Custom Query (1894 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1101 - 1200 of 1894)

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#28208 Run bridges+hs-v23 for make test-network in 0.4.2 and later assigned defect Medium Tor: unspecified
#30225 Run clang's scan-build in Tor's CI new defect Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#31378 Run in ram mode new enhancement Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#29780 Run travis with python2 and python3 new enhancement Medium Tor: unspecified
#31443 Rust's default allocator is the system allocator since rust 1.32 new defect Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14066 SIGHUP: Reloading config and does not reset internal state of accounting new defect Very Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#15661 Same "non-loopback address" notice is printed twice new defect Very Low Tor: unspecified
#20007 Sandbox causing crash when setting HidServAuth when there is a hidden service running needs_information defect Medium Tor: unspecified
#27315 Sandbox regression in 0.3.4.7-rc needs_information defect Medium Tor: 0.3.5.x-final
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned task High Tor: unspecified
#17254 Scalable HSes by splitting intro/rendezvous needs_revision TvdW enhancement Medium Tor: unspecified
#29217 Script to add new tor files and modules in rust and/or C new defect Medium Tor: 0.4.2.x-final
#31178 Scripts to help with backport branches assigned enhancement Medium Tor: 0.4.2.x-final
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#29819 Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4 assigned nickm defect Medium Tor: 0.4.0.x-final
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#6883 Separate configuration options for separate Socks/NATD/Trans/DNS ports new project Medium Tor: unspecified
#30831 Separate front-end and back-end of handle implementation. assigned nickm enhancement Medium Tor: 0.4.2.x-final
#18346 Separate the various roles that directory authorities play, from a configuration POV assigned enhancement High Tor: unspecified
#28638 Serialize state machines in the torrc new defect Low Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#30301 Set bridge running status on a timer? new enhancement Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned defect High Tor: unspecified
#14987 Settle on a name for descriptors assigned defect Low Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? assigned defect Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#28344 Should we log \r\n on Windows? new defect Medium Tor: unspecified
#30420 Should we recommend that relay operators turn on tcp bbr? new task Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#30267 Simplify the code logic of launching HS circuits assigned neel defect Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
#31183 Situational symlink attacks on ControlPortWriteToFile etc. new defect Medium Tor: 0.4.2.x-final
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#30409 Some of our tests require internet connectivity / an IPv4 stack needs_information defect Medium Tor: unspecified
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#13932 Some way for multiple Tor processes to share directory information new enhancement Medium Tor: unspecified
#26460 Some? autoconf tests that include stdio.h fail with a missing ssp.h on cygwin reopened defect Medium Tor: unspecified
#22251 Spec should change: stop requiring Tor relays to support old link versions new enhancement Medium Tor: unspecified
#28653 Specify IPv4 and IPv6 weight calculations in dir-spec.txt new enhancement Medium Tor: unspecified
#15232 Specify a potential TLS-replacing protocol for future use in Tor. new defect Medium Tor: unspecified
#25153 Specify how PrivCount in Tor statistics are configured and interpreted assigned task Medium Tor: unspecified
#29602 Speed up builds using Appveyor's build cache new enhancement Medium Tor: unspecified
#28777 Split circuitpadding.c code into multiple modules new defect Low Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores assigned chelseakomlo project High Tor: unspecified
#29131 Split rephist.c into modules for each type of statistic new enhancement Medium Tor: unspecified
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#30281 Sponsor27 master ticket new defect Medium Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#31177 Start conversation about auto-formatting our C code new task Medium Tor: 0.4.2.x-final
#21511 State.tmp is not erased and it may contain sensitive information needs_information defect Medium Tor: unspecified
#26464 Static cross-compiling for Windows is broken new Hello71 defect Medium Tor: unspecified
#27725 Stealthy onions should appear to be offline new defect Medium Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#14763 Stochastic Guard Flag new defect Medium Tor: unspecified
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#28079 Stop returning the empty string when the cstr! macro fails new enhancement Medium Tor: unspecified
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.