Custom Query (1859 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1859)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#449 dns failures prevent legitimate options being set accepted nickm defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information nickm defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline assigned mikeperry defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1270 Spec conformance issues on get_next_token() reported by outofwords needs_revision nickm defect Low Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned nickm defect High Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores assigned chelseakomlo project High Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information nickm defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned mikeperry enhancement Medium Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned nickm defect High Tor: unspecified
#3028 META: Support non-clique topologies on the network new enhancement Low Tor: very long term
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#3266 gabelmoo publishes only 1 extra-info descriptor per week needs_information defect Low Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#3317 Tor should lock its HiddenServiceDirs new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3459 Expose information about dir conns to controllers accepted rransom enhancement Low Tor: unspecified
#3501 Teach Tor to run the Control Port over TLS new enhancement Low Tor: unspecified
#3511 Automatically chosen published ports should be stable assigned blackpaw enhancement High Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#3522 Allow controllers to post HS descriptors to Tor's cache new enhancement Low Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3652 Export clock skew opinion as getinfo command needs_revision nickm enhancement High Tor: unspecified
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#3733 Tor should abandon rendezvous circuits that cause a client request to time out assigned defect Medium Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#3782 Add native chroot support to Tor new enhancement Medium Tor: unspecified
#3852 Make DNS resolution happen on particular exit nodes for particular hostnames new enhancement Low Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#3948 "fooport auto" should be able to get a hint new enhancement Low Tor: unspecified
#3982 MAPADDRESS for IP ranges (CIDR, etc) reopened enhancement Medium Tor: unspecified
#4036 Tor relays/bridges can detect when they are being filtered by SSL cert new enhancement Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4233 Exact addition/summation and memory allocation needs_revision enhancement Medium Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#4310 Reorder tor manpage entries within sections new task Medium Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf new nickm defect Low Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#4378 Tor guesses IP address when Address is 127.0.0.1 new defect Low Tor: unspecified
#4386 Requesting better "too slow" warning message new defect Medium Tor: unspecified
#4391 `GETINFO ns/all` doesn't return 'p' lines -- make something that does! new defect Medium Tor: unspecified
#4477 Relays that are not directory authorities shouldn't load the approved-routers file new defect Low Tor: unspecified
#4539 Make dir auths write to disk digests that don't match new enhancement Medium Tor: unspecified
#4565 Enable relays to talk to other relays via IPv6 assigned ln5 project Medium Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.