Custom Query (1845 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (801 - 900 of 1845)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config new enhancement High Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#29213 Minimize the boundary between src/core and src/{feature,app} new defect Medium Tor: 0.4.2.x-final
#26933 Minor memleak in HSv3 configuration needs_information nickm defect Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#14999 Most/all esc_for_log instances in control.c should change. new defect Medium Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#7126 Multipath consensus integrity verification new enhancement Medium Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned nickm enhancement Medium Tor: unspecified
#6289 Multiple Socks Server support in Tor Client new enhancement Low Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#5565 MyFamily should provide an alternate non-idhex subscription mechanism reopened enhancement Medium Tor: unspecified
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information nickm defect Medium Tor: unspecified
#29241 NSS SSL_ExportKeyingMaterial failing merge_ready nickm defect High Tor: 0.3.5.x-final
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#25173 No Control Socket when DisableNetwork and User options are set new defect Medium Tor: unspecified
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#11059 Nodes' country codes should be "definite" and "possible" new enhancement Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: 0.4.1.x-final
#6676 Nuke ‘MyFamily’ new task High Tor: unspecified
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time needs_information defect Medium Tor: unspecified
#30041 OOB access with huge buffers (src/lib/buf/buffers.c) merge_ready defect Medium Tor: 0.3.5.x-final
#29617 OOM manger wipes entire DNS cache needs_review nickm defect Medium Tor: 0.4.1.x-final
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#21044 ORPort self reachability test happens also when it shouldn't new defect Medium Tor: unspecified
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: unspecified
#29995 Objective 1, Activity 1.1: Make v3 the default on Core Tor stable new project Medium Tor: unspecified
#29998 Objective 1, Activity 1.2: Adopt OnionBalance features into onion services v3 new project Medium Tor: unspecified
#29999 Objective 1, Activity 2: Denial of service defences new project Medium Tor: unspecified
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#28593 On macOS/iOS, experiment with SystemConfiguration.framework to get a list of network interfaces new enhancement Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned nickm defect Medium Tor: unspecified
#7117 One of our code-checking tools should make sure that we don't add more reserved identifiers new enhancement Low Tor: unspecified
#30520 Onion Service (v2) hosting Tor instance reporting under high load: Failed to find node for hop #1 of our path. Discarding this circuit. new defect Medium Tor: 0.4.1.x-final
#28968 Onion Service v2 connection status update event new enhancement Medium Tor: unspecified
#28969 Onion Service v3 connection status update event new enhancement Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits needs_revision dgoulet enhancement Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated assigned neel defect Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: unspecified
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#9323 Option to start as a bridge by default, but change to relay if bw is super-high. new chiiph enhancement Medium Tor: unspecified
#28760 Option/* format for ControlPort options needs to be homogeneous new defect Medium Tor: unspecified
#28140 Our circuit died due to an invalid selected path if switching to plugabble transports needs_information defect High Tor: unspecified
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information nickm defect Medium Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.0.x-final
#29112 PTs should pass user count events back to Tor new enhancement Medium Tor: 0.4.1.x-final
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned dgoulet defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_review Jigsaw52 task High Tor: 0.4.2.x-final
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#29786 Path bias circuits can still have cells pending assigned neel defect Medium Tor: unspecified
#27192 Perform --verify-config before reloading tor reopened defect Medium Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#29128 Place complete obfs4 bridge line in accessible location needs_information defect Medium Tor: unspecified
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() new defect Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Low Tor: 0.4.1.x-final
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#30200 Potential circuit timeout issues on onion service circuits new defect Medium Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision nickm enhancement Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#27491 Prefer IPv4 or IPv6 based on the number of failures assigned neel enhancement Medium Tor: unspecified
#24985 Preserve circuit-layer confidentiality against a quantum-capable adversary new project Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification assigned defect Low Tor: unspecified
#27908 PrivCount proof of concept with existing statistics assigned task Medium Tor: 0.4.2.x-final
#29265 PrivCount proof of concept: Re-implement the C code in Rust new enhancement Medium Tor: 0.4.2.x-final
#29268 PrivCount proof of concept: Use the subsystems API for PrivCount new enhancement Medium Tor: 0.4.2.x-final
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol assigned enhancement Low Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters assigned enhancement Low Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: 0.4.2.x-final
#29004 PrivCount proof of concept: implement check counters needs_revision teor enhancement Medium Tor: 0.4.2.x-final
#29005 PrivCount proof of concept: implement consumed bandwidth counters needs_revision teor enhancement Medium Tor: 0.4.2.x-final
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.