Custom Query (272 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 272)

1 2 3

Status: closed (100 matches)

Ticket Summary Owner Type Priority Component Version
#20699 prop224: Add control port events and commands dgoulet enhancement Very High Core Tor/Tor
#22810 prop224: Make the client/service extend properly to the IP/RP dgoulet enhancement Very High Core Tor/Tor
#23170 Include ed25519 relay id keys in the consensus nickm task Very High Core Tor/Tor
#24031 Protover.rs could use a better algorithm isis defect Very High Core Tor/Tor Tor: 0.3.3.1-alpha
#24228 Tor keeps on creating new circuits even when it's idle defect Very High Core Tor/Tor Tor: 0.3.1.1-alpha
#24767 All relays are constantly connecting to down relays and failing over and over dgoulet enhancement Very High Core Tor/Tor
#24902 Denial of Service mitigation subsystem dgoulet enhancement Very High Core Tor/Tor
#25128 Bug: src/or/dos.c:312: cc_stats_refill_bucket: Non-fatal assertion new_circuit_bucket_count >= stats->circuit_bucket failed dgoulet defect Very High Core Tor/Tor
#25193 dos: Avoid blacklisting Exit relays dgoulet defect Very High Core Tor/Tor
#3940 Allow MapAddress .exit even if AllowDotExit is 0 defect High Core Tor/Tor Tor: 0.2.2.32
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ dgoulet defect High Core Tor/Tor Tor: 0.3.1.3-alpha
#23105 Bug: outgoing relay cell sent from src/or/relay.c:836 has n_chan==NULL. defect High Core Tor/Tor Tor: 0.3.1.5-alpha
#23709 channel: `outgoing_queue` and `incoming_queue` are always empty dgoulet defect High Core Tor/Tor
#23710 sched: channel_more_to_flush() is probably looking at the wrong queue dgoulet defect High Core Tor/Tor
#23881 Implement a way to utilise tor's logging system from Rust code isis enhancement High Core Tor/Tor
#24032 Add comments everywhere that C and Rust must stay in sync chelseakomlo defect High Core Tor/Tor
#24053 Bug: shared_random.c:918: sr_generate_our_commit: Assertion my_rsa_cert failed; aborting. dgoulet defect High Core Tor/Tor Tor: unspecified
#24608 Update our Cargo.lock file to remove the deprecated and removed [root] section defect High Core Tor/Tor Tor: 0.3.2.6-alpha
#24687 Tor eats all mbufs on FreeBSD defect High Core Tor/Tor Tor: 0.3.1.9
#24700 sched: With KIST, a channel can be added more than once in the pending list dgoulet defect High Core Tor/Tor Tor: 0.3.2.1-alpha
#24769 Increase client idle and connection timeouts to reduce network load mikeperry defect High Core Tor/Tor Tor: 0.3.1.1-alpha
#24807 UAF after updating `master` to 1dab8bae21bc32e5d4e3ff954f4919d6506ad2e1 defect High Core Tor/Tor
#24860 Bug: Assertion cmux failed in circuitmux_get_policy at src/or/circuitmux.c dgoulet defect High Core Tor/Tor
#24861 Using %zu seems to break mingw :/ ffmancera defect High Core Tor/Tor
#24975 sched: scheduler_notify_networkstatus_changed() calls select_scheduler() without the new consensus dgoulet defect High Core Tor/Tor
#25036 Tor 0.3.2 rejects connections to raw ipv6 addresses tbb-team defect High Core Tor/Tor Tor: 0.3.2.1-alpha
#25117 Resolve TROVE-2018-002: bug 24700 KIST use-after-free can be remotely triggered nickm defect High Core Tor/Tor
#25125 KIST: Bug: scheduler_release_channel: Non-fatal assertion !(smartlist_pos(channels_pending, chan) == -1) dgoulet defect High Core Tor/Tor
#25223 dos: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed dgoulet defect High Core Tor/Tor
#25250 Infinite loop in Rust protover implementation (TROVE-2018-003) nickm defect High Core Tor/Tor
#25252 Rust implementation of protover code deviates from C in some cases nickm defect High Core Tor/Tor
#25316 Assertion failure in scale_active_circuits defect High Core Tor/Tor Tor: 0.3.2.9
#25380 Transparent proxy not working with linux kernel 4.15.6 defect High Core Tor/Tor Tor: 0.3.2.9
#25401 Transparent proxy stopped working after Linux kernel update to version 4.4.118 that fixes Spectre variant 1 defect High Core Tor/Tor Tor: 0.3.2.9
#25415 moria1 seg faults on testing relay reachability nickm defect High Core Tor/Tor Tor: 0.3.3.2-alpha
#25560 test all rust crates for realsies defect High Core Tor/Tor Tor: 0.3.3.3-alpha
#25691 Bridges don't work: Non-fatal assertion !(exit_ei == NULL) failed in onion_pick_cpath_exit nickm defect High Core Tor/Tor
#25692 onion_extend_cpath: Non-fatal assertion info || client failed. nickm defect High Core Tor/Tor
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed nickm defect Medium Core Tor/Tor Tor: 0.2.2.37
#12062 Audit DisableNetwork, we_are_hibernating usage nickm defect Medium Core Tor/Tor
#13043 torspec lies about accepting both IPv4 and IPv6 for ORAddress lines teor defect Medium Core Tor/Tor
#13605 Create a client/relay-side ReducedExitPolicy enhancement Medium Core Tor/Tor
#13837 Mitigate guard discovery by pinning middle node mikeperry defect Medium Core Tor/Tor
#19610 IPv6-only clients fetch microdescriptors from a small number of IPv6 fallbacks teor defect Medium Core Tor/Tor Tor: 0.2.8.4-rc
#19990 EntryNodes is incompatible with IPv6-only bootstrap teor defect Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#20615 Your Guard is failing an extremely large amounts of circuits. defect Medium Core Tor/Tor Tor: 0.2.8.9
#20942 Make consensus expiry tolerance for fallbacks lower when the stale consensus bug is fixed teor enhancement Medium Core Tor/Fallback Scripts
#20946 Make it easier to find contacts for a fallback list enhancement Medium Core Tor/Fallback Scripts
#21109 apparent inconsistency in prop264 defect Medium Core Tor/Tor
#22145 Document which interface is used for DNS requests in the context of OutboundBindAddressOR/Exit defect Medium Core Tor/Tor Tor: 0.3.0.6
#22215 networkstatus_nickname_is_unnamed() can get ripped out enhancement Medium Core Tor/Tor
#22271 Regenerate fallback list for 0.3.2 or 0.3.3 teor task Medium Core Tor/Fallback Scripts
#22310 Tor 0.3.x clients won't use Guard-flagged relays as Guards if they don't have V2Dir, throwing off consensus position weights arma defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#22321 Update fallback directory whitelist based on operator relay changes teor enhancement Medium Core Tor/Fallback Scripts
#22342 Add a nice append-only stringbuffer, and refactor code to use it nickm defect Medium Core Tor/Tor
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file nickm defect Medium Core Tor/Tor Tor: 0.3.0.7
#22527 Add new operators to fallback directory whitelist pastly task Medium Core Tor/Fallback Scripts
#22703 Add a KeyDirectory option to override location of $datadir/keys, and/or a cachedir option to override location of cached files. nickm enhancement Medium Core Tor/Tor
#22759 Mark the fallbacks that have extra-info descriptors, so stem can use them teor enhancement Medium Core Tor/Fallback Scripts
#22840 Implement protover in Rust chelseakomlo enhancement Medium Core Tor/Tor
#22909 Our Rust code is always built in debug mode defect Medium Core Tor/Tor
#22955 Specify how PrivCount will work with Tor nickm task Medium Core Tor/Tor
#23100 Circuit Build Timeout needs to count hidden service circuits mikeperry enhancement Medium Core Tor/Tor Tor: 0.2.7
#23101 Predict and build specific HS purpose circuits (rather than GENERAL) mikeperry enhancement Medium Core Tor/Tor
#23114 Circuit Build Timeout should apply at circuit completion mikeperry enhancement Medium Core Tor/Tor
#23118 release checklist should include "make sure the new version got recommended" defect Medium Core Tor/Tor
#23146 prop280: Finish privcount-in-Tor proposal (280) nickm defect Medium Core Tor/Tor
#23254 BridgeAuth offline key mode seems broken defect Medium Core Tor/Tor Tor: 0.3.0.10
#23271 control_auth_cookie isn't deleted when tor stops defect Medium Core Tor/Tor Tor: 0.3.0.10
#23406 Sampled guards are not re-weighted when a new consensus arrives nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#23459 prop224: Specialize interface of hs_circuitmap_get_rend_circ_client_side() defect Medium Core Tor/Tor
#23471 Add ed25519 ids to torrc relay configs enhancement Medium Core Tor/Tor
#23543 prop224: Disconnects on long-lasting HS connections (possibly because of mds) asn defect Medium Core Tor/Tor
#23571 Stop closing channels out from under OR connections in hibernate_go_dormant() teor defect Medium Core Tor/Tor Tor: 0.2.4.7-alpha
#23577 Add rendezvous point IPv6 address to client introduce cells enhancement Medium Core Tor/Tor
#23621 prop224: Missing tons of mds over time with a lurking client dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#23628 Hibernation on period roll-over defect Medium Core Tor/Tor Tor: 0.3.1.7
#23633 Why does roflcopter have an empty protocol line in the consensus? defect Medium Core Tor/Tor
#23635 improve AccountingStart manual entry enhancement Medium Core Tor/Tor
#23684 Make it easier for mobile app developers to embed tor enhancement Medium Core Tor/Tor
#23740 prop224: tor_bug_occurred_(): Bug: src/or/hs_service.c:403: service_intro_point_new: Non-fatal assertion !(!ls) failed. (on Tor 0.3.2.1-alpha 290274dbb5428bc5) defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#23760 Use node_get_curve25519_onion_key() in extend_info_from_node() enhancement Medium Core Tor/Tor
#23785 [HELP!] 7.5a5's(IIRC) Tor cause DNS disruption! task Medium Core Tor/Tor
#23813 router_reset_descriptor_download_failures() doesn't actually reset descriptor downloads defect Medium Core Tor/Tor
#23814 Remove non-exponential backoff directory download implementation nickm defect Medium Core Tor/Tor
#23826 Authorities: Put Relay IPv6 addresses in the microdesc consensus teor enhancement Medium Core Tor/Tor
#23827 Clients/Relays: Use IPv6 Addresses from microdesc consensus teor enhancement Medium Core Tor/Tor
#23828 Authorities: Remove IPv6 addresses from microdescriptors teor defect Medium Core Tor/Tor
#23845 Document a stable tor main function nickm enhancement Medium Core Tor/Tor
#23847 Make sure Tor can shut down via control port, and start again in same process enhancement Medium Core Tor/Tor
#23848 Replace all exit() calls with return code style nickm enhancement Medium Core Tor/Tor
#23870 Authorities: document what happens when relays have misconfigured IPv6 teor defect Medium Core Tor/Tor Tor: 0.2.4.1-alpha
#23874 Clear the address when node_get_prim_orport() returns early defect Medium Core Tor/Tor Tor: 0.2.8.2-alpha
#23898 tor-spec: move IPv6 addresses from microdescs to microdesc consensus teor defect Medium Core Tor/Tor
#23900 Let programs call tor_main with a preconstructed control socket nickm enhancement Medium Core Tor/Tor
#23953 Use stdatomic counters where available nickm enhancement Medium Core Tor/Tor
#23954 Race condition in LOG_PROTOCOL_WARN nickm defect Medium Core Tor/Tor
#23966 Refactor node_has_curve25519_onion_key() to use node_get_curve25519_onion_key() enhancement Medium Core Tor/Tor
#23989 entry_guards_update_all() will pretend to update primaries even if sampled set is empty nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#24001 node_get_ed25519_id() should check if the microdesc ed25519 id is all zero enhancement Medium Core Tor/Tor
(more results for this group on next page)
1 2 3
Note: See TracQuery for help on using queries.