Custom Query (1892 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 1892)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#14223 END_STREAM_REASON_TIMEOUT blurs together two very different error cases new defect Medium Tor: unspecified
#14266 Make address mapping conditional on having the particular address mapping types enabled. new defect Low Tor: unspecified
#14267 We should be smarter about fetching all missing votes new defect Medium Tor: unspecified
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#14579 Clients cannot use multiple transports with a single bridge new defect Medium Tor: unspecified
#14581 Looking up bridge by ID may choose the wrong bridge new defect High Tor: unspecified
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#14715 Change the default for automaphostsonresolve to be on-by-default? new defect Medium Tor: unspecified
#14763 Stochastic Guard Flag new defect Medium Tor: unspecified
#14799 Make failure to create extrainfo an error? reopened defect Low Tor: unspecified
#14827 Tor controller command to write its file to disk new defect Medium Tor: unspecified
#14854 Document the hardlimit of HiddenServiceAuthorizeClient basic new defect Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14899 Enable Tor to work without using filesystem for cached files new enhancement Medium Tor: unspecified
#14900 To link connections only if they ready reopened defect Medium Tor: unspecified
#14921 Investigate whether we sometimes remove all predicted ports at startup new defect Medium Tor: unspecified
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#14987 Settle on a name for descriptors assigned defect Low Tor: unspecified
#14999 Most/all esc_for_log instances in control.c should change. new defect Medium Tor: unspecified
#15000 bring some sanity to quoted strings in the controller api needs_revision defect Medium Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
#15017 Experiment: does BIO_f_buffer help performance with read/write syscalls? new enhancement Medium Tor: unspecified
#15043 Use acx_pthread.m4 to find pthreads library new defect Medium Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned defect Low Tor: unspecified
#15059 Allow UI to identify servers by Ed25519 keys assigned enhancement Low Tor: unspecified
#15060 Decide the fate of MyFamily new enhancement Medium Tor: unspecified
#15061 Support Ed25519 identities in controller interface assigned defect Low Tor: unspecified
#15062 Support identifying nodes by ed25519 keys in state file, other misc files assigned defect Low Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#15214 networkstatus_compute_consensus() is unreasonably large and should be refactored new defect Medium Tor: unspecified
#15232 Specify a potential TLS-replacing protocol for future use in Tor. new defect Medium Tor: unspecified
#15237 Improve tooling and usability for approved-routers file and its allies new defect Medium Tor: unspecified
#15272 Think of more research questions that we can answer with statistics new task High Tor: unspecified
#15380 log messages are doubled and unclear new defect Very Low Tor: unspecified
#15458 StrongSocksIsolation option (w/ virtual circuits?) new enhancement Low Tor: unspecified
#15469 Remove data structure containing unique IP address sets new enhancement High Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#15607 Tor log dates imprecise needs_revision defect Medium Tor: unspecified
#15618 Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending) assigned defect Medium Tor: unspecified
#15621 Kill the pre-version 3 intro protocol code with fire. assigned enhancement Medium Tor: unspecified
#15660 [feature suggestion] Need signal to totally switch to the new set of circuits new defect Medium Tor: unspecified
#15661 Same "non-loopback address" notice is printed twice new defect Very Low Tor: unspecified
#15692 'GETINFO config-file' command on ControlPort returns the standard torrc file when it was overridden in the command line new defect Medium Tor: unspecified
#15765 Tor doesn't reconnect automatically when tun/tap device goes down. new task Medium Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#15883 Redesign/Rewrite the BridgeAuthority new enhancement Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#15938 HS descriptor cache leaks timing information to local users new defect Medium Tor: unspecified
#15940 Make a standard transition plan for killing off a client version assigned task High Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever assigned task High Tor: unspecified
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#15998 suggestion: distributed captcha mechanism for hidden service DDOS defense new enhancement Medium Tor: very long term
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints new enhancement Medium Tor: unspecified
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. new defect Medium Tor: unspecified
#16059 Add a "rendezvous approver" control API new enhancement Medium Tor: unspecified
#16070 Tor log doesn't have to be world readable new defect Low Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#16294 Unable to bootstrap when no relays meet criteria; logging messages unhelpful new defect Low Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16350 tor.pid should be deleted on exit in every case possible, like assert termination, and catchable signals new defect Medium Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16458 torspec references UTC, but tor uses unix time (leap second handling) new task Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#16585 Long-running activity in scheduler_run() blocks network, creating information leaks new defect Medium Tor: unspecified
#16598 fsync ed25519 master key files before closing them. assigned defect Very Low Tor: unspecified
#16608 "time published in the consensus network status" seems to be wrong new defect Medium Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#16648 Libevent configuration doesn't use pkg-config new defect Medium Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#16782 systemd unit file is not compatible with the AppArmorProfile= directive new defect Medium Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#16803 Unit tests for sandbox failures new enhancement Medium Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#16845 make unverified consensus ISOTime accessible through Tor's ControlPort reopened enhancement Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#16997 Gather and report metrics for the number of channels a relay is servicing. new enhancement Medium Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.