Custom Query (85 matches)


Show under each result:

Ticket Summary Cc Status Owner Type Priority
#1776 Allow regular relays (if they have a dirport open) to be used as bridges korobkov@…, teor, isis reopened asn defect High
#8387 Unbuilt one-hop circuits sometimes hang around forever atagar, karsten, teor new nickm defect High
#15272 Think of more research questions that we can answer with statistics isabela, karsten, dgoulet, teor new task High
#15421 Relay crash when reloading and resolv.conf is empty teor accepted nickm defect High
#17282 Chutney could use a HOWTO for writing new test cases, network tests, etc teor assigned nickm enhancement High
#17901 Tor would bind ControlPort to public ip address if it has no localhost interface teor new defect High
#24506 Move some bandwidth authority servers to a CDN teor@…, starlight@… needs_information tom task High
#25386 fix rust tests teor, isis, chelseakomlo, manishearth@… needs_revision Hello71 defect High
#25691 Bridges don't work: Non-fatal assertion !(exit_ei == NULL) failed in onion_pick_cpath_exit teor merge_ready nickm defect High
#25692 onion_extend_cpath: Non-fatal assertion info || client failed. teor merge_ready nickm defect High
#25779 Ship tor in Tor Browser nightly builds for macOS with Rust enabled teor new tbb-team defect High
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline arma, nickm, Sebastian, mikeperry, teor assigned mikeperry defect Medium
#5788 Add support for relays without an IPv4 address kwadronaut@…, pterjan, teor, dominik@… new ln5 enhancement Medium
#6369 Gather empirical data on AES/RSA operations performed by typical relays or bridges nickm, arma, teor assigned metrics-team task Medium
#6418 Drop support for older versions of the hidden service protocol teor new enhancement Medium
#7028 Implement Adaptive Padding or some variant and measure overhead vs accuracy g.koppen@…, nikita@…, whonix-devel@…, teor, mikeperry new project Medium
#7357 Collect more statistics to better understand simulations arma, karsten, robgjansen, teor new enhancement Medium
#7798 Use directory guards even when consensus isn't live teor needs_information defect Medium
#8190 Relays should publish number of refill intervals where the token bucket went dry robgjansen, karsten, teor new enhancement Medium
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments teor2345@… needs_revision defect Medium
#11625 Tor DNSPORT returns NXDOMAIN for AAAA records? mickeyc, teor new defect Medium
#14939 Support ipv6 addresses in Tor Circuit DIsplay mcs, teor new tbb-team defect Medium
#16520 Run some onion services to observe crawling trends dlmccoy@…, naif, phw, teor assigned metrics-team project Medium
#16538 Limit the impact of a malicious HSDir teor new project Medium
#16558 Dir auths should vote about Invalid like they do about BadExit teor, isis, yawning, tom, phw, karsten, micah, s7r, ln5 new defect Medium
#17254 Scalable HSes by splitting intro/rendezvous teor, special needs_revision TvdW enhancement Medium
#17591 Use channel padding to obscure circuit setup asn, yawning, special, dgoulet, teor new mikeperry enhancement Medium
#19162 Make it even harder to become HSDir dgoulet, special, teor, nickm accepted arma defect Medium
#20021 Require ntor-onion-key in microdescriptors, descriptors teor needs_revision nickm defect Medium
#20050 Testing: add a controller feature to generate paths without building circuits teor needs_revision nickm defect Medium
#21006 Reduce NumDirectoryGuards to 1 asn, teor new defect Medium
#21345 Do relays count dir reqs as completed before they're complete? teor, karsten, dgoulet new task Medium
#21697 torflow bwfiles maybe should be updated mikeperry, teor new defect Medium
#21846 BwAuthority can't be run out of the box without manual work chelseakomlo, mikeperry, teor, AgentSeb, davidwf, tom new enhancement Medium
#22156 Add Rust linting/formatting tools Sebastian, teor, acrichton@… new enhancement Medium
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour teor, catalyst new defect Medium
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t catalyst, teor needs_revision nickm defect Medium
#23472 Add support for ed25519 authorities and bridges to chutney teor@… new enhancement Medium
#23473 Add support for ed25519 fallbacks ids to the fallback script teor@… new enhancement Medium
#23494 Add chutney tests for hidden and single onion services through bridges teor@… new defect Medium
#23498 Teach chutney not to send HSv3 hostnames to 0.3.1 and earlier clients teor@… new defect Medium
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays teor needs_information dgoulet defect Medium
#24018 Automate measuring connection timeouts per exit arthuredelstein, teor, robgjansen, hiro, karsten new metrics-team project Medium
#24224 When a bwauthority circuit fails, it is very noisy teor@… new tom defect Medium
#24225 Update torflow's TorCtl submodule to latest pytorctl version teor@… new tom task Medium
#24242 Resolve warnings on NEWCONSENSUS / NEWDESC events teor@… new tom defect Medium
#24248 bwauth goes crazy in test network with no measured nodes teor@… new tom defect Medium
#24267 bwauth scanner.9 fills disk again teor@… new tom defect Medium
#24338 DirAuths that have IPv6 addresses don't include them in their vote on themself teor new defect Medium
#24367 Changing pluggable transports (during start-up) in Tor Browser is broken teor, brade, mcs, nickm, asn, catalyst new defect Medium
#24611 Add a chutney network that does reachability tests sven.herzberg@…, teor@… new enhancement Medium
#24674 Bandwidth authorities should use geographically distributed bandwidth servers teor@…, ln5 new tom task Medium
#24680 Make tor binary smaller by reducing the size of the fallback list strings teor@… new enhancement Medium
#24719 Make sure fallback whitelist entries are unique teor@… new enhancement Medium
#24730 Clarify the bandwidth authority spec to include client and server/service paths teor@…, ln5 new tom enhancement Medium
#24786 Rebuild the fallback list in 2018 teor@… new task Medium
#24787 Revise the fallback stability requirements based on current network load teor@… new defect Medium
#24790 When 0.2.5 is EOL, remove the fallback script comment that refers to 0.2.8 and earlier teor@… merge_ready nickm defect Medium
#24803 Generate a new fallback list in 2018 and backport it to all supported versions teor@… new enhancement Medium
#24804 Run an opt-in process for relay operators to become fallbacks teor@… assigned task Medium
#24805 Update fallback whitelist and blacklist teor@… assigned enhancement Medium
#24815 Validate shared random state dates before each voting period teor, asn assigned asn defect Medium
#24834 Map consensus weight vs bandwidth for each bandwidth authority's votes teor@…, ln5, tom new metrics-team enhancement Medium
#24838 Just have relay fingerprints in the fallback whitelist teor@… assigned enhancement Medium
#24851 create a script that generates the authority format from the authorities in the current consensus teor@… new enhancement Medium
#24939 chutney should log warnings from tor-gencert and other startup processes teor@… new defect Medium
#24953 In check_existing mode, log "fallback list", not "whitelist" teor@… new defect Medium
#25157 Chutney should set the same consensus parameters as the public network teor@… new enhancement Medium
#25169 Fallback removal for 0BEA4A88D069753218EAAAD6D22EA87B9A1319D6 teor@… new defect Medium
#25265 Set consensus parameter CircuitPriorityHalflife to enable the EWMA circuit policy teor@… new defect Medium
#25414 Fallback details changed for 9FBEB75E8BC142565F12CBBE078D63310236A334 teor@… new defect Medium
#25436 Remove from fallback.whitelist, add to fallback.blacklist 328E54981C6DDD7D89B89E418724A4A7881E3192 teor@… new task Medium
#25669 Privcount: blinding and encryption should be finished up teor, nickm new enhancement Medium
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits teor new defect Medium
#25798 Remove from fallback list: teor@… new defect Medium
#25844 Ignore DownloadSchedule deprecation warnings in chutney teor@… assigned teor defect Medium
#25885 count_acceptable_nodes() would be more accurate using node_has_preferred_descriptor() teor new defect Medium
#25886 Have frac_nodes_with_descriptors() take and use for_direct_connect teor new defect Medium
#393 hidden services resolve hosts only once weasel, nickm, Sebastian, saint, teor assigned rransom defect Low
#13260 Transform code to cleaner c99 style mcs, teor, ahf, catalyst new defect Low
#17623 Improve not-a-server behavior of server-only timer callbacks teor new defect Low
#18674 Tor rejects [::]/8 and [::]/127 explicitly, but the latter is sometimes eliminated teor new defect Low
#18856 Talk with tor's ORPort yawning, teor new atagar enhancement Low
#24660 Wrap our PRNG interface(s) in Rust with appropriate traits chelseakomlo, catalyst, isis, nickm, teor needs_revision isis enhancement Low
#22942 Empty menuitem below "About Tor Browser" teor new tbb-team defect Very Low
Note: See TracQuery for help on using queries.