Custom Query (1931 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 1931)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#17520 Relax the rend cache failure cleanup timer needs_information neel enhancement Medium Tor: unspecified
#17835 Make ClientPreferIPv6ORPort smarter assigned neel enhancement Medium Tor: unspecified
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#23301 prop224: Refactor connection_ap_handle_onion assigned neel defect Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#25568 hs: Lookup failure cache when introducing to an intro point needs_review neel defect Medium Tor: 0.4.3.x-final
#26769 We should make HSv3 desc upload less frequent needs_information neel defect Medium Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells assigned neel defect Medium Tor: unspecified
#27446 hs: Report configuration error on the control port assigned neel defect Low Tor: unspecified
#27491 Prefer IPv4 or IPv6 based on the number of failures assigned neel enhancement Medium Tor: unspecified
#27492 Try IPv4 or IPv6 more often based on public or private IP addresses assigned neel enhancement Medium Tor: unspecified
#27647 When randomly choosing IPv4 or IPv6, set IPv6 probability based on IPv6 weight assigned neel enhancement Medium Tor: unspecified
#27648 Stop setting the IPv6 preferred flag on nodes assigned neel enhancement Medium Tor: unspecified
#28511 Limit the number of open testing circuits, and the total number of testing circuits assigned neel defect Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated assigned neel defect Medium Tor: unspecified
#29801 Write a proposal for IPv6 "Happy Eyeballs" on Tor clients needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#29826 Rename router_status_t to avoid confusion with routerstatus_t assigned neel defect Medium Tor: unspecified
#30267 Simplify the code logic of launching HS circuits assigned neel defect Medium Tor: unspecified
#30466 hs: Do not allow more than one control cell on a circuit needs_information neel defect Medium Tor: unspecified
#31652 hs-v3: Service circuit retry limit should not close a valid circuit needs_review neel defect Medium Tor: 0.4.2.x-final
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened nickm defect Medium Tor: unspecified
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted nickm defect Medium Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals accepted nickm enhancement High Tor: unspecified
#27130 rust dependency updating instructions don't work accepted nickm defect Medium Tor: unspecified
#29211 Distribute config.c functionality across more modules assigned nickm task Medium Tor: 0.4.3.x-final
#29223 List canonical abbreviations to use in Tor functions and identifiers needs_revision nickm task Medium Tor: 0.4.2.x-final
#29746 Improve Tor best practices tracker assigned nickm enhancement Medium Tor: 0.4.2.x-final
#29819 Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4 assigned nickm defect Medium Tor: 0.4.0.x-final
#30743 Write a coccinelle script to catch increment/decrement calls inside log_debug(). merge_ready nickm enhancement Medium Tor: 0.4.2.x-final
#30866 Teach config.c to work with options configured in other modules assigned nickm enhancement Medium Tor: 0.4.3.x-final
#30916 assert in dimap_add_entry() needs_review nickm defect Medium Tor: 0.4.2.x-final
#31001 Undefined behavior in tor_vasprintf() merge_ready nickm defect Medium Tor: 0.4.0.x-final
#31078 improve docs for config var abstraction assigned nickm enhancement Medium Tor: 0.4.2.x-final
#31107 channel: channel_tls_handle_cell() CELL_VERSIONS code reached needs_review nickm defect High Tor: 0.4.2.x-final
#31177 Start conversation about auto-formatting our C code accepted nickm task Medium Tor: 0.4.2.x-final
#31241 Refactor config validation needs_revision nickm task Medium Tor: 0.4.3.x-final
#31338 Practracker --list-overbroad produces confusing output when there is an exception merge_ready nickm defect Medium Tor: 0.4.2.x-final
#31466 Consider demoting ".exit is disabled" log message to info needs_review nickm defect Medium Tor: 0.4.2.x-final
#31483 token_bucket_ctr_adjust() does not convert rate to step accepted nickm defect Very High Tor: 0.4.3.x-final
#31508 config refactor: create simple summaries for each refactor step assigned nickm task Medium Tor: 0.4.3.x-final
#31511 config refactor: split mass change commits into automated and manual steps assigned nickm task Medium Tor: 0.4.3.x-final
#31516 config refactor: every function table entry should be documented and unit tested assigned nickm defect Medium Tor: 0.4.3.x-final
#31544 sr: Check why some sr_disk_state fields need to be cleared assigned nickm defect Medium Tor: unspecified
#31549 Authorities should stop listing relays running pre-0.2.9, or running 0.3.0 through 0.3.4 needs_information nickm enhancement Medium Tor: 0.4.2.x-final
#31631 Write a test for round-trip encode/decode operations on configuration objects. accepted nickm enhancement Medium Tor: unspecified
#31638 config: Always check for valid function arguments at the start of each function assigned nickm task Medium Tor: 0.4.3.x-final
#31675 Split microdescs_parse_from_string() into smaller functions merge_ready nickm task Low Tor: 0.4.2.x-final
#31705 Add sufficient coccinelle tooling to run coccinelle without stress needs_review nickm task Medium Tor: 0.4.2.x-final
#31757 test_parseconf.sh: apparently not reliable on Appveyor accepted nickm defect High Tor: 0.4.2.x-final
#31759 Make "annotate_ifdef_directives" script comply with line-width limits needs_review nickm defect Medium Tor: 0.4.2.x-final
#31769 -Wextra-semi causes build failure on debian bullseye needs_information nickm defect Medium Tor: 0.4.2.x-final
#31770 Divide connection_edge.c into separate files. assigned nickm task Medium Tor: 0.4.2.x-final
#31779 annotate_ifdef_directives: avoid double-negation needs_review nickm defect Low Tor: 0.4.2.x-final
#31796 practracker git hook warning: Unusual pattern permitted.h in testdata assigned nickm defect Medium Tor: 0.4.2.x-final
#20284 consensus weight case 2b3 does not follow dir-spec needs_revision pastly defect Medium Tor: unspecified
#29607 2019 Q1: Denial of service on v2 and v3 onion service needs_information pidgin defect Immediate Tor: 0.4.3.x-final
#17949 Make loopback address search more accurate needs_revision rl1987 enhancement Medium Tor: unspecified
#20006 HSFETCH fails for hidden services which use client authentication needs_revision rl1987 enhancement Medium Tor: unspecified
#27143 Look for parts of code that relies on non-trunnel code for binary wire format handling accepted rl1987 task Medium Tor: unspecified
#27324 Rework AUTHENTICATE cell parsing and remaining generation with trunnel accepted rl1987 enhancement Medium Tor: unspecified
#27854 Integration test(s) for tor-resolve needs_information rl1987 enhancement Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#28982 Refactor GETINFO dir/ so that new tor/ URLs automatically become GETINFOs accepted rl1987 enhancement Medium Tor: unspecified
#29573 Tests fail without network interface configured needs_information rl1987 defect Low Tor: unspecified
#31023 Add tests for tor-print-ed-signing-cert and other tools, and run them in CI accepted rl1987 defect Medium Tor: unspecified
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#3459 Expose information about dir conns to controllers accepted rransom enhancement Low Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#25708 [test] setenv() failure in util/expand_filename: test: environment corrupt; missing value for MAKEOVER assigned saper task Low Tor: unspecified
#17521 Support capsicum(4) on FreeBSD assigned shawn.webb enhancement Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#18620 HSFORGET command to clear cached client state for a HS needs_revision str4d enhancement Medium Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% assigned tbb-team defect High Tor: unspecified
#14389 little-t-tor: Provide support for better TBB UI of hidden service client authorization needs_revision tbb-team defect Medium Tor: unspecified
#16027 APPLICATION_VERIFIER_NETWORKING_WSA_NOT_INITIALIZED in tor (via torbrowser 4.5.1) needs_information tbb-team defect Medium Tor: unspecified
#20212 Tor can be forced to open too many circuits by embedding .onion resources new tbb-team enhancement Medium Tor: unspecified
#25530 Closing Tor cleanly from command line (when started from command line) on win32 new tbb-team defect Medium Tor: unspecified
#27655 TB 8.5a1 fails to load reachable onion services needs_information tbb-team defect Medium Tor: unspecified
#17020 Add test for Config options_act function needs_revision tcz001 enhancement Medium Tor: unspecified
#16564 WIP: Reject bridge descriptors posted to non-bridge authorities needs_revision teor enhancement High Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor assigned teor enhancement Very High Tor: unspecified
#23818 Make v2 and v3 single onion services retry all failed intro and rend connections with a 3-hop path merge_ready teor defect Medium Tor: 0.4.0.x-final
#30745 Document disabled CI assigned teor defect Medium Tor: 0.4.1.x-final
#30839 Update EndOfLifeTor.md with our latest end of life process needs_revision teor task Medium Tor: 0.4.2.x-final
#30901 Add control port trace logging to tor needs_revision teor enhancement Medium Tor: 0.4.3.x-final
#30917 Add instructions for making a new maint branch to EndOfLifeTor.md, and rename the file needs_revision teor defect Medium Tor: 0.4.1.x-final
#31482 Avoid possible overflow when converting between coarse stamp to approx ms needs_revision teor defect Medium Tor: 0.4.2.x-final
#31571 Add the tor version and a newline to raw_assert() merge_ready teor defect Medium Tor: 0.4.1.x-final
#31594 Close all the log fds before aborting merge_ready teor defect Medium Tor: 0.4.1.x-final
#31614 Implement clean_up_backtrace_handler() needs_review teor defect Medium Tor: 0.4.2.x-final
#31615 Reorder the early subsystems based on their dependencies merge_ready teor defect Medium Tor: 0.4.1.x-final
#31793 Bug: tor_addr_is_internal() called from src/feature/dirauth/process_descs.c:447 with a non-IP address of type 0 needs_review teor defect High Tor: 0.4.2.x-final
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#20082 Lower initial descriptor upload delay for hidden services needs_revision twim enhancement Medium Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.