Custom Query (360 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 360)

1 2 3 4

Status: closed (100 matches)

Ticket Summary Owner Type Priority Component Version
#12424 Implement improved hidden service protocol (prop224) dgoulet enhancement Very High Core Tor/Tor
#17242 prop224: Implement client support enhancement Very High Core Tor/Tor
#17690 prop224: Control the number of HSDirs using a consensus parameter dgoulet enhancement Very High Core Tor/Tor
#20524 Revise initial descriptor upload behavior for onion services dgoulet enhancement Very High Core Tor/Tor
#20657 prop224: Implement service support. dgoulet enhancement Very High Core Tor/Tor
#21403 prop224: Implement HS descriptor fetching dgoulet enhancement Very High Core Tor/Tor
#21534 "Client asked me to extend back to the previous hop" in small networks dgoulet defect Very High Core Tor/Tor
#21859 prop224: Rendezvous circuit e2e crypto asn enhancement Very High Core Tor/Tor
#22918 Add link protocol 5 throughout torspec nickm defect Very High Core Tor/Tor Tor: 0.3.1.1-alpha
#23097 The circuit timeout prediction is not working properly defect Very High Core Tor/Tor
#23310 test: prop224 client unit tests defect Very High Core Tor/Tor
#23347 Using bridges or switching to bridges sometimes does not work with tor 0.3.2 teor defect Very High Core Tor/Tor
#23387 prop224: HSdir index desynch between client and service defect Very High Core Tor/Tor
#23429 hs: assert on rend_data when pruning the v2 service list dgoulet defect Very High Core Tor/Tor
#23558 sched: KIST schedule() bad cast on monotime_diff_msec() dgoulet defect Very High Core Tor/Tor
#23751 [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc. dgoulet defect Very High Core Tor/Tor
#24186 vote: Voting schedule is not updated before voting defect Very High Core Tor/Tor
#24665 sched: In KIST, the extra_space kernel value needs to be allowed to be negative dgoulet defect Very High Core Tor/Tor Tor: 0.3.2.1-alpha
#24666 sched: Store the circuit ID instead of the full DESTROY cell in the destroy queue nickm defect Very High Core Tor/Tor
#24671 sched: KISTLite should set an upper limit to write on the outbuf dgoulet defect Very High Core Tor/Tor
#25450 Intermittent test failures for hs_service/service_intro_point isis defect Very High Core Tor/Tor Tor: 0.3.1.3-alpha
#17639 provide an option to display the expiry date of a given ed25519 signing key isis enhancement High Core Tor/Tor Tor: 0.2.7.2-alpha
#19281 Potential heap corruption via `write_escaped_data` in control.c nickm defect High Core Tor/Tor Tor: unspecified
#20532 Make sure directory_initiate_request handles pluggable transports correctly catalyst defect High Core Tor/Tor
#20575 Deprecate HTTPProxy and httpproxyauthenticator dgoulet task High Core Tor/Tor
#22173 Support looking up node by ed25519 identity (backend) nickm enhancement High Core Tor/Tor
#22276 Merge prop220/prop244 to tor-spec/dir-spec nickm defect High Core Tor/Tor
#22636 Add Travis configs so GitHub forks get CI coverage patrickod defect High Core Tor/Tor
#22644 Assert crash with HSPOST and POSTDESCRIPTOR control port commands nickm defect High Core Tor/Tor
#22791 Prop 224 encrypted public key defect High Core Tor/Tor
#22891 Add GitLab CI configs hiro defect High Core Tor/Tor
#23056 prop224: Intro point aren't transfered between services on HUP dgoulet defect High Core Tor/Tor
#23308 prop224: Implement note_connection_attempt_succeeded() in the client code dgoulet enhancement High Core Tor/Tor
#23309 hs: We need to get rid of a descriptor when entering non-overlap mode dgoulet defect High Core Tor/Tor
#23355 prop224: Implement a client purge state for NEWNYM dgoulet enhancement High Core Tor/Tor
#23360 prop224: Service has dead code which removed a feature dgoulet defect High Core Tor/Tor
#23361 prop224: client can pick super old rendezvous points defect High Core Tor/Tor
#23372 test: stack-use-after-scope in hs_service/build_update_descriptors defect High Core Tor/Tor
#23455 hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider REND_JOINED purpose dgoulet defect High Core Tor/Tor
#23466 hs: v3 client descriptor cache entry should be indexed by blinded key defect High Core Tor/Tor
#23479 Bug: ../src/or/config.c:785: get_options_mutable: Non-fatal assertion ! in_option_validation failed nickm defect High Core Tor/Tor
#23506 clock_skew_warning should be a bootstrap event catalyst defect High Core Tor/Tor
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap dgoulet defect High Core Tor/Tor
#23676 kist on 0.3.2.1-alpha-dev beats its head against a wall trying to flush a conn that's closed defect High Core Tor/Tor
#23687 kist: Channel in waiting_to_write goes missing until a destroy cell defect High Core Tor/Tor
#23762 hs-v3: Client request with missing dirinfo will always timeout dgoulet defect High Core Tor/Tor
#23783 Can't build Tor 0.3.2.2-alpha with mingw32 on Windows 7 defect High Core Tor/Tor Tor: 0.3.2.2-alpha
#23788 When I host a V3 hidden service using macOs server it requires me to have "https" in front of the onion so that it lets me connect defect High Core Tor/Tor
#24313 Crash: died: Caught signal 11 [crash from rend_consider_services_intro_points] dgoulet defect High Core Tor/Tor Tor: 0.3.2.4-alpha
#24511 TorBrowser 7.5 a8 takes multiple minutes to connect defect High Core Tor/Tor Tor: 0.3.2.7-rc
#24590 sched: Fix integer overflow for KIST dgoulet defect High Core Tor/Tor
#24595 hs_service_intro_circ_has_closed: Assertion desc failed defect High Core Tor/Tor
#3056 surprising dns responses received from hosts that aren't our resolver nickm defect Medium Core Tor/Tor Tor: 0.2.3.10-alpha
#5190 Collect Rob's patch for throttling flows at guards robgjansen task Medium Core Tor/Tor
#5966 Can we speed up bootstrapping by starting circuit building earlier? enhancement Medium Core Tor/Tor
#7890 meaningless error message displayed by tor at start up nickm defect Medium Core Tor/Tor Tor: 0.2.4.6-alpha
#11307 connection_handle_event_cb() should handle orconns correctly even when not in OR_CONN_STATE_CONNECTING andrea defect Medium Core Tor/Tor Tor: 0.2.5.3-alpha
#12541 Integrate KIST socket/circuit scheduling dgoulet enhancement Medium Core Tor/Tor
#12890 Design and implement optimizations for socket write limits enhancement Medium Core Tor/Tor
#14312 tor-spec says additional fields in exitpolicy response are "optional" when they're not nickm defect Medium Core Tor/Tor
#14948 Clarify in control-spec which relays have ns and md entries and which don't nickm defect Medium Core Tor/Tor
#15554 Put some actual hsdescs in the unit tests for parsing rl1987 enhancement Medium Core Tor/Tor
#15582 compile warning in test_util.c: In function 'test_util_sscanf' nickm defect Medium Core Tor/Tor Tor: 0.2.6.6
#15645 Document PublishServerDescriptor better defect Medium Core Tor/Tor Tor: 0.2.6.7
#17750 Make bootstrapping clients wait before trying an authority teor enhancement Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#18307 Update RSOS Proposal (260) task Medium Core Tor/Tor
#18736 [Manual] Add some information about sub-domain rules nickm task Medium Core Tor/Tor
#18891 Make it clear that Address only works for IPv4 nickm defect Medium Core Tor/Tor
#18892 Add IP versions to man page enhancement Medium Core Tor/Tor
#19254 Provide timestamps in the CIRC_BW and STREAM_BW events donncha enhancement Medium Core Tor/Tor
#19476 Use conditional intervals in heartbeat_callback defect Medium Core Tor/Tor
#19704 Deprecate ReachableDirAddresses and ClientPreferIPv6DirPort nickm enhancement Medium Core Tor/Tor
#19711 circuit_package_relay_cell(): Bug: outgoing relay cell sent from src/or/relay.c:701 has n_chan==NULL. Dropping. (on Tor 0.2.8.5-rc ) defect Medium Core Tor/Tor
#19760 Update longclaw's hard-coded IPv6 address teor defect Medium Core Tor/Tor
#19871 Crypto operation counters are unused and obsolete isis defect Medium Core Tor/Tor Tor: 0.1.2.4-alpha
#20119 Tor should exit if it fails to write its PidFile, under principle of least confusion. Also, maybe Tor should create the directory that the PidFile points to nickm enhancement Medium Core Tor/Tor Tor: 0.2.8.7
#20152 Update DirAuthority man entry for client begindir, no IPv6 DirPort nickm defect Medium Core Tor/Tor
#20456 Relative paths don't work for PidFile and control_auth_cookie defect Medium Core Tor/Tor
#20488 Nickname registration message is confusing nickm defect Medium Core Tor/Tor
#20963 [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20. nickm defect Medium Core Tor/Tor Tor: 0.2.8.9
#21031 Please don't remove ClientDNSRejectInternalAddresses Sebastian defect Medium Core Tor/Tor
#21209 Write, revise, analyze proposals for ways to use less directory bandwidth nickm project Medium Core Tor/Tor
#21212 Write and analyze proposals for transmitting microdescriptors with less bandwidth nickm defect Medium Core Tor/Tor
#21213 Write and analyze proposals for fetching consensuses/microdescriptors less frequently? nickm task Medium Core Tor/Tor
#21214 Based on measurement of #21205, write/analyze additional proposals and tickets for lowering bw usage for directory stuff task Medium Core Tor/Tor
#21215 Lower the directory overhead for low-bandwidth clients nickm project Medium Core Tor/Tor
#21283 Remove broken fallback directory mirrors defect Medium Core Tor/Tor
#21482 Run clang-scan on tor master nickm task Medium Core Tor/Tor
#21522 ClientDNSRejectInternalAddresses should not be deprecated in test networks. nickm defect Medium Core Tor/Tor
#21800 test suite triggers Bug: Result does not fit in tor_timegm but does not fail nickm defect Medium Core Tor/Tor Tor: 0.2.9.10
#21820 Update release checklist to add step about highlighting certain changes for operators enhancement Medium Core Tor/Tor
#21855 prop224: Client descriptor cache enhancement Medium Core Tor/Tor
#21856 prop224: Client introduction point failure cache enhancement Medium Core Tor/Tor
#21857 prop224: Client introduction point establishment enhancement Medium Core Tor/Tor
#21858 prop224: Client rendezvous point establishment enhancement Medium Core Tor/Tor
#21888 prop224: Groundwork for service implementation dgoulet enhancement Medium Core Tor/Tor
#21979 prop224: Load and configure service dgoulet enhancement Medium Core Tor/Tor
#22006 prop224: Validate ed25519 pubkeys to remove torsion component asn defect Medium Core Tor/Tor
#22101 Can't have relative DataDirectory with CookieAuthentication enabled Jigsaw52 defect Medium Core Tor/Tor
#22102 Can't HUP with a relative path in Log line Jigsaw52 defect Medium Core Tor/Tor
(more results for this group on next page)
1 2 3 4
Note: See TracQuery for help on using queries.