Custom Query (1849 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 1849)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#23712 sched: DESTROY cell on a circuit bypasses the scheduler accepted dgoulet defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler accepted dgoulet defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge new dgoulet defect High Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes new dgoulet defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned dgoulet defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info accepted dgoulet defect Medium Tor: unspecified
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells accepted dgoulet defect Medium Tor: unspecified
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned dgoulet defect Medium Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write assigned dgoulet defect Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells accepted dgoulet enhancement Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services needs_revision dgoulet defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t needs_revision dgoulet enhancement Very High Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned dgoulet enhancement Medium Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned dgoulet defect Medium Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned dgoulet enhancement Low Tor: unspecified
#25500 Reduce client CPU usage when idle assigned dgoulet task Medium Tor: unspecified
#25882 clients not detecting stale onion service introduction points assigned dgoulet defect High Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits needs_revision dgoulet enhancement Medium Tor: unspecified
#26094 manpage: increase minimal bandwidth requirements to be consistent with the relay guide and FAQ needs_information dgoulet enhancement Medium Tor: unspecified
#26288 prop289: Implement authenticated SENDME merge_ready dgoulet enhancement Medium Tor: 0.4.1.x-final
#26292 Subsystem for gathering information about local connection states assigned dgoulet enhancement Medium Tor: unspecified
#26300 Attempt by … to open a stream on first hop of circuit. Closing. needs_information dgoulet defect Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen accepted dgoulet defect High Tor: unspecified
#27471 HS intermittently fails: Non-fatal assertion failed in send_introduce1 new dgoulet defect Very High Tor: 0.3.4.x-final
#29034 circuit: Cleanup an HS circuit when it is being re-purposed assigned dgoulet defect High Tor: 0.4.1.x-final
#29625 git-pull-all.sh should say which branches it updated, and which files changed accepted dgoulet defect Medium Tor: 0.4.1.x-final
#30365 prop289: Update tor-spec.txt with authenticated SENDME spec needs_review dgoulet task Medium Tor: 0.4.1.x-final
#30382 Provide control port event for when we are missing v3 client auth for an onion needs_review dgoulet defect Medium Tor: 0.4.2.x-final
#30440 sendme: Service introduction circuit ignore flow control accepted dgoulet defect Very High Tor: unspecified
#30454 hs-v3: INTRODUCE1 trunnel code doensn't handle HS_INTRO_ACK_STATUS_CANT_RELAY merge_ready dgoulet defect High Tor: 0.4.0.x-final
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#22972 tor expert bundle only read the first letter from config new erinn defect Medium Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags needs_revision ffmancera defect High Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#17607 Clean up section 2 in control-spec assigned gk enhancement Very Low Tor: unspecified
#18224 Tor control spec doesn't properly specify reply format assigned gk defect Medium Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation needs_revision haxxpop enhancement Medium Tor: unspecified
#29134 Document the max number of v3 client auths I can make assigned haxxpop defect Medium Tor: unspecified
#8908 Tor systemd socket activation support needs_revision intgr enhancement Very Low Tor: unspecified
#17101 Tests for connection_ap_handshake_rewrite_and_attach needs_revision ipazmino defect Medium Tor: unspecified
#28465 Use or remove "package" lines from votes new irl task Medium Tor: unspecified
#29738 Deprecate RecommendedPackages torrc option, and remove the code for voting for packages merge_ready irl enhancement Medium Tor: 0.4.2.x-final
#8001 obfsproxy makes tor warn when one bridge is down assigned isis defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned isis defect Very Low Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports new isis enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned isis task High Tor: unspecified
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages assigned isis defect Medium Tor: unspecified
#22826 Write a spec for unsanitised bridge descriptor formats assigned isis enhancement Low Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells needs_revision isis enhancement Medium Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents needs_revision jryans defect High Tor: unspecified
#19009 bandwidth testing circuits should be allowed to use our guards assigned juga defect Medium Tor: unspecified
#22453 Relays should regularly do a larger bandwidth self-test needs_information juga defect Medium Tor: unspecified
#4565 Enable relays to talk to other relays via IPv6 assigned ln5 project Medium Tor: unspecified
#4847 Fix IPv6 bridges with a private/dynamic IPv4 address assigned ln5 defect Medium Tor: unspecified
#5788 Add support for relays without an IPv4 address new ln5 enhancement Medium Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#27999 Allow for long-running signing operations assigned ln5 enhancement Medium Tor: unspecified
#28000 Add support for performing signing operations using ssh-agent assigned ln5 task Medium Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline assigned mikeperry defect Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned mikeperry enhancement Medium Tor: unspecified
#5685 Publish node best practices doc and scripts new mikeperry task High Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits assigned mikeperry enhancement Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations new mikeperry enhancement Medium Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias new mikeperry enhancement Medium Tor: unspecified
#8160 Create separate pending counters during circuit construction new mikeperry enhancement Medium Tor: unspecified
#8453 Alter flag-weight balancing equations new mikeperry enhancement Medium Tor: unspecified
#8593 Circuit build timeout not respected? needs_information mikeperry defect High Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint reopened mikeperry defect High Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned mikeperry defect High Tor: unspecified
#17591 Use channel padding to obscure circuit setup new mikeperry enhancement Medium Tor: unspecified
#22422 Add noise to PaddingStatistics needs_information mikeperry defect High Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned mikeperry defect Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned mikeperry enhancement Medium Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned mikeperry defect High Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned mikeperry defect Medium Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#28634 Design a first useful padding machine (hiding client-side intro/rend circuits) merge_ready mikeperry defect Very High Tor: 0.4.1.x-final
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#17520 Relax the rend cache failure cleanup timer needs_information neel enhancement Medium Tor: unspecified
#17835 Make ClientPreferIPv6ORPort smarter assigned neel enhancement Medium Tor: unspecified
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_review neel enhancement Medium Tor: 0.4.2.x-final
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance assigned neel enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#25568 hs: Lookup failure cache when introducing to an intro point assigned neel defect Medium Tor: unspecified
#26769 We should make HSv3 desc upload less frequent needs_information neel defect Medium Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells assigned neel defect Medium Tor: unspecified
#27446 hs: Report configuration error on the control port assigned neel defect Low Tor: unspecified
#27491 Prefer IPv4 or IPv6 based on the number of failures assigned neel enhancement Medium Tor: unspecified
#27492 Try IPv4 or IPv6 more often based on public or private IP addresses assigned neel enhancement Medium Tor: unspecified
#27647 When randomly choosing IPv4 or IPv6, set IPv6 probability based on IPv6 weight assigned neel enhancement Medium Tor: unspecified
#27648 Stop setting the IPv6 preferred flag on nodes assigned neel enhancement Medium Tor: unspecified
#28027 Tor keeps opening circuits while waiting for bridge descriptors needs_information neel defect Medium Tor: unspecified
#28511 Limit the number of open testing circuits, and the total number of testing circuits assigned neel defect Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated assigned neel defect Medium Tor: unspecified
#28525 Make tor_addr_is_internal_() aware of RFC 6598 (Carrier Grade NAT/Large Scale NAT) IPv4 Ranges merge_ready neel defect Medium Tor: 0.3.5.x-final
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.