Custom Query (1929 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1929)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25687 over-report of observed / self-measure bandwidth on fast hardware -- important to torflow / peerflow new defect Medium Tor: unspecified
#25713 "DisableNetwork is set" log message in Tor Browser scares/confuses users new defect Medium Tor: unspecified
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x new task High Tor: unspecified
#25716 Arrange an experiment on the test network where we dump create cells on a relay and time the responses new task Medium Tor: unspecified
#25754 Make Prop#291 choices new defect Medium Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#25841 Write test for Rust fragile hardening new enhancement Medium Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#25922 Add an alias mechanism for controller commands and events, and use it for Onion Services new defect Medium Tor: unspecified
#25955 onion v2 deprecation plan new enhancement Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#25964 Remove hs_index_t fetch, and use one of the stores instead new enhancement Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#25978 UseEntryGuards 0 disables EntryNodes new defect Very Low Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26076 test_keygen.sh and test_key_expiration.sh fail on Windows new defect Very Low Tor: unspecified
#26088 Duplicate creation of ReachableAddresses reject in torrc file new defect Low Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#26113 Control spec is ambiguous whether a GETCONF error message is specified new defect Medium Tor: unspecified
#26136 DirPort reachability test inconsistency when only "DirPort x.x.x.x:x NoAdvertise" configured new defect Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
#26138 DirPort /tor/server/all document contains spurrious blank line following serving relay's descriptor new defect Very Low Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#26168 Rename HSDir consensus flag to OnionDir new enhancement Medium Tor: unspecified
#26181 Apparmor + systemd failures when loading included service files + DisableAllSwap Fix new defect Very High Tor: unspecified
#26217 add info that fingerprints in MyFamily are not case-sensitive new enhancement Medium Tor: unspecified
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#26262 Create unittests for circuit timeout tracking new enhancement Medium Tor: unspecified
#26285 Trac / Github service bot new project Medium Tor: unspecified
#26286 Update contributor document to explain the transition to travis-ci.com new enhancement Medium Tor: unspecified
#26287 run callgraph tool from Travis new enhancement Medium Tor: unspecified
#26289 use a pub/sub model for the "consensus changed" event new enhancement Medium Tor: unspecified
#26290 Log information from the relay connection failed cache in heartbeats new enhancement Medium Tor: unspecified
#26291 find all instances of SHA-1 in our design and implementation and kill them with fire new project Medium Tor: unspecified
#26295 Fix problems with the Windows event loop new defect Medium Tor: unspecified
#26299 Reproducible Tor releases new project Medium Tor: unspecified
#26306 HTTPS proxy doesn't use TLS new enhancement Low Tor: unspecified
#26310 Refusing to apply consensus diff because the base consensus doesn't match the digest as found in the consensus diff header. new defect Medium Tor: unspecified
#26316 Windows newlines in extrainfo descriptor new defect Medium Tor: unspecified
#26333 Write trac templates for bug reports / other tickets, and link them from somewhere useful new task Medium Tor: unspecified
#26334 Investigate how much our CI performance would improve (if at all) with paid builders new task Medium Tor: unspecified
#26335 Use fewer travis builders for typical commits? new defect Medium Tor: unspecified
#26339 Use same traffic path if destination is the same but the protocol is different. new defect Medium Tor: unspecified
#26359 DoS and timed attacks via unencrypted network time protocols new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() new defect Medium Tor: unspecified
#26369 Re-fetch onion service descriptor for isolated request new defect Medium Tor: unspecified
#26373 test_rust.sh should detect when it's being invoked improperly and error out new defect Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#26464 Static cross-compiling for Windows is broken new Hello71 defect Medium Tor: unspecified
#26478 Unify bandwidth related terms in dir-spec and Tor code. new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#26508 Allow DirAuthority address to be DNS hostname on test networks new defect Medium Tor: unspecified
#26521 Coverity issues for week 25: Coverity thinks some HS tests have memory leaks new defect Medium Tor: unspecified
#26565 Create unit tests for reading measured bandwidths with non-NULL routerstatuses new enhancement Medium Tor: unspecified
#26567 Replace ArgumentCharValue with ValueChar in dir-spec and bandwidth-file-spec new defect Very Low Tor: unspecified
#26578 Do clients request new consensus documents more often than we expect? new defect Medium Tor: unspecified
#26587 --verify-config accepts RelayBandwidthRate with no value? new defect Medium Tor: unspecified
#26591 doc/ missing in build directory for out-of-tree builds new enhancement Low Tor: unspecified
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#26639 Additional SSL Library Support and Fixes new task Medium Tor: unspecified
#26646 add support for multiple OutboundBindAddressExit IP(ranges) new enhancement Medium Tor: unspecified
#26664 When an exit tells a client about an IPv6-only hostname, the client should choose another IPv6 exit new defect Medium Tor: unspecified
#26685 Add ed25519 id support for the hard-coded fallback and authority lists new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#26691 add 'working DNS' to the list of mandatory requirements for the 'exit' flag new enhancement Medium Tor: unspecified
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#26737 File-level documentation for src/core/*/*.[ch] new defect Medium Tor: unspecified
#26738 File-level documentation for src/feature/*/*.[ch] new defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26748 Make core/proto depend only on lib/*, and not used by core/mainloop new defect Medium Tor: unspecified
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#26772 [warn] Introduction circuit established without a rend_intro_point_t object new defect Medium Tor: unspecified
#26778 Enable supporting multiple bridge authorities new defect Medium Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.