Custom Query (1818 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1818)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#449 dns failures prevent legitimate options being set accepted nickm defect Low Tor: unspecified
#3459 Expose information about dir conns to controllers accepted rransom enhancement Low Tor: unspecified
#3733 Tor should abandon rendezvous circuits that cause a client request to time out accepted dgoulet defect Medium Tor: unspecified
#11660 Make tor_spawn_background and related interfaces work the same on windows and *nix accepted ahf defect Medium Tor: unspecified
#15713 toggling DisableNetwork during bootstrap causes delay accepted arma defect Medium Tor: unspecified
#15715 spurious "Network is unreachable" error after setting DisableNetwork=1 accepted arma defect Medium Tor: unspecified
#15940 Make a standard transition plan for killing off a client version accepted nickm task High Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever accepted nickm task High Tor: unspecified
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted nickm defect Medium Tor: unspecified
#16598 fsync ed25519 master key files before closing them. accepted nickm defect Very Low Tor: unspecified
#17278 Fix malleable relay crypto accepted nickm defect High Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced accepted nickm enhancement Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#17945 Stop single hop client connections to Single Onion Services accepted dgoulet enhancement Medium Tor: unspecified
#18213 The parameter WarnUnsafeSocks does not work as specified in the documentation, no warning is logged in the log file accepted arma defect Low Tor: unspecified
#18308 Use a better pattern for "create mutex if not already initialized" accepted nickm defect Medium Tor: unspecified
#18321 Exclude our own vote from the consensus if we think our own vote is invalid accepted nickm defect Medium Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted nickm enhancement High Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted nickm project High Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some accepted nickm enhancement High Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals accepted nickm enhancement High Tor: unspecified
#19162 Make it even harder to become HSDir accepted arma defect Medium Tor: unspecified
#19329 Integrate callgraph complexity measures into our regular process accepted nickm defect Medium Tor: unspecified
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* accepted dgoulet defect Low Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS accepted nickm defect High Tor: unspecified
#20719 prop271 -- make parameters configurable accepted nickm enhancement Medium Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted nickm task High Tor: unspecified
#20931 [prop271] Generate GUARD controller events accepted nickm enhancement Medium Tor: unspecified
#21084 sometimes we call circuit has_opened() more than 2 times on client side accepted dgoulet defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent accepted nickm defect Low Tor: unspecified
#21474 Fix make test-fuzz-corpora warnings accepted nickm defect Medium Tor: unspecified
#21509 Fuzz v3 hidden services accepted nickm task High Tor: unspecified
#21678 Unify Windows and Unix API for tor_read_all_handle() in util.c accepted ahf enhancement Low Tor: unspecified
#22233 Reconsider behavior on .z URLs with Accept-Encoding header accepted Hello71 defect Medium Tor: unspecified
#22264 Remove old cached_dir_t code accepted nickm defect Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? accepted nickm defect Medium Tor: unspecified
#22619 SessionGroup = Reading config failed accepted catalyst defect Medium Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor accepted dgoulet enhancement Very High Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier accepted nickm task Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once accepted dgoulet defect Medium Tor: unspecified
#23507 Add single onion unreachable address algorithm to prop224 accepted dgoulet defect Medium Tor: unspecified
#23579 sched: Add accessors for channel_pending list accepted dgoulet enhancement Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after accepted dgoulet defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler accepted dgoulet defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler accepted dgoulet defect High Tor: unspecified
#23756 tor's .gitlab-ci.yml is doing mirroring? why? accepted catalyst defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info accepted dgoulet defect Medium Tor: unspecified
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells accepted dgoulet defect Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells accepted dgoulet enhancement Medium Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) accepted nickm defect High Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen accepted dgoulet defect High Tor: unspecified
#27143 Look for parts of code that relies on non-trunnel code for binary wire format handling accepted rl1987 task Medium Tor: unspecified
#27245 Don't store (micro)descriptor text on the heap so much. accepted nickm defect Medium Tor: unspecified
#27324 Rework AUTHENTICATE cell parsing and remaining generation with trunnel accepted rl1987 enhancement Medium Tor: unspecified
#27530 Configure: Use AC_TRY_RUN() to check that --enable-gcc-hardening works accepted nickm defect Low Tor: 0.4.1.x-final
#28248 Add comments around rust compilation flags accepted nickm enhancement Medium Tor: unspecified
#28481 Tor's startup time is getting slower on Android accepted nickm defect Medium Tor: unspecified
#28982 Refactor GETINFO dir/ so that new tor/ URLs automatically become GETINFOs accepted rl1987 enhancement Medium Tor: unspecified
#28984 Update dir-spec observed bandwidth to 5 days accepted teor defect High Tor: 0.4.0.x-final
#29241 NSS SSL_ExportKeyingMaterial failing accepted nickm defect High Tor: 0.4.0.x-final
#29310 control-spec: "limits/max-mem-in-queues" appears to be undocumented accepted nickm defect Medium Tor: 0.4.1.x-final
#29607 Denial of service on v2 and v3 onion service accepted pidgin defect Immediate
#29625 git-pull-all.sh should say which branches it updated, and which files changed accepted dgoulet defect Medium
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline assigned mikeperry defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned nickm defect High Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores assigned chelseakomlo project High Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned mikeperry enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned nickm defect High Tor: unspecified
#3511 Automatically chosen published ports should be stable assigned blackpaw enhancement High Tor: unspecified
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#4565 Enable relays to talk to other relays via IPv6 assigned ln5 project Medium Tor: unspecified
#4682 Deal with 'double door' effects because our read and write rate limiting are independent assigned arma project Medium Tor: unspecified
#4847 Fix IPv6 bridges with a private/dynamic IPv4 address assigned ln5 defect Medium Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned task High Tor: unspecified
#5409 Warn if we're on Windows, and the user ends a line accepting a directory path with a backslash? assigned Jigsaw52 defect Medium Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits assigned mikeperry enhancement Medium Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% assigned tbb-team defect High Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned isis defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned isis defect Very Low Tor: unspecified
#9662 Make ntor handshake faster assigned yawning defect Medium Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned nickm enhancement Medium Tor: unspecified
#11542 Add a new logging domain for transport proxies assigned yawning defect Low Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned mikeperry defect High Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned isis task High Tor: unspecified
#12898 Remove naming support from Tor assigned Sebastian enhancement Low Tor: unspecified
#12900 Remove config related naming stuff assigned Sebastian defect Low Tor: unspecified
#12901 Remove client-related naming stuff assigned Sebastian defect Low Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned nickm defect Low Tor: unspecified
#15059 Allow UI to identify servers by Ed25519 keys assigned nickm enhancement Low Tor: unspecified
#15061 Support Ed25519 identities in controller interface assigned nickm defect Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.