Custom Query (625 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 625)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#30257 Propagate USR1 and ABRT signals from stem tests through to tor new atagar defect Medium Tor: 0.2.9.x-final
#30591 Make tor's Travis stem job log controller messages from stem and tor needs_revision teor defect Medium Tor: 0.4.1.x-final
#30595 Stem unit tests hang after doctest on macOS new atagar defect Medium
#30596 stem tests expect platform.linux_distribution, which does not exist in python 3.8 needs_revision atagar defect Medium
#30649 Every few hours, relays [warn] Received circuit padding stop command for unknown machine. needs_review mikeperry defect Medium Tor: 0.4.1.x-final
#30695 Consider running tor's stem CI job in --target ONLINE mode, maybe with chutney new defect Medium Tor: unspecified
#30700 Tor's Travis stem job shows debug logs from 10 minutes after the hang needs_information atagar defect Medium Tor: unspecified
#30719 Work out why 90% of sbws measurements fail new defect High sbws: 1.1.x-final
#30720 Use test-network.sh for the examples in Chutney's README assigned teor defect High
#30721 tor_addr_port_lookup() is overly permissive merge_ready teor defect Medium Tor: 0.4.2.x-final
#30723 Work out why no measurements are excluded because they are too old new defect Low sbws: 1.1.x-final
#30724 Work out why relay_in_recent_consensus_count is 13 days for some relays new defect Low sbws: 1.1.x-final
#30725 Does "success" record relay measurements older than 5 days? new defect Medium sbws: 1.1.x-final
#30726 Missing relay keys in bandwidth file spec new defect High sbws: 1.1.x-final
#30727 Make sbws vote for all measured relays, even if they are not Running / not in the consensus new defect Very High sbws: 1.1.x-final
#30728 Report the time of the earliest eligible bandwidth measurement for each relay new defect Medium sbws: 1.2.x-final
#30745 Document disabled CI assigned teor defect Medium Tor: 0.4.1.x-final
#30747 Unclear check for skipping scaling due to missing bandwidths or missing descriptors needs_review defect High sbws: 1.1.x-final
#30781 Stop crashing when encountering an unknown router annotation merge_ready teor defect Medium Tor: 0.4.0.x-final
#30836 Build debs for tor's 0.4.1 branch, and stop building tor's 0.3.4 and 0.3.3 branches new weasel defect Medium Tor: 0.4.1.x-final
#30839 Update EndOfLifeTor.md with our latest end of life process needs_information teor defect Medium Tor: 0.4.1.x-final
#30858 Load geoip and geoip6 files during the unit tests assigned teor defect Low Tor: unspecified
#30900 Add a section or link to instructions about NAT in the tor relay guide new Nusenu defect Medium
#30909 sbws consensus timestamp updates incorrectly use the current time needs_review teor defect Medium sbws: 1.1.x-final
#30917 Add instructions for making a new maint branch to EndOfLifeTor.md, and rename the file assigned teor defect Medium Tor: 0.4.1.x-final
#30928 macOS Travis Homebrew cache has expired, failing some builds needs_review ahf defect High
#30940 Limit fallback directory DocTor IRC list to 5 relays reopened atagar defect Medium
#30958 Stop removing the ed25519 signature when the extra-info file is too big needs_review teor defect Medium Tor: 0.4.2.x-final
#30967 Explicitly select the top-level directories that we want to shellcheck assigned teor defect Medium Tor: 0.4.2.x-final
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#13815 Attempt to port tor to Google's BoringSSL new enhancement Medium Tor: unspecified
#15419 chutney: on failure, explain which connection failed new enhancement Medium
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16954 Refactor chutney networks: increase configurability, reduce code duplication new enhancement Medium
#17013 Does chutney need to test various rare IPv6/IPv4 combinations? new enhancement Medium
#17014 chutney: automate discovery and use of different tor versions new enhancement Medium
#17015 chutney should try harder to find a stable/different version of tor new enhancement Medium
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17629 Create chutney templates that match public tor network timings new enhancement Medium
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17712 Add chutney support for FallbackDirs new enhancement Medium
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17740 Unit Tests for Recent Consensuses new enhancement Medium Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#17835 Make ClientPreferIPv6ORPort smarter assigned neel enhancement Medium Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl assigned enhancement Medium Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17903 router_pick_trusteddirserver_impl should distinguish between fallbacks and authorities needs_revision attila enhancement Very Low Tor: unspecified
#17949 Make loopback address search more accurate needs_revision rl1987 enhancement Medium Tor: unspecified
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18583 Tor Browser doesn't show the circuit for downloads new tbb-team enhancement Medium
#18605 Consider including fallback directory mirrors with multiple IP addresses new enhancement Medium
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19129 Allow Fallback Directories with no DirPort new enhancement Low
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19573 Use fixedresolver.py from dnslib in chutney new enhancement Medium
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19694 Add a leekspin mode to chutney new enhancement Medium
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20036 Chutney should allow single onion and tor2web modes on any HS / client new enhancement Medium
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20067 Chutney should verify IPv6 SOCKSPorts new enhancement Medium
#20091 Add a required version setting to chutney (or to chutney networks) new enhancement Medium
#20142 chutney IPv6 HiddenServicePort tests new enhancement Medium
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20344 Do chutney releases with semantic versioning new enhancement Medium
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20403 Make it easier for relay operators to find their observed bandwidth new tom enhancement Medium
#20513 Use public tor network directory authority options in chutney new enhancement Medium
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20934 Use standard python multiset implementation in fallback script new enhancement Medium
#20939 Add average for each flag and uptime to the fallback summary new enhancement Medium
#21000 Make chutney select different options depending on the tor version new enhancement Medium
#21029 Log the git commit hash to the fallback output file new enhancement Medium
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21282 Adjust fallback log levels new enhancement Medium
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.