Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1001 - 1100 of 2070)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Ticket Summary Status Owner Type Priority Milestone
#33119 Resolve TROVE-2020-001 needs_review ahf defect High Tor: 0.4.4.x-final
#33124 Controller circuits don't pass the SOCKS request address in relay begin cells new defect Medium Tor: unspecified
#33131 Bug: buf->datalen >= 0x7fffffff merge_ready defect Medium Tor: 0.4.3.x-final
#33156 DoS subsystem should compare IPv6 /64 assigned neel defect Medium Tor: unspecified
#33196 Make flake8 test Python 3 syntax new defect Medium Tor: unspecified
#33204 Upgrade Rust typenum for Python 3 compatibility new defect Medium Tor: unspecified
#33210 old torrc in tor debian package in stable new defect Medium
#33237 Prop 312: 3.2.2. Stop Directory Authorities Resolving *Port Hostnames new defect Medium Tor: 0.4.5.x-final
#33242 Prop 312: 3.2.5. Make Relays do IPv4 and IPv6 Directory Fetches assigned defect Medium
#33243 Prop 312: 3.2.5. Handle IPv6 Directory Fetch Failures assigned defect Medium
#33290 Add diagnostics for confusing corruption issue #32564 in ewma merge_ready nickm defect Medium Tor: 0.4.2.x-final
#33344 mmdb-convert and fresh MMDB - error new defect High
#33346 Seccomp soft fail (no write) in 0.4.2.6 needs_revision nickm defect Medium Tor: 0.4.4.x-final
#33352 Warning: RELAY_COMMAND_INTRODUCE_ACK on padding circuit assigned asn defect Medium Tor: 0.4.4.x-final
#33361 relay: Warn about the lack of ContactInfo and the consequence merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#33375 Stop advertising an IPv6 exit policy when DNS is broken for IPv6 needs_information neel defect Medium Tor: 0.4.4.x-final
#33383 Do we actually need the orconn_ext_or_id_map? new defect Medium Tor: unspecified
#33409 Pre-commit hook does not stash unstaged changes before running code style checkers new defect Medium
#33411 Make DirCache default to 0 on Windows relays, if we can't fix the mmap issues assigned ahf defect Medium Tor: 0.4.4.x-final
#33414 Split router.c, and disable it (mostly) when building without relay support. needs_revision nickm defect Medium Tor: 0.4.4.x-final
#33415 Adjust clang-format name in script to be parameterized new defect Medium Tor: unspecified
#33437 Unsuccessful compilation of tor on FreeBSD system with libssl.so.11 needs_information defect Medium Tor: unspecified
#33469 INTERNAL ERROR: Raw assertion failed at src/lib/malloc/map_anon.c:239: lock_result == 0 needs_information defect High Tor: unspecified
#33503 LeakSanitizer detected memory leak with Tor 0.4.4.0-alpha-dev (git-6472d9cfdf1198cf) assigned asn defect Medium Tor: 0.4.4.x-final
#33513 Check boolean values and semantic versioning in the bandwidth file specification new defect Medium Tor: unspecified
#33538 v3bw files with too large of weights lead to relays being selected nearly uniformly at random new defect Medium Tor: unspecified
#33542 Orbot not working after the update. new defect Very High
#33550 Bandbreiten Problem mit der Brücke new defect Medium Tor: unspecified
#33554 Excessive CPU usage in windows tor_cond_t code? new defect Medium Tor: unspecified
#33582 Make bridges wait until they have bootstrapped, before publishing their descriptor new defect Medium Tor: unspecified
#33607 Stop forcing IPv4 and IPv6 traffic on non-SOCKSPorts new defect Medium Tor: 0.4.5.x-final
#33623 sendme: Change default emit cell version from 0 to 1 merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#33624 Static building tor with openssl does not work needs_revision defect Medium Tor: 0.4.4.x-final
#33639 Add CHANNEL_CLOSED reason to specs assigned nickm defect Medium Tor: 0.4.4.x-final
#33640 Add PATH_BIAS_TESTING purpose to specs assigned nickm defect Medium Tor: 0.4.4.x-final
#33669 "Pluggable Transport process terminated" but Tor keeps on going (and of course doesn't work) assigned asn defect Medium Tor: 0.4.4.x-final
#33687 Create rotating DNS DoH/DoT server list option Trr Core Tor new defect Medium Tor: unspecified
#33702 RSA_get0_d could not be located in the dynamic link library tor.exe assigned defect Medium
#33703 Improving HS availability under DoS (master ticket) new defect Medium Tor: unspecified
#33704 Understand code performance of onion services under DoS new defect Medium Tor: unspecified
#33712 Design a PoW scheme for HS DoS defence new defect Medium Tor: unspecified
#33739 Authority-mode keys and certificates should be owned by dirauth module new defect Medium Tor: unspecified
#33747 If the ExtORPort doesn't report an external IP address, Tor won't apply rate limiting or account for bandwidth on that connection assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33757 Fix log message when multiple tors try the same data directory assigned asn defect Medium Tor: 0.4.4.x-final
#33767 consider using a GitHub mirror for tor-rust-dependencies new defect Medium Tor: unspecified
#33768 Make tor_inet_pton() handle bad addresses consistently on Windows assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33781 DocTor chokes on malformed dirreq-stats-end line assigned ahf defect Medium Tor: 0.4.4.x-final
#33796 socks: Prefer IPv6 by default on SOCKS port broke torsocks assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33843 Write detailed priority queue scheduler design on the proposal assigned dgoulet defect Medium Tor: unspecified
#33844 Do next iteration of proposal by folding in comments from dgoulet/mike assigned asn defect Medium Tor: unspecified
#33850 log rotation for /var/log/tor/debug.log did not close handle to old file after compression new defect Medium Tor: unspecified
#33873 client: Send back SOCKS extended error F6 in case of bad hostname assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33880 Confusing "Your relay has a very large number of connections to other relays" relay message assigned nickm defect Medium Tor: unspecified
#33889 Functions with char* arguments are dangerous when used with casting new defect Medium Tor: 0.4.4.x-final
#33898 Stop modifying addr on connections, and delete real_addr assigned nickm defect High Tor: 0.4.5.x-final
#33978 *Proxy and accept *:80 can't coexist new defect Medium Tor: unspecified
#34068 Decide how to handle control port events for IPv6 reachability self-tests new defect Medium Tor: unspecified
#34082 Master ticket for client side rendezvous circuit related bugs that cause reachability problems in HSv3 land new defect Medium Tor: unspecified
#34083 Client rendezvous circuit is no longer in circuit_wait but in pending_entry_connections new defect Medium Tor: unspecified
#34084 HSv3: Bug at setup_intro_circ_auth_key at ../src/feature/hs/hs_client.c:739 assigned asn defect Medium Tor: 0.4.4.x-final
#34086 HSv3: Bug Non-fatal assertion in hs_client.c:776: client_rendezvous_circ_has_opened assigned dgoulet defect Medium Tor: 0.4.4.x-final
#34087 HSv3: Bug: Non-fatal assertion in hs_client.c:981: close_or_reextend_intro_circ assigned dgoulet defect Medium Tor: 0.4.4.x-final
#34088 circuit_build_times_update_alpha(): Bug: Could not determine largest build time new defect Medium Tor: unspecified
#34130 Tor won't start with seccomp sandbox when compiled with --enable-nss merge_ready defect Medium Tor: 0.4.3.x-final
#34137 Make sure inform_testing_reachability() reports the correct ports new defect Medium Tor: unspecified
#34171 possible single circuit maximum transfer rate regression in typical circuit path cases needs_information defect Medium
#34232 Make summarize_protover_flags() handle NULL and empty string the same new defect Medium Tor: unspecified
#34238 Space out some function calls in parse_short_policy() needs_revision neel defect Medium Tor: 0.4.4.x-final
#34249 Make sure the C and Rust protovers can't get out of sync assigned nickm defect Medium Tor: 0.4.4.x-final
#34303 Find out why onion service measurements have gotten slower merge_ready karsten defect Medium
#34382 Don't require M_SYSCALL in sandbox.c needs_review nickm defect Medium Tor: 0.4.4.x-final
#34400 control: HSFETCH command fails to validate v2 addresses new defect Medium Tor: 0.4.5.x-final
#34412 Additonal unit tests for functions related to ipv6 self-test new defect Medium Tor: 0.4.5.x-final
#34446 TestingTorNetwork should not set AssumeReachable 1 assigned nickm defect Medium Tor: 0.4.5.x-final
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each new enhancement Medium Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#3028 META: Support non-clique topologies on the network new enhancement Low Tor: very long term
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#3459 Expose information about dir conns to controllers accepted rransom enhancement Low Tor: unspecified
#3501 Teach Tor to run the Control Port over TLS new enhancement Low Tor: unspecified
#3511 Automatically chosen published ports should be stable assigned blackpaw enhancement High Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Note: See TracQuery for help on using queries.