Custom Query (1845 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (801 - 900 of 1845)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#20462 Make test failures/bugs on Raspberry Pi 3 reopened defect Medium Tor: unspecified
#20469 Expose predicted-ports state over the control port new enhancement Medium Tor: unspecified
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#20535 A 304 "Not Modified" should update the time to when we next expect a modification new defect Medium Tor: unspecified
#20554 Refactor circuit_expire_building new enhancement Low Tor: unspecified
#20555 Stream isolation for DNS new defect Medium Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20647 Run chutney tests in Jenkins or Travis assigned enhancement High Tor: 0.4.1.x-final
#20653 Test targets should gracefully handle missing dependencies new defect Low Tor: unspecified
#20671 Refactor stream cipher API new defect Medium Tor: unspecified
#20672 Refactor hashing API new defect Medium Tor: unspecified
#20676 Disposable Exit Nodes new enhancement Low Tor: unspecified
#20719 prop271 -- make parameters configurable accepted nickm enhancement Medium Tor: unspecified
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned nickm project Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned nickm enhancement Medium Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted nickm task High Tor: unspecified
#20849 periodic pattern in network connections ofa newly setup relay needs_information task Low Tor: unspecified
#20872 option to build non-standard code paths on x86 new enhancement Medium Tor: unspecified
#20919 Extract prop271 state-parsing code into a generic thing new defect Medium Tor: unspecified
#20930 Use new systemd hardening options new enhancement Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events accepted nickm enhancement Medium Tor: unspecified
#20953 Isolate references to versioning new chelseakomlo enhancement Medium Tor: unspecified
#20956 optionally do not write command line config to torrc reopened nickm defect Medium Tor: unspecified
#20986 Gracefully handle build configurations on systems without AsciiDoc new defect Medium Tor: unspecified
#21003 extend_info_describe should list IPv6 address (if present) needs_revision teor defect Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21020 Refactor dirserv_generate_networkstatus_vote_obj new enhancement Low Tor: unspecified
#21023 Replace custom checks with Autoconf macros new defect Medium Tor: unspecified
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#21043 Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses new defect Medium Tor: unspecified
#21044 ORPort self reachability test happens also when it shouldn't new defect Medium Tor: unspecified
#21081 tor --service install -options does not work new cypherpunks defect Medium Tor: unspecified
#21084 sometimes we call circuit has_opened() more than 2 times on client side accepted dgoulet defect Medium Tor: unspecified
#21117 can't migrate onion services to single-hop onion services assigned dgoulet defect Medium Tor: unspecified
#21133 Add stem support to expose ed25519 relay key expire date new enhancement Medium Tor: unspecified
#21149 Document what Tor means by "using reasonable defaults" new enhancement Medium Tor: unspecified
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21205 Instrument clients to measure directory usage assigned ahf project Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned ahf defect Medium Tor: unspecified
#21207 Test scenarios for clients that are idle for large periods of time new task Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned ahf enhancement Medium Tor: unspecified
#21237 Support domain isolation for onion connections too? new defect Medium Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision nickm task High Tor: unspecified
#21281 Allow process poll rate to be customized new enhancement Very Low Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21297 Hidden service unavailable. new defect Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit needs_information defect Medium Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#21345 Do relays count dir reqs as completed before they're complete? new task Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#21358 Tor fails to reconnect after computer resumes from sleep new defect Medium Tor: unspecified
#21360 add controller event to track changes to 'getinfo onions/detached' new enhancement Medium Tor: unspecified
#21397 Tor TransparentProxy documentation: add IPv6 support / port to nftables new enhancement Medium Tor: unspecified
#21413 Exits can get the Exit flag without having any ports in their microdescriptor port summary new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time needs_information defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#21453 add ClientTransportPlugin configuration to tor-service-defaults-torrc by default new enhancement Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent accepted nickm defect Low Tor: unspecified
#21465 Tor relays fix data directory permissions, but tor clients do not new defect Medium Tor: unspecified
#21474 Fix make test-fuzz-corpora warnings accepted nickm defect Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21494 Fix scan-build warnings about assigning to char** new defect Low Tor: unspecified
#21497 Fix scan-build warnings: memory accesses new defect Medium Tor: unspecified
#21499 client_dns_incr_failures while passing not hostname but only IP new defect Medium Tor: unspecified
#21502 create exitnode socksportoption since .node.exit is bad idea new enhancement Low Tor: unspecified
#21503 ship default MapAddress for at least torproject.org hosts new enhancement Low Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#21509 Fuzz v3 hidden services accepted nickm task High Tor: unspecified
#21511 State.tmp is not erased and it may contain sensitive information needs_information defect Medium Tor: unspecified
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#21573 Fix tor warnings that chutney is currently ignoring new defect Medium Tor: unspecified
#21597 ExitRelay configuration option is confusingly named new defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: 0.4.1.x-final
#21602 HiddenServiceAuthorizeClient failed to work if the user specify multiple hiddensite. new defect Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned nickm enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#21716 Avoid recursive call to routerlist_remove_old_routers via router_rebuild_store new defect Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.