Custom Query (603 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 603)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21990 Use a sensible default set of bandwidth servers new enhancement Medium
#21991 Allow bandwidth scanners to use non-Exits to access onion addresses new enhancement Medium
#21995 Set PreferIPv6 on Bandwidth Scanner SOCKSPorts new enhancement Medium
#22031 Write a bandwidth server file creator and file checker new enhancement Medium
#22133 When CHUTNEY_DEBUG is set, make tor log a debug log new enhancement Medium
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22323 Catch and handle socket errors in chutney new defect Low
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22360 chutney's --quiet mode could be quieter new enhancement Medium
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22375 Can tor-prompt optionally wait for tor to start on a port, rather than failing straight away? new enhancement Medium
#22376 Make the chutney README less scary new defect Medium
#22397 Add a (single) onion service for the new tor blog new enhancement Medium
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22600 Make chutney work with large numbers of hidden services new defect Medium
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22663 Tor keeps using a very slow guard new defect Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22688 hs: stop HSDirs being used as single-hop "proxies" needs_revision defect Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#22744 Remove the smaller bandwidth authority files new defect Medium
#22748 Show which bandwidth authority files are used for which percentiles new enhancement Medium
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22815 Chutney tests for IPv6 only bridges new enhancement Medium
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23472 Add support for ed25519 authorities and bridges to chutney new enhancement Medium
#23473 Add support for ed25519 fallbacks ids to the fallback script new enhancement Medium
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23493 IPv6 v3 Onion Services support new defect Medium Tor: unspecified
#23494 Add chutney tests for hidden and single onion services through bridges new defect Medium
#23498 Teach chutney not to send HSv3 hostnames to 0.3.1 and earlier clients new defect Medium
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23818 Make v3 single onion services retry failed connections with a 3-hop path new defect Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24210 Avoid division by zero and excessive ranks in pytorctl's ScanHandler.rank_to_percent needs_review defect Medium
#24219 Avoid aggregate.py error when no nodes are measured needs_revision defect Medium
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_information defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24611 Add a chutney network that does reachability tests new enhancement Medium
#24680 If the fallback list has 200-300 entries, make the tor binary smaller by reducing the size of the fallback list strings new enhancement Medium
#24719 Make sure fallback whitelist entries are unique new enhancement Medium
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24768 Increase nf_conntimeout_clients to 5 hours needs_information defect Medium
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24787 Revise the fallback stability requirements based on current network load new defect Medium
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24839 Add a torrc option and descriptor line to opt-in as a FallbackDir new task Medium Tor: unspecified
#24851 create a script that generates the authority format from the authorities in the current consensus new enhancement Medium
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.