#24265 |
Fuzz all rust functions that are used by authorities to make sure they match C
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24269 |
Raise a FATAL error if the user tried to combine v2 and prop224 hidden service in same directory
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#24300 |
Failed to find node for hop #1 of our path. Discarding this circuit
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24308 |
MaxMemInCellQueues minimum of 256MB is still too large for low-RAM relays (LEDE and OpenWRT routers)
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24339 |
(Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only)
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24340 |
(Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only)
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24347 |
periodic network bw pattern in an exit relay
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#24366 |
compare_vote_rs() could check more fields for better SHA1 collision resistance
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24368 |
Tune zstd parameters to decrease memory usage during streaming
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#24377 |
Warn about networkstatus_compute_consensus() breakage in all the functions it calls
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24400 |
Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24403 |
Propose and implement IPv6 ORPort reachability checks on relays
|
assigned
|
|
task
|
Medium
|
Tor: unspecified
|
#24404 |
Propose a relay protover that allows IPv6 extends
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24405 |
Implement relay IPv6 extends with proposed protover
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24406 |
Implement IPv6 ORPort reachability fallback
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24448 |
Channeltls adds the connection write event to main loop when writing a packed cell
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24449 |
sched: KIST scheduler should handle limited or failed connection write
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#24451 |
Put IPv6 link specifiers in client EXTEND cells
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24453 |
Reduce log spam when child process creation failed
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24454 |
sandbox failure on arm64
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#24455 |
messages out of order in the tor log due to stored logs
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24456 |
Figure out what to do with the guardfraction feature
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24457 |
Integrate tor-android build files directly into tor.git
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24468 |
Measure HSDir usage to guide parameter choices
|
assigned
|
|
task
|
Medium
|
Tor: unspecified
|
#24483 |
Make bridges work when the authorities are blocked
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24498 |
add configurables for eventdns settings
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24509 |
circuit_can_use_tap() should only allow TAP for v2 onion services
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#24535 |
Document which address functions we should use, and when
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24546 |
Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24586 |
Audit all state for stuff we need to reset on exit to make tor restartable.
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24594 |
Protocol warning: Expiring stuck OR connection to fd...
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24603 |
Update control spec to allow decorated IPv6 addresses in reachability events
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#24604 |
Decorate IPv6 addresses in connection_t->address to avoid ambiguity
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24609 |
consdiff implementation in Rust
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24617 |
Feature flags for new controller-accessible Tor features
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24649 |
Simplify bridge code: do we still need mark-unmark-and-sweep logic?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24650 |
Simplify bridge code: do we need separate addr and addport_configured?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24667 |
OOM needs to consider the DESTROY queued cells
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24668 |
sched: scheduler_compare_channels() function will never pick a channel with no active circuits.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24694 |
sched: Use the socket RTT in KIST to compute a more accurate extra space
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24712 |
Client builds and timeouts tons of circs to connect to HS
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24731 |
Stop checking routerinfos for addresses when we use microdescs for circuits
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24732 |
Remove unused IPv6 DirPort code
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24735 |
Always check for the null address when calling address functions
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24737 |
Recommend a MaxMemInQueues value in the Tor man page
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24741 |
Consider redacting usernames in notice level logs
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24774 |
Edit prop279 to support alternative name representations and non-English languages
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24779 |
Investigate Windows 11(?) AF_UNIX support
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24797 |
Add an option that makes Tor use fewer connections
|
needs_revision
|
neel
|
enhancement
|
Medium
|
Tor: unspecified
|
#24806 |
LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24815 |
Validate shared random state dates before each voting period
|
assigned
|
asn
|
defect
|
Medium
|
Tor: unspecified
|
#24817 |
Recommend that tools ignore HSDir and Guard flags on bridges
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24818 |
Make the hard-coded authorities into a separate include file with a standard format
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24833 |
DNS not reliably returning AAAA records
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24839 |
Add a torrc option and descriptor line to opt-in as a FallbackDir
|
assigned
|
|
task
|
Medium
|
Tor: unspecified
|
#24841 |
Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address?
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24850 |
tor2web option without the corresponding tag in torrc causes tor to fail with confusing console output
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24852 |
update the fallback script to generate the new format
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24853 |
backport the new authority and fallback file formats
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24857 |
Tor uses 100% CPU when accessing the cache directory on Windows
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24867 |
Do relays keep more than one canonical connection when they extend over IPv6?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24876 |
Directory Authorities should test reachability of relays in their family
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24897 |
Tor seems to malfunction on FreeBSD
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#24899 |
[feature request] Increase the limit on pending client circuits with the number of onion services
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24905 |
Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24906 |
Make channelpadding_update_padding_for_channel() use !channel_is_client()
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24907 |
Stop ignoring should_refuse_unknown_exits() for unauthenticated channels
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24911 |
Remove the known digest check from channel_check_for_duplicates()
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#24937 |
tor failing to resolve some dns records
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24940 |
Make authorities post authority_certificate to other authorities
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24955 |
exit selection biases appear to result when very-long ExcludeExitNodes list is in effect
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24966 |
Silence warnings for circuits created from controller
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24973 |
Tor should be more gentle when launching dozens of circuits at once
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24985 |
Preserve circuit-layer confidentiality against a quantum-capable adversary
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#24986 |
Implement prop#249 "Large Create Cells"
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24987 |
Implement prop#269 "Hybrid Handshakes" (composition module)
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24988 |
Implement prop#269 "Hybrid Handshakes" (ntor2 module)
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24990 |
Write a proposal for a post-quantum lattice KEX
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#24992 |
SingleOnion (and Tor2web?) connections may need better expiry, lots left open
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25007 |
See if we can allocate less for HMAC in Tor relays
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25061 |
Relays consider it a bootstrapping failure if they can't extend for somebody else's circuit
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25066 |
Rendezvous points should return signed proof of the established rend point
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25068 |
Make HSIntro consistent with rend_service_descriptor_t.protocols
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25069 |
Improve supported protocols unit test by exposing supported protocols in headers
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25149 |
Hook rephist subsystem into the OOM handler
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25152 |
Try to call less circuitmux_find_map_entry()
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#25153 |
Specify how PrivCount in Tor statistics are configured and interpreted
|
assigned
|
|
task
|
Medium
|
Tor: unspecified
|
#25173 |
No Control Socket when DisableNetwork and User options are set
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25203 |
document max. value of SigningKeyLifetime
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25208 |
Relays can upload a new descriptor every 2 minutes
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25224 |
Create a new consensus method that ignores guardfraction votes
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25227 |
Avoid storing all Tor nodes in RAM
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25263 |
Fix the hidden service statistics noise (and the privcount noise by extension)
|
assigned
|
|
task
|
Medium
|
Tor: unspecified
|
#25269 |
Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance
|
needs_information
|
Backxwash
|
enhancement
|
Medium
|
Tor: unspecified
|
#25299 |
recent update to 7.5 on portable version breaks browser
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25308 |
Onion service node pinning by default
|
reopened
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25312 |
circ: We can pick an active circuit that is marked for close
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#25324 |
Create a tor-releases.git repository.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25335 |
Tor relay node CPUWORKER failed error mssage
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25347 |
Tor keeps on trying the same overloaded guard over and over
|
needs_revision
|
asn
|
defect
|
Medium
|
Tor: unspecified
|