Custom Query (1890 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 1890)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#26691 add 'working DNS' to the list of mandatory requirements for the 'exit' flag new enhancement Medium Tor: unspecified
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#26737 File-level documentation for src/core/*/*.[ch] new defect Medium Tor: unspecified
#26738 File-level documentation for src/feature/*/*.[ch] new defect Medium Tor: unspecified
#26743 Further refactoring follow-on tasks: split files that don't fit well within their directory assigned defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26748 Make core/proto depend only on lib/*, and not used by core/mainloop new defect Medium Tor: unspecified
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#26754 stop using BUFFERS_PRIVATE needs_revision enhancement Medium Tor: unspecified
#26772 [warn] Introduction circuit established without a rend_intro_point_t object new defect Medium Tor: unspecified
#26778 Enable supporting multiple bridge authorities new defect Medium Tor: unspecified
#26780 Fix division by zero error reports from Coverity (CID: 1415721, 1415722, and 1415723) needs_information defect Medium Tor: unspecified
#26787 Core file left on travis hardened rust builld needs_information defect Very High Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26798 Write unit tests for reading measured bandwidths with non-NULL routerststuses new enhancement Medium Tor: unspecified
#26803 Add a bwfile test to tor's make test-network-all new enhancement Medium Tor: unspecified
#26805 Work out why Tor networks with all-zero bandwidths are unstable new defect Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen assigned defect High Tor: unspecified
#26886 prop295: revise proposal and determine feasability new task Medium Tor: unspecified
#26900 Reduce background compression thread priority new enhancement Low Tor: unspecified
#26904 Work out if we need to round scanner measured bandwidths to protect individual client usage new task Medium Tor: unspecified
#26905 Work out if we need to round observed relay bandwidths to protect individual client usage new task Medium Tor: unspecified
#26908 make it more clear that torrc files should not contain any bridges in their MyFamily lines reopened defect Medium Tor: unspecified
#26910 Could tor drop privileges even earlier? (before trying to access anything on the filesystem beyond its torrc files) new enhancement Medium Tor: unspecified
#26928 Taint untrusted link authentication keys new defect Medium Tor: unspecified
#26929 [suggestion] Warning "Skipping obsolete configuration option" should suggest what the replacement is new defect Medium Tor: unspecified
#26933 Minor memleak in HSv3 configuration needs_information defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies assigned defect Medium Tor: unspecified
#26944 Privcount blinding and encryption: Add tests assigned defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 assigned defect Medium Tor: unspecified
#26954 Appveyor: Add Rust builds on Windows new enhancement Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible assigned defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26970 Privcount: plan the modules and components assigned task Low Tor: unspecified
#26993 Tor silently ignores hidden directory when it isn't writable new defect Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#26999 tor_api: Some way to capture stdout/stderr new enhancement Medium Tor: unspecified
#27024 Tor is now TSR and no way to terminate it new defect Medium Tor: unspecified
#27047 Authorities should keep recent consensuses, votes, and bandwidth files new enhancement Medium Tor: unspecified
#27052 document rust/crypto new enhancement Medium Tor: unspecified
#27066 circuit_build_times_update_alpha(): Bug: Could not determine largest build time needs_information defect Medium Tor: unspecified
#27104 report intermediate status when building application circuits new enhancement Medium Tor: unspecified
#27130 rust dependency updating instructions don't work needs_review defect Medium Tor: 0.4.2.x-final
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#27161 Add make check-rustfmt to make check assigned enhancement Low Tor: unspecified
#27162 Travis: consider running CI on beta, nightly, and tor's lowest supported rust assigned enhancement Medium Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#27192 Perform --verify-config before reloading tor reopened defect Medium Tor: unspecified
#27194 Reject protover extra commas in protover needs_revision defect Medium Tor: unspecified
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#27201 rust/protover doesn't forbid version zero needs_information defect Medium Tor: unspecified
#27207 Examples in CodingStandardsRust.md are wrong new defect Medium Tor: unspecified
#27229 Create fuzzing harness to compare C/Rust Functionality new task Medium Tor: unspecified
#27241 Extract information from more kinds of wedged directory connections. needs_information enhancement Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#27245 Don't store (micro)descriptor text on the heap so much. assigned defect Medium Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#27284 Check IPv6 exit policies on microdescs assigned defect Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#27308 report bootstrap phase when we actually start, not just unblock something new enhancement Medium Tor: unspecified
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#27315 Sandbox regression in 0.3.4.7-rc needs_information defect Medium Tor: 0.3.5.x-final
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#27326 Replace packed_cell_t and supporting code with stuff generated by trunnel new enhancement Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27334 RelaxDirModeCheck on ControlSocket still requires group to m reopened defect Medium Tor: unspecified
#27353 intern project idea: a chutney or shadow framework for testing bootstrap speed/success new project Medium Tor: unspecified
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#27376 Travis: Actually use gcc on OS X new defect Medium Tor: unspecified
#27381 Bad consensus diffs on 0.3.4 and later [with chutney] assigned defect Medium Tor: unspecified
#27382 Bad valid-after time in 0.3.3 and 0.3.4 assigned defect Medium Tor: unspecified
#27414 Relays should check that their descriptors are UTF-8 before uploading them new enhancement Medium Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27448 router_have_consensus_path() logs an incorrect "no exits in consensus" assigned defect Medium Tor: unspecified
#27450 Test "make install" in Travis CI new enhancement Medium Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#27519 missing "Service configured in" for hs-v3 lines in info log new defect Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#27563 cached_dir_t for consensus is redundant with conscache code new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#27594 new warning: Requested exit point '<snip>' is not known. Closing. new defect Medium Tor: unspecified
#27615 Travis cache sticky failures new defect Medium Tor: unspecified
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines new enhancement Medium Tor: unspecified
#27661 use C99 bool from stdbool.h instead of int everywhere new defect Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#27679 Test dropped cell counting from command_process_relay_cell() new enhancement Medium Tor: unspecified
#27691 reset bootstrap progress when enough things change new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.