Custom Query (1978 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1978)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#31631 Write a test for round-trip encode/decode operations on configuration objects. accepted nickm enhancement Medium Tor: unspecified
#31634 Check .may_include order and tor subsystem init order are compatible needs_revision nickm enhancement Medium Tor: 0.4.3.x-final
#31635 Initialise and reset the sigsafe error fds to -1 new enhancement Medium Tor: 0.4.2.x-final
#31636 Circuit padding: Add meta probability distribution type new enhancement Medium Tor: unspecified
#31698 Reconsider HAVE_XXX_H usage in the Tor code new enhancement Low Tor: unspecified
#31706 Expose config flags to the controller new enhancement Medium Tor: unspecified
#31713 Automatically run the autostyle scripts before every commit new enhancement Medium Tor: unspecified
#31742 Write a script or makefile target to install git hooks new enhancement Medium
#31782 Circuit padding is not subject to flow control new enhancement Medium
#31783 Circuit padding support for multi-circuit behavior new enhancement Medium
#31787 Full HMM support for circuit padding state transition new enhancement Medium
#31788 Circuit padding trace simulator new enhancement Medium
#31789 Make networking usage in circuit padding more abstract new enhancement Medium
#31790 Add easy-to-parse event and packet tracing logs to circuit padding new enhancement Medium
#31908 Unify meaning of routerset NULL and routerset "" to avoid recurrence of #31495 new enhancement Medium Tor: 0.4.3.x-final
#31913 Add more robust Tor API documentation new enhancement Medium Tor: 0.4.3.x-final
#31937 decide and document that stuff in the CacheDirectory can be deleted while Tor is running new enhancement Medium
#31940 Fail unit tests that hang new enhancement Medium Tor: 0.4.3.x-final
#31943 Review pull request: reorganized Tor manual needs_information swati enhancement Medium Tor: 0.4.3.x-final
#32036 output debug logs to logcat as early as possible on Android new enhancement Medium Tor: 0.4.3.x-final
#32088 Proposal 271 - straightforward improvements needs_revision enhancement High Tor: 0.4.3.x-final
#32091 optional TUN interface to tor for mobile new enhancement Medium Tor: unspecified
#32102 Add build information to binary new enhancement Medium Tor: unspecified
#32121 Refactor some common configs and functions out of the git scripts. new enhancement Medium Tor: unspecified
#32122 Add tests for the git scripts new enhancement Medium Tor: unspecified
#32139 Disable all dirauth options when those modules are disabled assigned nickm enhancement Medium Tor: 0.4.3.x-final
#32162 Make router.c relay-only new enhancement Medium Tor: 0.4.3.x-final
#32163 Stop using HAVE_MODULE_{DIRAUTH,RELAY} inside functions needs_review enhancement Medium Tor: 0.4.3.x-final
#32190 Send a control port event when a stream enters the controller_wait state new enhancement Medium
#32193 update .gitlab-ci.yml to remove broken cruft and add a complete test suite needs_review enhancement Medium Tor: 0.4.3.x-final
#32242 Travis: Enable zstd new enhancement Medium Tor: 0.4.3.x-final
#32244 Phase 0: Disable the relay_periodic.c entry point in --disable-module-relay needs_review enhancement Medium Tor: 0.4.3.x-final
#32245 Phase 0: Disable the relay_sys.c entry point in --disable-module-relay needs_review enhancement Medium Tor: 0.4.3.x-final
#32249 Speed up practracker, by passing it a list of modified file names new enhancement Medium Tor: 0.4.3.x-final
#32299 read GeoIPFile and GeoIP6File straight out of ZIP (.apk, .jar, .zip, .ipa) new enhancement Medium Tor: unspecified
#32347 Make git-setup-dirs.sh more customisable needs_review teor enhancement Medium Tor: 0.4.3.x-final
#32354 Support "Cache Directory Tagging Standard" (already implemented e.g. in GNU tar) new enhancement Medium Tor: unspecified
#32372 Add a practracker mode that only regenerates over-broad exceptions new enhancement Medium Tor: 0.4.3.x-final
#32373 Create a way to scan all configured file paths new enhancement Medium Tor: 0.4.3.x-final
#32374 Create a test framework for options_act*() new enhancement Medium Tor: 0.4.3.x-final
#32395 Disable all relay options when those modules are disabled new enhancement Medium Tor: 0.4.3.x-final
#32396 Add state file support to test_parseconf.sh new enhancement Medium Tor: 0.4.3.x-final
#32427 Refactor options_act_reversible into manageable chunks needs_revision nickm enhancement Medium Tor: 0.4.3.x-final
#32428 Add backend ID when exposing circuitid with HiddenServiceExportCircuitID new enhancement Medium
#32451 test/parseconf: Add support for required log messages on success needs_review teor enhancement Medium Tor: 0.4.3.x-final
#32487 Phase 1: Stop compiling "acting as a directory cache" in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#32488 Phase 1: Stop compiling "Responding to CREATE and EXTEND cells" in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#32489 Phase 1: Stop compiling "Responding to BEGIN cells" in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#32490 Phase 1: Stop compiling "Listening for OR and Dir connections " in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#449 dns failures prevent legitimate options being set assigned defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#3266 gabelmoo publishes only 1 extra-info descriptor per week needs_information defect Low Tor: unspecified
#3317 Tor should lock its HiddenServiceDirs new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#3733 Tor should abandon rendezvous circuits that cause a client request to time out new defect Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf assigned defect Low Tor: unspecified
#4378 Tor guesses IP address when Address is 127.0.0.1 new defect Low Tor: unspecified
#4386 Requesting better "too slow" warning message new defect Medium Tor: unspecified
#4391 `GETINFO ns/all` doesn't return 'p' lines -- make something that does! new defect Medium Tor: unspecified
#4477 Relays that are not directory authorities shouldn't load the approved-routers file new defect Low Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.