our most recent x509
-      link certificate, which would sometimes make the link handshake fail.
-      Fixes one case of bug 22460; bugfix on 0.2.3.6-alpha.
diff --git a/changes/bug22490 b/changes/bug22490
deleted file mode 100644
index 244dd50b3..000000000
--- a/changes/bug22490
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (correctness):
-    - Avoid undefined behavior when parsing IPv6 entries from the geoip6
-      file. Fixes bug 22490; bugfix on 0.2.4.6-alpha.
diff --git a/changes/bug22516 b/changes/bug22516
deleted file mode 100644
index f024a3c47..000000000
--- a/changes/bug22516
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Permit the fchmod system call, to avoid crashing on startup when
-      starting with the seccomp2 sandbox and an unexpected set of permissions
-      on the data directory or its contents. Fixes bug 22516; bugfix on
-      0.2.5.4-alpha.
diff --git a/changes/bug22636 b/changes/bug22636
deleted file mode 100644
index 770cac72e..000000000
--- a/changes/bug22636
+++ /dev/null
@@ -1,8 +0,0 @@
- o Build features:
-   - Tor's repository now includes a Travis Continuous Integration (CI)
-     configuration file (.travis.yml). This is meant to help new developers and
-     contributors who fork Tor to a Github repository be better able to test
-     their changes, and understand what we expect to pass. To use this new build
-     feature, you must fork Tor to your Github account, then go into the
-     "Integrations" menu in the repository settings for your fork and enable
-     Travis, then push your changes.
diff --git a/changes/bug22644 b/changes/bug22644
deleted file mode 100644
index 9b8742eda..000000000
--- a/changes/bug22644
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (controller):
-    - Do not crash when receiving a POSTDESCRIPTOR command with an
-      empty body. Fixes part of bug 22644; bugfix on 0.2.0.1-alpha.
-    - Do not crash when receiving a HSPOST command with an empty body.
-      Fixes part of bug 22644; bugfix on 0.2.7.1-alpha.
diff --git a/changes/bug22737 b/changes/bug22737
deleted file mode 100644
index f0de8e6c4..000000000
--- a/changes/bug22737
+++ /dev/null
@@ -1,12 +0,0 @@
-  o Minor bugfixes (defensive programming, undefined behavior):
-
-    - Fix a memset() off the end of an array when packing cells.  This
-      bug should be harmless in practice, since the corrupted bytes
-      are still in the same structure, and are always padding bytes,
-      ignored, or immediately overwritten, depending on compiler
-      behavior. Nevertheless, because the memset()'s purpose is to
-      make sure that any other cell-handling bugs can't expose bytes
-      to the network, we need to fix it. Fixes bug 22737; bugfix on
-      0.2.4.11-alpha. Fixes CID 1401591.
-
-
diff --git a/changes/bug22789 b/changes/bug22789
deleted file mode 100644
index a65359284..000000000
--- a/changes/bug22789
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major bugfixes (openbsd, denial-of-service):
-    - Avoid an assertion failure bug affecting our implementation of
-      inet_pton(AF_INET6) on certain OpenBSD systems whose strtol()
-      handling of "0xfoo" differs from what we had expected.
-      Fixes bug 22789; bugfix on 0.2.3.8-alpha. Also tracked as
-      TROVE-2017-007.
-
diff --git a/changes/bug22797 b/changes/bug22797
deleted file mode 100644
index 619baaa40..000000000
--- a/changes/bug22797
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (file limits):
-    - When setting the maximum number of connections allowed by the OS,
-      always allow some extra file descriptors for other files.
-      Fixes bug 22797; bugfix on 0.2.0.10-alpha.
diff --git a/changes/bug22801 b/changes/bug22801
deleted file mode 100644
index 7edc79bc8..000000000
--- a/changes/bug22801
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (compilation):
-    - When building with certain versions the mingw C header files, avoid
-      float-conversion warnings when calling the C functions isfinite(),
-      isnan(), and signbit(). Fixes bug 22801; bugfix on 0.2.8.1-alpha.
-
diff --git a/changes/bug22838_028 b/changes/bug22838_028
deleted file mode 100644
index 1d0a4fbfd..000000000
--- a/changes/bug22838_028
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (compilation, mingw, backport from 0.3.1.1-alpha):
-    - Backport a fix for an "unused variable" warning that appeared
-      in some versions of mingw. Fixes bug 22838; bugfix on
-      0.2.8.1-alpha.
-
diff --git a/changes/bug22915 b/changes/bug22915
deleted file mode 100644
index 17a9c6018..000000000
--- a/changes/bug22915
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation warnings):
-    - Suppress -Wdouble-promotion warnings with clang 4.0. Fixes bug 22915;
-      bugfix on 0.2.8.1-alpha.
diff --git a/changes/bug22916_027 b/changes/bug22916_027
deleted file mode 100644
index 5cf99c7d1..000000000
--- a/changes/bug22916_027
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (Compilation):
-    - Fix warnings when building with libscrypt and openssl scrypt support
-      on Clang. Fixes bug 22916; bugfix on 0.2.7.2-alpha.
diff --git a/changes/bug23030_029 b/changes/bug23030_029
deleted file mode 100644
index 89a1b507d..000000000
--- a/changes/bug23030_029
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (coverity builds):
-    - Avoid Coverity build warnings related to our BUG() macro. By
-      default, Coverity treats BUG() as the Linux kernel does: an
-      instant abort(). We need to override that so our BUG() macro
-      doesn't prevent Coverity from analyzing functions that use it.
-      Fixes bug 23030; bugfix on 0.2.9.1-alpha.
-
diff --git a/changes/bug23081 b/changes/bug23081
deleted file mode 100644
index 76c4e3097..000000000
--- a/changes/bug23081
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (Windows service):
-    - When running as a Windows service, set the ID of the main thread
-      correctly. Failure to do so made us fail to send log messages
-      to the controller in 0.2.1.16-rc, slowed down controller
-      event delivery in 0.2.7.3-rc and later, and crash with an assertion
-      failure in 0.3.1.1-alpha. Fixes bug 23081; bugfix on 0.2.1.6-alpha.
-      Patch and diagnosis from "Vort".
-
diff --git a/changes/bug23291 b/changes/bug23291
deleted file mode 100644
index a5b0efda0..000000000
--- a/changes/bug23291
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (testing):
-    - Fix an undersized buffer in test-memwipe.c. Fixes bug 23291; bugfix on
-      0.2.7.2-alpha. Found and patched by Ties Stuij.
diff --git a/changes/bug23318 b/changes/bug23318
deleted file mode 100644
index 7fcb8d448..000000000
--- a/changes/bug23318
+++ /dev/null
@@ -1,11 +0,0 @@
-  o Minor bugfixes (path selection):
-    - When selecting relays by bandwidth, avoid a rounding error that
-      could sometimes cause load to be imbalanced incorrectly. Previously,
-      we would always round upwards; now, we round towards the nearest
-      integer.  This had the biggest effect when a relay's weight adjustments
-      should have given it weight 0, but it got weight 1 instead.
-      Fixes bug 23318; bugfix on 0.2.4.3-alpha.
-    - When calculating the fraction of nodes that have descriptors, and all
-      all nodes in the network have zero bandwidths, count the number of nodes
-      instead.
-      Fixes bug 23318; bugfix on 0.2.4.10-alpha.
diff --git a/changes/bug23470 b/changes/bug23470
deleted file mode 100644
index 33367b3a3..000000000
--- a/changes/bug23470
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfix (relay address resolution):
-    - Avoid unnecessary calls to directory_fetches_from_authorities()
-      on relays. This avoids spurious address resolutions and
-      descriptor rebuilds. This is a mitigation for 21789. The original
-      bug was introduced in commit 35bbf2e as part of prop210.
-      Fixes 23470 in 0.2.8.1-alpha.
diff --git a/changes/bug23690 b/changes/bug23690
deleted file mode 100644
index 36ff32e49..000000000
--- a/changes/bug23690
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (relay, crash, assertion failure):
-    - Fix a timing-based assertion failure that could occur when the
-      circuit out-of-memory handler freed a connection's output buffer.
-      Fixes bug 23690; bugfix on 0.2.6.1-alpha.
-
diff --git a/changes/bug23693 b/changes/bug23693
deleted file mode 100644
index 796398be5..000000000
--- a/changes/bug23693
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (relay, crash):
-    - Avoid a crash when transitioning from client mode to bridge mode.
-      Previously, we would launch the worker threads whenever our "public
-      server" mode changed, but not when our "server" mode changed.
-      Fixes bug 23693; bugfix on 0.2.6.3-alpha.
-
diff --git a/changes/bug23874 b/changes/bug23874
deleted file mode 100644
index bf6620553..000000000
--- a/changes/bug23874
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (memory safety):
-    - Clear the address when node_get_prim_orport() returns early.
-      Fixes bug 23874; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug23985 b/changes/bug23985
deleted file mode 100644
index 9cb593796..000000000
--- a/changes/bug23985
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor bugfixes (bootstrapping):
-    - Fetch descriptors aggressively whenever we lack enough
-      to build circuits, regardless of how many descriptors we are missing.
-      Previously, we would delay launching the fetch when we had fewer than
-      15 missing descriptors, even if some of those descriptors were
-      blocking circuits from building. Fixes bug 23985; bugfix on
-      0.1.1.11-alpha. The effects of this bug became worse in 0.3.0.3-alpha,
-      when we began treating missing descriptors from our primary guards
-      as a reason to delay circuits.
diff --git a/changes/bug24167 b/changes/bug24167
deleted file mode 100644
index fd0d87eff..000000000
--- a/changes/bug24167
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (network layer):
-    - When closing a connection via close_connection_immediately(), we
-      mark it as "not blocked on bandwidth", to prevent later calls
-      from trying to unblock it, and give it permission to read. This
-      fixes a backtrace warning that can happen on relays under various
-      circumstances. Fixes bug 24167; bugfix on 0.1.0.1-rc.
-
diff --git a/changes/bug24170 b/changes/bug24170
deleted file mode 100644
index d3d734769..000000000
--- a/changes/bug24170
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (path selection):
-    - Actually log the total bandwidth in compute_weighted_bandwidths().
-      Fixes bug 24170; bugfix on 0.2.4.3-alpha.
diff --git a/changes/bug24198 b/changes/bug24198
deleted file mode 100644
index 679070687..000000000
--- a/changes/bug24198
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (controller, linux seccomp2 sandbox):
-    - Avoid a crash when attempting to use the seccomp2 sandbox
-      together with the OwningControllerProcess feature.
-      Fixes bug 24198; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24313 b/changes/bug24313
deleted file mode 100644
index b927ec3ba..000000000
--- a/changes/bug24313
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (security, hidden service v2):
-    - Fix a use-after-free error that could crash v2 Tor hidden services
-      when it failed to open circuits while expiring introductions
-      points. Fixes bug 24313; bugfix on 0.2.7.2-alpha.  This
-      issue is also tracked as TROVE-2017-013 and CVE-2017-8823.
diff --git a/changes/bug24480 b/changes/bug24480
deleted file mode 100644
index 94e5b91a0..000000000
--- a/changes/bug24480
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Fix a signed/unsigned comparison warning introduced by our
-      fix to TROVE-2017-009. Fixes bug 24480; bugfix on 0.2.5.16.
diff --git a/changes/bug24633 b/changes/bug24633
deleted file mode 100644
index 028c7cc14..000000000
--- a/changes/bug24633
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (portability, msvc):
-    - Fix a bug in the bit-counting parts of our timing-wheel code on
-      MSVC. (Note that MSVC is still not a supported build platform,
-      due to cyptographic timing channel risks.) Fixes bug 24633;
-      bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug24666 b/changes/bug24666
deleted file mode 100644
index 830775f5f..000000000
--- a/changes/bug24666
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (memory usage):
-
-    - When queuing DESTROY cells on a channel, only queue the
-      circuit-id and reason fields: not the entire 514-byte
-      cell. This fix should help mitigate any bugs or attacks that
-      fill up these queues, and free more RAM for other uses. Fixes
-      bug 24666; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24736 b/changes/bug24736
deleted file mode 100644
index 632560932..000000000
--- a/changes/bug24736
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (address selection):
-    - When the fascist_firewall_choose_address_ functions don't find a
-      reachable address, set the returned address to the null address and port.
-      This is a precautionary measure, because some callers do not check the
-      return value.
-      Fixes bug 24736; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug24854 b/changes/bug24854
deleted file mode 100644
index 64e10772e..000000000
--- a/changes/bug24854
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Code simplification and refactoring:
-    - Move the list of default directory authorities to their own file for
-      inclusion using the C preprocessor. Closes ticket 24854. Patch by "beastr0".
diff --git a/changes/bug24895 b/changes/bug24895
deleted file mode 100644
index 7edde94a0..000000000
--- a/changes/bug24895
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Major bugfixes (onion services):
-    - Fix an "off by 2" error in counting rendezvous failures on the onion
-      service side. While we thought we would stop the rendezvous attempt
-      after one failed circuit, we were actually making three circuit attempts
-      before giving up. Now switch to a default of 2, and allow the consensus
-      parameter "hs_service_max_rdv_failures" to override. Fixes bug 24895;
-      bugfix on 0.0.6.
-
diff --git a/changes/bug24898-029 b/changes/bug24898-029
deleted file mode 100644
index b33f09384..000000000
--- a/changes/bug24898-029
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (relay):
-    - Make the internal channel_is_client() function look at what sort
-      of connection handshake the other side used, rather than whether
-      the other side ever sent a create_fast cell to us. Backports part
-      of the fixes from bugs 22805 and 24898.
-
diff --git a/changes/bug24952 b/changes/bug24952
deleted file mode 100644
index 93174c04f..000000000
--- a/changes/bug24952
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfix (channel connection):
-    - The accurate address of a connection is real_addr, not the addr member.
-      TLS Channel remote address is now real_addr content instead of addr
-      member. Fixes bug 24952; bugfix on 707c1e2e26 in 0.2.4.11-alpha.
-      Patch by "ffmancera".
diff --git a/changes/bug24969 b/changes/bug24969
deleted file mode 100644
index 46b2bae6f..000000000
--- a/changes/bug24969
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (Linux seccomp2 sandbox):
-    - Allow the nanosleep() system call, which glibc uses to implement
-      sleep() and usleep(). Fixes bug 24969; bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug24978 b/changes/bug24978
deleted file mode 100644
index 5dc45c744..000000000
--- a/changes/bug24978
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor features (compatibility, OpenSSL):
-    - Tor will now support TLS1.3 once OpenSSL 1.1.1 is released.
-      Previous versions of Tor would not have worked with OpenSSL
-      1.1.1, since they neither disabled TLS 1.3 nor enabled any of the
-      ciphersuites it requires. Here we enable the TLS 1.3 ciphersuites.
-      Closes ticket 24978.
-
diff --git a/changes/bug25223 b/changes/bug25223
deleted file mode 100644
index fdd556350..000000000
--- a/changes/bug25223
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (DoS mitigation):
-    - Make sure we don't modify consensus parameters if we aren't a public
-      relay when a new consensus arrives. Fixes bug 25223; bugfix on
-      0.3.3.2-alpha.
diff --git a/changes/bug25249 b/changes/bug25249
deleted file mode 100644
index b4153eeae..000000000
--- a/changes/bug25249
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (spec conformance):
-    - Forbid "-0" as a protocol version. Fixes part of bug 25249; bugfix on
-      0.2.9.4-alpha.
diff --git a/changes/bug25249.2 b/changes/bug25249.2
deleted file mode 100644
index 9058c1107..000000000
--- a/changes/bug25249.2
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (spec conformance):
-    - Forbid UINT32_MAX as a protocol version.  Fixes part of bug 25249;
-      bugfix on 0.2.9.4-alpha.
diff --git a/changes/bug25440 b/changes/bug25440
deleted file mode 100644
index f8d9dd4fa..000000000
--- a/changes/bug25440
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (linux seccomp2 sandbox):
-    - Fix a bug in out sandboxing rules for the openat() syscall.
-      Previously, no openat() call would be permitted, which would break
-      filesystem operations on recent glibc versions. Fixes bug 25440;
-      bugfix on 0.2.9.15. Diagnosis and patch from Daniel Pinto.
diff --git a/changes/bug25629 b/changes/bug25629
deleted file mode 100644
index 190928a94..000000000
--- a/changes/bug25629
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (C correctness):
-    - Fix a very unlikely null pointer dereference.  Fixes bug 25629;
-      bugfix on 0.2.9.15.  Found by Coverity; this is CID 1430932.
diff --git a/changes/bug26007 b/changes/bug26007
deleted file mode 100644
index efcd15084..000000000
--- a/changes/bug26007
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (directory authorities, security):
-    - When directory authorities read a zero-byte bandwidth file, they log
-      a warning with the contents of an uninitialised buffer. Log a warning
-      about the empty file instead.
-      Fixes bug 26007; bugfix on 0.2.2.1-alpha.
diff --git a/changes/bug26072 b/changes/bug26072
deleted file mode 100644
index 2489e4fbb..000000000
--- a/changes/bug26072
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (correctness, client):
-    - Upon receiving a malformed connected cell, stop processing the cell
-      immediately.  Previously we would mark the connection for close, but
-      continue processing the cell as if the connection were open. Fixes bug
-      26072; bugfix on 0.2.4.7-alpha.
diff --git a/changes/bug26116 b/changes/bug26116
deleted file mode 100644
index 3bfde74f7..000000000
--- a/changes/bug26116
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Minor bugfixes (compatibility, openssl):
-    - Work around a change in OpenSSL 1.1.1 where
-      return values that would previously indicate "no password" now
-      indicate an empty password. Without this workaround, Tor instances
-      running with OpenSSL 1.1.1 would accept descriptors that other Tor
-      instances would reject. Fixes bug 26116; bugfix on 0.2.5.16.
-      
diff --git a/changes/bug26196 b/changes/bug26196
deleted file mode 100644
index 47fcffa0f..000000000
--- a/changes/bug26196
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (hardening):
-    - Prevent a possible out-of-bounds smartlist read in
-      protover_compute_vote(). Fixes bug 26196; bugfix on
-      0.2.9.4-alpha.
diff --git a/changes/bug26269 b/changes/bug26269
deleted file mode 100644
index 73dcdbf5c..000000000
--- a/changes/bug26269
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Fix a compilation warning on some versions of GCC when
-      building code that calls routerinfo_get_my_routerinfo() twice,
-      assuming that the second call will succeed if the first one did.
-      Fixes bug 26269; bugfix on 0.2.8.2-alpha.
diff --git a/changes/bug26485 b/changes/bug26485
deleted file mode 100644
index 5a40b7a78..000000000
--- a/changes/bug26485
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (directory authority):
-    - When voting for recommended versions, make sure that all of the
-      versions are well-formed and parsable. Fixes bug 26485; bugfix on
-      0.1.1.6-alpha.
diff --git a/changes/bug26535.029 b/changes/bug26535.029
deleted file mode 100644
index 111b539f1..000000000
--- a/changes/bug26535.029
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (testing, compatibility):
-    - When running the ntor_ref.py test, make sure only to pass strings
-      (rather than "bytes" objects) to the Python subprocess module.
-      Python 3 on Windows seems to require this.  Fixes bug 26535; bugfix on
-      0.2.5.5-alpha.
diff --git a/changes/bug26787 b/changes/bug26787
deleted file mode 100644
index b32e519a9..000000000
--- a/changes/bug26787
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (testing):
-    - Disable core dumps in test_bt.sh, to avoid failures in "make
-      distcheck". Fixes bug 26787; bugfix on 0.2.5.2-alpha.
diff --git a/changes/bug26830 b/changes/bug26830
deleted file mode 100644
index c002f1953..000000000
--- a/changes/bug26830
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (continuous integration):
-    - Skip an unreliable key generation test on Windows, until the underlying
-      issue in bug 26076 is resolved. Fixes bug 26830; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug26924 b/changes/bug26924
deleted file mode 100644
index 882db56b4..000000000
--- a/changes/bug26924
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (single onion services, Tor2web):
-    - Log a protocol warning when single onion services or Tor2web clients
-      fail to authenticate direct connections to relays.
-      Fixes bug 26924; bugfix on 0.2.9.1-alpha.
diff --git a/changes/bug27081 b/changes/bug27081
deleted file mode 100644
index 74e0efbd2..000000000
--- a/changes/bug27081
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (compilation, windows):
-    - Don't link or search for pthreads when building for Windows, even if we
-      are using build environment (like mingw) that provides a pthreads
-      library. Fixes bug 27081; bugfix on 0.1.0.1-rc.
diff --git a/changes/bug27088 b/changes/bug27088
deleted file mode 100644
index d4d3b292c..000000000
--- a/changes/bug27088
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (continuous integration):
-    - Pass the module flags to distcheck configure, and
-      log the flags before running configure. (Backported
-      to 0.2.9 and later as a precaution.)
-      Fixes bug 27088; bugfix on 0.3.4.1-alpha.
diff --git a/changes/bug27185 b/changes/bug27185
deleted file mode 100644
index 79221b3df..000000000
--- a/changes/bug27185
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (Windows, compilation):
-    - Silence a compilation warning on MSVC 2017 and clang-cl.
-      Fixes bug 27185; bugfix on 0.2.2.2-alpha.
diff --git a/changes/bug27226 b/changes/bug27226
deleted file mode 100644
index 9030773cd..000000000
--- a/changes/bug27226
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (testing, openssl compatibility):
-    - Our "tortls/cert_matches_key" unit test no longer relies on OpenSSL
-      internals.  Previously, it relied on unsupported OpenSSL behavior in
-      a way that caused it to crash with OpenSSL 1.0.2p. Fixes bug 27226;
-      bugfix on 0.2.5.1-alpha.
diff --git a/changes/bug27295 b/changes/bug27295
deleted file mode 100644
index c5a364877..000000000
--- a/changes/bug27295
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (testing, chutney):
-    - Before running make test-network-all, delete old logs and test result
-      files, to avoid spurious failures. Fixes bug 27295; bugfix on 0.2.7.3-rc.
diff --git a/changes/bug27344 b/changes/bug27344
deleted file mode 100644
index 9f6685558..000000000
--- a/changes/bug27344
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (compatibility):
-    - Tell OpenSSL to maintain backward compatibility with previous
-      RSA1024/DH1024 users in Tor. With OpenSSL 1.1.1-pre6, these ciphers
-      are disabled by default. Closes ticket 27344.
diff --git a/changes/bug27418 b/changes/bug27418
deleted file mode 100644
index 1d99497dc..000000000
--- a/changes/bug27418
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (continuous integration):
-    - When we use echo in Travis, don't pass a --flag as the first argument.
-      Fixes bug 27418; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27453 b/changes/bug27453
deleted file mode 100644
index 4501346d2..000000000
--- a/changes/bug27453
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (continuous integration):
-    - When a Travis build fails, and showing a log fails, keep trying to
-      show the other logs. Fixes bug 27453; bugfix on 0.3.4.7-rc.
diff --git a/changes/bug27461 b/changes/bug27461
deleted file mode 100644
index 3571ee816..000000000
--- a/changes/bug27461
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Stop calling SetProcessDEPPolicy() on 64-bit Windows. It is not
-      supported, and always fails. Some compilers warn about the function
-      pointer cast on 64-bit Windows.
-      Fixes bug 27461; bugfix on 0.2.2.23-alpha.
diff --git a/changes/bug27463 b/changes/bug27463
deleted file mode 100644
index 073acdd99..000000000
--- a/changes/bug27463
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (onion services):
-    - Silence a spurious compiler warning in rend_client_send_introduction().
-      Fixes bug 27463; bugfix on 0.1.1.2-alpha.
diff --git a/changes/bug27465 b/changes/bug27465
deleted file mode 100644
index 743b35130..000000000
--- a/changes/bug27465
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Silence a spurious compiler warning on the GetAdaptersAddresses
-      function pointer cast. This issue is already fixed by 26481 in
-      0.3.5 and later, by removing the lookup and cast.
-      Fixes bug 27465; bugfix on 0.2.3.11-alpha.
diff --git a/changes/bug8185_025 b/changes/bug8185_025
deleted file mode 100644
index 1bfc12b1e..000000000
--- a/changes/bug8185_025
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor bugfixes (logging, relay shutdown, annoyance):
-    - When a circuit is marked for close, do not attempt to package any cells
-      for channels on that circuit. Previously, we would detect this
-      condition lower in the call stack, when we noticed that the circuit had
-      no attached channel, and log an annoying message. Fixes bug 8185;
-      bugfix on 0.2.5.4-alpha.
diff --git a/changes/coveralls b/changes/coveralls
deleted file mode 100644
index 7fa69bb2b..000000000
--- a/changes/coveralls
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (continuous integration):
-    - Our Travis CI configuration now integrates with the Coveralls coverage
-      analysis tool. Closes ticket 25818.
diff --git a/changes/feature25313 b/changes/feature25313
deleted file mode 100644
index 90f421169..000000000
--- a/changes/feature25313
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (sandbox):
-    - Explicitly permit the poll() system call when the Linux seccomp2-based
-      sandbox is enabled: apparently, some versions of libc use poll() when
-      calling getpwnam(). Closes ticket 25313.
diff --git a/changes/feature26372_029 b/changes/feature26372_029
deleted file mode 100644
index 150ac3055..000000000
--- a/changes/feature26372_029
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (compilation):
-
-    - When building Tor, prefer to use Python 3 over Python 2, and more
-      recent (contemplated) versions over older ones. Closes ticket 26372.
diff --git a/changes/geoip-2017-11-06 b/changes/geoip-2017-11-06
deleted file mode 100644
index f034be900..000000000
--- a/changes/geoip-2017-11-06
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the November 6 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-2017-12-06 b/changes/geoip-2017-12-06
deleted file mode 100644
index ae4fb1149..000000000
--- a/changes/geoip-2017-12-06
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the December 6 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-2018-01-05 b/changes/geoip-2018-01-05
deleted file mode 100644
index 59aba02d0..000000000
--- a/changes/geoip-2018-01-05
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the January 5 2018 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-2018-02-07 b/changes/geoip-2018-02-07
deleted file mode 100644
index f45228fd7..000000000
--- a/changes/geoip-2018-02-07
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the February 7 2018 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-2018-03-08 b/changes/geoip-2018-03-08
deleted file mode 100644
index d9696aab5..000000000
--- a/changes/geoip-2018-03-08
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2
-      Country database. Closes ticket 25469.
-
diff --git a/changes/geoip-2018-04-03 b/changes/geoip-2018-04-03
deleted file mode 100644
index 987cc450b..000000000
--- a/changes/geoip-2018-04-03
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the April 3 2018 Maxmind GeoLite2
-      Country database. Closes ticket 25718.
-
diff --git a/changes/geoip-2018-05-01 b/changes/geoip-2018-05-01
deleted file mode 100644
index 1528bb0c3..000000000
--- a/changes/geoip-2018-05-01
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the May 1 2018 Maxmind GeoLite2
-      Country database. Closes ticket 26104.
-
diff --git a/changes/geoip-2018-06-07 b/changes/geoip-2018-06-07
deleted file mode 100644
index 0f8cff97a..000000000
--- a/changes/geoip-2018-06-07
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the June 7 2018 Maxmind GeoLite2
-      Country database. Closes ticket 26351.
-
diff --git a/changes/geoip-2018-07-03 b/changes/geoip-2018-07-03
deleted file mode 100644
index e921d63c9..000000000
--- a/changes/geoip-2018-07-03
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the July 3 2018 Maxmind GeoLite2
-      Country database. Closes ticket 26674.
-
diff --git a/changes/geoip-2018-08-07 b/changes/geoip-2018-08-07
deleted file mode 100644
index 9ddbe7b1b..000000000
--- a/changes/geoip-2018-08-07
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the August 7 2018 Maxmind GeoLite2
-      Country database. Closes ticket 27089.
-
diff --git a/changes/geoip-april2017 b/changes/geoip-april2017
deleted file mode 100644
index b489eaf01..000000000
--- a/changes/geoip-april2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the April 4 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-august2017 b/changes/geoip-august2017
deleted file mode 100644
index 2dab18a63..000000000
--- a/changes/geoip-august2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the August 3 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-december2016 b/changes/geoip-december2016
deleted file mode 100644
index 60754ea21..000000000
--- a/changes/geoip-december2016
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the December 7 2016 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-february2017 b/changes/geoip-february2017
deleted file mode 100644
index ec54b6122..000000000
--- a/changes/geoip-february2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the February 8 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-january2017 b/changes/geoip-january2017
deleted file mode 100644
index 77bc9a599..000000000
--- a/changes/geoip-january2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the January 4 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-july2017 b/changes/geoip-july2017
deleted file mode 100644
index ed10369f1..000000000
--- a/changes/geoip-july2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the July 4 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-june2017 b/changes/geoip-june2017
deleted file mode 100644
index 2ea7bf105..000000000
--- a/changes/geoip-june2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the June 8 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-march2017 b/changes/geoip-march2017
deleted file mode 100644
index 6dc92baa2..000000000
--- a/changes/geoip-march2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the March 7 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-may2017 b/changes/geoip-may2017
deleted file mode 100644
index 4e504d7a0..000000000
--- a/changes/geoip-may2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the May 2 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-november2016 b/changes/geoip-november2016
deleted file mode 100644
index b3f9913bb..000000000
--- a/changes/geoip-november2016
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (ge0oip):
-    - Update geoip and geoip6 to the November 3 2016 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-october2017 b/changes/geoip-october2017
deleted file mode 100644
index 11f623e85..000000000
--- a/changes/geoip-october2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (geoip):
-    - Update geoip and geoip6 to the October 4 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/geoip-september2017 b/changes/geoip-september2017
deleted file mode 100644
index be01ff952..000000000
--- a/changes/geoip-september2017
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features:
-    - Update geoip and geoip6 to the September 6 2017 Maxmind GeoLite2
-      Country database.
-
diff --git a/changes/longclaw-ipv6 b/changes/longclaw-ipv6
deleted file mode 100644
index 75899c9d0..000000000
--- a/changes/longclaw-ipv6
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor features (directory authorities):
-    - Remove longclaw's IPv6 address, as it will soon change.
-      Authority IPv6 addresses were originally added in 0.2.8.1-alpha.
-      This leaves 3/8 directory authorities with IPv6 addresses, but there
-      are also 52 fallback directory mirrors with IPv6 addresses.
-      Resolves 19760.
diff --git a/changes/longclaw_23592 b/changes/longclaw_23592
deleted file mode 100644
index 91e2da897..000000000
--- a/changes/longclaw_23592
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Directory authority changes:
-    - The directory authority "Longclaw" has changed its IP address.
-      Closes ticket 23592.
diff --git a/changes/more_module_docs b/changes/more_module_docs
deleted file mode 100644
index 0066ddfcf..000000000
--- a/changes/more_module_docs
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Documentation:
-    - Module-level documentation for several more modules. Closes tickets 
-      19287 and 
-      19290.
diff --git a/changes/prop275-minimal b/changes/prop275-minimal
deleted file mode 100644
index 83d42f850..000000000
--- a/changes/prop275-minimal
+++ /dev/null
@@ -1,9 +0,0 @@
-  o Minor features (future-proofing):
-
-    - Tor no longer refuses to download microdescriptors or descriptors if
-      they are listed as "published in the future".  This change will
-      eventually allow us to stop listing meaningful "published" dates
-      in microdescriptor consensuses, and thereby allow us to reduce the
-      resources required to download consensus diffs by over 50%.
-      Implements part of ticket 21642; implements part of proposal 275.
-
diff --git a/changes/task26771 b/changes/task26771
deleted file mode 100644
index fd700900f..000000000
--- a/changes/task26771
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Directory authority changes:
-    - The "Bifroest" bridge authority has been retired; the new bridge
-      authority is "Serge", and it is operated by George from the
-      TorBSD project. Closes ticket 26771.
diff --git a/changes/ticket19769 b/changes/ticket19769
deleted file mode 100644
index 9fc05c3e9..000000000
--- a/changes/ticket19769
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major features (security):
-    - Change the algorithm used to decide DNS TTLs on client and server side,
-      to better resist DNS-based correlation attacks like the DefecTor attack
-      of Greschbach, Pulls, Roberts, Winter, and Feamster).  Now
-      relays only return one of two possible DNS TTL values, and clients
-      are willing to believe DNS TTL values up to 3 hours long.
-      Closes ticket 19769.
diff --git a/changes/ticket20170-v3 b/changes/ticket20170-v3
deleted file mode 100644
index d634e7205..000000000
--- a/changes/ticket20170-v3
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor features (fallback directory list):
-    - Replace the 81 remaining fallbacks of the 100 originally introduced
-      in Tor 0.2.8.3-alpha in March 2016, with a list of 177 fallbacks
-      (123 new, 54 existing, 27 removed) generated in December 2016.
-      Resolves ticket 20170.
diff --git a/changes/ticket21564 b/changes/ticket21564
deleted file mode 100644
index 7e01f41f8..000000000
--- a/changes/ticket21564
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor features (fallback directory list):
-    - Replace the 177 fallbacks originally introduced in Tor 0.2.9.8 in
-      December 2016 (of which ~126 were still functional), with a list of
-      151 fallbacks (32 new, 119 existing, 58 removed) generated in
-      May 2017.
-      Resolves ticket 21564.
diff --git a/changes/ticket21953 b/changes/ticket21953
deleted file mode 100644
index 7cc84f506..000000000
--- a/changes/ticket21953
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor features:
-    - Enable a couple of pieces of Windows hardening: one
-      (HeapEnableTerminationOnCorruption) that has been on-by-default since
-      Windows 8, and unavailable before Windows 7, and one
-      (PROCESS_DEP_DISABLE_ATL_THUNK_EMULATION) which we believe doesn't
-      affect us, but shouldn't do any harm. Closes ticket 21953.
diff --git a/changes/ticket22895 b/changes/ticket22895
deleted file mode 100644
index a3f7b8601..000000000
--- a/changes/ticket22895
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (compilation):
-    - Fix unused variable warnings in donna's Curve25519 SSE2 code.
-      Fixes bug 22895; bugfix on 0.2.7.2-alpha.
diff --git a/changes/ticket23856 b/changes/ticket23856
deleted file mode 100644
index 049da18d0..000000000
--- a/changes/ticket23856
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor feature (relay statistics): 
-    - Change relay bandwidth reporting stats interval from 4 hours to 24 hours
-      in order to reduce the efficiency of guard discovery attacks. Fixes
-      ticket 23856.
diff --git a/changes/ticket23910 b/changes/ticket23910
deleted file mode 100644
index eb38fcf32..000000000
--- a/changes/ticket23910
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Directory authority changes:
-    - Add bastet as a ninth directory authority to the default list. Closes
-      ticket 23910.
diff --git a/changes/ticket24315 b/changes/ticket24315
deleted file mode 100644
index df34dbf41..000000000
--- a/changes/ticket24315
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Major features (linux seccomp2 sandbox):
-    - Update the sandbox rules so that they should now work correctly with
-      Glibc 2.26.  Closes  ticket 24315.
diff --git a/changes/ticket24629 b/changes/ticket24629
deleted file mode 100644
index 482c0a1a6..000000000
--- a/changes/ticket24629
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (continuous integration):
-    - Enable macOS builds in our Travis CI configuration.
-      Closes ticket 24629.
diff --git a/changes/ticket24681 b/changes/ticket24681
deleted file mode 100644
index cc0a42b2e..000000000
--- a/changes/ticket24681
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Minor features (fallback directory mirrors):
-    - Make the default DirAuthorityFallbackRate 0.1, so that clients on the
-      public tor network prefer to bootstrap off fallback directory mirrors.
-      This is a follow-up to 24679, which removed weights from the default
-      fallbacks.
-      Implements ticket 24681.
diff --git a/changes/ticket24902 b/changes/ticket24902
deleted file mode 100644
index 1a2ef95cc..000000000
--- a/changes/ticket24902
+++ /dev/null
@@ -1,13 +0,0 @@
-  o Major features (denial of service mitigation):
-    - Give relays some defenses against the recent network overload. We start
-      with three defenses (default parameters in parentheses). First: if a
-      single client address makes too many concurrent connections (>100), hang
-      up on further connections. Second: if a single client address makes
-      circuits too quickly (more than 3 per second, with an allowed burst of
-      90) while also having too many connections open (3), refuse new create
-      cells for the next while (1-2 hours). Third: if a client asks to
-      establish a rendezvous point to you directly, ignore the request. These
-      defenses can be manually controlled by new torrc options, but relays
-      will also take guidance from consensus parameters, so there's no need to
-      configure anything manually. Implements ticket 24902.
-
diff --git a/changes/ticket25122 b/changes/ticket25122
deleted file mode 100644
index 2921811b2..000000000
--- a/changes/ticket25122
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor feature (geoip cache):
-    - Make our OOM handler aware of the geoip client history cache so it
-      doesn't fill up the memory which is especially important for IPv6 and
-      our DoS mitigation subsystem. Closes ticket 25122.
diff --git a/changes/ticket25170 b/changes/ticket25170
deleted file mode 100644
index 065213940..000000000
--- a/changes/ticket25170
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor bugfix (directory authority, documentation):
-    - When a fingerprint or network address is marked as rejected, the
-      returned message by the authority now explicitly mention to set a valid
-      ContactInfo address and contact the bad-relays@ mailing list. Fixes bug
-      25170; bugfix on 0.2.9.1.
diff --git a/changes/ticket25202 b/changes/ticket25202
deleted file mode 100644
index ba64abad7..000000000
--- a/changes/ticket25202
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor bugfixes (DoS mitigation):
-    - Add extra safety checks when refilling the circuit creation bucket to
-      ensure we never set a value that is above the allowed burst. Fixes
-      bug 25202; bugfix on 0.3.3.2-alpha.
diff --git a/changes/ticket26062 b/changes/ticket26062
deleted file mode 100644
index 1ee49d860..000000000
--- a/changes/ticket26062
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (client):
-    - Don't consider Tor running as a client if the ControlPort is open. Fixes
-      bug 26062; bugfix on 0.2.9.4-alpha.
diff --git a/changes/ticket26343 b/changes/ticket26343
deleted file mode 100644
index ab5f332ee..000000000
--- a/changes/ticket26343
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (directory authority):
-    - Add an IPv6 address for the "dannenberg" directory
-      authority. Closes ticket 26343.
diff --git a/changes/ticket26467 b/changes/ticket26467
deleted file mode 100644
index 45883786c..000000000
--- a/changes/ticket26467
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor bugfixes (memory, correctness):
-    - Fix a number of small memory leaks identified by coverity. Fixes
-      bug 26467; bugfix on numerous Tor versions.
diff --git a/changes/ticket26560 b/changes/ticket26560
deleted file mode 100644
index 5b4fb1bfe..000000000
--- a/changes/ticket26560
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (continuous integration):
-    - Install libcap-dev and libseccomp2-dev so these optional
-      dependencies get tested on Travis CI.  Closes ticket 26560.
diff --git a/changes/ticket26952-ccache b/changes/ticket26952-ccache
deleted file mode 100644
index edc115e9d..000000000
--- a/changes/ticket26952-ccache
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (continuous integration):
-    - Use ccache in our Travis CI configuration.
-      Closes ticket 26952.
diff --git a/changes/ticket27087 b/changes/ticket27087
deleted file mode 100644
index b8af70aaa..000000000
--- a/changes/ticket27087
+++ /dev/null
@@ -1,3 +0,0 @@
-  o Minor features (continuous integration):
-    - Run asciidoc during Travis CI.
-      Implements ticket 27087.
diff --git a/changes/ticket_24801 b/changes/ticket_24801
deleted file mode 100644
index f5f6c831a..000000000
--- a/changes/ticket_24801
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Minor features (new fallback directories):
-    - The fallback directory list has been re-generated based on the
-      current status of the network. Tor uses fallback directories to
-      bootstrap it doesn't yet have up-to-date directory
-      information. Closes ticket 24801.
diff --git a/changes/travis_distcheck b/changes/travis_distcheck
deleted file mode 100644
index 0f278fe7e..000000000
--- a/changes/travis_distcheck
+++ /dev/null
@@ -1,4 +0,0 @@
-  o Minor features (continuous integration):
-    - Our .travis.yml configuration now includes support for testing
-      the results of "make distcheck". (It's not uncommon for "make check" to
-      pass but "make distcheck" to fail.)  Closes ticket 25814.
diff --git a/changes/trove-2017-001 b/changes/trove-2017-001
deleted file mode 100644
index 5187e6d5f..000000000
--- a/changes/trove-2017-001
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Major bugfixes (security):
-    - Downgrade the "-ftrapv" option from "always on" to "only on when
-      --enable-expensive-hardening is provided."  This hardening option, like
-      others, can turn survivable bugs into crashes--and having it on by
-      default made a (relatively harmless) integer overflow bug into a
-      denial-of-service bug. Fixes bug 21278 (TROVE-2017-001); bugfix on
-      0.2.9.1-alpha.
-
diff --git a/changes/trove-2017-001.2 b/changes/trove-2017-001.2
deleted file mode 100644
index 3ef073cf9..000000000
--- a/changes/trove-2017-001.2
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Major bugfixes (parsing):
-    - Fix an integer underflow bug when comparing malformed Tor versions.
-      This bug is harmless, except when Tor has been built with
-      --enable-expensive-hardening, which would turn it into a crash;
-      or on Tor 0.2.9.1-alpha through Tor 0.2.9.8, which were built with
-      -ftrapv by default.
-      Part of TROVE-2017-001. Fixes bug 21278; bugfix on
-      0.0.8pre1. Found by OSS-Fuzz.
diff --git a/changes/trove-2017-005 b/changes/trove-2017-005
deleted file mode 100644
index cebb013f8..000000000
--- a/changes/trove-2017-005
+++ /dev/null
@@ -1,7 +0,0 @@
-  o Major bugfixes (hidden service, relay, security):
-    - Fix an assertion failure caused by receiving a BEGIN_DIR cell on
-      a hidden service rendezvous circuit. Fixes bug 22494, tracked as
-      TROVE-2017-005 and CVE-2017-0376; bugfix on 0.2.2.1-alpha. Found
-      by armadev.
-
-
diff --git a/changes/trove-2017-008 b/changes/trove-2017-008
deleted file mode 100644
index 4b9c5b0a1..000000000
--- a/changes/trove-2017-008
+++ /dev/null
@@ -1,5 +0,0 @@
-  o Major bugfixes (security, hidden services, loggging):
-    - Fix a bug where we could log uninitialized stack when a certain
-      hidden service error occurred while SafeLogging was disabled.
-      Fixes bug #23490; bugfix on 0.2.7.2-alpha.
-      This is also tracked as TROVE-2017-008 and CVE-2017-0380.
diff --git a/changes/trove-2017-009 b/changes/trove-2017-009
deleted file mode 100644
index 166a5faec..000000000
--- a/changes/trove-2017-009
+++ /dev/null
@@ -1,10 +0,0 @@
-  o Major bugfixes (security):
-    - When checking for replays in the INTRODUCE1 cell data for a (legacy)
-      hiddden service, correctly detect replays in the RSA-encrypted part of
-      the cell. We were previously checking for replays on the entire cell,
-      but those can be circumvented due to the malleability of Tor's legacy
-      hybrid encryption. This fix helps prevent a traffic confirmation
-      attack. Fixes bug 24244; bugfix on 0.2.4.1-alpha. This issue is also
-      tracked as TROVE-2017-009 and CVE-2017-8819.
-
-
diff --git a/changes/trove-2017-010 b/changes/trove-2017-010
deleted file mode 100644
index d5bf9333d..000000000
--- a/changes/trove-2017-010
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (security):
-    - Fix a denial-of-service issue where an attacker could crash
-      a directory authority using a malformed router descriptor.
-      Fixes bug 24245; bugfix on 0.2.9.4-alpha. Also tracked
-      as TROVE-2017-010 and CVE-2017-8820.
-
diff --git a/changes/trove-2017-011 b/changes/trove-2017-011
deleted file mode 100644
index 82d20d9e7..000000000
--- a/changes/trove-2017-011
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Major bugfixes (security):
-    - Fix a denial of service bug where an attacker could use a malformed
-      directory object to cause a Tor instance to pause while OpenSSL would
-      try to read a passphrase from the terminal. (If the terminal was not
-      available, tor would continue running.)  Fixes bug 24246; bugfix on
-      every version of Tor.  Also tracked as TROVE-2017-011 and
-      CVE-2017-8821.  Found by OSS-Fuzz as testcase 6360145429790720.
-
diff --git a/changes/trove-2017-012-part1 b/changes/trove-2017-012-part1
deleted file mode 100644
index 9fccc2cf6..000000000
--- a/changes/trove-2017-012-part1
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (security, relay):
-    - When running as a relay, make sure that we never build a path through
-      ourselves, even in the case where we have somehow lost the version of
-      our descriptor appearing in the consensus. Fixes part of bug 21534;
-      bugfix on 0.2.0.1-alpha. This issue is also tracked as TROVE-2017-012
-      and CVE-2017-8822.
diff --git a/changes/trove-2018-001.1 b/changes/trove-2018-001.1
deleted file mode 100644
index f0ee92f40..000000000
--- a/changes/trove-2018-001.1
+++ /dev/null
@@ -1,6 +0,0 @@
-  o Major bugfixes (denial-of-service, directory authority):
-    - Fix a protocol-list handling bug that could be used to remotely crash
-      directory authorities with a null-pointer exception. Fixes bug 25074;
-      bugfix on 0.2.9.4-alpha. Also tracked as TROVE-2018-001.
-
-
diff --git a/changes/trove-2018-004 b/changes/trove-2018-004
deleted file mode 100644
index 37e0a89b0..000000000
--- a/changes/trove-2018-004
+++ /dev/null
@@ -1,8 +0,0 @@
-  o Minor bugfixes (denial-of-service):
-    - Fix a possible crash on malformed consensus. If a consensus had
-      contained an unparseable protocol line, it could have made clients
-      and relays crash with a null-pointer exception. To exploit this
-      issue, however, an attacker would need to be able to subvert the
-      directory-authority system. Fixes bug 25251; bugfix on
-      0.2.9.4-alpha. Also tracked as TROVE-2018-004.
-





More information about the tor-commits mailing list