Custom Query (421 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 421)

1 2 3 4 5

Status: accepted (33 matches)

Ticket Summary Owner Type Priority Component Version
#22893 prop224: Make intro point per-service and not per-descriptor dgoulet enhancement Very High Core Tor/Tor
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed nickm defect High Core Tor/Tor Tor: 0.2.2.37
#14039 Many unnecessary CPU wakeups per second nickm defect High Core Tor/Tor Tor: 0.2.5.10
#15940 Make a standard transition plan for killing off a client version nickm task High Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever nickm task High Core Tor/Tor Tor: 0.2.4.1-alpha
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. nickm project High Core Tor/Tor
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS nickm defect High Core Tor/Tor
#21509 Fuzz v3 hidden services nickm task High Core Tor/Tor
#3733 Tor should abandon rendezvous circuits that cause a client request to time out dgoulet defect Medium Core Tor/Tor
#7176 Adapt and update AccessLabs' patches for reduced Tor memory consumption for embedded devices nickm enhancement Medium Core Tor/Tor Tor: unspecified
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t nickm defect Medium Core Tor/Tor
#22948 Padding, Keepalive and Drop cells should have random payloads isis defect Medium Core Tor/Tor
#22955 Specify how PrivCount will work with Tor nickm task Medium Core Tor/Tor
#22962 Clarify the security severity of issues that make denial of service easier nickm task Medium Core Tor/Tor
#23108 prop224: Don't rotate all service descriptors at once dgoulet defect Medium Core Tor/Tor
#23146 prop280: Finish privcount-in-Tor proposal (280) nickm defect Medium Core Tor/Tor
#23406 Sampled guards are not re-weighted when a new consensus arrives nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#23507 Add single onion unreachable address algorithm to prop224 dgoulet defect Medium Core Tor/Tor
#23579 sched: Add accessors for channel_pending list dgoulet enhancement Medium Core Tor/Tor
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after dgoulet defect Medium Core Tor/Tor
#23756 tor's .gitlab-ci.yml is doing mirroring? why? catalyst defect Medium Core Tor/Tor Tor: 0.3.2.2-alpha
#23989 entry_guards_update_all() will pretend to update primaries even if sampled set is empty nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#24193 Make v3 single onion services parse and use IPv6 introduce link specifiers dgoulet enhancement Medium Core Tor/Tor
#24346 prop224: Service stops uploading one of its two descriptors dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.4-alpha
#24451 Put IPv6 link specifiers in client EXTEND cells dgoulet enhancement Medium Core Tor/Tor
#24454 sandbox failure on arm64 nickm defect Medium Core Tor/Tor Tor: 0.3.2.5-alpha
#24469 Cannibalizing a circuit should check that first hop is in our guard state dgoulet defect Medium Core Tor/Tor
#24902 Denial of Service mitigation subsystem dgoulet enhancement Medium Core Tor/Tor
#21454 tor_version_compare and version spec comparison order are inconsistent nickm defect Low Core Tor/Tor
#21678 Unify Windows and Unix API for tor_read_all_handle() in util.c ahf enhancement Low Core Tor/Tor

Status: assigned (44 matches)

Ticket Summary Owner Type Priority Component Version
#20700 prop224: Implement client authorization asn enhancement Very High Core Tor/Tor
#12600 Save retrieved bridge information in our state file isis task High Core Tor/Tor
#24487 Reverse path selection (choose outer hops first) mikeperry defect High Core Tor/Tor
#24868 Check a consensus parameter before activating onion service IPv6 features teor defect High Core Tor/Tor
#17521 Support capsicum(4) on FreeBSD shawn.webb enhancement Medium Core Tor/Tor Tor: unspecified
#19566 SR: Use BUG() instead of tor_assert() when we can dgoulet enhancement Medium Core Tor/Tor
#20832 Design proposals to further improve guard security nickm enhancement Medium Core Tor/Tor
#21117 can't migrate onion services to single-hop onion services dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.8
#21205 Instrument clients to measure directory usage ahf project Medium Core Tor/Tor
#21600 Hidden service introduction point retries occur at 1 second intervals teor defect Medium Core Tor/Tor Tor: 0.2.7.2-alpha
#22233 Reconsider behavior on .z URLs with Accept-Encoding header ahf defect Medium Core Tor/Tor
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion mikeperry defect Medium Core Tor/Tor Tor: 0.3.1.1-alpha
#22926 The Tor compression code can call functions that are NULL ahf defect Medium Core Tor/Tor Tor: 0.3.1.1-alpha
#23300 prop224: General client side issues dgoulet defect Medium Core Tor/Tor
#23301 prop224: Refactor connection_ap_handle_onion dgoulet defect Medium Core Tor/Tor
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose dgoulet defect Medium Core Tor/Tor
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack dgoulet defect Medium Core Tor/Tor
#23323 sample_laplace_distribution should produce a valid result on 0.0 teor defect Medium Core Tor/Tor Tor: 0.2.6.3-alpha
#23415 sample_laplace_distribution() should take multiple random inputs teor defect Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#23416 Document the precision and limits of sample_laplace_distribution() teor enhancement Medium Core Tor/Tor
#23576 Make service_intro_point_new() take a node instead of an extend_info dgoulet defect Medium Core Tor/Tor
#23750 Isolate libevent usage to a few locations nickm enhancement Medium Core Tor/Tor
#23759 Refactor common code out of setup_introduce1_data and intro point functions dgoulet defect Medium Core Tor/Tor
#23883 document how to get Travis or GitLab CI running on your fork of tor catalyst task Medium Core Tor/Tor
#23954 Race condition in LOG_PROTOCOL_WARN nickm defect Medium Core Tor/Tor
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. mikeperry enhancement Medium Core Tor/Tor
#23988 connection_dir_request_failed() not handling HS purposes dgoulet defect Medium Core Tor/Tor
#24029 Test all rust functions' behavior when called from C with bad UTF8 chelseakomlo defect Medium Core Tor/Tor
#24062 CPU profiling of Tor on Android device ahf task Medium Core Tor/Tor
#24182 Pad INTRODUCE cells to hide the number of link specifiers dgoulet defect Medium Core Tor/Tor
#24342 Various spec fixes to dir-spec, rend-spec-v3 asn defect Medium Core Tor
#24403 Propose and implement IPv6 ORPort reachability checks on relays teor task Medium Core Tor/Tor
#24423 Fix STACK warnings in Tor catalyst defect Medium Core Tor/Tor
#24449 sched: KIST scheduler should handle limited or failed connection write dgoulet defect Medium Core Tor/Tor
#24468 Measure HSDir usage to guide parameter choices teor task Medium Core Tor/Tor
#24544 Fix more prop224 spec inconsistencies asn defect Medium Core Tor/Tor
#24587 Reset bootstrapping state on shutdown nickm defect Medium Core Tor/Tor
#24661 accept a reasonably live consensus for guard selection catalyst defect Medium Core Tor/Tor
#24688 timing wheels should use 32-bit math on 32-bit platforms nickm defect Medium Core Tor/Tor
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space dgoulet enhancement Medium Core Tor/Tor
#24815 Validate shared random state dates before each voting period dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#15059 Allow UI to identify servers by Ed25519 keys nickm enhancement Low Core Tor/Tor Tor: 0.2.7
#24343 Remove dead code and doc regarding the old SocksSocket option dgoulet defect Low Core Tor/Tor
#24847 Merge HS v3 prop284 into control-spec.txt dgoulet enhancement Low Core Tor/Tor

Status: closed (23 matches)

Ticket Summary Owner Type Priority Component Version
#20699 prop224: Add control port events and commands dgoulet enhancement Very High Core Tor/Tor
#22810 prop224: Make the client/service extend properly to the IP/RP dgoulet enhancement Very High Core Tor/Tor
#23170 Include ed25519 relay id keys in the consensus nickm task Very High Core Tor/Tor
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ dgoulet defect High Core Tor/Tor Tor: 0.3.1.3-alpha
#23105 Bug: outgoing relay cell sent from src/or/relay.c:836 has n_chan==NULL. defect High Core Tor/Tor Tor: 0.3.1.5-alpha
#23709 channel: `outgoing_queue` and `incoming_queue` are always empty dgoulet defect High Core Tor/Tor
#23710 sched: channel_more_to_flush() is probably looking at the wrong queue dgoulet defect High Core Tor/Tor
#24032 Add comments everywhere that C and Rust must stay in sync chelseakomlo defect High Core Tor/Tor
#24053 Bug: shared_random.c:918: sr_generate_our_commit: Assertion my_rsa_cert failed; aborting. dgoulet defect High Core Tor/Tor Tor: unspecified
#24687 Tor eats all mbufs on FreeBSD defect High Core Tor/Tor Tor: 0.3.1.9
#24807 UAF after updating `master` to 1dab8bae21bc32e5d4e3ff954f4919d6506ad2e1 defect High Core Tor/Tor
#24861 Using %zu seems to break mingw :/ ffmancera defect High Core Tor/Tor
#12062 Audit DisableNetwork, we_are_hibernating usage nickm defect Medium Core Tor/Tor
#13043 torspec lies about accepting both IPv4 and IPv6 for ORAddress lines teor defect Medium Core Tor/Tor
#13605 Create a client/relay-side ReducedExitPolicy enhancement Medium Core Tor/Tor
#13837 Mitigate guard discovery by pinning middle node mikeperry defect Medium Core Tor/Tor
#19610 IPv6-only clients fetch microdescriptors from a small number of IPv6 fallbacks teor defect Medium Core Tor/Tor Tor: 0.2.8.4-rc
#19990 EntryNodes is incompatible with IPv6-only bootstrap teor defect Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#20942 Make consensus expiry tolerance for fallbacks lower when the stale consensus bug is fixed teor enhancement Medium Core Tor/Fallback Scripts
#20946 Make it easier to find contacts for a fallback list enhancement Medium Core Tor/Fallback Scripts
#21109 apparent inconsistency in prop264 defect Medium Core Tor/Tor
#22145 Document which interface is used for DNS requests in the context of OutboundBindAddressOR/Exit defect Medium Core Tor/Tor Tor: 0.3.0.6
#22215 networkstatus_nickname_is_unnamed() can get ripped out enhancement Medium Core Tor/Tor
(more results for this group on next page)
1 2 3 4 5
Note: See TracQuery for help on using queries.