Custom Query (1432 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1432)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#2149 new 'extra dormant' mode for people who never use their tor needs_revision enhancement Very High Tor: unspecified
#4872 When the valid consensus is old but still barely valid, are the descriptors referenced in it still valid? new defect Very High Tor: unspecified
#12424 Implement improved hidden service protocol (prop224) assigned enhancement Very High Tor: 0.3.1.x-final
#14039 Many unnecessary CPU wakeups per second new defect Very High Tor: unspecified
#17242 prop224: Implement client support new enhancement Very High Tor: 0.3.1.x-final
#17690 prop224: Control the number of HSDirs using a consensus parameter assigned dgoulet enhancement Very High Tor: 0.3.1.x-final
#18098 prop224: Implement tor-genkey tool for offline HS key creation new enhancement Very High Tor: 0.3.2.x-final
#19769 Round down DNS TTL to the nearest DEFAULT_DNS_TTL (30 minutes) merge_ready nickm defect Very High Tor: 0.2.9.x-final
#20524 Revise initial descriptor upload behavior for onion services assigned dgoulet enhancement Very High Tor: 0.3.1.x-final
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement Very High Tor: 0.3.2.x-final
#20657 prop224: Implement service support. assigned dgoulet enhancement Very High Tor: 0.3.1.x-final
#20699 prop224: Add control port events and commands new enhancement Very High Tor: 0.3.2.x-final
#20700 prop224: Implement client authorization assigned asn enhancement Very High Tor: 0.3.1.x-final
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: 0.3.2.x-final
#20961 prop224: Implement consensus params to adjust portion of the protocol assigned dgoulet enhancement Very High Tor: 0.3.1.x-final
#21403 prop224: Implement HS descriptor fetching accepted dgoulet enhancement Very High Tor: 0.3.1.x-final
#21509 Fuzz v3 hidden services new enhancement Very High Tor: 0.3.1.x-final
#98 WSAENOBUFS: Running out of buffer space on Windows assigned defect High Tor: unspecified
#675 update_consensus_networkstatus_downloads() & router_pick_directory_server() rarely called new defect High Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1299 Tor should verify signatures before parsing new defect High Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores accepted nickm project High Tor: unspecified
#1776 Allow regular relays (if they have a dirport open) to be used as bridges reopened asn defect High Tor: unspecified
#1907 Unbalanced bandwidth reported in extra-info new defect High Tor: unspecified
#1922 torrc.d-style configuration directories assigned Jigsaw52 enhancement High Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement High Tor: unspecified
#2106 Controller can't unset httpsproxy if it doesn't resolve new enhancement High Tor: unspecified
#2191 Send all error-level log messages to controllers new defect High Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2878 Don't bootstrap from an old consensus if we're about to replace it new enhancement High Tor: unspecified
#3021 Make the microdesc format a little more flexible assigned nickm defect High Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect High Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom defect High Tor: unspecified
#3652 Export clock skew opinion as getinfo command needs_revision nickm enhancement High Tor: 0.3.2.x-final
#3678 Disallow more than one relay per country in a circuit needs_information enhancement High Tor: very long term
#3948 "fooport auto" should be able to get a hint new enhancement High Tor: unspecified
#3972 Implement proposal 179: TLS certificate and handshake normalization needs_revision enhancement High Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4347 Geoip parsing fails on user accounts under windows needs_review erinn defect High Tor: unspecified
#4519 circuit_unlink_all_from_orconn is too expensive new defect High Tor: unspecified
#4550 Allow bridge operators to specify their own link certificates (part of proposal 179) needs_review enhancement High Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus assigned defect High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision andrea defect High Tor: unspecified
#4587 Bugs in tor_tls_got_client_hello() assigned nickm defect High Tor: unspecified
#4594 tor_tls_state_changed_callback(): detects of ClientHello is too late new defect High Tor: unspecified
#4626 Very high cpu usage for gabelmoo running with renegotiation-limiting code accepted asn defect High Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned isis task High Tor: unspecified
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms new enhancement High Tor: unspecified
#5221 Intelligently use capabilities/privileges and drop what we don't need for Windows new enhancement High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X needs_information nickm enhancement High Tor: unspecified
#5456 Defend against path bias and tagging attacks new defect High Tor: unspecified
#5506 Do we just keep downloading a consensus if our clock is wrong? new defect High Tor: unspecified
#5650 Tor hogging CPU needs_review nickm defect High Tor: unspecified
#5685 Publish node best practices doc and scripts new mikeperry task High Tor: unspecified
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#6235 Unable to release control connections on OSX new defect High Tor: unspecified
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config assigned nickm enhancement High Tor: unspecified
#6622 Tor link against static zlib broken by -pie switch new defect High Tor: unspecified
#6676 Nuke ‘MyFamily’ assigned task High Tor: unspecified
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed needs_information defect High Tor: unspecified
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#6877 Finally replace all char[] buffers with uint8_t[] buffers new defect High Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#7003 Wipe relay key material from memory on common crash conditions new enhancement High Tor: unspecified
#7027 Defend against Website Traffic Fingerprinting new enhancement High Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses needs_revision isis project High Tor: unspecified
#7148 Even better parameter voting protocol new defect High Tor: unspecified
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision nickm defect High Tor: 0.3.2.x-final
#7349 Obfsbridges should be able to "disable" their ORPort assigned isis project High Tor: unspecified
#7478 Allow routersets to include/exclude nodes by IPv6 address needs_revision enhancement High Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7829 Support all kinds of DNS over Tor new task High Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% needs_revision erinn defect High Tor: unspecified
#8170 get independent from host clock time / insecure NTP new enhancement High Tor: unspecified
#8240 Raise our guard rotation period, if appropriate new defect High Tor: unspecified
#8323 Missing 'GETINFO md/all' new defect High Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever needs_information nickm defect High Tor: unspecified
#8391 Sudden Server Speed Change -- IP in Wrong Country. needs_information defect High Tor: unspecified
#8593 Circuit build timeout not respected? needs_information mikeperry defect High Tor: unspecified
#8782 Don't give up so easily on your guards if the consensus calls them Running new enhancement High Tor: unspecified
#8795 Make #8822 survivable reopened defect High Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients assigned defect High Tor: unspecified
#9754 Tor 0.2.4.17-rc crashed with failed assertion needs_information defect High Tor: unspecified
#10416 Tor won't start on Windows when path contains non-ascii characters assigned defect High Tor: unspecified
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned mikeperry defect High Tor: unspecified
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#11301 Tor does not reconnect after network loss with guards used as bridges new nickm defect High Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect High Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark needs_information defect High Tor: unspecified
#12450 Network down race condition might lead to primary guards getting skipped assigned defect High Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned isis task High Tor: 0.3.1.x-final
#13231 Tor(Windows) don't close ports when killed from service control new task High Tor: unspecified
#13339 Prop140: Complete Consensus diffs / Merge GSoC project assigned nickm enhancement High Tor: 0.3.1.x-final
#13444 "GhostNode" - a new way to build IP-hidden networking new project High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.