Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 2070)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#18757 Memunit config defaults say "KB" rather than "KBytes" needs_revision defect Medium Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config new enhancement High Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#29213 Minimize the boundary between src/core and src/{feature,app} new enhancement Medium Tor: unspecified
#33104 Minor issues when handling ACTIVE control signal merge_ready nickm defect Medium Tor: 0.4.2.x-final
#26933 Minor memleak in HSv3 configuration needs_information defect Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#14999 Most/all esc_for_log instances in control.c should change. new defect Medium Tor: unspecified
#32809 Move AuthDir* policy entries into feature/dirauth new defect Medium Tor: unspecified
#32813 Move V3BandwidthsFile into feature/dirauth module new defect Medium Tor: unspecified
#32815 Move all directory authority options into the dirauth man page section new task Medium Tor: 0.4.4.x-final
#32812 Move authority-mode options into dirauth module new defect Medium Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#32816 Move the relay options into the correct man page sections new defect Medium Tor: 0.4.4.x-final
#32810 Move timing-related authority options into dirauth module new defect Medium Tor: unspecified
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#7126 Multipath consensus integrity verification new enhancement Medium Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. new enhancement Medium Tor: unspecified
#6289 Multiple Socks Server support in Tor Client new enhancement Low Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#5565 MyFamily should provide an alternate non-idhex subscription mechanism reopened enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#25173 No Control Socket when DisableNetwork and User options are set new defect Medium Tor: unspecified
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#11059 Nodes' country codes should be "definite" and "possible" new enhancement Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time needs_information defect Medium Tor: unspecified
#33048 O1.1 - Propose and implement IPv6 ORPort reachability checks on relays new project Medium
#33049 O1.2 - Make relays figure out their own IPv6 address new project Medium
#33051 O1.4 - Measure the number of Tor relays that support IPv6 reachability checks new project Medium
#33052 O1.5 - Measure the number of connections, and consumed bandwidth, using IPv4 and IPv6 new project Medium
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#21044 ORPort self reachability test happens also when it shouldn't new defect Medium Tor: unspecified
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: 0.4.5.x-final
#5304 Obfsproxy should respect OutboundBindAddress in torrc needs_review defect Medium Tor: 0.4.4.x-final
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#32165 On first boot, Tor mistakenly tells me "The current consensus has no exit nodes" needs_revision ahf defect Medium Tor: 0.4.4.x-final
#28593 On macOS/iOS, experiment with SystemConfiguration.framework to get a list of network interfaces new enhancement Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage new defect Medium Tor: unspecified
#7117 One of our code-checking tools should make sure that we don't add more reserved identifiers new enhancement Low Tor: unspecified
#28968 Onion Service v2 connection status update event new enhancement Medium Tor: unspecified
#28969 Onion Service v3 connection status update event new enhancement Medium Tor: unspecified
#29174 Onion service can do self-reachability tests to detect overwhelmed guards new defect Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#30926 OnionPerf requests to onion service fail close towards completion with TGEN/READ error needs_information defect Medium Tor: unspecified
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits new enhancement Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated new defect Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: unspecified
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#9323 Option to start as a bridge by default, but change to relay if bw is super-high. new chiiph enhancement Medium Tor: unspecified
#28760 Option/* format for ControlPort options needs to be homogeneous new defect Medium Tor: unspecified
#33542 Orbot not working after the update. new defect Very High
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.4.x-final
#29112 PTs should pass user count events back to Tor new enhancement Medium Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#31653 Padding cells sent with 0ms delay cause circuit failures assigned mikeperry defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads new defect Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_review Jigsaw52 task High Tor: 0.4.4.x-final
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#29786 Path bias circuits can still have cells pending new defect Medium Tor: unspecified
#27192 Perform --verify-config before reloading tor reopened defect Medium Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#32490 Phase 1: Stop compiling "Listening for OR and Dir connections " in --disable-module-relay new enhancement Medium Tor: unspecified
#32489 Phase 1: Stop compiling "Responding to BEGIN cells" in --disable-module-relay new enhancement Medium Tor: unspecified
#32488 Phase 1: Stop compiling "Responding to CREATE and EXTEND cells" in --disable-module-relay new enhancement Medium Tor: unspecified
#29128 Place complete obfs4 bridge line in accessible location new enhancement Medium Tor: 0.4.5.x-final
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#31912 Port miscellaneous scripts to Python 3. new task Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() needs_revision neel defect Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#32814 Possibly, move V3AuthUseLegacyKey into dirauth module new defect Medium Tor: unspecified
#33409 Pre-commit hook does not stash unstaged changes before running code style checkers new defect Medium
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.