Custom Query (1899 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (901 - 1000 of 1899)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#31477 Practracker integration tsts for headers and includes assigned nickm defect Medium Tor: 0.4.2.x-final
#31476 Practracker: document new features needs_review nickm task Medium Tor: 0.4.2.x-final
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#27491 Prefer IPv4 or IPv6 based on the number of failures assigned neel enhancement Medium Tor: unspecified
#24985 Preserve circuit-layer confidentiality against a quantum-capable adversary new project Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#31373 Print summary of features at end of configure needs_revision dgoulet enhancement Medium Tor: 0.4.2.x-final
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification assigned defect Low Tor: unspecified
#27908 PrivCount proof of concept with existing statistics assigned task Medium Tor: 0.4.2.x-final
#29265 PrivCount proof of concept: Re-implement the C code in Rust new enhancement Medium Tor: 0.4.2.x-final
#29268 PrivCount proof of concept: Use the subsystems API for PrivCount new enhancement Medium Tor: 0.4.2.x-final
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol assigned enhancement Low Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters assigned enhancement Low Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: 0.4.2.x-final
#29004 PrivCount proof of concept: implement check counters assigned enhancement Medium Tor: 0.4.2.x-final
#29005 PrivCount proof of concept: implement consumed bandwidth counters assigned enhancement Medium Tor: 0.4.2.x-final
#29007 PrivCount proof of concept: implement debugging for PrivCount assigned enhancement Low Tor: unspecified
#29027 PrivCount proof of concept: put the PrivCount statistics in a stats/ file assigned enhancement Medium Tor: unspecified
#29266 PrivCount proof of concept: round results to hide usage over time new defect Medium Tor: 0.4.2.x-final
#29009 PrivCount proof of concept: use blinding and Shamir secret sharing new enhancement Medium Tor: 0.4.2.x-final
#29271 PrivCount proof of concept: use pubsub for events that PrivCount cares about new enhancement Medium Tor: 0.4.2.x-final
#29010 PrivCount proof of concept: work out how to do CI for PrivCount using chutney assigned enhancement Medium Tor: 0.4.2.x-final
#26944 Privcount blinding and encryption: Add tests assigned defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible assigned defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 assigned defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies assigned defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#26970 Privcount: plan the modules and components assigned task Low Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#12572 Proposal for __OwningControllerTimeout option new enhancement Medium Tor: unspecified
#15729 Proposal: Hidden Service Revocation new Nathaniel enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#29317 Protect heartbeat logs using PrivCount new enhancement Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#30381 Provide control port commands to ADD/REMOVE/VIEW v3 client-auth needs_revision asn defect Medium Tor: 0.4.2.x-final
#30382 Provide control port event for when we are missing v3 client auth for an onion needs_revision dgoulet defect Medium Tor: 0.4.2.x-final
#19552 Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response new defect Medium Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned enhancement Medium Tor: unspecified
#7509 Publish and use circuit success rates in extrainfo descriptors new enhancement Medium Tor: unspecified
#5685 Publish node best practices doc and scripts assigned task High Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#30417 Quicken CBT latency on updated/restarted nodes new enhancement Medium Tor: unspecified
#29432 QuotedString and CString in control-spec.txt technically require escaping ascii 32 (space) new defect Medium Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#30474 RFC: Tor should warn about expiring keys much earlier (and leass annoying) new enhancement Medium Tor: unspecified
#11325 RFE: Adhere to XDB base directory specification new defect Low Tor: unspecified
#18020 RFE: Introduce privsep to secure OS and hidden service keys new enhancement Medium Tor: very long term
#21974 Race: Tor declares controlport listener open before it has written its controlcookie to disk new defect Medium Tor: unspecified
#24269 Raise a FATAL error if the user tried to combine v2 and prop224 hidden service in same directory new task Medium Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#31442 Raise rustc minimum version needs_review Sebastian defect Medium Tor: 0.4.2.x-final
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#29777 Rate-limit "Problem bootstrapping" warnings to one every 5 seconds new defect Medium Tor: unspecified
#26369 Re-fetch onion service descriptor for isolated request new defect Medium Tor: unspecified
#11462 Re-promote "We stalled too much while trying to write" warning if it happens too much new enhancement Medium Tor: unspecified
#7729 Reading pending TLS bytes can take us over at_most needs_revision defect Medium Tor: unspecified
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#24737 Recommend a MaxMemInQueues value in the Tor man page new defect Medium Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#22233 Reconsider behavior on .z URLs with Accept-Encoding header accepted Hello71 defect Medium Tor: unspecified
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#7077 Recover from junk in cached-descriptors new defect Medium Tor: unspecified
#15883 Redesign/Rewrite the BridgeAuthority new enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#26900 Reduce background compression thread priority new enhancement Low Tor: unspecified
#21814 Reduce binary size for client-only tor new task Medium Tor: unspecified
#25500 Reduce client CPU usage when idle assigned task Medium Tor: unspecified
#18402 Reduce duplicate code in parse_*_time functions needs_revision enhancement Low Tor: unspecified
#24453 Reduce log spam when child process creation failed new defect Medium Tor: unspecified
#29209 Reduce visibility of more data type internals new task Medium Tor: 0.4.2.x-final
#31463 Redundant build exclusion not working corrently on travis merge_ready defect Medium Tor: 0.4.0.x-final
#28982 Refactor GETINFO dir/ so that new tor/ URLs automatically become GETINFOs accepted rl1987 enhancement Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#21975 Refactor all the startup stuff in config.c, with dependencies in mind new task Medium Tor: unspecified
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#26296 Refactor cell crypto to pre/post crypto operations assigned chelseakomlo enhancement Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used assigned task High Tor: unspecified
#7660 Refactor circuit cannibalization into one place new enhancement Medium Tor: unspecified
#20554 Refactor circuit_expire_building new enhancement Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#31241 Refactor config validation assigned nickm task Medium Tor: 0.4.2.x-final
#21910 Refactor connection_edge_process_relay_cell() new enhancement Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.