#7349 |
Obfsbridges should be able to "disable" their ORPort
|
new
|
|
project
|
Very High
|
Tor: unspecified
|
#9498 |
Allow bridge descriptors to contain no address if they are not being published
|
new
|
|
enhancement
|
Very High
|
Tor: unspecified
|
#10186 |
Backtrace support for windows
|
assigned
|
tom
|
enhancement
|
Very High
|
Tor: unspecified
|
#20742 |
prop224: Implement stealth client authorization
|
assigned
|
asn
|
enhancement
|
Very High
|
Tor: unspecified
|
#22893 |
prop224: Make intro point per-service and not per-descriptor
|
accepted
|
dgoulet
|
enhancement
|
Very High
|
Tor: unspecified
|
#24554 |
sched: Have per-scheduler type data in a channel_t
|
needs_revision
|
dgoulet
|
enhancement
|
Very High
|
Tor: unspecified
|
#24738 |
Abort trap: 6 after installation Mac OS 10.13.1
|
needs_information
|
|
defect
|
Very High
|
Tor: unspecified
|
#25245 |
Crash in assert_connection_ok when changing Exit options
|
needs_revision
|
ahf
|
defect
|
Very High
|
Tor: 0.3.5.x-final
|
#26181 |
Apparmor + systemd failures when loading included service files + DisableAllSwap Fix
|
new
|
|
defect
|
Very High
|
Tor: unspecified
|
#26787 |
Core file left on travis hardened rust builld
|
needs_information
|
|
defect
|
Very High
|
Tor: 0.3.5.x-final
|
#27146 |
Mismatched digest in 0.3.3.9 and master mixed chutney network
|
assigned
|
teor
|
defect
|
Very High
|
Tor: 0.3.5.x-final
|
#28634 |
Design a useful padding machine that we can enable
|
new
|
|
defect
|
Very High
|
Tor: unspecified
|
#28780 |
circpadding: Add machine flag for not closing circuit if machine is active
|
needs_revision
|
|
defect
|
Very High
|
Tor: unspecified
|
#28825 |
update to 8.04 causes immediate crash on MacOS 10.14.1
|
new
|
|
defect
|
Very High
|
Tor: unspecified
|
#29085 |
WTF-PAD: Reduce monotime usage because of performance issues
|
new
|
|
defect
|
Very High
|
Tor: unspecified
|
#29168 |
Fix TROVE-2019-001
|
new
|
|
defect
|
Very High
|
Tor: 0.4.0.x-final
|
#29174 |
Guard Node can eclipse the hidden service
|
new
|
|
defect
|
Very High
|
|
#29204 |
Inspect circuit queue during padidng decisions
|
new
|
|
defect
|
Very High
|
|
#29529 |
util/map_anon_nofork test fails on macOS
|
accepted
|
nickm
|
defect
|
Very High
|
Tor: 0.4.0.x-final
|
#29534 |
Regression: map_anon_nofork test is breaking jenkins on some platforms
|
merge_ready
|
nickm
|
defect
|
Very High
|
Tor: 0.4.0.x-final
|
#29538 |
Coverage fails on master
|
new
|
|
defect
|
Very High
|
Tor: 0.4.0.x-final
|
#1247 |
bootstrap hickups when network is down
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#1354 |
Configuring Tor with --with*dir gives wrong directories
|
assigned
|
nickm
|
defect
|
High
|
Tor: unspecified
|
#1749 |
Split relay and link crypto across multiple CPU cores
|
assigned
|
chelseakomlo
|
project
|
High
|
Tor: unspecified
|
#2665 |
Create a dirauth DoS response procedure
|
new
|
|
task
|
High
|
Tor: unspecified
|
#3021 |
Make the microdesc format a little more flexible, with optional TAP key
|
assigned
|
nickm
|
defect
|
High
|
Tor: unspecified
|
#3511 |
Automatically chosen published ports should be stable
|
assigned
|
blackpaw
|
enhancement
|
High
|
Tor: unspecified
|
#3652 |
Export clock skew opinion as getinfo command
|
needs_revision
|
nickm
|
enhancement
|
High
|
Tor: unspecified
|
#4229 |
smartlist_len returns a (signed) int
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#4260 |
[PATCH] Update TOR build instructions for mingw
|
assigned
|
erinn
|
enhancement
|
High
|
Tor: unspecified
|
#4320 |
Audit functions called during options_act_reversible()
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#4580 |
Some Tor clients go nuts requesting the consensus if there is no recent enough consensus
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#4581 |
Dir auths should defend themselves from too many begindir requests per address
|
needs_revision
|
|
defect
|
High
|
Tor: unspecified
|
#4806 |
Detect and warn when running IPv6-using client without IPv6 address privacy
|
needs_revision
|
|
enhancement
|
High
|
Tor: unspecified
|
#5211 |
Discuss other ways for the bridge authority to run bridge reachability tests
|
assigned
|
|
task
|
High
|
Tor: unspecified
|
#5219 |
Intelligently use capabilities/privileges and drop what we don't need for all possible platforms
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#5221 |
Intelligently use capabilities/privileges and drop what we don't need for Windows
|
new
|
|
project
|
High
|
Tor: unspecified
|
#5222 |
Intelligently use capabilities/privileges and drop what we don't need for Mac OS X
|
new
|
nickm
|
enhancement
|
High
|
Tor: unspecified
|
#5456 |
Defend against path bias and tagging attacks
|
new
|
|
project
|
High
|
Tor: unspecified
|
#5685 |
Publish node best practices doc and scripts
|
new
|
mikeperry
|
task
|
High
|
Tor: unspecified
|
#5968 |
Improve onion key and TLS management
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#6311 |
Migrate TOR_SEARCH_LIBRARY to use pkg-config
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#6622 |
Tor link against static zlib broken by -pie switch
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#6676 |
Nuke ‘MyFamily’
|
new
|
|
task
|
High
|
Tor: unspecified
|
#6837 |
More fine-grained modular decomposition
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#6877 |
Finally replace all char[] buffers with uint8_t[] buffers
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#6939 |
Missing IPv6 ORPort reachability check
|
needs_revision
|
|
defect
|
High
|
Tor: unspecified
|
#7003 |
Wipe relay key material from memory on common crash conditions
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#7027 |
Defend against Website Traffic Fingerprinting
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#7144 |
Implement Bridge Guards and other anti-enumeration defenses
|
needs_revision
|
|
project
|
High
|
Tor: unspecified
|
#7148 |
Even better parameter voting protocol
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#7164 |
microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1
|
needs_revision
|
nickm
|
defect
|
High
|
Tor: unspecified
|
#7478 |
Allow routersets to include/exclude nodes by IPv6 address
|
needs_revision
|
|
enhancement
|
High
|
Tor: unspecified
|
#7572 |
Make relay crypto run on multiple CPU cores
|
assigned
|
yawning
|
defect
|
High
|
Tor: unspecified
|
#7678 |
Check if a stream could send a cell but the circuit hasn't asked it to
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#7829 |
Support all kinds of DNS over Tor
|
new
|
|
task
|
High
|
Tor: unspecified
|
#7956 |
Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA%
|
assigned
|
tbb-team
|
defect
|
High
|
Tor: unspecified
|
#8111 |
Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#8387 |
Unbuilt one-hop circuits sometimes hang around forever
|
new
|
nickm
|
defect
|
High
|
Tor: unspecified
|
#8593 |
Circuit build timeout not respected?
|
needs_information
|
mikeperry
|
defect
|
High
|
Tor: unspecified
|
#8742 |
Byte history leaks information about local usage/hidden services
|
reopened
|
|
defect
|
High
|
Tor: unspecified
|
#9001 |
Slow Guard Discovery of Hidden Services and Clients
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#10059 |
capture tor log messages before control connection is opened
|
new
|
nickm
|
enhancement
|
High
|
Tor: unspecified
|
#10221 |
Implement BGP malicious route checks before publishing descriptor in consensus
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#10416 |
Tor won't start on Windows when path contains non-ascii characters
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#10476 |
Reattach non open streams if circuit destroyed
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#10478 |
Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#10969 |
Set of guard nodes can act as a linkability fingerprint
|
reopened
|
mikeperry
|
defect
|
High
|
Tor: unspecified
|
#11207 |
Sybil selection should be trickier to game
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#11327 |
Dir auths should choose Fast and Guard flags by consensus weight if they don't measure
|
needs_revision
|
TvdW
|
defect
|
High
|
Tor: unspecified
|
#11743 |
nodelist_add_microdesc: assign md to all appropriate nodes properly
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#12184 |
Circuit on detached list which I had no reason to mark
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#12389 |
Should we warn when exit nodes are using opendns or google dns?
|
needs_revision
|
nickm
|
defect
|
High
|
Tor: unspecified
|
#12401 |
Document EntryGuardPathBias in doc/state-contents.txt
|
assigned
|
mikeperry
|
defect
|
High
|
Tor: unspecified
|
#12600 |
Save retrieved bridge information in our state file
|
assigned
|
isis
|
task
|
High
|
Tor: unspecified
|
#13444 |
"GhostNode" - support relays that cannot accept incoming connections.
|
new
|
|
project
|
High
|
Tor: unspecified
|
#13737 |
Move circuit building crypto to worker
|
assigned
|
yawning
|
enhancement
|
High
|
Tor: unspecified
|
#13753 |
Validate is_canonical more thoroughly
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#13817 |
Untange kludgey library detection, particularly for SSL forks
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#14354 |
Improve torflow engineering quality and deployment procedure
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#14581 |
Looking up bridge by ID may choose the wrong bridge
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#15272 |
Think of more research questions that we can answer with statistics
|
new
|
|
task
|
High
|
Tor: unspecified
|
#15469 |
Remove data structure containing unique IP address sets
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#15940 |
Make a standard transition plan for killing off a client version
|
accepted
|
nickm
|
task
|
High
|
Tor: unspecified
|
#15941 |
Form a plan for killing off client versions which assume they'll live forever
|
accepted
|
nickm
|
task
|
High
|
Tor: unspecified
|
#16255 |
Guardfraction on dirauths screws up bandwidth weights
|
needs_revision
|
asn
|
defect
|
High
|
Tor: unspecified
|
#16564 |
Add a line to bridge descriptors specifying they're bridges?
|
assigned
|
|
enhancement
|
High
|
Tor: unspecified
|
#16696 |
BWauth no-consensus fallback logic may need revision
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#16764 |
Simplify Tor's control flow graph to the extent we can.
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#16791 |
All modules in src/common should have 90-95%+ unit test coverage
|
new
|
|
project
|
High
|
Tor: unspecified
|
#16805 |
Improve unit-test coverage on old and/or pure-ish functions/modules in src/or
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#16809 |
High coverage on node/path selection functions
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#16810 |
Unit tests on circuit/relay functions
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#16824 |
Emit a warning message about side channel leaks when using relays as clients
|
needs_revision
|
|
defect
|
High
|
Tor: 0.4.0.x-final
|
#16844 |
Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#16849 |
clear_status_flags_on_sybil might want to clear more flags
|
needs_revision
|
ffmancera
|
defect
|
High
|
Tor: unspecified
|
#17275 |
Package directory authority scripts for debian in compliant packages
|
new
|
|
task
|
High
|
Tor: unspecified
|
#17278 |
Fix malleable relay crypto
|
accepted
|
nickm
|
defect
|
High
|
Tor: unspecified
|
#17279 |
Implement large/split create cells (proposal 249)
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#17284 |
Implement multiple new testing-focused controller features
|
assigned
|
yawning
|
defect
|
High
|
Tor: unspecified
|