Custom Query (2110 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 2110)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Ticket Summary Status Owner Type Priority Milestone
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#31912 Port miscellaneous scripts to Python 3. new task Medium Tor: 0.4.4.x-final
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() needs_revision neel defect Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#32814 Possibly, move V3AuthUseLegacyKey into dirauth module new defect Medium Tor: 0.4.4.x-final
#33409 Pre-commit hook does not stash unstaged changes before running code style checkers new defect Medium
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#12377 Prefer default route when checking local interface addresses needs_revision defect Medium Tor: unspecified
#24985 Preserve circuit-layer confidentiality against a quantum-capable adversary new project Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification new defect Low Tor: unspecified
#27908 PrivCount proof of concept with existing statistics new task Medium Tor: unspecified
#29265 PrivCount proof of concept: Re-implement the C code in Rust new enhancement Medium Tor: unspecified
#29268 PrivCount proof of concept: Use the subsystems API for PrivCount new enhancement Medium Tor: unspecified
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol new enhancement Low Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters new enhancement Low Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: unspecified
#29004 PrivCount proof of concept: implement check counters new enhancement Medium Tor: unspecified
#29005 PrivCount proof of concept: implement consumed bandwidth counters new enhancement Medium Tor: unspecified
#29007 PrivCount proof of concept: implement debugging for PrivCount new enhancement Low Tor: unspecified
#29027 PrivCount proof of concept: put the PrivCount statistics in a stats/ file new enhancement Medium Tor: unspecified
#29266 PrivCount proof of concept: round results to hide usage over time new enhancement Medium Tor: unspecified
#29009 PrivCount proof of concept: use blinding and Shamir secret sharing new enhancement Medium Tor: unspecified
#29271 PrivCount proof of concept: use pubsub for events that PrivCount cares about new enhancement Medium Tor: unspecified
#29010 PrivCount proof of concept: work out how to do CI for PrivCount using chutney new enhancement Medium Tor: unspecified
#26944 Privcount blinding and encryption: Add tests new defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible new defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 new defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies new defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#26970 Privcount: plan the modules and components new task Low Tor: unspecified
#33043 Prop 306: Keep bridge IPv6 behaviour in sync with client behaviour new task Medium Tor: 0.4.4.x-final
#33220 Prop 311: 3. Allow Relay IPv6 Extends assigned teor enhancement Medium Tor: 0.4.4.x-final
#33221 Prop 311: 4. Ensure Relay and Bridge IPv6 ORPorts are Reachable assigned teor task Medium Tor: 0.4.4.x-final
#33222 Prop 311: 4.2. Implement IPv6 ORPort Reachability Self-Tests needs_review teor enhancement Medium Tor: 0.4.4.x-final
#33223 Prop 311: 4.3.1. Don't Publish Descriptor if IPv6 ORPort is Unreachable assigned enhancement Medium Tor: 0.4.4.x-final
#33224 Prop 311: 4.3.2. Add AssumeReachableIPv6 Option and Consensus Parameter assigned enhancement Medium Tor: 0.4.4.x-final
#33225 Prop 311: 4.4.1. Extend IPv6 From All Supported Second-Last Hops new enhancement Medium Tor: 0.4.4.x-final
#33234 Prop 312: 3.2.1. Make the Address torrc Option Resolve IPv6 Hostnames assigned enhancement Medium Tor: 0.4.4.x-final
#33233 Prop 312: 3.2.1. Make the Address torrc Option Support IPv6 Literals assigned enhancement Medium Tor: 0.4.4.x-final
#33235 Prop 312: 3.2.1. Test Address torrc Option Configurations assigned task Medium Tor: 0.4.4.x-final
#33237 Prop 312: 3.2.2. Stop Directory Authorities Resolving *Port Hostnames new defect Medium Tor: 0.4.4.x-final
#33236 Prop 312: 3.2.2. Use Advertised ORPort IPv4 Address in Descriptors assigned enhancement Medium Tor: 0.4.4.x-final
#33239 Prop 312: 3.2.3 Limit Directory Authority Addresses to Address and ORPort assigned enhancement Medium Tor: 0.4.4.x-final
#33238 Prop 312: 3.2.3. Use Local Interface IPv6 Address assigned enhancement Medium Tor: 0.4.4.x-final
#33240 Prop 312: 3.2.4. Use Own Hostname IPv6 Addresses assigned enhancement Medium Tor: 0.4.4.x-final
#33243 Prop 312: 3.2.5. Handle IPv6 Directory Fetch Failures assigned defect Medium Tor: 0.4.4.x-final
#33242 Prop 312: 3.2.5. Make Relays do IPv4 and IPv6 Directory Fetches assigned defect Medium Tor: 0.4.4.x-final
#33241 Prop 312: 3.2.5. Use Directory Header IPv6 Addresses assigned task Medium Tor: 0.4.4.x-final
#33244 Prop 312: 3.2.5. Use IPv6 Addresses from Directory Servers assigned enhancement Medium Tor: 0.4.4.x-final
#33245 Prop 312: 3.2.6. Add an AddressDisableIPv6 torrc option assigned enhancement Medium Tor: 0.4.4.x-final
#33246 Prop 312: 3.2.7. Automatically Enable an IPv6 ORPort assigned enhancement Medium Tor: 0.4.4.x-final
#33247 Prop 312: 3.2.7. Publish IPv4 Descriptor on Guessed IPv6 Reachability Failure assigned enhancement Medium Tor: 0.4.4.x-final
#33248 Prop 312: 3.5.5. Detailed Address Resolution Logs new enhancement Medium Tor: 0.4.4.x-final
#33249 Prop 312: 4. Update Directory Spec for IPv6 X-Your-Address-Is assigned enhancement Medium Tor: 0.4.4.x-final
#33253 Prop 312: 5.1. Ask Relay Operators to Test IPv6 Addresses Discovery assigned task Medium Tor: 0.4.4.x-final
#33252 Prop 312: 5.1. Test Relay IPv6 Addresses Discovery on the Tor Network assigned task Medium Tor: 0.4.4.x-final
#33262 Prop 313: 3. Write a Script that Counts IPv6 Relays in the Consensus assigned enhancement Medium Tor: 0.4.4.x-final
#33263 Prop 313: 4. Collect IPv6 Bandwidth Stats on Relays and Bridges assigned enhancement Medium Tor: 0.4.4.x-final
#33264 Prop 313: 5. Collect IPv6 Connection Stats on Relays assigned enhancement Medium Tor: 0.4.4.x-final
#33265 Prop 313: 6. Update Directory Spec for IPv6 Stats assigned task Medium Tor: 0.4.4.x-final
#33270 Prop 313: 8.1. Monitor IPv6 Relay Counts in the Consensus assigned task Medium Tor: 0.4.4.x-final
#33268 Prop 313: 8.1. Test IPv6 Relay Consensus Counts on the Tor Network assigned task Medium Tor: 0.4.4.x-final
#33272 Prop 313: 8.2. Test IPv6 Stats on the Tor Network assigned task Medium Tor: 0.4.4.x-final
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus new enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#32088 Proposal 310 - choose guards in sampled order needs_revision enhancement High Tor: 0.4.4.x-final
#12572 Proposal for __OwningControllerTimeout option new enhancement Medium Tor: unspecified
#15729 Proposal: Hidden Service Revocation new Nathaniel enhancement Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays new task Medium Tor: 0.4.4.x-final
#29317 Protect heartbeat logs using PrivCount new enhancement Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#32670 Provide and use higher resolution padding callback timers new enhancement Medium Tor: unspecified
#19552 Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response new defect Medium Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. new enhancement Medium Tor: unspecified
#7509 Publish and use circuit success rates in extrainfo descriptors new enhancement Medium Tor: unspecified
#5685 Publish node best practices doc and scripts new task High Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#34167 PublishServerDescriptor via IPv6 new enhancement Medium Tor: unspecified
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells new enhancement Medium Tor: unspecified
#32863 Put an up-to-date web version of the Tor manual somewhere new defect Medium Tor: 0.4.5.x-final
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#30417 Quicken CBT latency on updated/restarted nodes new enhancement Medium Tor: unspecified
#29432 QuotedString and CString in control-spec.txt technically require escaping ascii 32 (space) new defect Medium Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#30474 RFC: Tor should warn about expiring keys much earlier (and leass annoying) new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Note: See TracQuery for help on using queries.