Custom Query (1897 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1897)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag assigned defect High Tor: unspecified
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#22233 Reconsider behavior on .z URLs with Accept-Encoding header accepted Hello71 defect Medium Tor: unspecified
#22251 Spec should change: stop requiring Tor relays to support old link versions new enhancement Medium Tor: unspecified
#22264 Remove old cached_dir_t code assigned defect Medium Tor: unspecified
#22304 Support generating HS private key / onion address without publishing new enhancement Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#22312 Refactor/Simplify to clarify "we cache dir info" vs "we invite clients to use us as a directory guard" new enhancement Medium Tor: unspecified
#22331 Tor needs to stop trying to read directories before it changes users new defect High Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? assigned defect Medium Tor: unspecified
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#22363 Make our test network public new enhancement Medium Tor: unspecified
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#22382 Fix fd leak-on-close from tor-fw-helper pipe new defect Very Low Tor: unspecified
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#22408 Refactor functions over 300 lines long. new defect Medium Tor: unspecified
#22422 Add noise to PaddingStatistics assigned defect High Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() new defect Low Tor: unspecified
#22450 Tor works in compatibility mode on Windows 7 and later new defect Medium Tor: unspecified
#22453 Relays should regularly do a larger bandwidth self-test needs_information juga defect Medium Tor: unspecified
#22455 Enumerate cases where we want to retry circuits, and correctly balance retry robustness with guard discovery new task Medium Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22469 tor should probably reject "0x00" in port range specifications new defect Medium Tor: unspecified
#22473 Do any controllers still use getinfo network-status? new defect Medium Tor: unspecified
#22477 Add -Wl,--large-address-aware to tor-for-Windows build chain new defect Low Tor: unspecified
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. needs_information defect Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22571 AssumeReachable 1 on a relay doesn't make it publish quickly new defect Medium Tor: unspecified
#22572 please don't kill WarnUnsafeSocks option new defect Medium Tor: unspecified
#22589 Tor circuit is too slow! assigned defect Medium Tor: unspecified
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed new defect Medium Tor: unspecified
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22663 Tor keeps using a very slow guard new defect Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22697 Tor should mandatory require brackets around ipv6 address new enhancement Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned defect Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#22728 Long-lived onion service circuits can enable guard discovery new defect Medium Tor: unspecified
#22729 Revisit relay read/write history resolution (for onion services) new defect Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22745 Establish policy for writing regression tests new task Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22769 Investigate the reproducibility of Rust binaries new task Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#22826 Write a spec for unsanitised bridge descriptor formats assigned enhancement Low Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor assigned enhancement Very High Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#22908 Establish guidelines for contributing large bodies of code new task Medium Tor: unspecified
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#22972 tor expert bundle only read the first letter from config new erinn defect Medium Tor: unspecified
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#23006 Test connection speed new enhancement Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23013 Tor 0.3.0.9 tarball was missing ReleaseNotes entry new defect Low Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#23079 Support 80-bit Onion Model In Perpetuity new project Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once assigned defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23119 Make Tors no longer warn if they're running a newer-than-recommended version? new enhancement Medium Tor: unspecified
#23126 HSDirs should publish some count about new-style onion addresses new enhancement Medium Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23232 misleading log message related to used SSL vendor needs_information enhancement Low Tor: unspecified
#23277 ApplicationControlSocket: the way for apps to control Tor new enhancement Medium Tor: unspecified
#23278 Give user option to use non-Exit Guards only reopened enhancement Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion assigned neel defect Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.