Custom Query (1970 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1970)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#15060 Decide the fate of MyFamily new enhancement Medium Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#15214 networkstatus_compute_consensus() is unreasonably large and should be refactored new defect Medium Tor: unspecified
#15232 Specify a potential TLS-replacing protocol for future use in Tor. new defect Medium Tor: unspecified
#15237 Improve tooling and usability for approved-routers file and its allies new defect Medium Tor: unspecified
#15272 Think of more research questions that we can answer with statistics new task High Tor: unspecified
#15380 log messages are doubled and unclear new defect Very Low Tor: unspecified
#15458 StrongSocksIsolation option (w/ virtual circuits?) new enhancement Low Tor: unspecified
#15469 Remove data structure containing unique IP address sets new enhancement High Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#15660 [feature suggestion] Need signal to totally switch to the new set of circuits new defect Medium Tor: unspecified
#15661 Same "non-loopback address" notice is printed twice new defect Very Low Tor: unspecified
#15692 'GETINFO config-file' command on ControlPort returns the standard torrc file when it was overridden in the command line new defect Medium Tor: unspecified
#15729 Proposal: Hidden Service Revocation new Nathaniel enhancement Medium Tor: unspecified
#15765 Tor doesn't reconnect automatically when tun/tap device goes down. new task Medium Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#15883 Redesign/Rewrite the BridgeAuthority new enhancement Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#15938 HS descriptor cache leaks timing information to local users new defect Medium Tor: unspecified
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#15998 suggestion: distributed captcha mechanism for hidden service DDOS defense new enhancement Medium Tor: very long term
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints new enhancement Medium Tor: unspecified
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. new defect Medium Tor: unspecified
#16059 Add a "rendezvous approver" control API new enhancement Medium Tor: unspecified
#16070 Tor log doesn't have to be world readable new defect Low Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16134 The various stream lists tied to the circuit structures should use tor_queue.h new yawning enhancement Medium Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#16294 Unable to bootstrap when no relays meet criteria; logging messages unhelpful new defect Low Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16350 tor.pid should be deleted on exit in every case possible, like assert termination, and catchable signals new defect Medium Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16458 torspec references UTC, but tor uses unix time (leap second handling) new task Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#16585 Long-running activity in scheduler_run() blocks network, creating information leaks new defect Medium Tor: unspecified
#16608 "time published in the consensus network status" seems to be wrong new defect Medium Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#16648 Libevent configuration doesn't use pkg-config new defect Medium Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#16782 systemd unit file is not compatible with the AppArmorProfile= directive new defect Medium Tor: unspecified
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#16803 Unit tests for sandbox failures new enhancement Medium Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#16997 Gather and report metrics for the number of channels a relay is servicing. new enhancement Medium Tor: unspecified
#17032 Threadpool doesn't get shutdown when changing from relay to client new defect Low Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17066 Avoid assuming relays have a single IPv4/IPv6 address new task Medium Tor: unspecified
#17120 Fire a circuit status control port event when circuit isolation changes. new enhancement Low Tor: unspecified
#17127 Fix and re-enable --master-key option, possibly --out (for keys) and possibly --nopass for non-interactive key generation new enhancement Medium Tor: unspecified
#17134 Add a way to say "Use this option only if supported" in torrc new enhancement Medium Tor: unspecified
#17145 <tor.exe --service install -options -f ...\torrc> returns Error 1064 on Windows new defect Medium Tor: unspecified
#17146 "Sandbox 1" in chutney makes coverage underreported new defect Medium Tor: unspecified
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms new defect Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17230 Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. new defect Medium Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17366 Track consensus fetch times per country? new enhancement Medium Tor: unspecified
#17387 ExtraRelayDescriptorFields needs proposal number new task Low Tor: unspecified
#17451 Tor controller [ControlPort] - bruteforce defence measures & detailed logging when listening non-locally new enhancement Very Low Tor: unspecified
#17495 Unit-test launch_resolve() in dns.c new task Medium Tor: unspecified
#17543 Bring some clarity to behavior of net_is_disabled() vs DisableNetwork vs we_are_hibernating() new defect Medium Tor: unspecified
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#17627 Add missing controller events so we can link every step of the HS dance new enhancement Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.