Custom Query (206 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 206)

1 2 3
Ticket Summary Status Owner Type Priority Milestone
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information nickm defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline assigned mikeperry defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#3948 "fooport auto" should be able to get a hint new enhancement Low Tor: unspecified
#4036 Tor relays/bridges can detect when they are being filtered by SSL cert new enhancement Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#4310 Reorder tor manpage entries within sections new task Medium Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf new nickm defect Low Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#4624 Config option to declare whether you're using bridges for reachability or for security new project Medium Tor: unspecified
#4826 Write proposal for improved consensus voting schedules new enhancement Medium Tor: unspecified
#4904 tor-resolve falsely says can't resolve if answer is 127.0.0.1 new defect Low Tor: unspecified
#5271 add log messages when a hidden service consistently doesn't have any preemptive circuit ready new enhancement Very Low Tor: unspecified
#5379 Design adaptive n23 algorithm that works new enhancement Medium Tor: unspecified
#5392 Write proposal for n23 patch behavior needs_revision task Medium Tor: unspecified
#5401 tag control log events so arm can know they're from the same place in the code new enhancement Medium Tor: unspecified
#5915 Write patch to make socks handshakes succeed instantly needs_information enhancement Medium Tor: unspecified
#6419 is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid? new defect Low Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#6777 add config option to not rate limit authority dir conns new defect Medium Tor: unspecified
#7106 Write "how to be nice to the Tor network" spec new project Medium Tor: unspecified
#7346 Add stream-level pushback into n23 design new project Medium Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7679 Test integration of Minion (out-of-order data transmission thing) with Tor relays new project Medium Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#7875 debian obfsproxies can't advertise ports under 1024 new asn defect Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned isis defect Low Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#8190 Relays should publish number of refill intervals where the token bucket went dry new enhancement Medium Tor: unspecified
#8214 "getinfo address" should work more consistently soon after startup new enhancement Low Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
#9775 Authorities should report when they don't vote Running but some addresses are still reachable new enhancement Medium Tor: unspecified
#9968 Time out quicker on microdesc fetch failures while we're bootstrapping new enhancement Medium Tor: unspecified
#10027 Tor Windows service should be installed with the NetworkService account new defect Medium Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#10817 Write instructions for using valgrind with the debian tor new task Very Low Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports new isis enhancement Medium Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#11458 A newer signing cert should innoculate us against older ones? new enhancement Medium Tor: unspecified
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision defect Medium Tor: unspecified
#12220 Give a better warning on header/library mismatch for openssl new defect Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#13194 Track time between ESTABLISH_RENDEZVOUS and RENDEZVOUS1 cell new enhancement Very Low Tor: unspecified
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? new task Low Tor: unspecified
#13705 Allow relays to promise in their descriptor that their IP address won't change new enhancement Medium Tor: unspecified
#13828 Refactor rend_cache_store_v2_desc_as_dir and rend_cache_store_v2_desc_as_client to avoid duplicate code new enhancement Very Low Tor: unspecified
#13908 Make it safe to set NumDirectoryGuards=1 new enhancement Medium Tor: unspecified
#14223 END_STREAM_REASON_TIMEOUT blurs together two very different error cases new defect Medium Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. new defect Medium Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#16564 Add a line to bridge descriptors specifying they're bridges? assigned enhancement High Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#17366 Track consensus fetch times per country? new enhancement Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#18509 Summarize our crypto migration plans in one place new enhancement Medium Tor: unspecified
#18757 Memunit config defaults say "KB" rather than "KBytes" needs_revision defect Medium Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals accepted nickm enhancement High Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#19009 bandwidth testing circuits should be allowed to use our guards assigned juga defect Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#20469 Expose predicted-ports state over the control port new enhancement Medium Tor: unspecified
#21149 Document what Tor means by "using reasonable defaults" new enhancement Medium Tor: unspecified
#21237 Support domain isolation for onion connections too? new defect Medium Tor: unspecified
#21345 Do relays count dir reqs as completed before they're complete? new task Medium Tor: unspecified
#21974 Race: Tor declares controlport listener open before it has written its controlcookie to disk new defect Medium Tor: unspecified
#21975 Refactor all the startup stuff in config.c, with dependencies in mind new task Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag new nickm defect High Tor: unspecified
#22251 Time to not require Tor relays to support old link versions? new enhancement Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#22312 Refactor/Simplify to clarify "we cache dir info" vs "we invite clients to use us as a directory guard" new enhancement Medium Tor: unspecified
#22331 Tor needs to stop trying to read directories before it changes users new defect Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? accepted nickm defect Medium Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
1 2 3
Note: See TracQuery for help on using queries.