Custom Query (1932 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1932)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#449 dns failures prevent legitimate options being set assigned defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned enhancement Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified
#3733 Tor should abandon rendezvous circuits that cause a client request to time out assigned defect Medium Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf assigned defect Low Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned task High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X assigned enhancement High Tor: unspecified
#5298 Relay does not pick the right IP addr of local node when multiple interfaces are available new defect Medium Tor: unspecified
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified
#5685 Publish node best practices doc and scripts assigned task High Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits assigned enhancement Medium Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: unspecified
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations assigned enhancement Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned defect Very Low Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias assigned enhancement Medium Tor: unspecified
#8160 Create separate pending counters during circuit construction assigned enhancement Medium Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever assigned defect High Tor: unspecified
#8453 Alter flag-weight balancing equations assigned enhancement Medium Tor: unspecified
#8593 Circuit build timeout not respected? assigned defect High Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#9957 Tor should consider stderr output of transport proxies new enhancement Very Low Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#10519 tor uses default IP for dirport instead of the one defined in DirPort new defect Low Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#10566 tor relay hangs for 20 seconds periodically if domain from Address can not be resolved new defect Medium Tor: unspecified
#10747 Support alternate DNS such as Namecoin/OpenNIC/etc new enhancement Medium Tor: unspecified
#10812 CryptReleaseContext missed for windows new defect Low Tor: unspecified
#10817 Write instructions for using valgrind with the debian tor new task Very Low Tor: unspecified
#10871 Download more microdescriptors with a shorter request new defect Medium Tor: unspecified
#10915 Tool to find unused functions in Tor new defect Medium Tor: unspecified
#10922 tor connected to bwauth produces lots of pathbias_count_use_attempt BUG messages needs_information defect Medium Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#10968 Authorities should use past consensuses to decide how to vote on relay flags new task Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned defect High Tor: unspecified
#11010 add ClientConnectPolicy config option needs_revision enhancement Medium Tor: unspecified
#11059 Nodes' country codes should be "definite" and "possible" new enhancement Medium Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports assigned enhancement Medium Tor: unspecified
#11119 Write a proposal for client-side key pinning needs_information defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#11145 coverage utility should merge multiple output files new defect Very Low Tor: unspecified
#11146 cov-diff utility should handle new source files new defect Very Low Tor: unspecified
#11151 Drop support for 0.2.2 clients new defect Medium Tor: unspecified
#11158 Write a proposal for a "couldn't reach consensus" statement new enhancement Medium Tor: unspecified
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified
#11325 RFE: Adhere to XDB base directory specification new defect Low Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#11397 Keep using too-dirty circuits if no new circuit can be built? new enhancement Medium Tor: unspecified
#11444 Drop support for long-obsolete versions of Windows new defect Medium Tor: unspecified
#11445 Drop support for Windows XP new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#11458 A newer signing cert should innoculate us against older ones? new enhancement Medium Tor: unspecified
#11462 Re-promote "We stalled too much while trying to write" warning if it happens too much new enhancement Medium Tor: unspecified
#11595 Use smarter data structures for keeping track of circuit IDs per channel new enhancement Low Tor: unspecified
#11625 Tor DNSPORT returns NXDOMAIN for AAAA records? new defect Medium Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision defect Medium Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#12220 Give a better warning on header/library mismatch for openssl new defect Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#12377 get_interface_address6() behaviour iff all interface addresses are internal needs_revision defect Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#12399 "Hash of session info was not as expected" should be log_protocol_warn merge_ready defect Medium Tor: 0.4.0.x-final
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.