Custom Query (89 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#21915 Add a new directory authority: Nicholas Merrill new task High Tor: unspecified
#13184 Add an option to whitelist networks accepted dgoulet enhancement Medium
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#18822 Add fallback dir schedule to chutney common template new enhancement Medium
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket accepted dgoulet enhancement Medium
#14954 Chutney: add control socket to torrc templates needs_revision dgoulet enhancement Medium
#17735 Create a public repository of training/outreach material new Kelley task Medium
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#20969 Detect relays that don't update their onion keys every 7 days. new atagar enhancement Medium
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#13792 HS statistics for private tor network to gather info on services, clients and relays new enhancement Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#22363 Make our test network public new enhancement Medium Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#25500 Reduce client CPU usage when idle assigned dgoulet task Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#21910 Refactor connection_edge_process_relay_cell() new enhancement Low Tor: unspecified
#17520 Relax the rend cache failure cleanup timer needs_information neel enhancement Medium Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#25265 Set consensus parameter CircuitPriorityHalflife to enable the EWMA circuit policy new defect Medium
#24962 Single hop onion service denial of service issues new enhancement Medium Tor: unspecified
#19407 Support FD passing on Unix socket accepted dgoulet enhancement Medium
#11727 Support shared onion pool for DNS resolution in separate process accepted dgoulet enhancement Medium
#28027 Tor keeps opening circuits while waiting for bridge descriptors needs_information neel defect Medium Tor: unspecified
#24162 Torsocks tarballs should not be on my people.tpo assigned hiro task Medium
#25152 Try to call less circuitmux_find_map_entry() needs_information defect Medium Tor: unspecified
#29484 Update the requirements.txt and freeze them on release assigned dgoulet task Medium
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#27548 chutney: HS v3 client authorization network template/configuration new defect High Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned dgoulet defect Medium Tor: unspecified
#29034 circuit: Cleanup an HS circuit when it is being re-purposed assigned dgoulet defect High Tor: 0.4.1.x-final
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned dgoulet enhancement Low Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes new dgoulet defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#28279 control: Add a key to GETINFO to fetch the circuit onion handshake rephist values new enhancement Low Tor: unspecified
#28280 control: Add a key to GETINFO to get the DoS subsystem stats new enhancement Low Tor: unspecified
#24964 dos: Add an option to block tor2web requests at the HSDir new defect Medium Tor: unspecified
#24963 dos: Add an option to block tor2web requests at the intro point new enhancement Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#30454 hs-v3: INTRODUCE1 trunnel code doensn't handle HS_INTRO_ACK_STATUS_CANT_RELAY needs_review defect High Tor: 0.4.1.x-final
#23764 hs-v3: No live consensus on client with a bridge new dgoulet defect High Tor: unspecified
#29669 hs: ADD_ONION with NEW:BEST is still pinned on v2 new defect High Tor: 0.4.1.x-final
#30466 hs: Do not allow more than one control cell on a circuit assigned neel defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned dgoulet defect Medium Tor: unspecified
#25568 hs: Lookup failure cache when introducing to an intro point assigned neel defect Medium Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned dgoulet defect Medium Tor: unspecified
#29427 kist: Poor performance with a small amount of sockets new defect Medium Tor: 0.4.1.x-final
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays new dgoulet defect Medium Tor: unspecified
#23300 prop224: General client side issues assigned dgoulet defect Medium Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation needs_revision haxxpop enhancement Medium Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor accepted dgoulet enhancement Very High Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion assigned dgoulet defect Medium Tor: unspecified
#30364 prop289: Add consensus param to use or not SENDME v1 for one-hop directory download needs_revision dgoulet enhancement Very High Tor: 0.4.1.x-final
#26288 prop289: Implement authenticated SENDME merge_ready dgoulet enhancement Medium Tor: 0.4.1.x-final
#26846 prop289: Leave unused random bytes in relay cell payload needs_revision nickm enhancement Medium Tor: 0.4.1.x-final
#30365 prop289: Update tor-spec.txt with authenticated SENDME spec assigned dgoulet defect Medium Tor: 0.4.1.x-final
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#23579 sched: Add accessors for channel_pending list accepted dgoulet enhancement Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler accepted dgoulet defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t needs_revision dgoulet enhancement Very High Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write assigned dgoulet defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after accepted dgoulet defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler accepted dgoulet defect High Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned dgoulet defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned dgoulet enhancement Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#30428 sendme: Failure to validate authenticated SENDMEs client side needs_revision dgoulet defect Very High Tor: 0.4.1.x-final
#30440 sendme: Service introduction circuit ignore flow control accepted dgoulet defect Very High Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
Note: See TracQuery for help on using queries.