Custom Query (1968 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1101 - 1200 of 1968)

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#22728 Long-lived onion service circuits can enable guard discovery new defect Medium Tor: unspecified
#22729 Revisit relay read/write history resolution (for onion services) new defect Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22745 Establish policy for writing regression tests new task Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22769 Investigate the reproducibility of Rust binaries new task Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#22826 Write a spec for unsanitised bridge descriptor formats assigned enhancement Low Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#22908 Establish guidelines for contributing large bodies of code new task Medium Tor: unspecified
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#22992 master pubkey of the hidden service quantum computer resistance new defect Medium Tor: very long term
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#23006 Test connection speed new enhancement Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23013 Tor 0.3.0.9 tarball was missing ReleaseNotes entry new defect Low Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#23079 Support 80-bit Onion Model In Perpetuity new project Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once assigned defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23119 Make Tors no longer warn if they're running a newer-than-recommended version? new enhancement Medium Tor: unspecified
#23126 HSDirs should publish some count about new-style onion addresses new enhancement Medium Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23232 misleading log message related to used SSL vendor needs_information enhancement Low Tor: unspecified
#23277 ApplicationControlSocket: the way for apps to control Tor new enhancement Medium Tor: unspecified
#23278 Give user option to use non-Exit Guards only reopened enhancement Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23433 Windows relay: 85% of CPU power is wasted inside select() call new defect Medium Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile new enhancement Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays assigned defect Medium Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23579 sched: Add accessors for channel_pending list assigned enhancement Medium Tor: unspecified
#23595 Support KIST on other platforms. new enhancement Medium Tor: unspecified
#23613 some control protocol GETINFO downloads/networkstatus keys are lies new defect Medium Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23677 Tor should log what it thinks the time is sometime(s) new defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after assigned defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler assigned defect Medium Tor: unspecified
#23714 stop casting small integers to (void *) new defect Medium Tor: unspecified
#23720 'make test' writes into my /tmp new defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler assigned defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge new defect High Tor: unspecified
#23777 tor spends a lot of time in malloc/free new enhancement Medium Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#23886 Write FFI bindings and function pointers for ed25519-dalek new enhancement Medium Tor: unspecified
#23891 Write blogpost on future/expectations for Rust in tor? new task Medium Tor: unspecified
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned enhancement Medium Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.