Custom Query (1966 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1101 - 1200 of 1966)

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#4310 Reorder tor manpage entries within sections new task Medium Tor: unspecified
#29704 Repeated failure to get to a site new defect Medium Tor: unspecified
#26567 Replace ArgumentCharValue with ValueChar in dir-spec and bandwidth-file-spec new defect Very Low Tor: unspecified
#25892 Replace RejectPlaintextPorts with RejectPlaintextPortPolicy reopened enhancement Medium Tor: unspecified
#9954 Replace broadcast voting protocol with something more robust new defect Medium Tor: unspecified
#21023 Replace custom checks with Autoconf macros new defect Medium Tor: unspecified
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#27326 Replace packed_cell_t and supporting code with stuff generated by trunnel new enhancement Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#26299 Reproducible Tor releases new project Medium Tor: unspecified
#4816 Request: add count to "[warn] Your computer is too slow..." new enhancement Low Tor: unspecified
#4386 Requesting better "too slow" warning message new defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: unspecified
#31223 Research approaches for improving the availability of services under DoS new defect Medium Tor: 0.4.3.x-final
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#32100 Resolve all doxygen warnings assigned nickm defect Medium Tor: 0.4.3.x-final
#5903 Restore ExcludeEntryNodes feature new enhancement Medium Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#8749 Return information about the leaking application new enhancement Medium Tor: unspecified
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned defect High Tor: unspecified
#4712 Review and update any existing patches for proposal 182 ("credit buckets") new task Medium Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#31039 Review proposal 306: IPv6 "Happy Eyeballs" for Tor clients needs_revision task Medium Tor: unspecified
#31943 Review pull request: reorganized Tor manual needs_review swati enhancement Medium Tor: 0.4.3.x-final
#31502 Revise authority and fallback code so that they use the same "defaults" logic as other code new defect Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#22729 Revisit relay read/write history resolution (for onion services) new defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#27324 Rework AUTHENTICATE cell parsing and remaining generation with trunnel accepted rl1987 enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#5159 Round robin on connection level (more unfairness) new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced assigned enhancement Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. assigned defect Medium Tor: unspecified
#28208 Run bridges+hs-v23 for make test-network in 0.4.2 and later assigned defect Medium Tor: unspecified
#30225 Run clang's scan-build in Tor's CI new defect Medium Tor: unspecified
#31869 Run doctest on all of our python files new task Medium Tor: 0.4.2.x-final
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#31378 Run in ram mode new enhancement Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#29780 Run travis with python2 and python3 new enhancement Medium Tor: unspecified
#31443 Rust's default allocator is the system allocator since rust 1.32 new defect Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14066 SIGHUP: Reloading config and does not reset internal state of accounting new defect Very Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#15661 Same "non-loopback address" notice is printed twice new defect Very Low Tor: unspecified
#20007 Sandbox causing crash when setting HidServAuth when there is a hidden service running needs_information defect Medium Tor: unspecified
#27315 Sandbox regression in 0.3.4.7-rc needs_information defect Medium Tor: 0.3.5.x-final
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned task High Tor: unspecified
#17254 Scalable HSes by splitting intro/rendezvous needs_revision TvdW enhancement Medium Tor: unspecified
#29217 Script to add new tor files and modules in rust and/or C new enhancement Medium Tor: 0.4.3.x-final
#31178 Scripts to help with backport branches assigned enhancement Medium Tor: unspecified
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#29819 Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4 assigned nickm defect Medium Tor: 0.4.0.x-final
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#6883 Separate configuration options for separate Socks/NATD/Trans/DNS ports new project Medium Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV assigned enhancement High Tor: unspecified
#28638 Serialize state machines in the torrc new defect Low Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#30301 Set bridge running status on a timer? new enhancement Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned defect High Tor: unspecified
#14987 Settle on a name for descriptors assigned defect Low Tor: unspecified
#31530 Shall we require STMT_BEGIN/STMT_END everywhere? new enhancement Medium Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#31654 Should --list-torrc-options and GETINFO config/names have more in common? new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#31647 Should OBSOLETE and ___invisible configuration obtions be available to GETCONF? new defect Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? assigned defect Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#31560 Should we CI-build with --disable-module-dirauth and -O0? new task Medium Tor: unspecified
#28344 Should we log \r\n on Windows? new defect Medium Tor: unspecified
#30420 Should we recommend that relay operators turn on tcp bbr? new task Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.