Custom Query (89 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket assigned enhancement Medium
#11727 Support shared onion pool for DNS resolution in separate process assigned enhancement Medium
#13184 Add an option to whitelist networks assigned enhancement Medium
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#14954 Chutney: add control socket to torrc templates assigned enhancement Medium
#19407 Support FD passing on Unix socket assigned enhancement Medium
#22893 prop224: Make intro point per-service and not per-descriptor assigned enhancement Very High Tor: unspecified
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion assigned neel defect Medium Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays assigned defect Medium Tor: unspecified
#23579 sched: Add accessors for channel_pending list assigned enhancement Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after assigned defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler assigned defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler assigned defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge assigned defect High Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified
#24162 Torsocks tarballs should not be on my people.tpo assigned hiro task Medium
#24449 sched: KIST scheduler should handle limited or failed connection write assigned defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t assigned enhancement Very High Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#25500 Reduce client CPU usage when idle assigned task Medium Tor: unspecified
#29484 Update the requirements.txt and freeze them on release assigned phw task Medium
#30440 sendme: Service introduction circuit ignore flow control assigned defect Medium Tor: unspecified
#30742 sendme: Better logging overall assigned enhancement Medium Tor: 0.4.2.x-final
#31002 circpadding: Middle node did not accept our padding request assigned mikeperry defect Medium Tor: 0.4.2.x-final
#31003 heap-use-after-free src/feature/nodelist/routerlist.c:704 in router_get_by_descriptor_digest merge_ready nickm defect High Tor: 0.4.0.x-final
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#17520 Relax the rend cache failure cleanup timer needs_information neel enhancement Medium Tor: unspecified
#25152 Try to call less circuitmux_find_map_entry() needs_information defect Medium Tor: unspecified
#25568 hs: Lookup failure cache when introducing to an intro point needs_review neel defect Medium Tor: unspecified
#30466 hs: Do not allow more than one control cell on a circuit needs_review neel defect Medium Tor: unspecified
#31490 hs-v3: Turns out the hs_ident circuit_type is not used needs_review neel defect Medium Tor: 0.4.3.x-final
#18098 prop224: Implement tor-genkey tool for offline HS key creation needs_revision haxxpop enhancement Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#30924 hs-v3: Implement proposal 305 - ESTABLISH_INTRO Cell DoS Defense Extension needs_revision dgoulet enhancement Medium Tor: 0.4.2.x-final
#31373 Print summary of features at end of configure needs_revision dgoulet enhancement Medium Tor: 0.4.2.x-final
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#13792 HS statistics for private tor network to gather info on services, clients and relays new enhancement Medium Tor: unspecified
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#18822 Add fallback dir schedule to chutney common template new enhancement Medium
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#20969 Detect relays that don't update their onion keys every 7 days. new atagar enhancement Medium
#21910 Refactor connection_edge_process_relay_cell() new enhancement Low Tor: unspecified
#21915 Add a new directory authority: Nicholas Merrill new task High Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#22363 Make our test network public new enhancement Medium Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#27548 chutney: HS v3 client authorization network template/configuration new defect High Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#28279 control: Add a key to GETINFO to fetch the circuit onion handshake rephist values new enhancement Low Tor: unspecified
#28280 control: Add a key to GETINFO to get the DoS subsystem stats new enhancement Low Tor: unspecified
#29427 kist: Poor performance with a small amount of sockets new defect Medium Tor: 0.4.2.x-final
#29669 hs: ADD_ONION with NEW:BEST is still pinned on v2 new defect High Tor: 0.4.2.x-final
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#30553 chutney: Bump the data size transmitted with the verify command new enhancement Medium
#30608 Have a SMTP out only server new tpa enhancement Medium
#30916 assert in dimap_add_entry() new defect Medium Tor: 0.4.2.x-final
#31004 Bad element "$C" while parsing a node family. new defect Medium Tor: 0.4.2.x-final
#31062 token bucket: Improve library to handle under/overflow and clock jump new defect Medium Tor: 0.4.2.x-final
#31107 channel: channel_tls_handle_cell() CELL_VERSIONS code reached new defect Medium Tor: 0.4.2.x-final
#31371 hs: Add DoS defense counter to DoS heartbeat message new defect Medium Tor: 0.4.2.x-final
Note: See TracQuery for help on using queries.