Custom Query (1985 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1985)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: unspecified
#7117 One of our code-checking tools should make sure that we don't add more reserved identifiers new enhancement Low Tor: unspecified
#28968 Onion Service v2 connection status update event new enhancement Medium Tor: unspecified
#28969 Onion Service v3 connection status update event new enhancement Medium Tor: unspecified
#29174 Onion service can do self-reachability tests to detect overwhelmed guards new defect Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#30926 OnionPerf requests to onion service fail close towards completion with TGEN/READ error needs_information defect Medium Tor: unspecified
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated new defect Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: 0.4.2.x-final
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#9323 Option to start as a bridge by default, but change to relay if bw is super-high. new chiiph enhancement Medium Tor: unspecified
#28760 Option/* format for ControlPort options needs to be homogeneous new defect Medium Tor: unspecified
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.0.x-final
#29112 PTs should pass user count events back to Tor new enhancement Medium Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#31653 Padding cells sent with 0ms delay cause circuit failures assigned mikeperry defect Medium Tor: 0.4.3.x-final
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_revision Jigsaw52 task High Tor: 0.4.3.x-final
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#29786 Path bias circuits can still have cells pending new defect Medium Tor: unspecified
#27192 Perform --verify-config before reloading tor reopened defect Medium Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#32490 Phase 1: Stop compiling "Listening for OR and Dir connections " in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#32489 Phase 1: Stop compiling "Responding to BEGIN cells" in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#32488 Phase 1: Stop compiling "Responding to CREATE and EXTEND cells" in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#32487 Phase 1: Stop compiling "acting as a directory cache" in --disable-module-relay new enhancement Medium Tor: 0.4.3.x-final
#29128 Place complete obfs4 bridge line in accessible location new defect Medium Tor: unspecified
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#31912 Port miscellaneous scripts to Python 3. new task Medium Tor: 0.4.3.x-final
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() new defect Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#30200 Potential circuit timeout issues on onion service circuits assigned dgoulet defect Medium Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#27491 Prefer IPv4 or IPv6 based on the number of failures assigned neel enhancement Medium Tor: unspecified
#24985 Preserve circuit-layer confidentiality against a quantum-capable adversary new project Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification assigned defect Low Tor: unspecified
#27908 PrivCount proof of concept with existing statistics new task Medium Tor: unspecified
#29265 PrivCount proof of concept: Re-implement the C code in Rust new enhancement Medium Tor: unspecified
#29268 PrivCount proof of concept: Use the subsystems API for PrivCount new enhancement Medium Tor: unspecified
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol assigned enhancement Low Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters assigned enhancement Low Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: unspecified
#29004 PrivCount proof of concept: implement check counters new enhancement Medium Tor: unspecified
#29005 PrivCount proof of concept: implement consumed bandwidth counters new enhancement Medium Tor: unspecified
#29007 PrivCount proof of concept: implement debugging for PrivCount assigned enhancement Low Tor: unspecified
#29027 PrivCount proof of concept: put the PrivCount statistics in a stats/ file assigned enhancement Medium Tor: unspecified
#29266 PrivCount proof of concept: round results to hide usage over time new enhancement Medium Tor: unspecified
#29009 PrivCount proof of concept: use blinding and Shamir secret sharing new enhancement Medium Tor: unspecified
#29271 PrivCount proof of concept: use pubsub for events that PrivCount cares about new enhancement Medium Tor: unspecified
#29010 PrivCount proof of concept: work out how to do CI for PrivCount using chutney new enhancement Medium Tor: unspecified
#26944 Privcount blinding and encryption: Add tests assigned defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible assigned defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 assigned defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies assigned defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#26970 Privcount: plan the modules and components assigned task Low Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#12572 Proposal for __OwningControllerTimeout option new enhancement Medium Tor: unspecified
#15729 Proposal: Hidden Service Revocation new Nathaniel enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#29317 Protect heartbeat logs using PrivCount new enhancement Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#32670 Provide and use higher resolution padding callback timers new enhancement Medium Tor: unspecified
#19552 Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response new defect Medium Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned enhancement Medium Tor: unspecified
#7509 Publish and use circuit success rates in extrainfo descriptors new enhancement Medium Tor: unspecified
#5685 Publish node best practices doc and scripts assigned task High Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#32620 Put man page options in smaller sections new task Medium Tor: 0.4.3.x-final
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#30417 Quicken CBT latency on updated/restarted nodes new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.