Custom Query (1844 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1844)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18134 tor issues missleading permission warning when torrc overrides User config directive of default torrc new defect Low Tor: unspecified
#18142 Anti-Automated-Scanning: Support "marking" with iptables TCP connections differently "for each circuits" new enhancement Low Tor: unspecified
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#18157 Which hidden services am I running? new enhancement Medium Tor: unspecified
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags new defect High Tor: unspecified
#18263 GETCONF provides incorrect value when undefined new defect Medium Tor: unspecified
#18268 Make Tor aware of the top-30 destinations of Tor Exit traffic new enhancement Medium Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18294 systemd AppArmorProfile= directive unavailable leads to not loading AppArmor profile on Debian jessie new defect Medium Tor: unspecified
#18298 reduce warn loglevel entry for missing ed25519_master_id_public_key to notice loglevel new enhancement Low Tor: unspecified
#18323 Add support for HTTP/1.1 for Transfer-Encoding: chunked new enhancement Low Tor: unspecified
#18360 option not to use mman-win32 new enhancement Low Tor: unspecified
#18402 Reduce duplicate code in parse_*_time functions needs_revision enhancement Low Tor: unspecified
#18451 log msg is printed twice after 5 sec new defect Medium Tor: unspecified
#18457 continues to start on unix socket open errors new defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#18509 Summarize our crypto migration plans in one place new enhancement Medium Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#18580 exit relay fails with 'unbound' DNS resolver when lots of requests time-out new defect Medium Tor: unspecified
#18608 Limiting ADD_ONION TARGET access. new defect Medium Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#18665 Make test_util_time pieces pass on windows new defect Medium Tor: unspecified
#18674 Tor rejects [::]/8 and [::]/127 explicitly, but the latter is sometimes eliminated new defect Low Tor: unspecified
#18706 tor-0.2.8.2-alpha, undefined symbolo "signbit" when compiling for Solaris10 needs_information defect Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#18757 Memunit config defaults say "KB" rather than "KBytes" needs_revision defect Medium Tor: unspecified
#18795 diversity weighting system needs_information task Very Low Tor: unspecified
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#18988 log error level messages if relay (self) is not in consensus needs_revision enhancement Medium Tor: unspecified
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19068 Write and run a clique reachability test. new task Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19174 libscrypt check fails when libscrypt requires libm needs_revision defect Medium Tor: unspecified
#19179 Refactor functions that handle 'packages' in consensus/votes new defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. new enhancement Medium Tor: unspecified
#19377 Consider retry/backoff behavior when building new circuits new task Medium Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#19507 tor and tor-gencert disagree on what a month is new defect Medium Tor: unspecified
#19518 Configure argument --without-tcmalloc causes linking with libtcmalloc library new defect Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#19535 A can't-happen case for one-hop circuits actually can happen new defect Medium Tor: unspecified
#19552 Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response new defect Medium Tor: unspecified
#19560 running tor trying to access its ed25519_signing_secret_key, log message too loud new defect Medium Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19572 set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie new defect Medium Tor: unspecified
#19625 Allow relays to set peering policy needs_information project Medium Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19669 `log_prefix_` maybe getting weird output from strftime new defect Low Tor: unspecified
#19759 systemd tor.service hardening: add MemoryDenyWriteExecute=true new enhancement Medium Tor: unspecified
#19761 Tor systemd service should have RuntimeDirectory=tor new defect Medium Tor: unspecified
#19762 Tor systemd service should have ReadWriteDirectories=/var/run/tor new defect Medium Tor: unspecified
#19777 tor-gencert should warn nicely when PEM passphrases are too short new defect Very Low Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#19859 Expose stream isolation information to controllers new enhancement Medium Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#19931 curve25519-donna runtime math errors on armhf needs_information defect Medium Tor: unspecified
#19959 have a flag for Tor relay location, if a relay is hosted in a data center, cloud or physically secured new enhancement Medium Tor: unspecified
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#19989 Tor fails to bootstrap with an Exit as EntryNode new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.