Custom Query (255 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 255)

1 2 3

Status: closed (100 matches)

Ticket Summary Owner Type Priority Component Version
#19025 Exit relays always return DNS TTL 60 to tor clients defect Very High Core Tor/Tor Tor: 0.2.8.2-alpha
#20826 Restrict GUARDS set to EntryNodes when the set of guards is restrictive nickm defect Very High Core Tor/Tor
#20860 Regression breaks 'SETCONF HiddenServiceDir' defect Very High Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#21107 0.3.0.x dir auths enforcing ED identity keys: intended? nickm defect Very High Core Tor/Tor Tor: 0.3.0.1-alpha
#21300 Recent changes broke GETCONF *Port nickm defect Very High Core Tor/Tor
#21369 Tor crashes with tor_assertion_failed_() [Assertion buf->datalen < INT_MAX failed in write_to_buf at ../src/or/buffers.c:832] nickm defect Very High Core Tor/Tor Tor: 0.2.9.9
#21471 handle_get_hs_descriptor_v3() does strlen(NULL) when descriptor isn't found dgoulet defect Very High Core Tor/Tor
#22447 hs: HSDir do not accept v3 descriptors properly dgoulet defect Very High Core Tor/Tor Tor: 0.3.0.1-alpha
#22508 Assertion failure in rotate_x509_certificate_callback() defect Very High Core Tor/Tor
#12595 Finalize design for improved guard-node behavior asn task High Core Tor/Tor Tor: 0.2.7
#15055 Implement ed25519 link handshake nickm enhancement High Core Tor/Tor Tor: 0.2.7
#15056 Support ed25519 identities for circuit extension nickm enhancement High Core Tor/Tor Tor: 0.2.7
#15426 Update ciphers.inc to match ciphers from current Firefox nickm enhancement High Core Tor/Tor
#17238 prop224: Implement HSDir support dgoulet enhancement High Core Tor/Tor
#17241 prop224: Implement relay side support dgoulet enhancement High Core Tor/Tor
#18319 Exclude relays that don't match pinned RSA/Ed key pairs nickm defect High Core Tor/Tor
#18571 prop224: Encode/Decode descriptor implementation dgoulet enhancement High Core Tor/Tor
#18572 prop224: HSDir descriptor cache implementation dgoulet enhancement High Core Tor/Tor
#19899 prop224: Add a consensus param to enable/disable next gen onion service dgoulet enhancement High Core Tor/Tor
#19999 Maybe test-cases should complete without BUG warnings? nickm defect High Core Tor/Tor
#20004 prop224: Add a trunnel subdirectory specifically for HS dgoulet enhancement High Core Tor/Tor
#20029 prop224: Implementation of INTRODUCE1 and INTRODUCE_ACK cells dgoulet enhancement High Core Tor/Tor
#20410 Tor master breaks bridge clients defect High Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#20459 ewma_cmp_cmux never considers policies different defect High Core Tor/Tor Tor: 0.2.6.2-alpha
#20569 hs: Use AES256 prop224 descriptors dgoulet defect High Core Tor/Tor
#20572 hs: Remove the private key material from hs_descriptor.h jryans defect High Core Tor/Tor
#20574 hs: Make a change file for #17238 defect High Core Tor/Tor
#20810 protover: Using twice the same version for old tor defect High Core Tor/Tor Tor: 0.2.9.4-alpha
#20823 [controller, prop271] GETINFO support for new guard selection logic nickm defect High Core Tor/Tor
#20824 [prop271, controller] DROPGUARDS support for new guard backend nickm defect High Core Tor/Tor
#20828 Should we provide a migration method from the old guard logic to the new one? defect High Core Tor/Tor
#20831 Support existing guard torrc options better with new guard code, or deprecate them. nickm defect High Core Tor/Tor
#20894 Resolve read-off-end-of-buffer on atoi in fetch_from_buf_http (TROVE-2016-10-001) nickm defect High Core Tor/Tor Tor: unspecified
#20906 SocksPorts and ControlPorts should be stored in a set, not a list nickm enhancement High Core Tor/Tor
#20920 Lower MAX_SAMPLE_THRESHOLD by a lot nickm defect High Core Tor/Tor
#20966 Parts of deployed shared random protocol are specified only in the proposal asn task High Core Tor/Tor
#20996 IPv6-only client fails to bootstrap on microdescriptor fetch/fallback defect High Core Tor/Tor Tor: 0.2.8.5-rc
#21007 guard: circuit_send_next_onion_skin(): Bug: 3-hop circuit <ptr> with purpose 18 has no guard state nickm defect High Core Tor/Tor Tor: 0.3.0.3-alpha
#21027 tor_bug_occurred_(): Bug: src/or/entrynodes.c:816: entry_guard_add_to_sample_impl: Non-fatal assertion !(have_sampled_guard_with_id(gs, rsa_id_digest)) failed. (on Tor 0.3.0.0-alpha-dev 8b75261b6dc341de) nickm defect High Core Tor/Tor
#21052 Bad prop271 behavior when exhausting all guards asn defect High Core Tor/Tor
#21054 hs: BUG() is triggered with ephemeral service on config reload dgoulet defect High Core Tor/Tor Tor: 0.3.0.1-alpha
#21059 shared-rand-current-value violates spec asn defect High Core Tor/Tor
#21142 prop271: circuits_pending_other_guards not properly maintained asn defect High Core Tor/Tor Tor: 0.3.0.1-alpha
#21799 Unittest fail: FAIL ../tor/src/test/test_entrynodes.c:618: assert(smartlist_len(gs_br->sampled_entry_guards) OP_EQ 2): 1 vs 2 defect High Core Tor/Tor
#21894 Base32_encode: *actually* allow inputs of odd sizes nickm defect High Core Tor/Tor
#22246 ASSERT failure on v0.3.0.6 defect High Core Tor/Tor Tor: 0.3.0.6
#22255 Frequent OOM kills of tor process defect High Core Tor/Tor
#22753 Resolve TROVE-2017-006: Regression in guard family avoidance in 0.3.0 series nickm defect High Core Tor/Tor
#23078 hs: Forgotten log_warn for prop224 intro point dgoulet defect High Core Tor/Tor
#5462 Clients should alert the user if many guards are unreachable defect Medium Core Tor/Tor Tor: 0.2.7
#6769 Relays (and bridges) don't use microdescriptors defect Medium Core Tor/Tor
#8018 path-spec does not discuss guard rotation nickm enhancement Medium Core Tor/Tor
#13827 Cell handling code duplication in channel.c pingl defect Medium Core Tor/Tor
#14881 incorrect defaults when producing bandwidth-weights line in directory footer pastly defect Medium Core Tor/Tor Tor: 0.2.7
#16852 update dir-spec.txt to match our requirements for Guard flag nickm defect Medium Core Tor/Tor
#17070 ".local" is mDNS for the local network, but tor assumes localhost jryans defect Medium Core Tor/Tor
#17849 Warn if single-stack IPv4/IPv6 clients have very restricted guard choices enhancement Medium Core Tor/Tor
#18146 Tor's control protocol misspells "Dependent" jryans defect Medium Core Tor/Tor Tor: unspecified
#18828 Regenerate fallback list for 0.2.9 teor enhancement Medium Core Tor/Tor
#19024 prop224: Refactor rend_data_t so be able to use multiple HS version dgoulet enhancement Medium Core Tor/Tor
#19043 prop224: Implementation of ESTABLISH_INTRO cell asn enhancement Medium Core Tor/Tor
#19133 Clarify how INT_N truncates values dgoulet defect Medium Core Tor/Tor
#19142 Remove the environ configure check defect Medium Core Tor/Tor
#19205 prop224: HSDir fetch/store implementation dgoulet enhancement Medium Core Tor/Tor
#19222 base64_decode() unreachable heap corruption on 32-bit systems defect Medium Core Tor/Tor Tor: unspecified
#19291 Document cell-scheduler and cell-queue stuff in detail nickm defect Medium Core Tor/Tor
#19292 Document main event loop actions in detail nickm defect Medium Core Tor/Tor
#19301 Accept Ed25519 identities in EXTEND2 cells nickm enhancement Medium Core Tor/Tor
#19302 Send ed25519 IDs in EXTEND2 cells nickm enhancement Medium Core Tor/Tor
#19642 Add a descriptor line for Single Onion Services dgoulet enhancement Medium Core Tor/Tor
#19699 Remove almost all functionality from Tor's test-network.sh defect Medium Core Tor/Tor
#19858 Move guard state out of globals per new guard plan andrea task Medium Core Tor/Tor Tor: unspecified
#19877 Implement new guard selection algorithm of prop 271 nickm task Medium Core Tor/Tor Tor: unspecified
#19878 Sample SAMPLED_GUARDS from GUARDS per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19879 Derive FILTERED_GUARDS / USABLE_FILTERED_GUARDS from SAMPLED_GUARDS per new guard plan nickm task Medium Core Tor/Tor
#19880 Maintain set of PRIMARY_GUARDS per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19881 New guard plan - guard selection for circuits nickm defect Medium Core Tor/Tor Tor: unspecified
#19882 New guard plan - update guard state when a circuit fails/succeeds nickm task Medium Core Tor/Tor Tor: unspecified
#19883 Maintain CONFIRMED_GUARDS per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19884 Retry schedule for guards per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19885 New guard plan - update list of waiting circuits nickm task Medium Core Tor/Tor Tor: unspecified
#19886 New guard plan - update state whenever we get a new consensus nickm task Medium Core Tor/Tor Tor: unspecified
#19887 New guard plan - bridge support nickm task Medium Core Tor/Tor Tor: unspecified
#19888 New guard plan - separate state instances when EntryNodes/ExcludeNodes/etc are used nickm task Medium Core Tor/Tor Tor: unspecified
#19889 New guard plan - Glue things together! nickm task Medium Core Tor/Tor Tor: unspecified
#19925 SR: Control event to get the shared random values dgoulet enhancement Medium Core Tor/Tor
#19953 DataDirectoryGroupReadable does not take effect when relay enabled dgoulet defect Medium Core Tor Tor: 0.2.8.6
#19965 Log torrc option can't handle tab after severity jryans defect Medium Core Tor/Tor Tor: 0.2.1.10-alpha
#20014 GETINFO version in torspec is inconsistent with the implementation jryans defect Medium Core Tor/Tor
#20048 Introduce `smartlist_add_strdup()` function enhancement Medium Core Tor/Tor
#20060 torspec patch for new bandwidth weight defaults defect Medium Core Tor/Tor
#20070 Make address choice failure log message more informative teor enhancement Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#20077 Make is_sensitive_dir_purpose and purpose_needs_anonymity consistent defect Medium Core Tor/Tor
#20174 Automate checking existing fallbacks haxxpop enhancement Medium Core Tor/Fallback Scripts Tor: 0.2.8.1-alpha
#20262 Onion services startup time always gets revealed twim defect Medium Core Tor/Tor
#20269 bridge users ignore their cached consensus file on startup arma defect Medium Core Tor/Tor
#20354 prop220: tristate/consensus parameter to decide if we add Ed IDs to extend cells. nickm defect Medium Core Tor/Tor
#20355 prop220: canonicity should consider all key types nickm defect Medium Core Tor/Tor
#20376 Do not mark circs for close again after relay_send_command_from_edge() twim defect Medium Core Tor/Tor
#20389 Say 'Invalid argument' instead of unclear 'Unrecognized' in HSFETCH defect Medium Core Tor/Tor
(more results for this group on next page)
1 2 3
Note: See TracQuery for help on using queries.