Custom Query (14201 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (8001 - 9000 of 14201)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Ticket Summary Owner Type Priority Milestone Component
#22246 ASSERT failure on v0.3.0.6 defect High Tor: 0.3.0.x-final Core Tor/Tor
#22253 Resolve TROVE-2017-002 nickm defect High Tor: 0.3.1.x-final Core Tor/Tor
#22255 Frequent OOM kills of tor process defect High Tor: 0.3.0.x-final Core Tor/Tor
#22256 Man page typo defect Very Low Tor: 0.3.1.x-final Core Tor/Tor
#22257 Obsolete torrc options still in manual defect Very Low Tor: 0.3.1.x-final Core Tor/Tor
#22270 Fix the usage message in the fallback directory script defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22305 Don't send accept-encoding on anon http requests ahf defect High Tor: 0.3.1.x-final Core Tor/Tor
#22322 Typo in timercmp comment defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22325 "we're missing descriptors for some of our primary entry guards" while using bridges defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#22332 Fix function comments of tor_snprintf callers defect Low Tor: 0.3.1.x-final Core Tor/Tor
#22347 document key-pinning-journal file in man page defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22349 dir auth attempts to fetch a descriptor every minute for every relay with mismatched rsa/ed key nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#22356 [warn] assign_to_cpuworker failed. Ignoring. nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22368 double-free of MyFamily lines defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22370 Stop leaking routerinfos that are rejected due to keypinning defect High Tor: 0.3.1.x-final Core Tor/Tor
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#22413 build fails with libzstd-0.5.1 catalyst defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22417 crash: double free or corruption (fasttop): Jigsaw52 defect High Tor: 0.3.1.x-final Core Tor/Tor
#22420 Mysterious "XXXX RD This is a bug, right?" comment from Nick arma defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22421 Update fallback config comment for exponential backoff defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22424 Always check for usage underflows in the storage API defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22446 Fix GCC7 -Wimplicit-fallthrough warnings defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#22447 hs: HSDir do not accept v3 descriptors properly dgoulet defect Very High Tor: 0.3.0.x-final Core Tor/Tor
#22460 Link handshake trouble: certificates and keys can get out of sync defect High Tor: 0.3.1.x-final Core Tor/Tor
#22461 Tor emits inaccurate safesocks warning event whenever you visit a naked IP address defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22466 "Crosscert is expired" warnings: RSA->Ed25519 identity crosscertifice apparently made in 1970? defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#22490 Stop using GeoIP country after buf has gone out of scope defect Medium Tor: 0.2.4.x-final Core Tor/Tor
#22493 Fix TROVE-2017-004 defect High Tor: 0.3.1.x-final Core Tor/Tor
#22494 Fix TROVE-2017-005 defect High Tor: 0.3.1.x-final Core Tor/Tor
#22502 Investigate Zstandard decompression error nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22508 Assertion failure in rotate_x509_certificate_callback() defect Very High Tor: 0.3.0.x-final Core Tor/Tor
#22516 tor fails to start with 'Sandbox 1' nickm defect High Tor: 0.2.9.x-final Core Tor/Tor
#22520 Incorrect encoding for error message Vort defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22532 ServerDNSAllowBrokenConfig defaults to 1, but TestingTorNetwork overrides it to...1. defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#22619 SessionGroup = Reading config failed nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#22623 New compression options require pkg-config nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22626 Missing stream NULL check in tor_compress_impl ahf defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22628 ZSTD_decompressStream doesn't ever say TOR_COMPRESS_BUFFER_FULL ahf defect High Tor: 0.3.1.x-final Core Tor/Tor
#22629 tor_compress_impl() ignores trailing input garbage when decompressing nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22638 Typo in compress_none.c header comment catalyst defect Low Tor: 0.3.1.x-final Core Tor/Tor
#22644 Assert crash with HSPOST and POSTDESCRIPTOR control port commands nickm defect High Tor: 0.3.2.x-final Core Tor/Tor
#22669 When sending cached_dir_t objects compressed with zlib, do not claim zstd compression. nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22672 Defensive programming: ensure no infinite COMPRESS_OK loops defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22677 Document that Sandbox 1 requires linux and seccomp2. nickm enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#22694 prop224: Disable netflow padding if v3 single onion services are enabled defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22702 Never send a consensus which the downloader already has ahf defect High Tor: 0.3.1.x-final Core Tor/Tor
#22719 Bug: src/common/compress.c:576: tor_compress_process: nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22720 Don't exit(0) on error: exit(1) instead defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22722 tor-spec still says "For a public-key cipher, we use RSA with 1024-bit keys" defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22726 prop224: Ignore unparseable v3 introduction points dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22735 prop224: HS desc overlap period func uses absolute times instead of slots asn task High Tor: unspecified Core Tor/Tor
#22736 prop224: Update spec wrt overlap behavior of HSes asn defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22737 CID 1401591: errant memset in cell_pack(). defect High Tor: 0.2.4.x-final Core Tor/Tor
#22742 torspec should say when tor's event buffer limit was removed defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22750 Incorrect syscall in some sandbox error messages defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22751 LZMA coder causes crash when the sandbox is enabled ahf defect High Tor: 0.3.1.x-final Core Tor/Tor
#22752 Assertion failure in consensus_cache_entry_handle_get on Windows nickm defect High Tor: 0.3.1.x-final Core Tor/Tor
#22753 Resolve TROVE-2017-006: Regression in guard family avoidance in 0.3.0 series nickm defect High Tor: 0.3.0.x-final Core Tor/Tor
#22779 choose_good_entry_server() is no longer used to choose entry guards nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22781 hs: Unify link specifier API/ABI teor enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#22789 Tor 0.3.1.4-alpha crash on OpenBSD-current nickm defect High Tor: 0.3.1.x-final Core Tor/Tor
#22795 torrc has an optional final newline defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22797 macOS should use ULIMIT_BUFFER for open files teor defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#22798 Windows relay is several times slower than Linux relay defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#22801 Warnings from isnan, isinfinite, signbit on mingw nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#22802 Avoid use of "0" with tor_parse_foo() nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22803 Memory leak in link-handshake/certs_ok_ed25519 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22830 Problems with building with --enable-rust with RUST_DEPENDENCIES chelseakomlo defect High Tor: 0.3.1.x-final Core Tor/Tor
#22838 Backport mingw warning fix from 0.3.1. nickm defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#22862 tor-spec doesn't say how clients authenticate authorities or fallback directories teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22870 consdiff test fails on OS X defect Low Tor: 0.3.1.x-final Core Tor/Tor
#22880 NETINFO cells are used for clock skew checks nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22882 The v4 link protocol requires the initiator to set the most significant bit defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22883 Bridge unavailable during differential consensus update nickm defect High Tor: 0.3.1.x-final Core Tor/Tor
#22885 When uploading the first descriptor of a session, call it dirty because "Tor just started" nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22890 Recent tor relays do use canonical connections defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22892 Compilation fails when openssl 1.1.0 and libscrypt are both detected nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22895 Unused variables in donna's SSE2 header defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#22905 Cargo.lock and Cargo.toml specify incompatible dependencies for libc defect Medium Tor: unspecified Core Tor/Tor
#22906 We might not want to commit Cargo.lock files defect Medium Tor: unspecified Core Tor/Tor
#22907 Investigate using cargo-vendor for offline dependencies isis task Medium Tor: 0.3.4.x-final Core Tor/Tor
#22915 clang 4.0 double promotion warnings in clamp_double_to_int64() nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22916 Clang warnings when building with openssl and scrypt defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#22918 Add link protocol 5 throughout torspec nickm defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#22924 signed integer overflow in unit tests crashes hardened build on 32-bit trusty nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22927 zstd tests fail with libzstd 1.3.0 defect High Tor: 0.3.1.x-final Core Tor/Tor
#22929 What cells can be sent before a VERSIONS cell, and what is their CIRCID_LEN? defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22931 What happens when a VERSIONS cell is sent outside a handshake? defect Medium Tor: unspecified Core Tor/Tor
#22934 PADDING cells can't be sent immediately after a VERSIONS cell nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22937 Clarify how resolved values are encoded in cells defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22940 prop224: HS revision counter should persist after service reboot defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22951 NETINFO cells are mandatory, but tor-spec says "may" defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22961 Should tor-spec say that nodes MUST NOT use TLS compression? defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22964 Clarify comment about all tor data being encrypted teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22979 prop224: Add an introduction point onion key in the descriptor dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#22987 TAP Hybrid Encryption case 1 is used when the payload is equal to the maximum length teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22993 prop224 has two section 0.5s defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22996 The router protocol versions section in dir-spec is out of date nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23009 Make it clear that RELAY_SENDME cells don't have a payload defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23019 prop224: Validate received onion addresses on the client side defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23023 test: some prop224 unit tests fail only sometimes dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23026 Rename hybrid_encrypt functions to prevent accidental use defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23030 Review coverity build warnings nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23053 Memory leak of unix_socket_path when validating multiple unix sockets nickm task Medium Tor: 0.3.1.x-final Core Tor/Tor
#23054 BUG() macros shouldn't be warned as dead-code under coverity. defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23055 Y2106 bug in certificate expiration parsing. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23056 prop224: Intro point aren't transfered between services on HUP dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23071 test_hs_ntor.sh fails with recent pysha3 nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23077 Channelpadding tests rely on actual time; can fail mikeperry defect High Tor: 0.3.1.x-final Core Tor/Tor
#23080 connection_ext_or_handle_cmd_useraddr and proposal 196 disagree on the format of ExtORPort USERADDR defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23081 Tor relay crashes at consensus_diff_queue_diff_work() with assertion in_main_thread() failed defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23082 tor_addr_parse is overly permissive rl1987 defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#23090 Sandbox failure on Debian 8.9 under OpenVZ with kernel version 2.6.32 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23091 Broken condition in check_expired_networkstatus_callback() defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23097 The circuit timeout prediction is not working properly defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23100 Circuit Build Timeout needs to count hidden service circuits mikeperry enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#23106 Audit code for swapped ntoh*/hton* calls nickm defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23107 prop224: Optimize hs_circ_service_get_intro_circ() digest calculation neel defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#23110 prop224: Rate limit HS descriptor reuploads defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23123 Cannibalized HS circuit don't have their timestamp_dirty updated defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23139 memory leak in consdiffmgr.c nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23155 Double free on error in config_process_include nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23157 prop224: Fix coverity reports generated by prop224 service merge (#20657) defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23159 Bug: Non-fatal assertion ei failed in launch_intro_point_circuits at src/or/hs_service.c:1784 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23163 Wrong name for new tor config options defect Low Tor: unspecified Core Tor/Tor
#23223 test: Fix prop224 hs unit tests defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23224 hs: Compiler warnings with clang and mingwcross defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23233 Unexpected BUG violation in hsv3 decriptor decoding defect High Tor: 0.3.1.x-final Core Tor/Tor
#23271 control_auth_cookie isn't deleted when tor stops defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23275 Consensus diffs are generated even if DirCache and DirPort are 0 nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23276 RELAY_CONNECTED cells responding to RELAY_BEGIN_DIR cells don't have a payload defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23291 unintentional undefined behaviore in test-memwipe.c defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23303 hs: Explain why we reset the directory connection timestamp client side dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23308 prop224: Implement note_connection_attempt_succeeded() in the client code dgoulet enhancement High Tor: 0.3.2.x-final Core Tor/Tor
#23309 hs: We need to get rid of a descriptor when entering non-overlap mode dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23311 prop224: Spammy intro point logs in v2 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23318 compute_weighted_bandwidths: do not add 0.5 to final_weight nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23319 hs: Memory leak in test hs_descriptor/decode_bad_signature dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23327 prop224: client-side memleaks on the last hidserv request subsystem defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23329 sandbox: Double free when initializing the HSv3 config dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23331 prop224: Don't build HS desc if we don't have a live consensus defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23335 prop224: Clang compile error + bad log_warn on master defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23340 There is no HSDir3 flag, but prop224 says there should be defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23343 prop224: Bug: Non-fatal assertion !((strlen(req_key_str) + REND_DESC_ID_V2_LEN_BASE32) < strlen(key)) failed defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23346 prop224: HSdir set changed detection fails sometimes defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23347 Using bridges or switching to bridges sometimes does not work with tor 0.3.2 teor defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23358 Multiple definitions of `response_handler_args_t` in src/or/directory.h are breaking clang builds isis defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23360 prop224: Service has dead code which removed a feature dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23361 prop224: client can pick super old rendezvous points defect High Tor: 0.3.2.x-final Core Tor/Tor
#23366 test: test_options_validate__outbound_addresses is broken defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23372 test: stack-use-after-scope in hs_service/build_update_descriptors defect High Tor: 0.3.2.x-final Core Tor/Tor
#23379 Atlas marked my relay as a hsdir even though I disabled DirPort defect High Core Tor/Tor
#23387 prop224: HSdir index desynch between client and service defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23429 hs: assert on rend_data when pruning the v2 service list dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23445 dir-spec: "protocols" line has been remove (past not future) defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23455 hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider REND_JOINED purpose dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23457 prop224: Service descriptor uploads race condition defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23461 test: Unit tests memleaks in nodelist/ed_id and hs_common/client_service_hsdir_set_sync dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23465 hs: Downgrade client log warn to info dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23466 hs: v3 client descriptor cache entry should be indexed by blinded key defect High Tor: 0.3.2.x-final Core Tor/Tor
#23470 Avoid relays resolving their own address on every download status check defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23479 Bug: ../src/or/config.c:785: get_options_mutable: Non-fatal assertion ! in_option_validation failed nickm defect High Tor: 0.3.2.x-final Core Tor/Tor
#23480 hs: Rate limit some logs in hs-v3 subsystem defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23487 Incorrect output on bad directory ownership nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23488 key-expiration check always returns exitcode 0 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23490 Fix TROVE-2017-008: Stack disclosure in hidden services logs when SafeLogging disabled nickm defect High Tor: 0.2.8.x-final Core Tor/Tor
#23492 Fix some typos in prop 280 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23493 IPv6 v3 Onion Services support defect Medium Tor: 0.4.2.x-final Core Tor/Tor
#23499 dir server responses should include a Date: header even when not responding 200 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23507 Handle unreachable addresses on v3 single onion services by using a 3 hop path teor defect Medium Tor: 0.4.2.x-final Core Tor/Tor
#23512 Bandwidth stats info leak upon close of circuits with queued cells defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#23524 Avoid crashing when we ask for running bridges, but UseBridges is 0 teor defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#23525 Add a missing call to download_status_get_next_attempt_at() defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23532 NETINFO clock skew detection doesn't work on clients catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23533 Repair bug in geoip/rephist reporting from relays that only download microdescriptors. nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23537 Allow the new sched to respond to a new conensus, not the old one. pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23539 We've defined "don't use kist" as a negative interval, so don't check for -1 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23551 src/common/compress.c:576: tor_compress_process: Non-fatal assertion ahf defect High Tor: 0.3.1.x-final Core Tor/Tor
#23558 sched: KIST schedule() bad cast on monotime_diff_msec() dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23560 Fix typo(s) in comment(s) in the scheduling system. pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23563 document changes files release-readiness requirement in doc/HACKING nickm task Medium Tor: 0.3.2.x-final Core Tor/Tor
#23566 options/validate__transproxy fails on FreeBSD (thanks to the new scheduler) pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23568 [PATCH] fix format issues in zstd code on 32 bit defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23571 Stop closing channels out from under OR connections in hibernate_go_dormant() teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23572 Clarify what the client timestamp actually does teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23575 Avoid printf warning in scheduler_ev_add teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23576 Make service_intro_point_new() take a node instead of an extend_info teor defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#23580 doc: HiddenServiceVersion man page entry only lists version 2 as supported dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23581 Die more helpfully if Schedulers option isn't compatible with platform pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23583 ext/timeouts/timeout-bitops.c:234: bad shift nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23588 Write fascist_firewall_choose_address_ls() and use it in hs_get_extend_info_from_lspecs() teor enhancement Low Tor: 0.4.1.x-final Core Tor/Tor
#23589 Stop assuming that every extend_info contains an IPv4 address in get_lspecs_from_extend_info() teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23602 Detect homebrew OpenSSL on OSX (was:Fix compilation on macOS) defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23605 expired consensus causes guard selection to stall at BOOTSTRAP PROGRESS=80 catalyst defect High Tor: 0.4.0.x-final Core Tor/Tor
#23606 incorrect clock skew sign convention in or_state_load() catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23607 Avoid assertion failure for state file clock skew catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23608 Some channelpadidng tests still use unmocked time mikeperry defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23610 handle_establish_intro() can mark circuits for close twice dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#23611 misspelled reference "UseEntryGuardsAsDirectoryGuards" to obsolete config parameter in manual page catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23622 Maybe use "has authenticated" rather than "has authenticated as a known relay" to set client flag enhancement Medium Tor: 0.3.1.x-final Core Tor/Tor
#23635 improve AccountingStart manual entry enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#23637 Make exit flag depend on ports 80 and 443, not 6667 enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#23645 hs: Continue to improve logging in both HS and circuit subsystems dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23650 Tor source code has many typos arma defect Very Low Tor: 0.3.4.x-final Core Tor/Tor
#23662 prop224: Service edge-case where it re-uploads descriptor with same rev counter dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23672 hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23676 kist on 0.3.2.1-alpha-dev beats its head against a wall trying to flush a conn that's closed defect High Tor: 0.3.2.x-final Core Tor/Tor
#23678 Tor kinda _is_ an http proxy now... nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23681 prop224: Clients mark intro circs as timed-out within seconds dgoulet defect High Tor: 0.2.9.x-final Core Tor/Tor
#23690 Assertion *buf_flushlen <= buf->datalen failed nickm defect Medium Tor: 0.2.8.x-final Core Tor/Tor
#23691 leak in test_util_decompress_dos_impl() catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23693 0.3.1.7: Assertion threadpool failed in cpuworker_queue_work nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#23696 Bug: scheduler_kist.c:520: kist_scheduler_schedule: Non-fatal assertion !((diff < 0)) failed. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23700 Tor tells me "Scheduler type KIST has been enabled" multiple times defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23706 Tor's seccomp sandbox does not know about the syscall epoll_pwait defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23709 channel: `outgoing_queue` and `incoming_queue` are always empty dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#23710 sched: channel_more_to_flush() is probably looking at the wrong queue dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#23722 Somebody should profile a Tor 0.3.1.7 relay enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#23741 scripts/test/coverage tries to mv .gcov files to / catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23746 torguts.git/tree/01d-crypto.md#n13 is incomplete nickm defect Low Core Tor/Tor
#23748 inconsistent/redundant handling of hs_ed25519_public_key file defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23751 [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc. dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23755 don't unconditionally mirror in .gitlab-ci.yml defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23756 tor's .gitlab-ci.yml is doing mirroring? why? catalyst defect Medium Tor: unspecified Core Tor/Tor
#23757 tor's .gitlab-ci.yml doesn't have the same behaviour as our .travis.yml catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23758 test config/include_no_permission fails when run as root catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23762 hs-v3: Client request with missing dirinfo will always timeout dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23774 sched: KIST doesn't free the socket info hashtable on free_all() nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23783 Can't build Tor 0.3.2.2-alpha with mingw32 on Windows 7 defect High Tor: 0.3.2.x-final Core Tor/Tor
#23790 rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when copying intro points dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23813 router_reset_descriptor_download_failures() doesn't actually reset descriptor downloads defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23814 Remove non-exponential backoff directory download implementation nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23816 Use exponential backoff with jitter and/or tune its parameters nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23817 Tor re-tries directory mirrors that it knows are missing microdescriptors defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23818 Make v2 and v3 single onion services retry all failed intro and rend connections with a 3-hop path teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#23820 Make sure v3 single onion services and v3 onion service clients only send IPv4 addresses teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23861 Excessive I learned some more directory information. [...] log message at startup dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23862 Tor only updates guard state after a consensus if it has enough directory info asn defect Very High Tor: 0.3.1.x-final Core Tor/Tor
#23870 Authorities: document what happens when relays have misconfigured IPv6 teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23874 Clear the address when node_get_prim_orport() returns early defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23881 Implement a way to utilise tor's logging system from Rust code isis enhancement High Tor: 0.3.3.x-final Core Tor/Tor
#23908 write_http_status_line(): Bug: status line too long. (on Tor 0.3.1.7 ) defect High Tor: 0.3.1.x-final Core Tor/Tor
#23909 dirauths write corrupted keypin journal nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#23952 LOG_PROTOCOL_WARN can call get_options() during an options transition. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23954 Race condition in LOG_PROTOCOL_WARN nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23977 control-spec.txt should document which "signals" don't actually exist as Unix signals defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23978 Write simulator to evaluate security of Prop247 parameter choices task Medium Tor: unspecified Core Tor/Tor
#23985 If less than 15 missing mds, Tor will delay md download for 10 mins nickm defect High Tor: 0.3.1.x-final Core Tor/Tor
#23989 entry_guards_update_all() will pretend to update primaries even if sampled set is empty nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24002 Check for ed25519 key is inverted in pick_intro_point() dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24007 Say "At most once" for exit policy summaries in microdescriptors defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24011 Attempt to open a stream on first hop of circuit defect High Tor: 0.3.4.x-final Core Tor/Tor
#24025 Log warning: Inconsistent ed25519 identities in the nodelist dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24031 Protover.rs could use a better algorithm isis defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#24044 Resolved [scrubbed] which was already resolved; ignoring defect Medium Tor: unspecified Core Tor/Tor
#24050 We still do client-side caching. We just don't use the cache. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24053 Bug: shared_random.c:918: sr_generate_our_commit: Assertion my_rsa_cert failed; aborting. dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24082 uninitialized value in networkstatus_parse_vote_from_string() via fuzz_consensus.c defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24086 consdiffmgr.c:637: consdiffmgr_find_diff_from: Non-fatal assertion !(ent->entry == NULL) failed nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#24097 evdns_callback(): Bug: eventdns returned no addresses or error nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24099 tor should remove empty/invalid consensus cache files (Unable to map file from consensus cache: Numerical result out of range) nickm defect Low Tor: 0.3.1.x-final Core Tor/Tor
#24104 Delay descriptor bandwidth reporting on established relays juga defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24113 We stop trying to download an md after 8 failed tries defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24115 man: Mention that HS v3 num intro points is 0 to 20, not 0 to 10. defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24117 Make a repository to hold our rust dependencies in a form Cargo can use task Medium Tor: 0.3.3.x-final Core Tor/Tor
#24118 spec: Update dir-spec.txt with HS v3 consensus param dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24119 channel_rsa_id_group_set_badness spends a lot of time in malloc/free Hello71 enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#24127 Profile a 0.3.2.x fast relay dgoulet task Medium Tor: 0.3.4.x-final Core Tor/Tor
#24134 Make supported version timeline easier to find dgoulet enhancement Very Low Tor: 0.3.2.x-final Core Tor/Tor
#24147 Fix manual mistakes defect Low Tor: 0.3.3.x-final Core Tor/Tor
#24149 "Tor is running with Rust integration. Please report any bugs you encouter." defect Low Core Tor/Tor
#24150 Memory leak in v3 hsdesc parsing with empty encrypted data. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24152 refactor download_status code into its own file enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#24158 I get this error "Looks like our kernel doesn't have the support for KIST anymore." on my relay pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24161 Recalculating voting schedule should be called first when setting a new consensus dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24165 prop284: Changes needed on the proposal dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24167 connection_check_event: Bug: Event missing on connection nickm defect Medium Tor: 0.2.5.x-final Core Tor/Tor
#24170 Log the actual bandwidth total when logging "Generated weighted bandwidths" defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24185 before doing the 0.3.2.4-alpha release (today): typo in changelog (release-0.3.2 branch) defect Medium Core Tor/Tor
#24186 vote: Voting schedule is not updated before voting defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24198 (Sandbox) Caught a bad syscall attempt (syscall kill) nickm defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#24201 spec: ADD_ONION syntax is not reflecting the code dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24203 AppArmor default config blocks Snowflake from running with system tor defect Medium Tor: unspecified Core Tor/Tor
#24230 control: HS_DESC event failed upload sends back the wrong Action dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24241 update FreeBSD tor port maintainer's email address in ReleasingTor.md nickm enhancement Medium Core Tor/Tor
#24244 Fix TROVE-2017-009: Replay-cache ineffective for v2 hidden services. nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24245 Fix TROVE-2017-010: Remote DoS attack against directory authorities nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24246 Fix TROVE-2017-011: An attacker can make tor ask for a password nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24247 Fuzzing: check_signature mock can be fooled by a really short key. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24254 There needs to be documentation on what kernel versions the KIST Scheduler will run on pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24262 hs-v3: Change "hsdir-interval" to "hsdir_interval" to match the spec defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24279 configure libevent leaks Hello71 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24298 Better handling of DoS attacks on onion services defect Medium Tor: unspecified Core Tor/Tor
#24313 Crash: died: Caught signal 11 [crash from rend_consider_services_intro_points] dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24315 sandbox incompatible with glibc 2.26 (openat() not handled for all our files) nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24318 Clarify that the RelayBandwidth* options exclude directory fetches by relays defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24333 Fix TROVE-2017-012: Relays can pick themselves in a circuit path defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24338 DirAuths that have IPv6 addresses don't include them in their vote on themself neel defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#24343 Remove dead code and doc regarding the old SocksSocket option dgoulet defect Low Tor: 0.3.3.x-final Core Tor/Tor
#24345 Memory leak in config/check_bridge_distribution_setting_not_a_bridge nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24346 prop224: Service stops uploading one of its two descriptors dgoulet defect Medium Tor: unspecified Core Tor/Tor
#24362 Add logging backend for Android ahf enhancement Low Tor: 0.3.3.x-final Core Tor/Tor
#24363 Remove /usr/athena from search path in configure.ac defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24367 Changing pluggable transports (during start-up) in Tor Browser is broken nickm defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#24372 Fix a confusing comment about tie-breaking in compute_routerstatus_consensus() teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24392 Ignore cached bridge descriptors until we check if they are running teor defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24404 Propose a relay protover that allows IPv6 extends enhancement Medium Tor: 0.4.4.x-final Core Tor/Tor
#24424 fails to build with libseccomp-dev installed on arm64 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24425 Set the hsdir_spread_store parameter to 4 (or maybe even 5) dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#24426 Reliability: Make sure onion services don't publish until they have (nearly) all hsdirs' descriptors defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24430 Fix TROVE-2017-013: Use-after-free in onion service v2 when rotating intro points defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24469 Cannibalizing a circuit should check that first hop is in our guard state dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24480 Signed/unsigned mismatch defect Medium Core Tor/Tor
#24484 free(NULL) always works (nowadays) so stop acting like it might not nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24488 Make set_routerstatus_from_routerinfo() set IPv6 unspecified addresses teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24489 Add some consts to networkstatus_getinfo_by_purpose() teor enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#24490 Stop setting bridges running in networkstatus_getinfo_by_purpose() neel defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#24502 scheduler_release_channel: Non-fatal assertion dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24511 TorBrowser 7.5 a8 takes multiple minutes to connect defect High Tor: 0.3.2.x-final Core Tor/Tor
#24518 Remove the --quiet from our cargo build invocation nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24526 Make it clear that multi-relay operators are expected to set a working ContactInfo and proper MyFamily nickm enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#24531 sched: Add function to change scheduler state and always use it defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24543 Coverity CID 1425733: Calling "hs_parse_address" without checking return value ahf defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24544 Fix more prop224 spec inconsistencies asn defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24551 Tor crashes with: ../src/or/connection_edge.c:3979:17: runtime error: member access within null pointer of type 'const struct entry_connection_t' defect Medium Core Tor/Tor
#24555 Bug: tor_gmtime_r overflow - gmtime(9223372036854775807) failed with error No error defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24558 enable expensive hardening message is wrong with static library builds defect Very Low Tor: 0.3.3.x-final Core Tor/Tor
#24559 Move a comment to relay_send_end_cell_from_edge() defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24572 rewrite_node_address_for_bridge() doesn't set rs IPv6 addresses ffmancera defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24573 rewrite_node_address_for_bridge() should set IPv6 preferences even if there is no ri defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24575 options_transition_affects_guards() refers to an old function name in a comment defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24582 Memory leak in tor-resolve nickm defect Low Tor: 0.3.3.x-final Core Tor/Tor
#24587 Reset bootstrapping state on shutdown nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24590 sched: Fix integer overflow for KIST dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24595 hs_service_intro_circ_has_closed: Assertion desc failed defect High Tor: 0.3.2.x-final Core Tor/Tor
#24596 FREE_AND_NULL documentation uses different names for the macro parameter defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24608 Update our Cargo.lock file to remove the deprecated and removed [root] section defect High Tor: 0.3.3.x-final Core Tor/Tor
#24613 Avoid monotime_coarse_absolute_msec in channelpadding code nickm enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#24630 Stop initialising rust git submodules, travis does this automatically defect Very Low Tor: 0.3.2.x-final Core Tor/Tor
#24633 to->pending->tqh_last is 0xFFFFFFFFFFFFFFFF。 nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24634 test_hs_common.c:974:33: warning: declaration of 'time' shadows a global declaration nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24652 Rust builds fail on macOS with linker error nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24658 Split/refactor crypto.h into smaller separate modules nickm enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#24661 accept a reasonably live consensus for guard selection teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#24665 sched: In KIST, the extra_space kernel value needs to be allowed to be negative dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24666 sched: Store the circuit ID instead of the full DESTROY cell in the destroy queue nickm defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24671 sched: KISTLite should set an upper limit to write on the outbuf dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24677 Use ping ::1 on Linux when ping6 ::1 fails defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24681 Make the default fallback weight in Tor 10.0 teor enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#24693 Coverity CID 1426750 and CID 1426749: Calling two functions without control ffmancera defect Medium Core Tor/Tor
#24700 sched: With KIST, a channel can be added more than once in the pending list dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24733 Loading ifc.ifc_buf using the new tor_free() causes undefined behaviour on x86_64 macOS teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24736 Clear the address when fascist_firewall_choose_address_base() can't find an address teor defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24740 Tor launches two requests for authority certificates on first bootstrap defect High Tor: 0.3.4.x-final Core Tor/Tor
#24762 tor_remove_file() should ignore NULL filenames teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24767 All relays are constantly connecting to down relays and failing over and over dgoulet enhancement Very High Tor: 0.3.3.x-final Core Tor/Tor
#24778 Mark prop#283 as Accepted teor enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#24782 Set a lower default MaxMemInQueues value ahf defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24794 smartlist.rs: do not use i8 interchangeably with libc::c_char nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24805 Update fallback whitelist in late 2018 phoul enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#24807 UAF after updating `master` to 1dab8bae21bc32e5d4e3ff954f4919d6506ad2e1 defect High Tor: 0.3.3.x-final Core Tor/Tor
#24821 Relay publishing malformed dirreq-v3-tunneled-dl defect High Tor: unspecified Core Tor/Tor
#24826 consensus diffs stall Tor Browser launch for at least 20s or break it entirely if compiled with --enable-expensive-hardening nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24844 Add HS v3 status to the SIGUSR1 dumpstats() neel enhancement Low Tor: 0.4.4.x-final Core Tor/Tor
#24849 Added -1 signatures to consensus nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24859 Bug: Non-fatal assertion !(ent == NULL) failed in store_multiple at src/or/consdiffmgr.c nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24860 Bug: Assertion cmux failed in circuitmux_get_policy at src/or/circuitmux.c dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24861 Using %zu seems to break mingw :/ ffmancera defect High Tor: 0.3.3.x-final Core Tor/Tor
#24863 Travis CI environment change breaks clang builds defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24891 build system --disable-unittests has no effect rl1987 defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24894 v3 onion services don't respect MAX_REND_FAILURES arma defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24895 MAX_REND_FAILURES is 1, but we will try three times defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24898 We have two conflicting notions of channel_is_client() defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24902 Denial of Service mitigation subsystem dgoulet enhancement Very High Tor: 0.3.3.x-final Core Tor/Tor
#24903 Bug: Line unexpectedly reached at pathbias_should_count at src/or/circpathbias.c:372 nickm defect High Tor: 0.2.9.x-final Core Tor/Tor
#24910 Make rep_hist_note_circuit_handshake_* use channel_is_client() arma defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24927 if (n_chan_id) in circuit_build_failed() can't fail nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24933 tor-gencert says [warn] event_base_free_: no base to free defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24946 connection_ap_expire_beginning(): Bug: circuit->purpose == CIRCUIT_PURPOSE_C_GENERAL failed mikeperry defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24952 channel: channel_tls_get_remote_addr_method() should return the "real_addr" of the connection defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24962 Single hop onion service denial of service issues dgoulet enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#24964 dos: Block single hop client at the HSDir dgoulet defect Medium Tor: 0.4.2.x-final Core Tor/Tor
#24969 Allow sleep() in the sandbox nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#24972 Bug: src/or/hs_descriptor.c:2357: hs_desc_encode_descriptor: Non-fatal assertion !(ret < 0) failed. defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24975 sched: scheduler_notify_networkstatus_changed() calls select_scheduler() without the new consensus dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24976 Bug: src/or/hs_cache.c:628: cache_store_as_client: Non-fatal assertion !(cache_entry->desc->plaintext_data.revision_counter > client_desc->desc->plaintext_data.revision_counter) failed dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24977 Non-fatal assertion !(tor_mem_is_zero((const char*)node->hsdir_index->fetch, DIGEST256_LEN)) asn defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24989 Count hsdir requests against maxcircuitspending mikeperry defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24991 relay frequently claiming "missing descriptors for 1/2 of our primary entry guards" defect Medium Tor: unspecified Core Tor/Tor
#25005 memory leak in test-scheduler unit tests nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25036 Tor 0.3.2 rejects connections to raw ipv6 addresses tbb-team defect High Tor: 0.3.3.x-final Core Tor/Tor
#25070 protover_get_supported_protocols() should include Link=5 as of 0.3.1.1-alpha teor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25074 TROVE-2018-001: null-pointer crash in directory authority protocol list code nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25076 wiki NextGenOnions: add link to contact asn for additions defect Medium Tor: unspecified Core Tor/Tor
#25081 use get_uptime() consistently defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25094 24902 fix breaks on clang defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25095 Update dir-spec.txt with recent consensus param additions dgoulet task Medium Tor: 0.3.3.x-final Core Tor/Tor
#25105 Look at PRT_HSREND, not PRT_HSDIR, for supports_v3_rendezvous_point nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25110 Warn operators who set MyFamily that they must also set ContactInfo defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#25113 monotonic_time unit test fail, 0.3.3.1-alpha debian armel dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25115 Chutney test-network and test-network-all fail on master branch defect Medium Core Tor/Tor
#25116 hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25117 Resolve TROVE-2018-002: bug 24700 KIST use-after-free can be remotely triggered nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#25125 KIST: Bug: scheduler_release_channel: Non-fatal assertion !(smartlist_pos(channels_pending, chan) == -1) dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#25127 Rust implementation of protover_get_supported_protocols() leaks memory isis defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25128 Bug: src/or/dos.c:312: cc_stats_refill_bucket: Non-fatal assertion new_circuit_bucket_count >= stats->circuit_bucket failed dgoulet defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#25136 "system clock jump" warnings still persist defect Medium Tor: unspecified Core Tor/Tor
#25148 Make geoip_client_cache_total_allocation() use geoip_client_history_cache_size dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25150 Avoid malloc/free on each server-side ntor handshake nickm enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#25171 Clarify 'recognized' field in tor-spec defect Very Low Tor: 0.3.3.x-final Core Tor/Tor
#25183 Implement a way to tell if an IP address is a known relay dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25188 Spec bug in formal definition of Document in dir-spec.txt enhancement Very Low Tor: 0.3.4.x-final Core Tor/Tor
#25193 dos: Avoid blacklisting Exit relays dgoulet defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#25202 Check the calculations in cc_stats_refill_bucket using non fatal assertions dgoulet defect Low Tor: 0.3.3.x-final Core Tor/Tor
#25223 dos: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#25236 dos: Document torrc default values in the man page when not in the consensus dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25237 spec: Document our circuit close reasons rl1987 defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25249 Spec/implementation deviation in C protover code nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25250 Infinite loop in Rust protover implementation (TROVE-2018-003) nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#25251 Fix TROVE-2018-004: bad consensus can trigger null pointer crash. nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25252 Rust implementation of protover code deviates from C in some cases nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#25261 Tor connection.c file have multiple transports.h includes. defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25271 Remove duplicate #include onion_ntor.h from src/test//test.c enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#25276 Compilation fails: ‘tor_zstd_format_version’ [-Werror=unused-function] defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25278 clean up torint.h Hello71 defect Low Tor: unspecified Core Tor/Tor
#25290 refactor to use should_record_bridge_info() more defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25296 update PerConnBWRate/Burst manpage entries to not mention consensus defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25306 tor_assertion_failed_(): Bug: ../src/or/hs_service.c:1985: rotate_all_descriptors: Assertion service->desc_current failed; aborting. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25313 Sandbox: Caught a bad syscall attempt (syscall poll) nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25319 commit 4438ef32 breaks tor macOS cross builds nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25353 Configure fails with some OpenSSL 1.1.0 built with no-deprecated. nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25368 Update the Tor Rust coding standards for new types defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25378 Log domain list is out of sync in tor.1.txt ahf defect Low Tor: 0.3.3.x-final Core Tor/Tor
#25399 mmap length doesn't need to be page-aligned defect Low Tor: 0.3.4.x-final Core Tor/Tor
#25400 CIRC_BW event miscounts, should count all circ data mikeperry defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25415 moria1 seg faults on testing relay reachability nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#25417 HSFETCH support for v3 Hidden Services neel defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#25440 Broken openat syscall in Sandbox mode nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#25441 Occasional timing? failures in hs_descriptor/validate_cert unit test defect Medium Tor: unspecified Core Tor/Tor
#25450 Intermittent test failures for hs_service/service_intro_point isis defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#25474 configure test for libevent fails with c99 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25479 Fix win32 crash in bench.c defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25494 Initial work on making modules conditionally compiled dgoulet task High Tor: 0.3.4.x-final Core Tor/Tor
#25495 module: Identify a list of tor module task Medium Tor: 0.3.4.x-final Core Tor/Tor
#25496 Investigate Tor on ARM64 with Orbot ahf task Medium Tor: unspecified Core Tor/Tor
#25498 module: Basic modularization preparation dgoulet task Medium Tor: 0.3.4.x-final Core Tor/Tor
#25505 Netflow padding should inspect circuitmux queues mikeperry defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#25512 Tor in-process restart fails to write auth cookie nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25515 Add a unit test for geoip_load_file() nickm enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#25517 TROVE-2018-005 isis defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25544 Complete vanguard specification defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25545 Figure out default vanguard script parameters asn defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25552 prop224: Onion service rev counters are useless and actually harmful for scalability dgoulet defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#25560 test all rust crates for realsies defect High Tor: 0.3.3.x-final Core Tor/Tor
#25568 hs: Lookup failure cache when introducing to an intro point neel defect Medium Tor: 0.4.3.x-final Core Tor/Tor
#25573 Track half-closed stream IDs defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25577 cmux: CircuitPriorityHalflife value is never taken from the consensus nickm defect High Tor: 0.3.4.x-final Core Tor/Tor
#25581 Inconsistent underscore config options (for vanguard options) nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25582 Manual includes non-existant ExitPolicyDefault option nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25602 Fix two comment typos in hs_cell.c isis defect Very Low Tor: 0.3.4.x-final Core Tor/Tor
#25610 module: Modularized directory authority subsystem dgoulet enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#25614 tor sets `TOR_PT_EXIT_ON_STDIN_CLOSE=1` only for server transports, not client transports defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#25617 unable to resolve DNS requests from control port, regression nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25629 fix CID 1430932 catalyst defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25645 n_possible variable goes unused in channel_get_for_extend() defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25661 RendPostPeriod and HiddenServiceAuthorizeClient are v2 only defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25668 Write a proposal for using two guards, not one defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25675 fix CID 1433643 catalyst defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header defect Medium Tor: unspecified Core Tor/Tor
#25691 Bridges don't work: Non-fatal assertion !(exit_ei == NULL) failed in onion_pick_cpath_exit nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#25692 onion_extend_cpath: Non-fatal assertion info || client failed. nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#25720 man: RephistTrackTime is not a dirauth only option dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25732 Rust files not all included with Tor. nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25733 Bug: Assertion bin_counts > 0 failed in circuit_build_times_get_xm at ../src/or/circuitstats.c:772. mikeperry defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25752 Detangle our included headers and reduce reliance on or.h enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#25756 EARLY_CONSENSUS_NOTICE_SKEW of 60 is too strict for some drifting dirauth clocks catalyst defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25758 Correction for Proposal 291 defect Medium Core Tor/Tor
#25761 hs: Reload signal (HUP) doesn't remove a disabled service dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25787 geoip_load_file() tests don't work on all window build environments nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25828 Our "has our write bucket been empty recently" check is dependent on TokenBucketRefillInterval nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25843 Make NumEntryGuards consistent with #271 consensus params defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25852 GETINFO exit-policy for tor client should return 551 defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25857 ::/128 is not the IPv6 equivalent of 0.0.0.0/0 atagar defect Very Low Tor: 0.3.3.x-final Core Tor/Tor
#25870 Fix vanguard restrictions defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25871 spelling errors in control-spec.txt catalyst defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25882 clients not detecting stale onion service introduction points defect High Tor: unspecified Core Tor/Tor
#25895 Cross-compiling tor rust for Windows is broken Hello71 defect High Tor: 0.3.4.x-final Core Tor/Tor
#25897 manual: document that ControlSocket is disabled by default defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25901 hs-v3: Memleak on SIGHUP dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25908 make test suite coverage more deterministic project Medium Tor: 0.3.4.x-final Core Tor/Tor
#25912 CID 1435130: Incorrect expression (COPY_PASTE_ERROR) defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25936 have travis display test-suite.log from the right place when DISTCHECK=yes catalyst defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25939 A Tor commit seems to have broken creation of V3 onion services with stem dgoulet defect High Tor: 0.3.4.x-final Core Tor/Tor
#25942 Fix win32 test failure for crypto/openssl_version defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25943 Investigate and fix tortls/x509_cert_free test failure on win32 CI builds saper defect Medium Core Tor/Tor
#25944 Investigate and fix tortls/context_new test failure on win32 CI builds saper defect Medium Core Tor/Tor
#25951 Run flush_pending_log_callbacks() on an as-needed basis, not once-per-second nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25952 Move check_whether_*port_reachable() to a scheduled callback, not once-per-second nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25953 Module: Add Travis target for modularized directory authority subsystem ahf task Medium Tor: 0.3.4.x-final Core Tor/Tor
#25960 Allow additional header lines in bandwidth measurements documents juga enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#25977 Cross-compiling tor rust for macOS is broken defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25981 Conflicting ports cause tor to crash nickm defect High Tor: 0.3.4.x-final Core Tor/Tor
#25988 module: Post-merge tasks for dirauth modularization dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25993 Improve deliberate test coverage for addressmap_get_virtual_address() nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25994 test_channel: keep time constant when running channel/outbound_cell nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25995 Use a deterministic PRNG in test_circuit_timeout() for predictable coverage. nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25997 Solve nondeterminism in testing of hs_get_responsible_hsdirs nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26000 9abf541f7f breaks Windows builds due to missing ";" defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26004 Allow Tor to accept node_id at the end of a bandwidth file line defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26005 OpenSSL-nodep fixes seem to have broken LibreSSL nickm defect High Tor: 0.3.4.x-final Core Tor/Tor
#26006 LibreSSL compilation warnings on all supported Tor versions nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26007 Stop logging stack contents when reading a zero-length bandwidth file teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26008 Make workqueue cancel code always get covered by tests. nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26014 Fix two cases of nondeterminism in voting_schedule.c coverage nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26024 cargo vendor rand-0.5.0-pre.1 dependency isis defect Immediate Tor: 0.3.4.x-final Core Tor/Tor
#26025 make distcheck failing for rust builds due to missing include isis defect Immediate Tor: 0.3.4.x-final Core Tor/Tor
#26036 macOS regression in crypto_rand.c refactor catalyst defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26052 man page still says CacheIPv4DNS is on by default arma defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#26062 client: ControlPort set doesn't mean you're a client dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26069 hs-v3: Descriptor signature parsing should have a trailing white-space dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26072 Malformed connected cell closes connection but code continues nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26078 CID 1435546: Error handling issues (CHECKED_RETURN) defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26082 control: ANY_EVENT_IS_INTERESTING() needs to mask the event before testing dgoulet defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#26101 Update cov-diff script to understand * character nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26102 Update cov-diff script to remove extraneous timestamp info nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26106 bump rand dependency to 0.5.0-pre.2 isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26107 move rand crate into parent crypto crate isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26108 the FFI functions in crypto_rand.rs aren't actually exported isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26109 our crypto::digests crate isn't actually exported isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26110 CIRC_BW fields vague defect Low Tor: 0.3.4.x-final Core Tor/Tor
#26116 OpenSSL 1.1.1 changed the semantics of the password callback return value nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26117 AF_UNSPEC are actually valid connected cells defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26121 BUILDTIMEOUT_SET totals are still off mikeperry defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26155 Bandwidth file Timestamp is the latest scanner result, not the file creation time teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26156 Undefined references to EVP_CIPHER_CTX_cleanup() with OpenSSL 1.1.0 no-deprecated nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26158 A little bug of circular path of Tor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26170 Core Tor releases typo defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#26196 Abort in test_bridges.c rl1987 defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26200 Bandwidth List format specification: add KeyValues counting errors in Bandwidth Lines enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#26222 Add a bandwidth-file line to votes in dir-spec.txt juga enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#26228 Clarify/determine specification for padding bytes, (formerly also PADDING cell) dmr defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26258 Rust tests don't fail on failure nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26259 Don't count 0-length RELAY_DATA cell as valid mikeperry defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26267 export rand from the crypto crate isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26269 new compiler warning src/or/router.c:2034:36: warning: potential null pointer dereference nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26272 gcc 7 fails on -Wunused-const-variable for Zstd headers defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26283 smartlist_len cast to double defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26284 Out-of-bounds smartlist access in protover_compute_vote() rl1987 defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#26331 Make queries to help with Tor rotations task Medium Tor: 0.3.5.x-final Core Tor/Tor
#26358 relaycell/circbw warning asn defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26360 Transport plugins deadlock if they write too much to stderr defect Medium Tor: unspecified Core Tor/Tor
#26378 test_rust.sh fails on src/rust/crypto defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#26379 Rend-spec isn't clear about role of first layer of descriptor encryption defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26399 remove redundant "testing" feature from tor_log crate isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26400 remove --all-features from test_rust.sh isis defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26402 Only link dirauth module into libtor_testing once nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26415 doctests in src/rust/crypto fail compilation catalyst defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26418 linker failures on 0.3.4 with --disable-module-dirauth ahf defect High Tor: 0.3.4.x-final Core Tor/Tor
#26435 memory leak in parse_protocol_list defect High Tor: 0.3.4.x-final Core Tor/Tor
#26437 Forking tests fails on Windows if there is a space in the path of the test runner defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26455 use correct CARGO_HOME in test_rust.sh catalyst defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#26467 Coverity issues for week 25 defect High Tor: unspecified Core Tor/Tor
#26470 WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n" WARN: connection_mark_unattached_ap_(): Bug: stream (marked at src/or/connection_edge.c:2551) sending two socks replies? (on Tor 0.3.3.5-rc 81d71f0d41adf0d8) nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#26479 Fix 0.3.4: appveyor failures on win32 (test_dir) nickm defect High Tor: 0.3.4.x-final Core Tor/Tor
#26480 Fix 0.3.4: appveyor failures on win32 (geoip binary mode) nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26481 Split src/common into src/lib nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26488 Stop resolving hard-coded authority DNS names that start with a digit rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26492 code style improvements for src/rust/protover/ffi.rs enhancement Very Low Tor: 0.3.5.x-final Core Tor/Tor
#26494 Resolve containers<->logs circular dependency nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26497 set CARGO_HOME correctly or stop using it defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26503 src/lib/err/torerr.c missing STDERR_FILENO on Windows after refactor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26522 strncat() without bounds rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26523 HSPOST command doesn't parse HSADDRESS argument defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26525 Rename sandbox_getaddrinfo() functions. rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26527 Remove ATTR_NONNULL rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26535 Appveyor fails test_ntor.sh and test_hs_ntor.sh nickm defect High Tor: 0.3.4.x-final Core Tor/Tor
#26541 Fix minor mistakes in the bandwidth-file dir-spec entry juga defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26549 Revision counter for v3 ephemeral hidden service is lost defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26564 Tor compilation fails when cross-compiling for macOS defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26568 --ControlPortWriteToFile reports port 0 on --ControlPort=auto, not opened port nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26593 Split even more things out of or.h nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26594 Tor becomes unresponsive after configuration handling on Windows defect High Tor: 0.3.5.x-final Core Tor/Tor
#26627 HSv3 throws many "Tried connecting to router at [IP:port], but RSA identity key was not as expected" teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#26633 Solve histogram issues for WTF-Pad task Medium Tor: 0.4.0.x-final Core Tor/Tor
#26634 Enumerate unresolved issues that will need to be solved for a WTF-pad deployment task Medium Tor: 0.4.0.x-final Core Tor/Tor
#26635 Finalize vanguard implementation in python defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26662 Fix broken Windows compilation on master nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26694 dir-spec: DirAuths should expose bwauth bandwidth files juga enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#26698 Authorities should put a hash of the bandwidth file in their votes enhancement Low Tor: 0.4.1.x-final Core Tor/Tor
#26703 Lower log level of "Scheduler type KIST has been enabled" defect Very Low Tor: 0.3.5.x-final Core Tor/Tor
#26712 EVP_PKEY_HKDF not defined in libressl, src/lib/crypt_ops/crypto_hkdf.c cannot compile nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26768 Support onionbalance in HSv3 asn defect Medium Tor: unspecified Core Tor/Tor
#26785 older gccs don't accept -Wunused-const-variable catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#26789 configure --disable-unittests causes build to fail when linking rl1987 defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26799 dir-spec: specify failure modes for the bandwidth-file-headers vote line teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26827 torspec: DirAuths should only read the V3BandwidthsFile once per vote enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#26830 SKIP test_keygen.sh on Windows teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26846 prop289: Leave unused random bytes in relay cell payload nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#26851 doc: writing bandwidth files atomically teor task Medium Tor: unspecified Core Tor/Tor
#26853 SKIP test_key_expiration.sh on Windows teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26860 Spec: decryption order appears to be wrongly specified dmr defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26869 tor-spec: Fix minor errors teor task Medium Tor: 0.3.5.x-final Core Tor/Tor
#26870 Spec: clarify inconsistency for [V]PADDING/DROP cell content vs. padding bytes dmr defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26871 prop289: randomize the unused part of relay payloads dgoulet enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#26872 tor-spec: Fix error in recognized, and explain better teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26876 tor.real fails to start on macOS 10.9 teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26882 IP address is not scrubbed in info logs, channel_tls_process_netinfo_cell() AND manpage for SafeLogging overgeneralizes rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26885 tor-spec: Generalise "exit" to "end" teor enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#26890 Redefine coverity version of the BUG macro nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26893 spec: all-zeroes special case is for relay IDs, not cell digests defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26894 spec: say CREATE/CREATE2 and EXTEND/EXTEND2 when we mean to defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26896 Duplicate call to connection_mark_for_close nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26913 DataDirectoryGroupReadable enabled does not have effect nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#26924 Make single onion service to rend and Tor2web to intro link authentication into a protocol warning teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26925 Make link specifier handling in rend-spec-v3 more precise teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26932 Soft assert in HS3 with vanguards ([warn] Invalid signature for service descriptor signing key: expired) defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26939 Privcount blinding and encryption: type fixes nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#26940 Privcount blinding and encryption: doc fixes nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#26942 Privcount blinding and encryption: Rust code conventions teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26943 Privcount blinding and encryption: Safety fixes nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#26946 Privcount blinding and encryption: warning fixes teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26948 tor_run_main crashes when called a second time with --version nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26952 Try enabling ccache on Travis teor enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#26953 Privcount blinding and encryption: add travis CI teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#26972 Create make target to ensure that all Rust files have been formatted with rustfmt teor enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#26979 Appveyor CI IRC shows the wrong branch for pull requests teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26980 HSv3 descriptors rejected because of bad SRV start time computation defect High Tor: 0.3.5.x-final Core Tor/Tor
#26986 Appveyor CI fails on master due to #19506 teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27003 Regression: 'SETCONF ORPort' can kill tor process nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#27037 autoconf error defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27040 [warn] We don't have a consensus, so we can't perform v2 rendezvous operations. defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27044 be more strict in parsing HiddenServicePort defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27071 Stop using max_width=80 for rustfmt defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27073 conditionvar_timeout intermittently fails on maint-0.3.3 nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27075 Typo in control_event_hs_descriptor_content() comment neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27080 bridges fail on Tor 0.3.4.1-alpha and later defect High Tor: 0.3.4.x-final Core Tor/Tor
#27081 Don't link pthreads on win32, even if it is present nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27096 Stop relying on $HOME being set in the unit tests defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27139 macOS i386 fails time unit tests nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network defect High Tor: unspecified Core Tor/Tor
#27160 Make GettingStartedRust.md say that we support rust stable teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27164 rust protover accepts "Link=1-5-foo" defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27165 CID 1438153 unlikely overflow in predicted_ports_prediction_time_remaining() rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27176 fix inaccurate rust docs defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27177 rust protover accepts tabs and newlines in protocol versions defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27185 test/test.c and lround() prototype teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27186 Inform users about configuration file and directory includes enhancement Low Tor: 0.4.4.x-final Core Tor/Tor
#27197 rust protover accepts excess commas in version strings defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27199 panic inside rust extern "C" function is undefined behavior defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27204 add info for IPv6-only hosts to torrc man page traumschule enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#27206 rust protover_all_supported() takes forever on some inputs defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27216 Fix spelling error in comment for getinfo_helper_current_time() neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27226 Crash in tortls/cert_matches_key with openssl 1.0.2p nickm defect High Tor: 0.2.9.x-final Core Tor/Tor
#27236 When checking usable exit descriptors, always check exit policies teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27237 When the network doesn't have any exits, use the mid weight as the exit weight teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27250 Duplicate line '#include "lib/net/address.h' in src/test/test_address.c neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27251 Add single-onion-v23-ipv6-md to make test-network-all teor enhancement Low Tor: 0.4.1.x-final Core Tor/Tor
#27272 ASan is incompatible with Rust's jemalloc on Travis defect High Tor: 0.3.5.x-final Core Tor/Tor
#27274 ASan on OSX Travis is incompatible with Rust's santiziers defect High Tor: 0.3.5.x-final Core Tor/Tor
#27275 Stop reporting appveyor on_success, because it's noisy defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27284 Check IPv6 exit policies on microdescs neel defect Medium Tor: 0.4.2.x-final Core Tor/Tor
#27295 make test-network-all should clear the test_network_log directory before running teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27296 macOS x86_64 fails test-timers teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27315 Sandbox regression in 0.3.4.7-rc defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27316 protover.c accepts arbitrary bytes in protocol names cyberpunks defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27318 incorrect comments in torlog.c defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27332 outdated documentation for connection_handle_write_impl() defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27333 outdated docs for onion_extend_cpath() traumschule defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27335 Tor bug when hs directory is missing defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27344 Debian OpenSSL 1.1.1~~pre6-1 defaults to requiring 2048 bit RSA keys defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27345 Make tor use chutney mixed+hs-v2 and bridges+hs-v2 teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27366 Ask Travis CI to reduce the number of erroring builds teor task Medium Tor: 0.3.5.x-final Core Tor/Tor
#27372 Make teor an appveyor admin on github teor task Medium Core Tor/Tor
#27378 Stop providing the hs flag on chutney authorities teor defect Medium Core Tor/Tor
#27382 Bad valid-after time in 0.3.3 and 0.3.4 defect Medium Tor: unspecified Core Tor/Tor
#27387 Fix issues found during NSS branch reviews nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27388 is_extrainfo in comment of router_parse_list_from_string() should be want_extrainfo neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27389 Appveyor Windows 64-bit builds fail because the compiler is broken teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27410 Bug: Non-fatal assertion !(status == HS_CLIENT_FETCH_HAVE_DESC) failed in retry_all_socks_conn_waiting_for_desc at ../src/or/hs_client.c:268 defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#27418 Don't pass --flags as the first argument to echo in travis.yaml teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27451 Refactor socket closing in tor_tls_free() so it is not broken with NSS nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27460 Appveyor: --disable-gcc-hardening teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27461 Windows: cast between incompatible function types in main teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27463 hs: rend_client_send_introduction v0 string truncation warning teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27464 Appveyor: stop reinstalling packages that haven't been updated teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27465 Windows: cast between incompatible function types in address.c teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27467 Remove unused GetAdaptersAddresses_fn_t teor enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#27470 tor nightly build fails for Windows 64 bit with "error: conflicting types for 'tor_tls_new'" defect Medium Core Tor/Tor
#27471 HS intermittently fails: Non-fatal assertion failed in send_introduce1 dgoulet defect Very High Tor: 0.4.2.x-final Core Tor/Tor
#27488 0.3.4.6-rc ChangeLog omits bug26876 defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27500 Tor crashes upon ORPort disconnection nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#27521 Comment: typo in get_interface_addresses_win32() function comment teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27530 Configure: Use AC_TRY_RUN() to check that --enable-gcc-hardening works nickm defect Low Tor: 0.4.1.x-final Core Tor/Tor
#27547 hs-v3: Client authorization feature needs a changes file and man page defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27550 hs-v3: Don't warn so loudly when tor is unable to decode a descriptor defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#27606 Handle coverity issues related to recently merged HS client auth defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27618 LLVM scan-build: src/tools/tor-resolve.c:224:3: warning: Value stored to 'socklen' is never read defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27629 add len argument to consensus parsing functions enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#27644 wrong documentation of networkstatus_read_cached_consensus_impl defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27649 rust protover double-counts protocol versions defect High Tor: 0.3.5.x-final Core Tor/Tor
#27655 TB 8.5a1 fails to load reachable onion services tbb-team defect Medium Tor: unspecified Core Tor/Tor
#27658 Nonzero exit from forked testcase should make the testcase fail nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27664 Initialization error when using NSS with Chutney nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27670 Memleak on tor master 95fcad4088eba52e defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27675 test_rebind.py depends on python >=2.7 or >=3.1 rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27680 Explain how to use auth cookie for onion services traumschule enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#27684 Memory leak in tortls/openssl/try_to_extract_certs_from_tls nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27685 Memory leak in tortls/openssl/context_new nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27686 OOM code should count space used in a circuit's half-closed list nickm defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27687 rust protover accepts non ASCII in protocol names defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27707 Improve some v3 onion logs defect Medium Tor: unspecified Core Tor/Tor
#27708 Heap use-after-free on git master dbb0abc9f1a174efdb65d581f5dbe46dbad2ebb5 nickm defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#27709 The compiler doesn't warn about tor_assert(a = b) nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#27711 Hardened build fails in tortls_openssl.c nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27728 Signature mismatch for crypto_strongest_rand() in ed-donna code breaks -flto compilation nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27730 CID 1439330: "st.st_size > 9223372036854775807L" is always false nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27731 tor restart loop: "The missing protocols are: LinkAuth=1" defect Medium Core Tor/Tor
#27734 tor on OpenSSL claims not to support LinkAuth=1 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27740 rust protover_all_supported() returns rust-allocated string in *missing_out ahf defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27741 too many arguments in rust protover_compute_vote() nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27750 conn_close_if_marked: Non-fatal assertion !(connection_is_writing(conn)) dgoulet defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#27756 0.3.5.1-alpha ChangeLog: delete all the consensuses to un-break nss teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27757 0.3.5.1-alpha: minor changelog fixes teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27761 check-changes: check that bugfixes aren't on future versions teor enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#27764 crypto_rsa.c: CID 1439488: Resource leaks defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27765 Appveyor: only install packages for the current target nickm enhancement Very High Tor: 0.3.5.x-final Core Tor/Tor
#27772 Compile without warnings on GCC 8.2.0 with LTO enabled nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#27774 hs-v3: Assertion onion_pk failed in introduce1_set_encrypted_onion_key defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27781 FTBFS on older arm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27782 nss: tor_tls_release_socket() won't catch invalid socket value defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27795 Possible fd leak on 0.3.5.1-alpha nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#27797 node: Make node_supports_v3_rendezvous_point() also check for the onion_pk defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27800 Non-fatal assertion !(old) failed in node_add_to_ed25519_map catalyst defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27804 rust protover_all_supported() NULL pointer dereference ahf defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27808 tor 0.3.5.early-alpha: Raw assertion failed at smartlist_core.c::191191 : idx>=0 rl1987 defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27810 hs_service/helper_functions test seems unreliable on slow systems dgoulet defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#27812 memwipe + arm, error: implicit declaration, error: nested extern defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27813 Tor 0.3.4.8 is leaking memory defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27814 move protover_rust.c out of core/proto/ defect Medium Core Tor/Tor
#27821 HTTPTunnelPort "405 Method Not Allowed" page should say "this is not an HTTP Proxy" enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#27838 v3 onion service wrongly considers Invalid signature for service descriptor signing key: expired dgoulet defect High Tor: 0.3.5.x-final Core Tor/Tor
#27841 Surprise race: Intro point closes circuit after NACK, at the same time as client tries to extend circuit to new intro point neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27844 rerun rustfmt defect Medium Tor: unspecified Core Tor/Tor
#27849 Bootstrapping hangs with 'SocksPort 0' dgoulet defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27853 tor-resolve manpage points to doc/socks-extensions.txt rl1987 defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27861 Tor 0.3.5.2-alpha-dev c82163dff468443d Bug in tor_assertion_failed_() nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27893 memory leak in dump_config() nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27913 Add test-stem to travis-ci if possible enhancement High Tor: 0.3.5.x-final Core Tor/Tor
#27928 Refrain from listener rebinding when address families differ defect High Tor: 0.3.5.x-final Core Tor/Tor
#27943 Broken Appveyor build nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#27946 "ExitRelay 0" ignored if config files are in include directories defect Medium Tor: unspecified Core Tor/Tor
#27948 Backtrace does not work on NetBSD teor defect High Tor: 0.3.5.x-final Core Tor/Tor
#27962 Newline missing between between hs_client_get_random_intro_from_edge() and hs_client_receive_introduce_ack() neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27963 Undefined symbol: "timeradd", first referenced in src/lib/libtor-thread.a nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#27968 SIGNAL HALT race condition in test-rebind.py teor defect High Tor: 0.3.5.x-final Core Tor/Tor
#27983 0.3.2.x reached it's EOL date: remove version 0.3.2.x from recommended versions task Medium Tor: 0.3.5.x-final Core Tor/Tor
#27990 Missing sys/time.h include in procmon.c breaks netbsd compilation nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#27992 config DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDir nickm defect Low Tor: 0.4.3.x-final Core Tor/Tor
#27995 hs v3 auth descriptor cookie validation: tor crash when parsing .auth file after SIGHUP dgoulet defect High Tor: 0.3.5.x-final Core Tor/Tor
#28007 shellcheck: scan-build.sh issues defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28008 shellcheck: coverage script issues defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28009 shellcheck: cov-diff issues defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28010 shellcheck: run_trunnel.sh issues rl1987 defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28011 shellcheck: run_calltool.sh issues rl1987 defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28012 shellcheck: updateRustDependencies.sh issues defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28019 Collect feedback on mobile DisableNetwork API; resolve issues. defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28020 Run another memory profile in late 0.4.0 to figure out how much memory we saved. dgoulet task Medium Tor: 0.4.0.x-final Core Tor/Tor
#28026 make hs-v3 client auth configuration clearer in man page defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28027 Tor keeps opening circuits while waiting for bridge descriptors neel defect Medium Tor: unspecified Core Tor/Tor
#28060 Fix the missing unpack function in mmdb-convert.py defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28066 Fix typo in hs_cell_parse_introduce2() comment neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28077 remove unsafe block from cstr! macro defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28089 Exhausting our bandwidth write limit stops the connection from reading defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#28094 fix docs in workqueue.c defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28096 Windows 8.1 and 10 relays claim to be Windows 8 teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#28100 Tor shouldn't set Content-Type: application/octet-stream when compressing results Hello71 defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28115 0.3.5.3 FTBFS on mips and s390 nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#28120 hs_descriptor: CID 1440368: Incorrect expression (SIZEOF_MISMATCH) defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28123 Missing description of ED25519-V3 private key format in rend-spec-v3.txt defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28127 Hidden service option HiddenServiceAuthorizeClient is incompatible with version 3 neel defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28128 v3 client auth: No interned sandbox parameter found dgoulet defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28140 Our circuit died due to an invalid selected path if switching to plugabble transports defect High Tor: unspecified Core Tor/Tor
#28142 Merge original WTF-PAD branch mikeperry enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#28160 outdated docs in rust/tor_log defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28177 Realphabetize list of tests nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28181 spec: Add to pt-spec.txt control messages going back to main process (tor) dgoulet enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#28182 spec: Add to control-spec.txt some pluggable transport events dgoulet enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#28183 tor-0.3.5.3_alpha unexpected stop bug: (Sandbox) Caught a bad syscall attempt (syscall shutdown) defect High Tor: 0.3.5.x-final Core Tor/Tor
#28192 Work out why 0.3.5 and later fail chutney (but 0.3.4 and earlier do not) defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28202 Bad end-of-string check in get_next_token (CID various) nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28208 Run bridges+hs-v23 for make test-network teor enhancement Medium Tor: 0.4.4.x-final Core Tor/Tor
#28221 Fix typo in ReleasingTor.md teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28223 Unparseable microdescriptor on public relay nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28226 Backend for an async publish-subcribe messaging system for cross-module communications nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#28245 Tor nodes with OpenSSL 1.1.1 can't communicate with each other nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#28255 verify guard selection consensus expiry constraints teor task Medium Tor: 0.4.0.x-final Core Tor/Tor
#28257 CID 1440805: Memory leak in configured_nameserver_address() due to #21900 defect High Tor: 0.4.0.x-final Core Tor/Tor
#28264 spec: Actually do base32 in the client auth pubkey example defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28275 hs-v3: Rotate intro points and close RP circuits when removing client auth service side defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#28286 Missing header in freespace.c when building for Android nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28298 Tor 0.3.3.1-alpha resumes allowing RunAsDaemon=1 with relative DataDirectory defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#28303 Include sys/time.h in timers.c and time_fmt.c to fix OpenBSD build defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28308 Log the Tor version before running the unit tests teor enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#28319 accept a reasonably live consensus for path selection teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28348 Setting DisableNetwork won't disable NEED_NET events defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#28358 Nyx forces Tor error: sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28360 Replace TODOs in bandwidth file spec with Tor versions teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28399 Build is broken on Appveyor CI defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#28413 FreeBSD build warning in aes_new_cipher() nickm defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#28415 extra-info-digest's sha256-digest isn't actually over the same data as the sha1-digest defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28416 The ns consensus isn't explicitly ns in the network-status-version line of flavored consensuses defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28419 libtorrunner: memory leak in tor_runner error path defect Low Tor: 0.3.3.x-final Core Tor/Tor
#28425 Typo in comment for rend_cache_failure in feature/rend/rendcache.c: "usuable" should be "usable" neel defect Medium Tor: unspecified Core Tor/Tor
#28435 adjust Doxyfile for source tree moves catalyst defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28440 Various doc and comment fixes teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28441 Stop talking about Named in log messages teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28453 Create a EndOfLifeTor.md document nickm task Low Tor: 0.4.1.x-final Core Tor/Tor
#28454 Actually use zstd on Appveyor teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28479 Update "ReleasingTor.md" to match current practice nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28485 Link failure for tor-print-ed-signing-cert.exe on Windows ahf defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28524 update control_free_all() for #27169 catalyst defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28525 Make tor_addr_is_internal_() aware of RFC 6598 (Carrier Grade NAT/Large Scale NAT) IPv4 Ranges neel defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#28554 Fix memory leaks and missing unmocks in test_entry_guard_outdated_dirserver_exclusion teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28558 Crash in memoize_protover_summary() when cache is full nickm defect Very High Tor: 0.4.0.x-final Core Tor/Tor
#28562 test: test_rebind.py doesn't use a temporary a DataDirectory defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28569 Mark outdated dirservers in reasonably live consensuses teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28570 Various comment fixes teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28574 Appveyor: OpenSSL unit test fails with header and library version mismatch defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#28591 Accept a future consensus for bootstrap teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28592 Spurious coverity memory leak error in memoize_protover_summary() defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28612 Tor start via Windows service fails defect High Tor: 0.3.5.x-final Core Tor/Tor
#28614 Can't parse networkstatus consensus time nickm defect High Tor: 0.4.0.x-final Core Tor/Tor
#28616 TLS internal error running Tor 0.3.4.9 on Debian Buster (OpenSSL 1.1.1a) defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28619 hs-v3: Do not close RP circuits when deleting an ephemeral service defect High Tor: 0.3.3.x-final Core Tor/Tor
#28623 use documentation IP ranges for documentation (manpage) defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28633 Pad on specific circuit purposes + ltups defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28635 Clean up PADDING_TODO.txt defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28636 Address WTF-PAD comments by Nick (2018-11-27 over IRC) defect High Tor: 0.4.1.x-final Core Tor/Tor
#28656 Bug: src/feature/nodelist/nodelist.c:2501: compute_frac_paths_available : Non-fatal assertion !(f_exit > 0.0) failed. defect High Tor: 0.3.5.x-final Core Tor/Tor
#28660 rend_cache_decrement_allocation(): Bug: Underflow in rend_cache_decrement_allocation (On Windows build) defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28668 If a Tor unit test causes a BUG log, it should fail nickm enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#28669 Bug: ../src/feature/hs/hs_client.c:280: retry_all_socks_conn_waiting_for_desc defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28693 Add an option to disable circuit padding defect High Tor: 0.4.1.x-final Core Tor/Tor
#28698 When circuit times are fixed, they can't be "relaxed" defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28717 Tor stuck in 25% Loading networkstatus consensus defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#28778 Rename some circuitpadding structs defect Medium Tor: unspecified Core Tor/Tor
#28779 Remove double function declarations in circuitpadding.c/test_circuitpadding.c defect Medium Tor: unspecified Core Tor/Tor
#28780 circpadding: Add machine flag for not closing circuit if machine is active defect Very High Tor: 0.4.1.x-final Core Tor/Tor
#28804 Add circuit padding to padding-spec.txt and write a doc for researchers mikeperry defect High Tor: unspecified Core Tor/Tor
#28805 ControlPort has undocumented behavior defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28806 checkIncludes.py does not like code in src/ext/timeouts nickm defect Low Tor: 0.4.1.x-final Core Tor/Tor
#28815 Refactor similar compression buffer code in dircache.c defect Medium Tor: unspecified Core Tor/Tor
#28816 Call a correct connection_buf_add* function based on compress_state of dir_connection_t rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#28837 Use openssl's SHA3 implementations when they are faster. nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#28841 Write tool for onion service health assessment dgoulet project Medium Tor: unspecified Core Tor/Tor
#28843 DROPOWNERSHIP command nickm enhancement Low Tor: 0.4.0.x-final Core Tor/Tor
#28851 Do we really need to check our hardwired DH primes at startup? nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28852 Remove memset() from get_token_arguments. nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28878 WTF-PAD: Improve deterministic randomness in tests nickm defect Low Tor: 0.4.1.x-final Core Tor/Tor
#28879 send_resolved_hostname_cell(): Assert first, strlen after. nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28880 Fix a few scan-build warnings in the unit tests nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28881 Initialize addr in parse_port_config nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28883 If many log messages are sent, test_rebind.py does not wait for 60 seconds nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28895 "Your guard" log messages are causing confusion defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28912 Stream hangs while downloading consensus via RELAY_BEGIN_DIR dgoulet defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#28913 Base32_decode should return the length of its result. nickm defect Low Tor: 0.4.1.x-final Core Tor/Tor
#28920 rep_hist_log_link_protocol_counts() only knows about 4 link protocols, but Tor has 5 defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28924 Our make V=1 logs have become too verbose for travis nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#28925 distinguish PT vs proxy for real in bootstrap tracker catalyst defect High Tor: 0.4.0.x-final Core Tor/Tor
#28929 fix typo/mispaste in BOOTSTRAP_STATUS_AP_CONN_PROXY summary text catalyst defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28941 tor-spec: Wrong default HiddenServiceVersion value in section 3.27 of control-spec.txt defect Medium Tor: unspecified Core Tor/Tor
#28966 HSv3 client auth insufficiently documented (was: HiddenServiceAuthorizeClient incompatible) asn defect High Tor: 0.4.2.x-final Core Tor/Tor
#28970 tor_bug_occurred_(): Bug: ../src/or/hs_client.c:624: setup_intro_circ_auth_key: Non-fatal assertion dgoulet defect High Tor: 0.3.5.x-final Core Tor/Tor
#28979 Current alpha manual typo authorized_clients nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28981 Use HW_PHYSMEM in get_total_system_memory_impl defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28984 Update dir-spec observed bandwidth to 5 days teor defect High Tor: 0.4.0.x-final Core Tor/Tor
#28989 test_hs_service: CID 1442277: Resource leaks (RESOURCE_LEAK) rl1987 defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28994 Close stdout pipe on error in process_unix_exec (was double closing stdin pipe) defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#28995 Fix the IPv6 case of tor_ersatz_socketpair defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29017 PaddingStatistics should be disabled when ExtraInfoStatistics is 0 teor defect Low Tor: 0.3.4.x-final Core Tor/Tor
#29018 Make all statistics depend on ExtraInfoStatistics teor enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29023 prop289: Implement a fast PRNG nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29026 OpenSSL will not compile without engine support defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29029 Make "tried to establish rendezvous on non-OR circuit" into a protocol warning teor defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#29034 circuit: Cleanup an HS circuit when it is being re-purposed mikeperry defect High Tor: 0.3.5.x-final Core Tor/Tor
#29036 Coverage merge failures cause test_process_slow stderr check to fail teor defect High Tor: 0.2.9.x-final Core Tor/Tor
#29040 Tor crashes if ClientOnionAuthDir contains more than one private key for a hidden service haxxpop defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29042 Error loading private key after 0.3.5.7 upgrade nickm defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#29061 shellcheck: test_bt.sh issue defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29062 shellcheck: test_keygen.sh issues rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29063 shellcheck: test_rebind.sh issues defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29064 shellcheck: test_rust.sh issues rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29067 shellcheck: test_workqueue_*.sh issue rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29068 shellcheck: zero_length_keys.sh issues defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29069 shellcheck: autogen.sh issues rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29070 shellcheck: torify issue defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29071 shellcheck: nagios-check-tor-authority-cert issues rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29072 shellcheck: check-tor issues rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29085 WTF-PAD: Reduce monotime usage because of performance issues defect Very High Tor: 0.4.1.x-final Core Tor/Tor
#29089 WTF-Pad needs a changes file entry defect High Tor: 0.4.0.x-final Core Tor/Tor
#29099 Shellcheck: chutney-git-bisect: use -n instead of ! -z defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29109 Run stochastic tests faster, log better message when they fail nickm defect Very High Tor: 0.4.0.x-final Core Tor/Tor
#29121 tor man page doesn't mention isolating between socksports defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29122 Intermittent test failure in circuitpadding/circuitpadding_wronghop defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29135 Failing to connect to a v3 onion service with client auth produces really long lines in log defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29137 Standardize 'Bandwidth File' name defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29144 Log the correct "auto" port number for listening sockets defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29145 Fix a compiler warning on OpenBSD in test-memwipe.c defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29147 Update dir-spec with the correct Tor version when bandwidth-file-digest is merged defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29150 (Sandbox) Caught a bad syscall attempt (syscall getsockopt) defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29160 do not LOG_ERR from test_address_get_if_addrs6 when there is no ipv6 nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29161 Expect some gmtime/localtime() failures on windows, don't log bugs from tests. nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29168 Fix TROVE-2019-001 (KIST can write above outbuf highwater mark) dgoulet defect Very High Tor: 0.4.0.x-final Core Tor/Tor
#29169 32-bit warnings in test_circuitpadding.c nickm defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29175 Tor 0.3.5.x mishandles empty socks5 auth rl1987 defect High Tor: 0.3.5.x-final Core Tor/Tor
#29196 circ: Remove p_mux and n_mux from circuit_t and or_circuit_t dgoulet defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29203 Add a way to specify machines as reduced circuit padding defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29204 Inspect circuit queue during padding decisions defect Very High Tor: 0.4.0.x-final Core Tor/Tor
#29210 Distribute control.c functionality across various modules catalyst task Medium Tor: 0.4.3.x-final Core Tor/Tor
#29231 Relays vastly underreport write-total in padding-counts line in extrainfo descriptor defect Very High Tor: 0.4.1.x-final Core Tor/Tor
#29237 Restore IPv6 intro points in the HS client tests teor enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29241 NSS SSL_ExportKeyingMaterial failing nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#29243 Fix minor bugs in the HSv3 unit tests teor defect Medium Tor: unspecified Core Tor/Tor
#29244 Travis permissions error: failed to write Cargo.lock nickm defect High Tor: 0.3.3.x-final Core Tor/Tor
#29280 Use Chutney in Tor's CI teor task High Tor: 0.2.9.x-final Core Tor/Tor
#29298 Explicitly specify histogram bin endpoints/widths defect Very High Tor: 0.4.1.x-final Core Tor/Tor
#29310 control-spec: "limits/max-mem-in-queues" appears to be undocumented nickm defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29357 add an ActiveOnStartup config option nickm enhancement Very High Tor: 0.4.0.x-final Core Tor/Tor
#29391 Put git branch-maintenance scripts into scripts directory nickm enhancement Low Tor: 0.4.0.x-final Core Tor/Tor
#29435 coverage script broken by library refactoring nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29436 Add scripts to test unit test coverage determinism nickm defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29437 test-stem times out intermittently nickm defect Medium Tor: 0.4.3.x-final Core Tor/Tor
#29438 In socks-extensions.txt document how we diverge from IETF RFCs for SOCKS5/5a rl1987 defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29500 Broken circuitpadding unittests on appveyor mikeperry defect High Tor: 0.4.0.x-final Core Tor/Tor
#29508 KIST does not check the right channel's sched_heap_idx when readding channels defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29519 Tor from Git on FreeBSD: cc src/test/test-slow leads to "/usr/bin/ld: error: unable to find library -levent" neel defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29527 Division by zero: undefined behaviour in circuitpadding/circuitpadding_sample_distribution test teor defect High Tor: 0.4.0.x-final Core Tor/Tor
#29529 util/map_anon_nofork test fails on macOS nickm defect Very High Tor: 0.4.0.x-final Core Tor/Tor
#29530 Some address/get_if_addrs* tests fail when the network is unreachable nickm defect High Tor: 0.3.5.x-final Core Tor/Tor
#29532 Update pre-push hook so that only maint-* and release-* can get pushed to origin. rl1987 enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29533 Lint all our shell scripts with shellcheck on CI enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#29534 Regression: map_anon_nofork test is breaking jenkins on some platforms nickm defect Very High Tor: 0.4.0.x-final Core Tor/Tor
#29536 prng: Add a global fast PRNG object nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29537 verify intptr_t round-trip through void * defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29541 Re-enable util/mmap_anon_no_fork nickm defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29542 Stop using weak_rng. nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29550 Tor nightly fails to build for Windows defect High Tor: 0.4.0.x-final Core Tor/Tor
#29553 pre-commit hook gives a warning when there are no changes files, when source files aren't where expected, and doesn't exit. nickm defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29562 APPCRASH of tor.exe on Windows when PT bootstrap is cancelled ahf defect High Tor: 0.4.0.x-final Core Tor/Tor
#29577 Fix port in prop#196 IPv6 USERADDR example teor defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29578 The bandwidth file is not a fallback list teor defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29588 Make a post-merge hook that logs a message when the git hooks are updated in master rl1987 enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29599 Test failure due to missing sr_state_free[_all]() in shared-random unit tests teor defect Very High Tor: 0.2.9.x-final Core Tor/Tor
#29601 Drop redundant jobs on Appveyor to speed up builds teor defect High Tor: 0.3.5.x-final Core Tor/Tor
#29603 Make a script that sets up worktrees for the git-* merge scripts teor enhancement Medium Tor: 0.4.3.x-final Core Tor/Tor
#29606 Remove tor 0.3.3 from the git-* scripts enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29607 2019 Q1: Denial of service on v2 and v3 onion service pidgin defect Immediate Tor: 0.4.3.x-final Core Tor/Tor
#29612 Update the documentation for ExitRelay teor defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29617 OOM manger wipes entire DNS cache nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29631 protover: Rust missing Padding value in translate_to_rust() defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29635 tor man page screws up quotes when telling you to use quotes for command line defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29640 Improve the monotonic time documentation in compat_time.c teor defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29643 Fix an incorrect comment about calling FreeLibrary() teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29665 hs: circuit_expire_old_circuits_serverside() should check for RP circuits defect High Tor: 0.3.4.x-final Core Tor/Tor
#29668 Drop thread_fast_rng during postfork; improve thread_fast_rng fork-safety nickm defect High Tor: 0.4.1.x-final Core Tor/Tor
#29669 hs: ADD_ONION with NEW:BEST is still pinned on v2 dgoulet defect High Tor: 0.4.2.x-final Core Tor/Tor
#29670 Could not create SOCKS args string nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29687 Update prop#299 in torspec enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29693 Decrease probability of stochastic failures in test-slow asn defect High Tor: 0.4.0.x-final Core Tor/Tor
#29702 Stop using configs from the local tor install when we launch tor for tests rl1987 defect High Tor: 0.3.5.x-final Core Tor/Tor
#29703 Backport test-network.sh fixes to 0.2.9 teor defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#29706 Test failure due to memory leaks in shared-random unit tests: long-term fix teor defect Medium Tor: 0.4.0.x-final Core Tor/Tor
#29732 Add full-fledged deterministic PRNG support for testing. nickm enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#29738 Deprecate RecommendedPackages torrc option, and remove the code for voting for packages irl enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#29740 Fix memory leaks in shared random unit tests: simple version teor defect Very High Tor: 0.2.9.x-final Core Tor/Tor
#29746 Improve Tor best practices tracker nickm enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#29747 shellcheck errors on the new git scripts nickm defect High Tor: 0.4.1.x-final Core Tor/Tor
#29754 Include new monitoring KeyValues in the bandwidth-file-spec teor defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29756 Check for correct header macro guards. nickm defect Low Tor: 0.4.1.x-final Core Tor/Tor
#29776 Mark proposal 301 as "Accepted", and update the index teor task Medium Tor: 0.4.1.x-final Core Tor/Tor
#29789 practracker.py codec exception in some locales catalyst defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29792 practracker problems and CI broken on master teor defect High Tor: 0.4.2.x-final Core Tor/Tor
#29801 Write a proposal for IPv6 "Happy Eyeballs" on Tor clients teor enhancement Medium Tor: 0.4.3.x-final Core Tor/Tor
#29805 41 coverity defects on prob_distr.c defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29806 Ignore bandwidth file lines with "vote=0" teor defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#29814 Replace NL by SP in Bandwidth Lines in the bandwidth-file-spec juga defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29819 Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4 nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29823 CID 1444117, CID 1444118 resource leaks in test_shared_random.c defect Medium Tor: 0.4.1.x-final Core Tor/Tor
#29824 CID 1444119 resource leak in BUG case in consdiff.c defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29826 Rename router_status_t to avoid confusion with routerstatus_t nickm defect Medium Tor: 0.4.3.x-final Core Tor/Tor
#29831 Backport "enable expensive hardening message is wrong with static library builds" teor defect Medium Tor: unspecified Core Tor/Tor
#29832 Use the correct library names when UBSan isn't supported teor defect Medium Tor: unspecified Core Tor/Tor
#29874 torrc no longer accepts space in executable paths ahf defect High Tor: 0.4.0.x-final Core Tor/Tor
#29875 Going from obfs4 to snowflake using the Tor Network Settings from the Torbutton doesn't work nickm defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#29876 get_proxy_type() may be wrong when unused PT configured defect Medium Tor: unspecified Core Tor/Tor
#29878 macOS Travis builds are 3x slower defect High Tor: unspecified Core Tor/Tor
#29879 Make git-push-all.sh push branches in a specific order teor enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#29882 Make practracker produce output in a stable order nickm defect Medium Tor: 0.4.1.x-final Core Tor/Tor
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Note: See TracQuery for help on using queries.