Custom Query (1891 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 1891)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17953 Fallback to resolving localhost when interface searches fail new defect Medium Tor: unspecified
#17956 Let tor handle disconnects better new defect Medium Tor: unspecified
#17957 Detect stolen onion service key new enhancement Medium Tor: unspecified
#17971 Unrecognized relay in exit address '[scrubbed].exit'. Refusing. new defect Low Tor: unspecified
#17990 torrc default config ORPort should be changed to 443 from 9001 new defect Medium Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#18020 RFE: Introduce privsep to secure OS and hidden service keys new enhancement Medium Tor: very long term
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18134 tor issues missleading permission warning when torrc overrides User config directive of default torrc new defect Low Tor: unspecified
#18142 Anti-Automated-Scanning: Support "marking" with iptables TCP connections differently "for each circuits" new enhancement Low Tor: unspecified
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#18157 Which hidden services am I running? new enhancement Medium Tor: unspecified
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags new defect High Tor: unspecified
#18263 GETCONF provides incorrect value when undefined new defect Medium Tor: unspecified
#18268 Make Tor aware of the top-30 destinations of Tor Exit traffic new enhancement Medium Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18294 systemd AppArmorProfile= directive unavailable leads to not loading AppArmor profile on Debian jessie new defect Medium Tor: unspecified
#18298 reduce warn loglevel entry for missing ed25519_master_id_public_key to notice loglevel new enhancement Low Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18323 Add support for HTTP/1.1 for Transfer-Encoding: chunked new enhancement Low Tor: unspecified
#18356 obfs4proxy cannot bind to <1024 port with systemd hardened service unit new asn defect Low Tor: unspecified
#18360 option not to use mman-win32 new enhancement Low Tor: unspecified
#18451 log msg is printed twice after 5 sec new defect Medium Tor: unspecified
#18457 continues to start on unix socket open errors new defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#18509 Summarize our crypto migration plans in one place new enhancement Medium Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#18580 exit relay fails with 'unbound' DNS resolver when lots of requests time-out new defect Medium Tor: unspecified
#18608 Limiting ADD_ONION TARGET access. new defect Medium Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#18665 Make test_util_time pieces pass on windows new defect Medium Tor: unspecified
#18674 Tor rejects [::]/8 and [::]/127 explicitly, but the latter is sometimes eliminated new defect Low Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19068 Write and run a clique reachability test. new task Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19179 Refactor functions that handle 'packages' in consensus/votes new defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. new enhancement Medium Tor: unspecified
#19333 Make node-selection functions testable and tested new defect Medium Tor: unspecified
#19377 Consider retry/backoff behavior when building new circuits new task Medium Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#19507 tor and tor-gencert disagree on what a month is new defect Medium Tor: unspecified
#19518 Configure argument --without-tcmalloc causes linking with libtcmalloc library new defect Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#19535 A can't-happen case for one-hop circuits actually can happen new defect Medium Tor: unspecified
#19552 Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response new defect Medium Tor: unspecified
#19560 running tor trying to access its ed25519_signing_secret_key, log message too loud new defect Medium Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#19572 set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie new defect Medium Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19669 `log_prefix_` maybe getting weird output from strftime new defect Low Tor: unspecified
#19759 systemd tor.service hardening: add MemoryDenyWriteExecute=true new enhancement Medium Tor: unspecified
#19761 Tor systemd service should have RuntimeDirectory=tor new defect Medium Tor: unspecified
#19762 Tor systemd service should have ReadWriteDirectories=/var/run/tor new defect Medium Tor: unspecified
#19777 tor-gencert should warn nicely when PEM passphrases are too short new defect Very Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.