Custom Query (1850 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 1850)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#17543 Bring some clarity to behavior of net_is_disabled() vs DisableNetwork vs we_are_hibernating() new defect Medium Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned isis defect Very Low Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#30085 Bug: Unexpectedly high use successes counts (101.500000/100.000000) for guard new defect Very Low Tor: unspecified
#20362 Bug: Used circuit is in strange path state new new defect Medium Tor: unspecified
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#4850 Build multiple circuits and use the fastest? new enhancement Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#30179 Building with 'ALL_BUGS_ARE_FATAL' fails because of formatted assertion changes. merge_ready defect Medium Tor: 0.4.1.x-final
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#29824 CID 1444119 resource leak in BUG case in consdiff.c merge_ready defect Medium Tor: 0.3.5.x-final
#30180 CID 1444641: REVERSE_INULL in test_hs_cache.c merge_ready nickm defect Medium Tor: 0.4.1.x-final
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#28734 CIRC_BW is only for origin circuits new defect Medium Tor: unspecified
#24062 CPU profiling of Tor on Android device assigned ahf task Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#28311 Call expand_filename (e.g. for ~ expansion) on all FILENAME config options new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#26305 Can not set up a hidden service on Windows 10 needs_information defect Medium Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#17962 Cannot connect to Tor needs_information defect Medium Tor: unspecified
#13697 Carry entropy across invocations new enhancement Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#14715 Change the default for automaphostsonresolve to be on-by-default? new defect Medium Tor: unspecified
#24367 Changing pluggable transports (during start-up) in Tor Browser is broken assigned defect Medium Tor: 0.4.1.x-final
#29247 Channel padding statistics are incorrect assigned mikeperry defect Medium Tor: 0.4.1.x-final
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#27284 Check IPv6 exit policies on microdescs assigned defect Medium Tor: unspecified
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen accepted dgoulet defect High Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned mikeperry defect Medium Tor: unspecified
#29490 Chutney fails (sometimes?) when tor is built with --enable-coverage new defect Medium Tor: 0.4.1.x-final
#29491 Chutney fails when Tor is built with --enable-nss new defect Medium Tor: 0.4.1.x-final
#8593 Circuit build timeout not respected? needs_information mikeperry defect High Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier accepted nickm task Medium Tor: unspecified
#29132 Clean up dirserv_read_measured_bandwidths after #26223 new defect Medium Tor: 0.4.1.x-final
#17607 Clean up section 2 in control-spec assigned gk enhancement Very Low Tor: unspecified
#6176 Clean up service IDs new defect Low Tor: unspecified
#30176 Clear memory in smartlist_remove_keeporder. merge_ready defect Medium Tor: 0.4.1.x-final
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#14579 Clients cannot use multiple transports with a single bridge new defect Medium Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#20423 Clock jumps on relay due to hostname lookup timeouts reopened defect High Tor: unspecified
#10024 Close and open sockets on IP change, tracking new enhancement Medium Tor: unspecified
#25530 Closing Tor cleanly from command line (when started from command line) on win32 new tbb-team defect Medium Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics assigned ahf project High Tor: unspecified
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned nickm project Medium Tor: unspecified
#7357 Collect more statistics to better understand simulations new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned nickm defect Low Tor: unspecified
#9476 Completely drop support for Tor 0.2.2.x new task Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#4624 Config option to declare whether you're using bridges for reachability or for security new project Medium Tor: unspecified
#19518 Configure argument --without-tcmalloc causes linking with libtcmalloc library new defect Medium Tor: unspecified
#27530 Configure: Use AC_TRY_RUN() to check that --enable-gcc-hardening works accepted nickm defect Low Tor: 0.4.1.x-final
#1354 Configuring Tor with --with*dir gives wrong directories assigned nickm defect High Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#13234 Consensus Algorithm Causes Flip-Flopping new defect Medium Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: 0.4.0.x-final
#15516 Consider dropping INTRODUCE2 cells when under load new enhancement Medium Tor: unspecified
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#7750 Consider packaging inbuf when about to send an end cell new enhancement Medium Tor: unspecified
#30220 Consider proof-of-rendezvous as a way to decrease INTRODUCE2 flood new defect Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#29488 Consider renaming all bash scripts to have .bash extension new defect Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#19377 Consider retry/backoff behavior when building new circuits new task Medium Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias new mikeperry enhancement Medium Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#26113 Control spec is ambiguous whether a GETCONF error message is specified new defect Medium Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#21892 ControlSockets are not created if tor starts with DisableNetwork set new defect Medium Tor: unspecified
#14164 Controller method to get our own descriptor new enhancement Medium Tor: unspecified
#29984 Controller protocol parser can't find empty initial line assigned nickm defect Medium Tor: 0.4.1.x-final
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.