Custom Query (1901 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1901)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#449 dns failures prevent legitimate options being set assigned defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#3266 gabelmoo publishes only 1 extra-info descriptor per week needs_information defect Low Tor: unspecified
#3317 Tor should lock its HiddenServiceDirs new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#3733 Tor should abandon rendezvous circuits that cause a client request to time out assigned defect Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf assigned defect Low Tor: unspecified
#4378 Tor guesses IP address when Address is 127.0.0.1 new defect Low Tor: unspecified
#4386 Requesting better "too slow" warning message new defect Medium Tor: unspecified
#4391 `GETINFO ns/all` doesn't return 'p' lines -- make something that does! new defect Medium Tor: unspecified
#4477 Relays that are not directory authorities shouldn't load the approved-routers file new defect Low Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#4648 Tor shouldn't call expand_filename on filenames specified on the command line new defect Low Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#4847 Fix IPv6 bridges with a private/dynamic IPv4 address assigned ln5 defect Medium Tor: unspecified
#4857 Disabling an HS with service-side rend circs in progress may produce ‘Internal Error’ log message new defect Very Low Tor: unspecified
#4904 tor-resolve falsely says can't resolve if answer is 127.0.0.1 new defect Low Tor: unspecified
#5048 cbtmintimeout should have a lower maximum new defect Medium Tor: unspecified
#5159 Round robin on connection level (more unfairness) new defect Medium Tor: unspecified
#5166 198.18.0.0/15 is reserved and in use by home routers new defect Medium Tor: unspecified
#5298 Relay does not pick the right IP addr of local node when multiple interfaces are available new defect Medium Tor: unspecified
#5409 Warn if we're on Windows, and the user ends a line accepting a directory path with a backslash? assigned Jigsaw52 defect Medium Tor: unspecified
#5825 Bridges without geoip file report empty statistics new defect Low Tor: unspecified
#5902 The whole "choose a doomed exit at random" business is busted new defect Medium Tor: unspecified
#5978 Dead code, possible races, in NT service code new defect Low Tor: unspecified
#6176 Clean up service IDs new defect Low Tor: unspecified
#6419 is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid? new defect Low Tor: unspecified
#6505 GETINFO dir/status-vote/current/consensus returns "Unrecognized key" if no consensus available needs_revision zwol defect Low Tor: unspecified
#6622 Tor link against static zlib broken by -pie switch new defect High Tor: unspecified
#6623 --enable-static-tor cannot succeed needs_revision defect Medium Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#6777 add config option to not rate limit authority dir conns new defect Medium Tor: unspecified
#6841 "We have no recent usable consensus" (0.2.4.2-alpha) new defect Medium Tor: unspecified
#6877 Finally replace all char[] buffers with uint8_t[] buffers new defect High Tor: unspecified
#6936 link to librt and libdl only when needed new defect Medium Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#7043 Tor reports clock jumps when no actual clock jumps occurred new defect Medium Tor: unspecified
#7077 Recover from junk in cached-descriptors new defect Medium Tor: unspecified
#7148 Even better parameter voting protocol new defect High Tor: unspecified
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: unspecified
#7216 networkstatus_check_consensus_signature() shouldn't warn because of missing certs needs_revision defect Medium Tor: unspecified
#7362 Don't kill the managed proxy if a transport failed to launch new defect Medium Tor: unspecified
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#7480 cached_resolve_t expiration is overengineered new defect Medium Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#7646 fix/enhance getinfo ns/id/* commands new defect Medium Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#7729 Reading pending TLS bytes can take us over at_most needs_revision defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#7755 circuit_t::timestamp_dirty should be cleaned up new defect Medium Tor: unspecified
#7789 Also display configuration file (torrc) location when running as Windows service new defect Low Tor: unspecified
#7798 Use directory guards even when consensus isn't live needs_information defect Medium Tor: unspecified
#7869 ntor-onion-key is padded with an equal sign needs_revision Jigsaw52 defect Low Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#7875 debian obfsproxies can't advertise ports under 1024 new asn defect Medium Tor: unspecified
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.