Next | Query returned 31 messages, browsing 1 to 10 | Previous

History of commit frequency

CVS Commit History:


   2008-08-01 19:25:13 by Thomas Klausner | Files touched by this commit (10) | Package removed
Log message:
Remove tor -- updated pkgsrc/net/tor based on this.
   2008-07-20 19:48:40 by Christian St. | Files touched by this commit (2)
Log message:
Updated to 0.2.0.30 (stable release!) It works again on new installs
   2008-07-11 00:48:20 by Christian St. | Files touched by this commit (2)
Log message:
Updated to version 0.2.0.29-rc

Changelog:
o Major bugfixes:
 - If you have more than one bridge but don't know their keys,
   you would only launch a request for the descriptor of the first one
   on your list. (Tor considered launching requests for the others, but
   found that it already had a connection on the way for $0000...0000
   so it didn't open another.) Bugfix on 0.2.0.x.
 - If you have more than one bridge but don't know their keys, and the
   connection to one of the bridges failed, you would cancel all
   pending bridge connections. (After all, they all have the same
   digest.) Bugfix on 0.2.0.x.
 - When a hidden service was trying to establish an introduction point,
   and Tor had built circuits preemptively for such purposes, we
   were ignoring all the preemptive circuits and launching a new one
   instead. Bugfix on 0.2.0.14-alpha.
 - When a hidden service was trying to establish an introduction point,
   and Tor *did* manage to reuse one of the preemptively built
   circuits, it didn't correctly remember which one it used,
   so it asked for another one soon after, until there were no
   more preemptive circuits, at which point it launched one from
   scratch. Bugfix on 0.0.9.x.
 - Make directory servers include the X-Your-Address-Is: http header in
   their responses even for begin_dir conns. Now clients who only
   ever use begin_dir connections still have a way to learn their IP
   address. Fixes bug 737; bugfix on 0.2.0.22-rc. Reported by goldy.

o Minor bugfixes:
 - Fix a macro/CPP interactions that was confusing some compilers:
   some GCCs don't like #if/#endif pairs inside macro arguments.
   Fix for bug 707.
 - Fix macro collision between OpenSSL 0.9.8h and Windows headers.
   Fixes bug 704; fix from Steven Murdoch.
 - When opening /dev/null in finish_daemonize(), do not pass the
   O_CREAT flag. Fortify was complaining, and correctly so. Fixes
   bug 742; fix from Michael Scherer. Bugfix on 0.0.2pre19.
 - Correctly detect transparent proxy support on Linux hosts that
   require in.h to be included before netfilter_ipv4.h.  Patch
   from coderman.
 - Disallow session resumption attempts during the renegotiation
   stage of the v2 handshake protocol.  Clients should never be
   trying session resumption at this point, but apparently some
   did, in ways that caused the handshake to fail.  Bugfix on
   0.2.0.20-rc.  Bug found by Geoff Goodell.
   2008-06-13 20:52:38 by Christian St. | Files touched by this commit (2)
Log message:
Update to 0.2.0.28-rc

Changes in version 0.2.0.28-rc - 2008-06-13
o Anonymity fixes:
 - Fix a bug where, when we were choosing the 'end stream reason' to
   put in our relay end cell that we send to the exit relay, Tor
   clients on Windows were sometimes sending the wrong 'reason'. The
   anonymity problem is that exit relays may be able to guess whether
   the client is running Windows, thus helping partition the anonymity
   set. Down the road we should stop sending reasons to exit relays,
   or otherwise prevent future versions of this bug.

o Major bugfixes:
 - While setting up a hidden service, some valid introduction circuits
   were overlooked and abandoned. This might be the reason for
   the long delay in making a hidden service available. Bugfix on
   0.2.0.13-alpha.

o Minor features:
 - Update to the "June 9 2008" ip-to-country file.
 - Run 'make test' as part of 'make dist', so we stop releasing so
   many development snapshots that fail their unit tests.

o Minor bugfixes:
 - When we're checking if we have enough dir info for each relay
   to begin establishing circuits, make sure that we actually have
   the descriptor listed in the consensus, not just any descriptor.
 - Bridge relays no longer print "xx=0" in their extrainfo document
   for every single country code in the geoip db.
 - Only warn when we fail to load the geoip file if we were planning to
   include geoip stats in our extrainfo document.
 - If we change our MaxAdvertisedBandwidth and then reload torrc,
   Tor won't realize it should publish a new relay descriptor. Fixes
   bug 688, reported by mfr.
 - When we haven't had any application requests lately, don't bother
   logging that we have expired a bunch of descriptors.
 - Make relay cells written on a connection count as non-padding when
   tracking how long a connection has been in use. Bugfix on
   0.2.0.1-alpha. Spotted by lodger.
 - Fix unit tests in 0.2.0.27-rc.
 - Fix compile on Windows.
   2008-06-04 20:53:23 by Christian St. | Files touched by this commit (2)
Log message:
oops, forgot adding patch-ab and removing patch-ac
   2008-06-04 20:49:38 by Christian St. | Files touched by this commit (6)
Log message:
- Updated to 0.2.0.27-rc
- changed maintainer Todd Vierling to me (Christian Sturm)
   2008-05-24 17:34:08 by Tobias Nygren | Files touched by this commit (146)
Log message:
This commit brought to you by the automated whitespace police (pkglint)
   2008-04-18 10:13:34 by Thomas Klausner | Files touched by this commit (2)
Log message:
Remove superfluous directory created during installation.
Add missing man page to PLIST.
   2008-03-14 21:49:08 by Johann Franz | Files touched by this commit (2)
Log message:
Updated tor 0.2.0.19-alpha to 0.2.0.21-rc.
Changes in version 0.2.0.21-rc - 2008-03-02
  Bugfixes only.
Changes in version 0.2.0.20-rc - 2008-02-24
  Tor 0.2.0.20-rc is the first release candidate for the 0.2.0 series. It
  makes more progress towards normalizing Tor's TLS handshake, makes
  hidden services work better again, helps relays bootstrap if they don't
  know their IP address, adds optional support for linking in openbsd's
  allocator or tcmalloc, allows really fast relays to scale past 15000
  sockets, and fixes a bunch of minor bugs reported by Veracode.
   2008-02-13 18:41:45 by Johann Franz | Files touched by this commit (2)
Log message:
Update tor to 0.2.0.19-alpha.
Changes in version 0.2.0.19-alpha - 2008-02-09
  Tor 0.2.0.19-alpha makes more progress towards normalizing Tor's TLS
  handshake, makes path selection for relays more secure and IP address
  guessing more robust, and generally fixes a lot of bugs in preparation
  for calling the 0.2.0 branch stable.
Changes in version 0.2.0.18-alpha - 2008-01-25
  Tor 0.2.0.18-alpha adds a sixth v3 directory authority run by CCC,
  fixes a big memory leak in 0.2.0.17-alpha, and adds new config options
  that can warn or reject connections to ports generally associated with
  vulnerable-plaintext protocols.
Changes in version 0.2.0.17-alpha - 2008-01-17
  Tor 0.2.0.17-alpha makes the tarball build cleanly again (whoops).
Changes in version 0.2.0.16-alpha - 2008-01-17
  Tor 0.2.0.16-alpha adds a fifth v3 directory authority run by Karsten
  Loesing, and generally cleans up a lot of features and minor bugs.

Next | Query returned 31 messages, browsing 1 to 10 | Previous