Custom Query (1362 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1362)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#21969 We're missing descriptors for some of our primary entry guards needs_information asn defect Immediate Tor: 0.3.2.x-final
#2149 new 'extra dormant' mode for people who never use their tor new angelo620 enhancement Very High Tor: 0.3.3.x-final
#7349 Obfsbridges should be able to "disable" their ORPort assigned isis project Very High Tor: unspecified
#9498 Allow bridge descriptors to contain no address if they are not being published new enhancement Very High Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation new enhancement Very High Tor: unspecified
#20699 prop224: Add control port events and commands needs_review dgoulet enhancement Very High Tor: 0.3.3.x-final
#20700 prop224: Implement client authorization assigned asn enhancement Very High Tor: 0.3.3.x-final
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#21394 connection timeouts are affecting Tor Browser usability merge_ready defect Very High Tor: 0.3.1.x-final
#21534 "Client asked me to extend back to the previous hop" in small networks accepted dgoulet defect Very High Tor: 0.3.2.x-final
#22810 prop224: Make the client/service extend properly to the IP/RP needs_revision dgoulet enhancement Very High Tor: 0.3.3.x-final
#22921 Tor 0.3.0.9 and 0.3.1.4-alpha on FreeBSD: Failed to find node for hop 0 of our path. Discarding this circuit. needs_information defect Very High Tor: 0.3.1.x-final
#23170 Include ed25519 relay id keys in the consensus needs_revision nickm task Very High Tor: 0.3.3.x-final
#23862 Tor only updates guard state after a consensus if it has enough directory info merge_ready asn defect Very High Tor: 0.3.1.x-final
#24145 Tor Browser crash on Windows 7 new defect Very High Tor: unspecified
#24228 Tor keeps on creating new circuits even when it's idle new defect Very High Tor: 0.3.3.x-final
#24397 Tor: The second generation onion router – annotated version ... new project Very High
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned nickm defect High Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores accepted nickm project High Tor: unspecified
#1907 Unbalanced bandwidth reported in extra-info new defect High Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2878 Don't bootstrap from an old consensus if we're about to replace it new enhancement High Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned nickm defect High Tor: unspecified
#3511 Automatically chosen published ports should be stable assigned blackpaw enhancement High Tor: unspecified
#3652 Export clock skew opinion as getinfo command needs_revision nickm enhancement High Tor: unspecified
#4187 A verified unverified-consensus should be renamed to cached-consensus assigned defect High Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision andrea defect High Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned isis task High Tor: unspecified
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms new enhancement High Tor: unspecified
#5221 Intelligently use capabilities/privileges and drop what we don't need for Windows new project High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X new nickm enhancement High Tor: unspecified
#5456 Defend against path bias and tagging attacks new project High Tor: unspecified
#5685 Publish node best practices doc and scripts new mikeperry task High Tor: unspecified
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config new enhancement High Tor: unspecified
#6622 Tor link against static zlib broken by -pie switch new defect High Tor: unspecified
#6676 Nuke ‘MyFamily’ new task High Tor: unspecified
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed accepted nickm defect High Tor: 0.3.3.x-final
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#6877 Finally replace all char[] buffers with uint8_t[] buffers new defect High Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#7003 Wipe relay key material from memory on common crash conditions new enhancement High Tor: unspecified
#7027 Defend against Website Traffic Fingerprinting new enhancement High Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses needs_revision isis project High Tor: unspecified
#7148 Even better parameter voting protocol new defect High Tor: unspecified
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision nickm defect High Tor: 0.3.3.x-final
#7478 Allow routersets to include/exclude nodes by IPv6 address needs_revision enhancement High Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7829 Support all kinds of DNS over Tor new task High Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% assigned tbb-team defect High Tor: unspecified
#8111 Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags new enhancement High Tor: unspecified
#8323 Missing 'GETINFO md/all' new enhancement High Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever new nickm defect High Tor: unspecified
#8593 Circuit build timeout not respected? needs_information mikeperry defect High Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#10059 capture tor log messages before control connection is opened new nickm enhancement High Tor: 0.3.3.x-final
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#10416 Tor won't start on Windows when path contains non-ascii characters new defect High Tor: unspecified
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint reopened mikeperry defect High Tor: unspecified
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#11301 Tor does not reconnect after network loss with guards used as bridges new nickm defect High Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision nickm defect High Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned mikeperry defect High Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned isis task High Tor: 0.3.3.x-final
#13444 "GhostNode" - support relays that cannot accept incoming connections. new project High Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#13753 Validate is_canonical more thoroughly new enhancement High Tor: unspecified
#13817 Untange kludgey library detection, particularly for SSL forks new defect High Tor: unspecified
#14039 Many unnecessary CPU wakeups per second accepted nickm defect High Tor: 0.3.3.x-final
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#14581 Looking up bridge by ID may choose the wrong bridge new defect High Tor: unspecified
#15015 tor --verify-config should not bind to ports new defect High Tor: unspecified
#15272 Think of more research questions that we can answer with statistics new task High Tor: unspecified
#15421 Relay crash when reloading and resolv.conf is empty new defect High Tor: 0.3.3.x-final
#15469 Remove data structure containing unique IP address sets new enhancement High Tor: unspecified
#15518 Tor considers routers in the same IPv6 /16 to be "in the same subnet" new defect High Tor: unspecified
#15940 Make a standard transition plan for killing off a client version accepted nickm task High Tor: 0.3.3.x-final
#15941 Form a plan for killing off client versions which assume they'll live forever accepted nickm task High Tor: 0.3.3.x-final
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#16564 Add a line to bridge descriptors specifying they're bridges? accepted isis enhancement High Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients new defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.