Custom Query (1959 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 1959)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#31757 test_parseconf.sh: apparently not reliable on Appveyor assigned ahf defect High Tor: 0.4.2.x-final
#31812 http URL's in docs/comments should be https needs_revision defect Medium Tor: 0.4.2.x-final
#31829 In 0.4.3, drop support for Python 2 new defect Medium Tor: 0.4.3.x-final
#31832 Coverage flapping in hs_get_responsible_hsdirs() new defect Low Tor: unspecified
#31837 Make test_rebind.py more robust needs_revision teor defect Medium Tor: 0.4.2.x-final
#31850 Integrate tor-guts Makefile into tor's build process new defect Medium Tor: 0.4.3.x-final
#31852 Rename doc/HACKING/design members to reflect current architectural division assigned nickm defect Medium Tor: 0.4.3.x-final
#31882 move Android build config into core tor needs_review defect Medium Tor: 0.4.3.x-final
#31884 Define ExecuteBash in the Appveyor error block merge_ready teor defect Medium Tor: 0.4.1.x-final
#31891 make autostyle doesn't work when building outside the source tree new defect Medium Tor: unspecified
#31897 util/map_anon_nofork test fails on SunOS merge_ready teor defect High Tor: 0.4.1.x-final
#31898 Occasional crash during shutdown when using Tor API merge_ready nickm defect Medium Tor: 0.4.1.x-final
#31921 Wrap our Travis commands with travis_retry, to mitigate network timeouts new defect Medium Tor: unspecified
#31939 log spam: Bug: buffers_tls.c:73: buf_read_from_tls: Non-fatal assertion !(buf->datalen >= INT_MAX - at_most) failed. merge_ready teor defect Medium Tor: 0.4.1.x-final
#31958 connection_dir_is_anonymous: Non-fatal assertion !(CONST_TO_OR_CIRCUIT(circ)->p_chan == NULL) failed needs_information dgoulet defect Medium Tor: 0.4.2.x-final
#31970 Address not work with Socks5Proxy new defect Medium
#31972 tor-spec: We should specify how clients pick between different handshake types new defect Medium Tor: unspecified
#31999 Default log file is handled inconsistently new defect Medium Tor: 0.4.3.x-final
#32020 hsv3: Client do not report failing circuit back into HS subsystem new defect Medium Tor: 0.4.3.x-final
#32021 hs-v3: Handle rendezvous client circuit build expire properly new defect Medium Tor: 0.4.3.x-final
#32022 Bug: buffers_tls.c:73: buf_read_from_tls: Non-fatal assertion !(buf->datalen >= INT_MAX - at_most) failed. new defect Medium Tor: unspecified
#32032 Assertion mp->conf_state == PT_PROTO_COMPLETED failed in managed_proxy_stdout_callback assigned ahf defect Medium Tor: 0.4.2.x-final
#32033 process_unix_exec assertion failure when ServerTransportPlugin refers to nonexistent file assigned ahf defect Medium Tor: 0.4.2.x-final
#32034 tor reads PT protocol messages from stderr new defect Medium Tor: 0.4.3.x-final
#32040 HS intro padding machine reactivates after receiving INTRODUCE_ACK new defect Medium Tor: 0.4.3.x-final
#32048 Loading a high number of Onion V3 Descriptors trough Tor Control Port lead to sustained 100% CPU new defect Medium Tor: 0.4.3.x-final
#32058 mainloop: make periodic events restartable assigned dgoulet defect Medium Tor: 0.4.2.x-final
#32059 Bug when reading accounting interval while starting a new relay new defect Low Tor: 0.4.3.x-final
#32060 CID 1454761: wrong type passed to unlock_cb_buf()? assigned teor defect Medium Tor: 0.4.2.x-final
#32063 CID 1454769: Resource leaks in build_establish_intro_dos_extension() assigned dgoulet defect Medium Tor: 0.4.2.x-final
#32067 Content revisions on doc/HACKING/design: describe important parts of lib. assigned nickm defect Medium Tor: 0.4.3.x-final
#32071 Remove perl scripts from development process? new defect Medium Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned enhancement Medium Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#3028 META: Support non-clique topologies on the network new enhancement Low Tor: very long term
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#3459 Expose information about dir conns to controllers accepted rransom enhancement Low Tor: unspecified
#3501 Teach Tor to run the Control Port over TLS new enhancement Low Tor: unspecified
#3511 Automatically chosen published ports should be stable assigned blackpaw enhancement High Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#3522 Allow controllers to post HS descriptors to Tor's cache new enhancement Low Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#3782 Add native chroot support to Tor new enhancement Medium Tor: unspecified
#3852 Make DNS resolution happen on particular exit nodes for particular hostnames new enhancement Low Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#3948 "fooport auto" should be able to get a hint new enhancement Low Tor: unspecified
#3982 MAPADDRESS for IP ranges (CIDR, etc) reopened enhancement Medium Tor: unspecified
#4036 Tor relays/bridges can detect when they are being filtered by SSL cert new enhancement Low Tor: unspecified
#4233 Exact addition/summation and memory allocation needs_revision enhancement Medium Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#4539 Make dir auths write to disk digests that don't match new enhancement Medium Tor: unspecified
#4631 Idea to make consensus voting more resistant new enhancement Medium Tor: unspecified
#4696 add OutboundBindInterface option to torrc new enhancement Medium Tor: unspecified
#4734 Tor DNS resolver only supports UDP sockets so can't resolve large RRs new enhancement Low Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#4816 Request: add count to "[warn] Your computer is too slow..." new enhancement Low Tor: unspecified
#4826 Write proposal for improved consensus voting schedules new enhancement Medium Tor: unspecified
#4850 Build multiple circuits and use the fastest? new enhancement Medium Tor: unspecified
#4885 Make all paths absolute new enhancement Medium Tor: unspecified
#5081 autoreload ServerTransportPlugin process when the underlying binary changes or requests it? new enhancement Medium Tor: unspecified
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms new enhancement High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X assigned enhancement High Tor: unspecified
#5241 Log location at DEBUG / INFO level new enhancement Medium Tor: unspecified
#5271 add log messages when a hidden service consistently doesn't have any preemptive circuit ready new enhancement Very Low Tor: unspecified
#5287 Turn LogMessageDomains on by default? new enhancement Low Tor: unspecified
#5379 Design adaptive n23 algorithm that works new enhancement Medium Tor: unspecified
#5401 tag control log events so arm can know they're from the same place in the code new enhancement Medium Tor: unspecified
#5507 option_transition_affects_workers could be split new enhancement Low Tor: unspecified
#5565 MyFamily should provide an alternate non-idhex subscription mechanism reopened enhancement Medium Tor: unspecified
#5641 Exit Enclave equivalent for encrypted Tor-to-Tor connections new enhancement Low Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits assigned enhancement Medium Tor: unspecified
#5788 Add support for relays without an IPv4 address new ln5 enhancement Medium Tor: unspecified
#5903 Restore ExcludeEntryNodes feature new enhancement Medium Tor: unspecified
#5915 Write patch to make socks handshakes succeed instantly needs_revision enhancement Medium Tor: 0.4.3.x-final
#5940 Figure out own IPv6 address new enhancement Medium Tor: unspecified
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#6010 UpdateBridgesFromAuthority isn't actually usable new enhancement Medium Tor: unspecified
#6256 Make circuit isolation isolate exits? (signal NEWNYM exit bucketing) new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.