Custom Query (1895 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 1895)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#17543 Bring some clarity to behavior of net_is_disabled() vs DisableNetwork vs we_are_hibernating() new defect Medium Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned defect Very Low Tor: unspecified
#31091 Bug stracktrace when pluggable transport cannot bind to port new defect Medium Tor: 0.4.2.x-final
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#30085 Bug: Unexpectedly high use successes counts (101.500000/100.000000) for guard new defect Very Low Tor: unspecified
#20362 Bug: Used circuit is in strange path state new new defect Medium Tor: unspecified
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#4850 Build multiple circuits and use the fastest? new enhancement Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#29824 CID 1444119 resource leak in BUG case in consdiff.c merge_ready defect Medium Tor: 0.3.5.x-final
#30458 CID 1444999 dead trunnel-generated code new defect Medium Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#28734 CIRC_BW is only for origin circuits new defect Medium Tor: unspecified
#24062 CPU profiling of Tor on Android device assigned task Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#28311 Call expand_filename (e.g. for ~ expansion) on all FILENAME config options new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#26305 Can not set up a hidden service on Windows 10 needs_information defect Medium Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#17962 Cannot connect to Tor needs_information defect Medium Tor: unspecified
#13697 Carry entropy across invocations new enhancement Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#14715 Change the default for automaphostsonresolve to be on-by-default? new defect Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#31088 Check IPv4 and IPv6 private addresses in descriptors, first hops, and extends new defect Medium Tor: unspecified
#27284 Check IPv6 exit policies on microdescs assigned defect Medium Tor: unspecified
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen assigned defect High Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#31147 Check tor_vasprintf for error return values. needs_review enhancement Low Tor: 0.4.2.x-final
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned defect Medium Tor: unspecified
#29490 Chutney fails (sometimes?) when tor is built with --enable-coverage new defect Medium Tor: unspecified
#29491 Chutney fails when Tor is built with --enable-nss new defect Medium Tor: unspecified
#8593 Circuit build timeout not respected? assigned defect High Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#31113 Circuitpadding updated comments needs_review enhancement Medium Tor: 0.4.1.x-final
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#29132 Clean up dirserv_read_measured_bandwidths after #26223 new defect Medium Tor: unspecified
#17607 Clean up section 2 in control-spec assigned gk enhancement Very Low Tor: unspecified
#6176 Clean up service IDs new defect Low Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#30796 ClientDNSRejectInternalAddresses inteferes with ClientRejectInternalAddresses=1 new defect Medium Tor: unspecified
#14579 Clients cannot use multiple transports with a single bridge new defect Medium Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#20423 Clock jumps on relay due to hostname lookup timeouts reopened defect High Tor: unspecified
#10024 Close and open sockets on IP change, tracking new enhancement Medium Tor: unspecified
#25530 Closing Tor cleanly from command line (when started from command line) on win32 new tbb-team defect Medium Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics assigned project High Tor: unspecified
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: unspecified
#7357 Collect more statistics to better understand simulations new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned defect Low Tor: unspecified
#9476 Completely drop support for Tor 0.2.2.x new task Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#4624 Config option to declare whether you're using bridges for reachability or for security new project Medium Tor: unspecified
#19518 Configure argument --without-tcmalloc causes linking with libtcmalloc library new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#13234 Consensus Algorithm Causes Flip-Flopping new defect Medium Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: unspecified
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#7750 Consider packaging inbuf when about to send an end cell new enhancement Medium Tor: unspecified
#15516 Consider rate-limiting INTRODUCE2 cells when under load needs_revision dgoulet enhancement Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#29488 Consider renaming all bash scripts to have .bash extension new defect Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#19377 Consider retry/backoff behavior when building new circuits new task Medium Tor: unspecified
#30411 Consider rewriting git hooks in Python new enhancement Medium Tor: unspecified
#30695 Consider running tor's stem CI job in --target ONLINE mode, maybe with chutney new defect Medium Tor: unspecified
#31089 Consider using data-URI to embed how_tor_works_thumb.png image into tor-exit-notice.html needs_review enhancement Low Tor: 0.4.2.x-final
#8159 Consolidate thresholds for path build bias and use bias assigned enhancement Medium Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#26113 Control spec is ambiguous whether a GETCONF error message is specified new defect Medium Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#21892 ControlSockets are not created if tor starts with DisableNetwork set new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.