Custom Query (1968 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 1968)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26798 Write unit tests for reading measured bandwidths with non-NULL routerststuses new enhancement Medium Tor: unspecified
#26803 Add a bwfile test to tor's make test-network-all new enhancement Medium Tor: unspecified
#26805 Work out why Tor networks with all-zero bandwidths are unstable new defect Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen new defect High Tor: 0.4.3.x-final
#26886 prop295: revise proposal and determine feasability new task Medium Tor: unspecified
#26900 Reduce background compression thread priority new enhancement Low Tor: unspecified
#26904 Work out if we need to round scanner measured bandwidths to protect individual client usage new task Medium Tor: unspecified
#26905 Work out if we need to round observed relay bandwidths to protect individual client usage new task Medium Tor: unspecified
#26910 Could tor drop privileges even earlier? (before trying to access anything on the filesystem beyond its torrc files) new enhancement Medium Tor: unspecified
#26928 Taint untrusted link authentication keys new defect Medium Tor: unspecified
#26929 [suggestion] Warning "Skipping obsolete configuration option" should suggest what the replacement is new defect Medium Tor: unspecified
#26954 Appveyor: Add Rust builds on Windows new enhancement Medium Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells new defect Medium Tor: unspecified
#26993 Tor silently ignores hidden directory when it isn't writable new defect Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#26999 tor_api: Some way to capture stdout/stderr new enhancement Medium Tor: unspecified
#27024 Tor is now TSR and no way to terminate it new defect Medium Tor: unspecified
#27047 Authorities should keep recent consensuses, votes, and bandwidth files new enhancement Medium Tor: unspecified
#27052 document rust/crypto new enhancement Medium Tor: unspecified
#27104 report intermediate status when building application circuits new enhancement Medium Tor: unspecified
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#27207 Examples in CodingStandardsRust.md are wrong new defect Medium Tor: unspecified
#27229 Create fuzzing harness to compare C/Rust Functionality new task Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#27308 report bootstrap phase when we actually start, not just unblock something new enhancement Medium Tor: unspecified
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#27326 Replace packed_cell_t and supporting code with stuff generated by trunnel new enhancement Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27353 intern project idea: a chutney or shadow framework for testing bootstrap speed/success new project Medium Tor: unspecified
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#27376 Travis: Actually use gcc on OS X new defect Medium Tor: unspecified
#27414 Relays should check that their descriptors are UTF-8 before uploading them new enhancement Medium Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27450 Test "make install" in Travis CI new enhancement Medium Tor: unspecified
#27519 missing "Service configured in" for hs-v3 lines in info log new defect Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#27563 cached_dir_t for consensus is redundant with conscache code new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#27594 new warning: Requested exit point '<snip>' is not known. Closing. new defect Medium Tor: unspecified
#27615 Travis cache sticky failures new defect Medium Tor: unspecified
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines new enhancement Medium Tor: unspecified
#27661 use C99 bool from stdbool.h instead of int everywhere new defect Medium Tor: unspecified
#27679 Test dropped cell counting from command_process_relay_cell() new enhancement Medium Tor: unspecified
#27691 reset bootstrap progress when enough things change new enhancement Medium Tor: unspecified
#27694 what happens if we have both a firewall-bypass proxy and a pluggable transport? new project Medium Tor: unspecified
#27712 Introduce Finite State Machine abstraction into Tor codebase new enhancement Medium Tor: very long term
#27713 uncrustify config file to autofix C code whitespace and indentation new enhancement Medium Tor: unspecified
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges new defect Medium Tor: unspecified
#27725 Stealthy onions should appear to be offline new defect Medium Tor: unspecified
#27739 rust protover_all_supported() accepts too-long protocol names new defect Medium Tor: unspecified
#27785 updateRustDependencies.sh shouldn't use realpath new defect Medium Tor: unspecified
#27801 tor_api: CreateConnection() interface new enhancement Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: 0.4.2.x-final
#27805 Update CodingStandardsRust.md with allocate_and_copy_string() new defect Medium Tor: unspecified
#27811 Eventual inability to connect to a HS from a client that lists most countries in ExcludeNodes new defect Medium Tor: unspecified
#27816 Rendezvous failures could distinguish "unknown cookie" from "outdated cookie" new defect Medium Tor: unspecified
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#27858 enable zstd on linux CI new defect Medium Tor: unspecified
#27859 update travis CI to ubuntu xenial image when available new defect Medium Tor: unspecified
#27869 "netstatus" in core should not depend on "hibernate" in features new defect Medium Tor: unspecified
#27879 Remove pathbias code new task Medium Tor: unspecified
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27908 PrivCount proof of concept with existing statistics new task Medium Tor: unspecified
#27915 Make rust doctests get linked in same way as other rust tests new defect High Tor: unspecified
#27921 apparent DOS / impairment-of-service against FallbackDirs using DIR requests, please evaluate for possible mitigation new enhancement Medium Tor: unspecified
#27992 config DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDir new defect Low Tor: unspecified
#28014 Windows support for Travis CI new enhancement Medium Tor: unspecified
#28036 Launch tests inside a single dirauth instance new defect Medium Tor: unspecified
#28057 When randomly choosing IPv4 or IPv6, log better IPv6 preference info new enhancement Medium Tor: unspecified
#28067 Annotations should be documented in dir-spec.txt new enhancement Medium Tor: unspecified
#28079 Stop returning the empty string when the cstr! macro fails new enhancement Medium Tor: unspecified
#28081 rust protover discards all votes if one is not UTF-8 new defect Medium Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#28095 dirauth key pinning can be bypassed sometimes? new defect Medium Tor: unspecified
#28097 Get the actual Windows version from Kernel32.dll new defect Medium Tor: unspecified
#28186 HS v3 suggestion as to how to generate a secure service client authentication key pair new enhancement Medium Tor: unspecified
#28190 Hidden service v2 exceeded launch limit with 11 intro points in the last 37 seconds new defect Medium Tor: unspecified
#28220 Create a chutney network with a single authority, and make sure it bootstraps new enhancement Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#28244 Followup tasks for Rust asan CI fixes new defect High Tor: unspecified
#28246 Use rust stable in Travis new defect Medium Tor: unspecified
#28250 "___UsingTestNetworkDefaults" not in "GETINFO config/names" new enhancement Medium Tor: unspecified
#28256 Add tests for UTF-8 encoded torrcs on Windows new defect Medium Tor: unspecified
#28279 control: Add a key to GETINFO to fetch the circuit onion handshake rephist values new enhancement Low Tor: unspecified
#28280 control: Add a key to GETINFO to get the DoS subsystem stats new enhancement Low Tor: unspecified
#28307 DisableNetwork is set new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.