Custom Query (1972 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 1972)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#17665 Drop scheduler config options new defect Very Low Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17740 Unit Tests for Recent Consensuses new enhancement Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#17793 Inconsistent function comment cache_failure_intro_lookup new defect Very Low Tor: unspecified
#17800 Tor Unit Tests should TT_FORK before initialising global PRNG state new defect Low Tor: unspecified
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: unspecified
#17807 Use OpenSSL 1.1.0 ASYNC engine support new enhancement Medium Tor: unspecified
#17811 Tor Clients on IPv6 new task High Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#17848 Tor ignores tunneled connections when checking existing directory downloads new defect Medium Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17881 Use return codes from test programs to simplify test scripts new enhancement Low Tor: unspecified
#17901 Tor would bind ControlPort to public ip address if it has no localhost interface new defect High Tor: unspecified
#17911 check Tor for local clock leaks new task Medium Tor: unspecified
#17927 Use SRWLock for non-recursive locks on vista and later new enhancement Medium Tor: unspecified
#17928 Warnings in syslog for wrong permissions on hidden service dir are misleading new enhancement Very Low Tor: unspecified
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17953 Fallback to resolving localhost when interface searches fail new defect Medium Tor: unspecified
#17956 Let tor handle disconnects better new defect Medium Tor: unspecified
#17957 Detect stolen onion service key new enhancement Medium Tor: unspecified
#17971 Unrecognized relay in exit address '[scrubbed].exit'. Refusing. new defect Low Tor: unspecified
#17990 torrc default config ORPort should be changed to 443 from 9001 new defect Medium Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#18020 RFE: Introduce privsep to secure OS and hidden service keys new enhancement Medium Tor: very long term
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18134 tor issues missleading permission warning when torrc overrides User config directive of default torrc new defect Low Tor: unspecified
#18142 Anti-Automated-Scanning: Support "marking" with iptables TCP connections differently "for each circuits" new enhancement Low Tor: unspecified
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#18157 Which hidden services am I running? new enhancement Medium Tor: unspecified
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags new defect High Tor: unspecified
#18263 GETCONF provides incorrect value when undefined new defect Medium Tor: unspecified
#18268 Make Tor aware of the top-30 destinations of Tor Exit traffic new enhancement Medium Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18294 systemd AppArmorProfile= directive unavailable leads to not loading AppArmor profile on Debian jessie new defect Medium Tor: unspecified
#18298 reduce warn loglevel entry for missing ed25519_master_id_public_key to notice loglevel new enhancement Low Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18323 Add support for HTTP/1.1 for Transfer-Encoding: chunked new enhancement Low Tor: unspecified
#18356 obfs4proxy cannot bind to <1024 port with systemd hardened service unit new asn defect Low Tor: unspecified
#18360 option not to use mman-win32 new enhancement Low Tor: unspecified
#18451 log msg is printed twice after 5 sec new defect Medium Tor: unspecified
#18457 continues to start on unix socket open errors new defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#18509 Summarize our crypto migration plans in one place new enhancement Medium Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#18580 exit relay fails with 'unbound' DNS resolver when lots of requests time-out new defect Medium Tor: unspecified
#18608 Limiting ADD_ONION TARGET access. new defect Medium Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#18665 Make test_util_time pieces pass on windows new defect Medium Tor: unspecified
#18674 Tor rejects [::]/8 and [::]/127 explicitly, but the latter is sometimes eliminated new defect Low Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19068 Write and run a clique reachability test. new task Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19179 Refactor functions that handle 'packages' in consensus/votes new defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. new enhancement Medium Tor: 0.4.3.x-final
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.