Anzeigen der neuesten Beiträge
0 Mitglieder und 1 Gast betrachten dieses Thema.
Tor 0.2.1.30 fixes a variety of less critical bugs. The main otherchange is a slight tweak to Tor's TLS handshake that makes relaysand bridges that run this new version reachable from Iran again.We don't expect this tweak will win the arms race long-term, but itbuys us time until we roll out a better solution.https://www.torproject.org/download/downloadChanges in version 0.2.1.30 - 2011-02-23 o Major bugfixes: - Stop sending a CLOCK_SKEW controller status event whenever we fetch directory information from a relay that has a wrong clock. Instead, only inform the controller when it's a trusted authority that claims our clock is wrong. Bugfix on 0.1.2.6-alpha; fixes the rest of bug 1074. - Fix a bounds-checking error that could allow an attacker to remotely crash a directory authority. Bugfix on 0.2.1.5-alpha. Found by "piebeer". - If relays set RelayBandwidthBurst but not RelayBandwidthRate, Tor would ignore their RelayBandwidthBurst setting, potentially using more bandwidth than expected. Bugfix on 0.2.0.1-alpha. Reported by Paul Wouters. Fixes bug 2470. - Ignore and warn if the user mistakenly sets "PublishServerDescriptor hidserv" in her torrc. The 'hidserv' argument never controlled publication of hidden service descriptors. Bugfix on 0.2.0.1-alpha. o Minor features: - Adjust our TLS Diffie-Hellman parameters to match those used by Apache's mod_ssl. - Update to the February 1 2011 Maxmind GeoLite Country database. o Minor bugfixes: - Check for and reject overly long directory certificates and directory tokens before they have a chance to hit any assertions. Bugfix on 0.2.1.28. Found by "doorss". - Bring the logic that gathers routerinfos and assesses the acceptability of circuits into line. This prevents a Tor OP from getting locked in a cycle of choosing its local OR as an exit for a path (due to a .exit request) and then rejecting the circuit because its OR is not listed yet. It also prevents Tor clients from using an OR running in the same instance as an exit (due to a .exit request) if the OR does not meet the same requirements expected of an OR running elsewhere. Fixes bug 1859; bugfix on 0.1.0.1-rc. o Packaging changes: - Stop shipping the Tor specs files and development proposal documents in the tarball. They are now in a separate git repository at git://git.torproject.org/torspec.git - Do not include Git version tags as though they are SVN tags when generating a tarball from inside a repository that has switched between branches. Bugfix on 0.2.1.15-rc; fixes bug 2402.
2011-08-08 Advanced Onion Router 0.3.0.1e- corrected: a negative status was assigned to an unsigned variable in proxy_handle_client_data()2011-08-05 Advanced Onion Router 0.3.0.1d- corrected: invalid pointer access if headers with different line terminators were received from a client in one request- corrected: when a web redirect was sent as a response for a request on a connection that was already associated with a different host the client was expected to close the connection causing some clients to wait indefinitely for the remote connection to be closed- the directory Tor-info was renamed to "Help" and the file tor-manual.html was removed; all text files related to the OR protocol were moved to Help\Tor- added a help file with explanations for all GUI settings and commands ("Help\AdvOR.html", "Help\Img")- geoip_c.h was updated with GeoIPCountryWhois.csv released on August 4th2011-07-30 Advanced Onion Router 0.3.0.1c- HTTP servers that don't send any information about the length of the message they return for statuses that allow/require an entity to be returned are assumed to close the connection after sending the response (thanks to DeepAnger for reporting this problem)2011-07-30 Advanced Onion Router 0.3.0.1b- corrected: when processing server data, a wrong buffer size could had been returned to _connection_write_to_buf_impl()- corrected: the capitalization for rewritten uTorrent HTTP headers did not match uTorrent's capitalization2011-07-28 Advanced Onion Router 0.3.0.1a- corrected the resize_info structure for the main dialog to make more room for child dialogs- uTorrent is now autodetected and its headers are re-generated as uTorrent headers (thanks to DeepAnger for reporting problems with some private trackers)- added uTorrent version pairs that are used to generate identity-dependent major browser versions when uTorrent is detected- added: new browser type on the "HTTP headers" page: "Mask a BitTorrent client as uTorrent" which can be used with BitTorrent clients that are not supported yet- updated language strings: 2930