Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 2070)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#28733 {CONSDIFF} Refusing to apply consensus diff needs_information defect Medium Tor: unspecified
#32208 write description of control subsystem architecture new task Medium Tor: unspecified
#32944 where are we still excessively strict about clock skew? pluggable transports? new defect Medium Tor: unspecified
#27694 what happens if we have both a firewall-bypass proxy and a pluggable transport? new project Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
#33861 vanguards: circ_max_megabytes applied to all connection new task High Tor: unspecified
#33648 vanguards: What is the recommended value? assigned mikeperry task Medium Tor: unspecified
#32158 vanguards: 'exit circ' always only '(length 3', 'internal circ' fine with '(length 4' and 5 new defect Medium
#33538 v3bw files with too large of weights lead to relays being selected nearly uniformly at random new defect Medium Tor: unspecified
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays new defect Medium Tor: unspecified
#24181 v3 Onion Services: Put IPv6 and unrecognised link specifiers in onion service EXTEND cells new defect Medium Tor: unspecified
#33028 v0.4.1.6 bug journalctl failed assertion new defect Very Low
#26289 use a pub/sub model for the "consensus changed" event new enhancement Medium Tor: unspecified
#27661 use C99 bool from stdbool.h instead of int everywhere new defect Medium Tor: unspecified
#27785 updateRustDependencies.sh shouldn't use realpath new defect Medium Tor: unspecified
#27859 update travis CI to ubuntu xenial image when available new defect Medium Tor: unspecified
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#32193 update .gitlab-ci.yml to remove broken cruft and add a complete test suite needs_review enhancement Medium Tor: 0.4.4.x-final
#30482 unexpected warning: Invalid signature for service descriptor signing key: expired new defect Medium Tor: unspecified
#27713 uncrustify config file to autofix C code whitespace and indentation new enhancement Medium Tor: unspecified
#32910 trace: Add tracepoints and userspace tracer support needs_revision dgoulet enhancement Medium Tor: 0.4.4.x-final
#16458 torspec references UTC, but tor uses unix time (leap second handling) new task Medium Tor: unspecified
#17990 torrc default config ORPort should be changed to 443 from 9001 new defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent new defect Low Tor: unspecified
#31364 tor_bug_occurred_(): Bug: ../src/feature/nodelist/microdesc.c:494: warn_if_nul_found: Non-fatal assertion !(nul_found) failed. (on Tor 0.4.0.5 ) new defect Medium Tor: unspecified
#26999 tor_api: Some way to capture stdout/stderr new enhancement Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#27801 tor_api: CreateConnection() interface new enhancement Medium Tor: unspecified
#29501 tor: Unhandled OpenSSL errors found new defect Medium Tor: unspecified
#24850 tor2web option without the corresponding tag in torrc causes tor to fail with confusing console output new defect Medium Tor: unspecified
#16350 tor.pid should be deleted on exit in every case possible, like assert termination, and catchable signals new defect Medium Tor: unspecified
#31972 tor-spec: We should specify how clients pick between different handshake types new defect Medium Tor: unspecified
#4904 tor-resolve falsely says can't resolve if answer is 127.0.0.1 new defect Low Tor: unspecified
#19777 tor-gencert should warn nicely when PEM passphrases are too short new defect Very Low Tor: unspecified
#18706 tor-0.2.8.2-alpha, undefined symbolo "signbit" when compiling for Solaris10 needs_information defect Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#10519 tor uses default IP for dirport instead of the one defined in DirPort new defect Low Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23777 tor spends a lot of time in malloc/free new enhancement Medium Tor: unspecified
#22469 tor should probably reject "0x00" in port range specifications new defect Medium Tor: unspecified
#10566 tor relay hangs for 20 seconds periodically if domain from Address can not be resolved new defect Medium Tor: unspecified
#19661 tor refuses to use /dev/null as a config file needs_revision cypherpunks enhancement Medium Tor: unspecified
#26469 tor on SunOS: [err] Error from libevent: evport.c:425: Assertion evpd->ed_pending[i] == fd failed in evport_del needs_information defect Medium Tor: unspecified
#18134 tor issues missleading permission warning when torrc overrides User config directive of default torrc new defect Low Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client new enhancement Medium Tor: unspecified
#24937 tor failing to resolve some dns records new defect Medium Tor: unspecified
#22972 tor expert bundle only read the first letter from config new erinn defect Medium Tor: unspecified
#10922 tor connected to bwauth produces lots of pathbias_count_use_attempt BUG messages needs_information defect Medium Tor: unspecified
#19507 tor and tor-gencert disagree on what a month is new defect Medium Tor: unspecified
#24888 tor 0.2.5.16: src/or/rendservice.c build error: comparison between signed and unsigned new defect Low Tor: unspecified
#21081 tor --service install -options does not work new cypherpunks defect Medium Tor: unspecified
#20225 tor "wedged" and become unable to connect to a hidden service needs_information defect Medium Tor: unspecified
#31483 token_bucket_ctr_adjust() does not convert rate to step accepted nickm defect Medium Tor: 0.4.4.x-final
#31062 token bucket: Improve library to handle under/overflow and clock jump new defect Medium Tor: unspecified
#15713 toggling DisableNetwork during bootstrap causes delay accepted arma defect Medium Tor: unspecified
#26373 test_rust.sh should detect when it's being invoked improperly and error out new defect Medium Tor: unspecified
#31757 test_parseconf.sh: apparently not reliable on Appveyor assigned defect High Tor: unspecified
#26076 test_keygen.sh and test_key_expiration.sh fail on Windows new defect Very Low Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#5401 tag control log events so arm can know they're from the same place in the code new enhancement Medium Tor: unspecified
#16782 systemd unit file is not compatible with the AppArmorProfile= directive new defect Medium Tor: unspecified
#19759 systemd tor.service hardening: add MemoryDenyWriteExecute=true new enhancement Medium Tor: unspecified
#18294 systemd AppArmorProfile= directive unavailable leads to not loading AppArmor profile on Debian jessie new defect Medium Tor: unspecified
#32823 support Android SharedPreferences xml as a torrc format new enhancement Medium Tor: unspecified
#15998 suggestion: distributed captcha mechanism for hidden service DDOS defense new enhancement Medium Tor: very long term
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#26754 stop using BUFFERS_PRIVATE needs_revision enhancement Medium Tor: unspecified
#23714 stop casting small integers to (void *) new defect Medium Tor: unspecified
#31565 static Tor building against openssl-1.1.1 fails: configure unable to find linkable OpenSSL needs_information defect Medium Tor: 0.4.4.x-final
#26139 start aplication needs_information defect Medium Tor: unspecified
#31544 sr: Check why some sr_disk_state fields need to be cleared assigned nickm defect Medium Tor: unspecified
#15715 spurious "Network is unreachable" error after setting DisableNetwork=1 accepted arma defect Medium Tor: unspecified
#21084 sometimes we call circuit has_opened() more than 2 times on client side new defect Medium Tor: unspecified
#23613 some control protocol GETINFO downloads/networkstatus keys are lies new defect Medium Tor: unspecified
#33796 socks: Prefer IPv6 by default on SOCKS port broke torsocks assigned dgoulet defect Medium Tor: 0.4.4.x-final
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
#29793 show-distdir-core and friends should fail more quietly new defect Medium Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#21503 ship default MapAddress for at least torproject.org hosts new enhancement Low Tor: unspecified
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#32884 set_main_thread() not called on second initialization with pthreads merge_ready nickm defect Medium Tor: 0.4.2.x-final
#19572 set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie new defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info new defect Medium Tor: unspecified
#30440 sendme: Service introduction circuit ignore flow control new defect Medium Tor: unspecified
#33623 sendme: Change default emit cell version from 0 to 1 merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#30742 sendme: Better logging overall new enhancement Medium Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#32388 sched: When OR connection opens, always indicate the channel is ready for cells assigned dgoulet defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space new enhancement Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler new defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler new defect High Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after new defect Medium Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write new defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t new enhancement Very High Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler new defect Medium Tor: unspecified
#24454 sandbox failure on arm64 needs_information defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.