Custom Query (1973 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (701 - 800 of 1973)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Ticket Summary Status Owner Type Priority Milestone
#16803 Unit tests for sandbox failures new enhancement Medium Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#16845 make unverified consensus ISOTime accessible through Tor's ControlPort reopened enhancement Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#16997 Gather and report metrics for the number of channels a relay is servicing. new enhancement Medium Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
#17032 Threadpool doesn't get shutdown when changing from relay to client new defect Low Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#17120 Fire a circuit status control port event when circuit isolation changes. new enhancement Low Tor: unspecified
#17134 Add a way to say "Use this option only if supported" in torrc new enhancement Medium Tor: unspecified
#17145 <tor.exe --service install -options -f ...\torrc> returns Error 1064 on Windows new defect Medium Tor: unspecified
#17146 "Sandbox 1" in chutney makes coverage underreported new defect Medium Tor: unspecified
#17147 long-running client path-selection not seeing some (fast) exit nodes needs_information defect Medium Tor: unspecified
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages assigned defect Medium Tor: unspecified
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms new defect Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17230 Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. new defect Medium Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#17278 Fix malleable relay crypto assigned defect High Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced assigned enhancement Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17366 Track consensus fetch times per country? new enhancement Medium Tor: unspecified
#17387 ExtraRelayDescriptorFields needs proposal number new task Low Tor: unspecified
#17391 (Sandbox) Caught a bad syscall attempt (syscall time) (__NR_time not defined?) reopened defect Medium Tor: unspecified
#17451 Tor controller [ControlPort] - bruteforce defence measures & detailed logging when listening non-locally new enhancement Very Low Tor: unspecified
#17495 Unit-test launch_resolve() in dns.c new task Medium Tor: unspecified
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#17591 Use channel padding to obscure circuit setup assigned enhancement Medium Tor: unspecified
#17627 Add missing controller events so we can link every step of the HS dance new enhancement Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#17665 Drop scheduler config options new defect Very Low Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17754 0.2.7.5 cannot work inside lxc container needs_information defect Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#17782 Relays may publish descriptors with incorrect IP address needs_revision defect Medium Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#17793 Inconsistent function comment cache_failure_intro_lookup new defect Very Low Tor: unspecified
#17800 Tor Unit Tests should TT_FORK before initialising global PRNG state new defect Low Tor: unspecified
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: unspecified
#17807 Use OpenSSL 1.1.0 ASYNC engine support new enhancement Medium Tor: unspecified
#17808 Tor doesn't produce a backtrace on gcc x86_64 on macOS needs_information defect Medium Tor: unspecified
#17811 Tor Clients on IPv6 new task High Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl assigned enhancement Medium Tor: unspecified
#17848 Tor ignores tunneled connections when checking existing directory downloads new defect Medium Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17881 Use return codes from test programs to simplify test scripts new enhancement Low Tor: unspecified
#17911 check Tor for local clock leaks new task Medium Tor: unspecified
#17927 Use SRWLock for non-recursive locks on vista and later new enhancement Medium Tor: unspecified
#17928 Warnings in syslog for wrong permissions on hidden service dir are misleading new enhancement Very Low Tor: unspecified
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17956 Let tor handle disconnects better new defect Medium Tor: unspecified
#17957 Detect stolen onion service key new enhancement Medium Tor: unspecified
#17962 Cannot connect to Tor needs_information defect Medium Tor: unspecified
#17971 Unrecognized relay in exit address '[scrubbed].exit'. Refusing. new defect Low Tor: unspecified
#17990 torrc default config ORPort should be changed to 443 from 9001 new defect Medium Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#18020 RFE: Introduce privsep to secure OS and hidden service keys new enhancement Medium Tor: very long term
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18134 tor issues missleading permission warning when torrc overrides User config directive of default torrc new defect Low Tor: unspecified
#18142 Anti-Automated-Scanning: Support "marking" with iptables TCP connections differently "for each circuits" new enhancement Low Tor: unspecified
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#18157 Which hidden services am I running? new enhancement Medium Tor: unspecified
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags new defect High Tor: unspecified
#18263 GETCONF provides incorrect value when undefined new defect Medium Tor: unspecified
#18268 Make Tor aware of the top-30 destinations of Tor Exit traffic new enhancement Medium Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18294 systemd AppArmorProfile= directive unavailable leads to not loading AppArmor profile on Debian jessie new defect Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Note: See TracQuery for help on using queries.