Custom Query (1909 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (801 - 900 of 1909)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#29520 Makefile: let target "micro-revision.i" be a prerequisite of the default target new defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#13603 Many channels closing with "IOERROR" reason given on control port. new defect Medium Tor: unspecified
#6313 Many of Tor's complex functions should be refactored new project Medium Tor: unspecified
#29989 MapAddress directive added to torrc doesn't work for some websites, fails to assign specified exit node needs_information defect Medium Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#24308 MaxMemInCellQueues minimum of 256MB is still too large for low-RAM relays (LEDE and OpenWRT routers) new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations assigned enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned defect Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned enhancement Medium Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#19487 Meek and ReachableAddresses needs_revision dcf defect Medium Tor: unspecified
#30894 Memory leak on invalid CSV_INTERVAL value merge_ready nickm defect Medium Tor: 0.4.0.x-final
#18757 Memunit config defaults say "KB" rather than "KBytes" needs_revision defect Medium Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config new enhancement High Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#29213 Minimize the boundary between src/core and src/{feature,app} new defect Medium Tor: 0.4.2.x-final
#26933 Minor memleak in HSv3 configuration needs_information defect Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#14999 Most/all esc_for_log instances in control.c should change. new defect Medium Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#30865 Move option-listing, setting, validation code out of confparse.c assigned nickm defect Medium Tor: 0.4.2.x-final
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#30914 Move struct manipulation code out of confparse.c needs_review nickm defect Medium Tor: 0.4.2.x-final
#30935 Move variable definition code out of confparse.c, and refactor needs_review nickm enhancement Medium Tor: 0.4.2.x-final
#30864 Move variable manipulation code out of confparse.c merge_ready nickm enhancement Medium Tor: 0.4.2.x-final
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#7126 Multipath consensus integrity verification new enhancement Medium Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified
#6289 Multiple Socks Server support in Tor Client new enhancement Low Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#5565 MyFamily should provide an alternate non-idhex subscription mechanism reopened enhancement Medium Tor: unspecified
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information defect Medium Tor: unspecified
#29241 NSS SSL_ExportKeyingMaterial failing merge_ready nickm defect High Tor: 0.3.5.x-final
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#25173 No Control Socket when DisableNetwork and User options are set new defect Medium Tor: unspecified
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#11059 Nodes' country codes should be "definite" and "possible" new enhancement Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time needs_information defect Medium Tor: unspecified
#30041 OOB access with huge buffers (src/lib/buf/buffers.c) merge_ready defect Medium Tor: 0.3.5.x-final
#29617 OOM manger wipes entire DNS cache merge_ready nickm defect Medium Tor: 0.4.0.x-final
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#21044 ORPort self reachability test happens also when it shouldn't new defect Medium Tor: unspecified
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: unspecified
#29995 Objective 1, Activity 1.1: Make v3 the default on Core Tor stable new project Medium Tor: unspecified
#29998 Objective 1, Activity 1.2: Adopt OnionBalance features into onion services v3 new project Medium Tor: unspecified
#29999 Objective 1, Activity 2: Denial of service defences new project Medium Tor: unspecified
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#28593 On macOS/iOS, experiment with SystemConfiguration.framework to get a list of network interfaces new enhancement Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: unspecified
#7117 One of our code-checking tools should make sure that we don't add more reserved identifiers new enhancement Low Tor: unspecified
#28968 Onion Service v2 connection status update event new enhancement Medium Tor: unspecified
#28969 Onion Service v3 connection status update event new enhancement Medium Tor: unspecified
#29174 Onion service can do self-reachability tests to detect overwhelmed guards new defect Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#30926 OnionPerf requests to onion service fail close towards completion with TGEN/READ error needs_information defect Medium Tor: 0.4.2.x-final
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated assigned neel defect Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: unspecified
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#9323 Option to start as a bridge by default, but change to relay if bw is super-high. new chiiph enhancement Medium Tor: unspecified
#28760 Option/* format for ControlPort options needs to be homogeneous new defect Medium Tor: unspecified
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.0.x-final
#29112 PTs should pass user count events back to Tor new enhancement Medium Tor: 0.4.2.x-final
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_review Jigsaw52 task High Tor: 0.4.2.x-final
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#29786 Path bias circuits can still have cells pending assigned neel defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.