Custom Query (1976 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1201 - 1300 of 1976)

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#20226 Support DNS-MX resource records with .onion-filtering for TOR as secure/anonymous email transport protocoll new enhancement Medium Tor: very long term
#20225 tor "wedged" and become unable to connect to a hidden service needs_information defect Medium Tor: unspecified
#20218 Fix and refactor and redocument routerstatus_has_changed needs_revision defect Medium Tor: unspecified
#20212 Tor can be forced to open too many circuits by embedding .onion resources new tbb-team enhancement Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#20188 hsfetch hs_desc FAILED with REASON missing new enhancement Medium Tor: unspecified
#20169 hs_desc, hs_desc_content - BAD_DESC|NOT_FOUND new enhancement Low Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20153 VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" new defect Medium Tor: unspecified
#20082 Lower initial descriptor upload delay for hidden services needs_revision twim enhancement Medium Tor: unspecified
#20071 Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4 new defect Low Tor: unspecified
#20061 When unit testing in Tor2web mode, set the config correctly new defect Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified
#20046 Test hidden services with different consensuses new defect Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20022 Tor should deprecate insecure cookie auth new defect Medium Tor: unspecified
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: unspecified
#20007 Sandbox causing crash when setting HidServAuth when there is a hidden service running needs_information defect Medium Tor: unspecified
#20006 HSFETCH fails for hidden services which use client authentication needs_revision rl1987 enhancement Medium Tor: unspecified
#19989 Tor fails to bootstrap with an Exit as EntryNode new defect Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS assigned defect High Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#19959 have a flag for Tor relay location, if a relay is hosted in a data center, cloud or physically secured new enhancement Medium Tor: unspecified
#19931 curve25519-donna runtime math errors on armhf needs_information defect Medium Tor: unspecified
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* assigned defect Low Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#19859 Expose stream isolation information to controllers needs_revision enhancement Medium Tor: 0.4.3.x-final
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#19777 tor-gencert should warn nicely when PEM passphrases are too short new defect Very Low Tor: unspecified
#19762 Tor systemd service should have ReadWriteDirectories=/var/run/tor new defect Medium Tor: unspecified
#19761 Tor systemd service should have RuntimeDirectory=tor new defect Medium Tor: unspecified
#19759 systemd tor.service hardening: add MemoryDenyWriteExecute=true new enhancement Medium Tor: unspecified
#19669 `log_prefix_` maybe getting weird output from strftime new defect Low Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19661 tor refuses to use /dev/null as a config file needs_revision cypherpunks enhancement Medium Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19625 Allow relays to set peering policy needs_information project Medium Tor: unspecified
#19572 set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie new defect Medium Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#19560 running tor trying to access its ed25519_signing_secret_key, log message too loud new defect Medium Tor: unspecified
#19552 Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response new defect Medium Tor: unspecified
#19535 A can't-happen case for one-hop circuits actually can happen new defect Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#19518 Configure argument --without-tcmalloc causes linking with libtcmalloc library new defect Medium Tor: unspecified
#19507 tor and tor-gencert disagree on what a month is new defect Medium Tor: unspecified
#19487 Meek and ReachableAddresses needs_revision dcf defect Medium Tor: unspecified
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#19377 Consider retry/backoff behavior when building new circuits new task Medium Tor: unspecified
#19333 Make node-selection functions testable and tested new defect Medium Tor: unspecified
#19329 Integrate callgraph complexity measures into our regular process assigned defect Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. needs_review enhancement Medium Tor: 0.4.3.x-final
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19325 controller: getinfo to get status of cpuworker queues assigned yawning enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" assigned yawning enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19319 controller: GETINFO stats to expose OOM details assigned yawning enhancement Medium Tor: unspecified
#19318 controller: expose cache details. assigned yawning enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#19179 Refactor functions that handle 'packages' in consensus/votes new defect Medium Tor: unspecified
#19174 libscrypt check fails when libscrypt requires libm needs_revision defect Medium Tor: unspecified
#19162 Make it even harder to become HSDir accepted arma defect Medium Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#19068 Write and run a clique reachability test. new task Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#19009 bandwidth testing circuits should be allowed to use our guards assigned juga defect Medium Tor: unspecified
#18988 log error level messages if relay (self) is not in consensus needs_revision enhancement Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.