#25607 |
On restart-in-process, do the right thing with thread-local storage
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#7117 |
One of our code-checking tools should make sure that we don't add more reserved identifiers
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#28968 |
Onion Service v2 connection status update event
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28969 |
Onion Service v3 connection status update event
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29174 |
Onion service can do self-reachability tests to detect overwhelmed guards
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25308 |
Onion service node pinning by default
|
reopened
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25883 |
Onion services do not provide stream events to control port
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#30926 |
OnionPerf requests to onion service fail close towards completion with TGEN/READ error
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#16785 |
Only build/use ed25519-donna.
|
new
|
yawning
|
enhancement
|
Medium
|
Tor: unspecified
|
#25899 |
Only run retry_dns() and check_dns_honesty() on exits
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28514 |
Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27802 |
OpenSSL 1.1.0 issue during static link
|
new
|
|
defect
|
Medium
|
Tor: 0.4.2.x-final
|
#29494 |
Optimize interaction between circuitmux and circuitpadding
|
needs_revision
|
mikeperry
|
enhancement
|
High
|
Tor: unspecified
|
#30291 |
Optimize our path selection code
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#15991 |
Option to skip authorization verification in INTRODUCE2 cell
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#9323 |
Option to start as a bridge by default, but change to relay if bw is super-high.
|
new
|
chiiph
|
enhancement
|
Medium
|
Tor: unspecified
|
#28760 |
Option/* format for ControlPort options needs to be homogeneous
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#9188 |
Our weighting algorithms probably behave strangely when guards are disabled
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#2077 |
Overwriting files can fail on Windows
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#6761 |
PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#21508 |
POSIX and Windows may interpret directory document whitespace differently
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29136 |
PT_LOG and PT_STATUS event fields unspecifed
|
needs_revision
|
atagar
|
defect
|
High
|
Tor: 0.4.0.x-final
|
#29112 |
PTs should pass user count events back to Tor
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#17275 |
Package directory authority scripts for debian in compliant packages
|
new
|
|
task
|
High
|
Tor: unspecified
|
#31653 |
Padding cells sent with 0ms delay cause circuit failures
|
assigned
|
mikeperry
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#22948 |
Padding, Keepalive and Drop cells should have random payloads
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#27327 |
Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#26688 |
Parse ed25519 IDs in the authority and fallback lists
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#25140 |
Parse only .torrc files in torrc.d directory
|
needs_revision
|
Jigsaw52
|
task
|
High
|
Tor: 0.4.3.x-final
|
#22495 |
Partial write in key-pinning-journal results in corrupted line
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#29786 |
Path bias circuits can still have cells pending
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27192 |
Perform --verify-config before reloading tor
|
reopened
|
|
defect
|
Medium
|
Tor: unspecified
|
#26105 |
Perhaps, make test coverage deterministic _within_ lines
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#32490 |
Phase 1: Stop compiling "Listening for OR and Dir connections " in --disable-module-relay
|
new
|
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#32489 |
Phase 1: Stop compiling "Responding to BEGIN cells" in --disable-module-relay
|
new
|
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#32488 |
Phase 1: Stop compiling "Responding to CREATE and EXTEND cells" in --disable-module-relay
|
new
|
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#32487 |
Phase 1: Stop compiling "acting as a directory cache" in --disable-module-relay
|
new
|
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#29128 |
Place complete obfs4 bridge line in accessible location
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#13461 |
Point to Tor.framework in contrib, for iOS and macOS
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#27435 |
Poland, PLAY operator and OBFS4
|
new
|
dcf
|
defect
|
High
|
Tor: unspecified
|
#25786 |
Policies for HTTPTunnelPort
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#31912 |
Port miscellaneous scripts to Python 3.
|
new
|
|
task
|
Medium
|
Tor: 0.4.3.x-final
|
#21810 |
Port rebind should not be performed after soft accounting limit reached
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#26366 |
Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect()
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28229 |
Possible race condition opening SOCKS Port in test_rebind.py
|
new
|
rl1987
|
defect
|
Medium
|
Tor: unspecified
|
#21422 |
Possibly, learn more network data from GUARD_USABLE_NEVER circuits?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#30200 |
Potential circuit timeout issues on onion service circuits
|
assigned
|
dgoulet
|
defect
|
Medium
|
Tor: unspecified
|
#9664 |
Precompute ephemeral keypairs for ntor
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#21339 |
Prefer Chacha on servers that lack AES hardware support?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27491 |
Prefer IPv4 or IPv6 based on the number of failures
|
assigned
|
neel
|
enhancement
|
Medium
|
Tor: unspecified
|
#24985 |
Preserve circuit-layer confidentiality against a quantum-capable adversary
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#20191 |
Prevent a recurrence of #20103
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27907 |
PrivCount config and version spec
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#27906 |
PrivCount noise specification
|
assigned
|
|
defect
|
Low
|
Tor: unspecified
|
#27908 |
PrivCount proof of concept with existing statistics
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#29265 |
PrivCount proof of concept: Re-implement the C code in Rust
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29268 |
PrivCount proof of concept: Use the subsystems API for PrivCount
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29008 |
PrivCount proof of concept: add a PrivCount module, torrc option, and protocol
|
assigned
|
|
enhancement
|
Low
|
Tor: unspecified
|
#29006 |
PrivCount proof of concept: add noise to counters
|
assigned
|
|
enhancement
|
Low
|
Tor: unspecified
|
#29129 |
PrivCount proof of concept: decide if we want to remove bandwidth statistics
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29004 |
PrivCount proof of concept: implement check counters
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29005 |
PrivCount proof of concept: implement consumed bandwidth counters
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29007 |
PrivCount proof of concept: implement debugging for PrivCount
|
assigned
|
|
enhancement
|
Low
|
Tor: unspecified
|
#29027 |
PrivCount proof of concept: put the PrivCount statistics in a stats/ file
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29266 |
PrivCount proof of concept: round results to hide usage over time
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29009 |
PrivCount proof of concept: use blinding and Shamir secret sharing
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29271 |
PrivCount proof of concept: use pubsub for events that PrivCount cares about
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29010 |
PrivCount proof of concept: work out how to do CI for PrivCount using chutney
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#26944 |
Privcount blinding and encryption: Add tests
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#26957 |
Privcount blinding and encryption: Derive copy and debug where possible
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#26945 |
Privcount blinding and encryption: always enable i128
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#26941 |
Privcount blinding and encryption: review dependencies
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#26958 |
Privcount blinding and encryption: run clippy on travis rust nightly
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#26637 |
Privcount noise generation implemented and deployed
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25669 |
Privcount: blinding and encryption should be finished up
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#26970 |
Privcount: plan the modules and components
|
assigned
|
|
task
|
Low
|
Tor: unspecified
|
#25652 |
Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly.
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#21642 |
Prop275: Eliminate "published" times from microdescriptor consensus
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#21659 |
Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#12572 |
Proposal for __OwningControllerTimeout option
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#15729 |
Proposal: Hidden Service Revocation
|
new
|
Nathaniel
|
enhancement
|
Medium
|
Tor: unspecified
|
#24404 |
Propose a relay protover that allows IPv6 extends
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24403 |
Propose and implement IPv6 ORPort reachability checks on relays
|
assigned
|
|
task
|
Medium
|
Tor: unspecified
|
#29317 |
Protect heartbeat logs using PrivCount
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24594 |
Protocol warning: Expiring stuck OR connection to fd...
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#10218 |
Provide "users-per-transport-per-country" statistics for obfsbridges
|
assigned
|
joelanders
|
enhancement
|
Medium
|
Tor: unspecified
|
#32670 |
Provide and use higher resolution padding callback timers
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19552 |
Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#17038 |
Provide scripts to set up transparent proxying, where supported
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#23980 |
Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes.
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#7509 |
Publish and use circuit success rates in extrainfo descriptors
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#5685 |
Publish node best practices doc and scripts
|
assigned
|
|
task
|
High
|
Tor: unspecified
|
#2282 |
Publish router descriptors rejected by the authorities or omitted from the consensus
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#7961 |
Publish transports that bind on IPv6 addresses
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#26636 |
Published final draft of proposal 295 [ADL-GCM for relay cryptography]
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#23869 |
Pull in control port parser test cases from Zcash
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24451 |
Put IPv6 link specifiers in client EXTEND cells
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#32620 |
Put man page options in smaller sections
|
new
|
|
task
|
Medium
|
Tor: 0.4.3.x-final
|
#1102 |
Queuing v3 signature for next consensus, an hour later?
|
needs_information
|
|
defect
|
Low
|
Tor: unspecified
|
#30417 |
Quicken CBT latency on updated/restarted nodes
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|