Custom Query (1966 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1201 - 1300 of 1966)

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#17835 Make ClientPreferIPv6ORPort smarter assigned neel enhancement Medium Tor: unspecified
#31609 Make CIRCUIT_IS_ORIGIN() look at the base magic number new defect Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#26374 MacOS Sandbox assigned enhancement Medium Tor: unspecified
#22340 META: allow exits to restrict on something more sophisticated than IPs new defect Medium Tor: very long term
#3028 META: Support non-clique topologies on the network new enhancement Low Tor: very long term
#22339 META: Implement some form of jurisdiction/geography/topology-aware routing reopened defect Medium Tor: very long term
#5992 META: Decentralize directory authorities as far as safely possible new project Medium Tor: very long term
#30123 MAPADDRESS result can mix status codes new defect Medium Tor: unspecified
#3982 MAPADDRESS for IP ranges (CIDR, etc) reopened enhancement Medium Tor: unspecified
#30094 MAPADDRESS exitnode by CountryCode new enhancement Very Low Tor: unspecified
#20082 Lower initial descriptor upload delay for hidden services needs_revision twim enhancement Medium Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#20371 Lower HSDir query backoff delay new enhancement Medium Tor: unspecified
#14581 Looking up bridge by ID may choose the wrong bridge new defect High Tor: unspecified
#24063 Look into battery usage for Tor on Android devices assigned task Medium Tor: unspecified
#27143 Look for parts of code that relies on non-trunnel code for binary wire format handling accepted rl1987 task Medium Tor: unspecified
#29743 Long-running tor instances fail to keep up-to-date directory information needs_information defect Medium Tor: unspecified
#16585 Long-running activity in scheduler_run() blocks network, creating information leaks new defect Medium Tor: unspecified
#22728 Long-lived onion service circuits can enable guard discovery new defect Medium Tor: unspecified
#31036 Logfile grow upto 2GB tor fails and refuse to start assigned ahf defect Medium Tor: 0.4.2.x-final
#28309 Log the rust version when printing other library versions new enhancement Medium Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#5241 Log location at DEBUG / INFO level new enhancement Medium Tor: unspecified
#26290 Log information from the relay connection failed cache in heartbeats new enhancement Medium Tor: unspecified
#28919 Log IPv4 and IPv6 connections in Tor's heartbeat message new defect Medium Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#17230 Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. new defect Medium Tor: unspecified
#32048 Loading a high number of Onion V3 Descriptors trough Tor Control Port lead to sustained 100% CPU new defect Medium Tor: 0.4.3.x-final
#30858 Load geoip and geoip6 files during the unit tests assigned defect Low Tor: unspecified
#29098 Load balance properly in the presence of padding overhead new enhancement High Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#29223 List canonical abbreviations to use in Tor functions and identifiers needs_revision nickm task Medium Tor: 0.4.2.x-final
#31190 List all valid DirPort urls new enhancement Medium Tor: unspecified
#25139 Link protocol negotiation without common version new defect Low Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) assigned defect High Tor: unspecified
#18608 Limiting ADD_ONION TARGET access. new defect Medium Tor: unspecified
#28511 Limit the number of open testing circuits, and the total number of testing circuits new defect Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#28509 Limit relay bandwidth self-tests based on RelayBandwidthRate, not BandwidthRate new defect Medium Tor: unspecified
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned defect Medium Tor: unspecified
#16648 Libevent configuration doesn't use pkg-config new defect Medium Tor: unspecified
#17956 Let tor handle disconnects better new defect Medium Tor: unspecified
#7986 Lengthen the consensus validity interval needs_revision enhancement Medium Tor: unspecified
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#28036 Launch tests inside a single dirauth instance new defect Medium Tor: unspecified
#24806 LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable new defect Medium Tor: unspecified
#15621 Kill the pre-version 3 intro protocol code with fire. assigned enhancement Medium Tor: unspecified
#13912 Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE registers) new defect Medium Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#11397 Keep using too-dirty circuits if no new circuit can be built? new enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#13258 Keep stats on effectiveness of consensus diffs new enhancement Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#20953 Isolate references to versioning new chelseakomlo enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#14921 Investigate whether we sometimes remove all predicted ports at startup new defect Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#22769 Investigate the reproducibility of Rust binaries new task Medium Tor: unspecified
#30801 Investigate running CI with hardened dependencies vs running CI with valgrind new task Medium Tor: unspecified
#26337 Investigate making rust error types use the failure crate needs_information enhancement Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#26334 Investigate how much our CI performance would improve (if at all) with paid builders new task Medium Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#31669 Invalid signature for service descriptor signing key: expired new defect Medium Tor: unspecified
#28821 Introduce timer_is_scheduled() method and replace padding_scheduled_at_us new defect Low Tor: unspecified
#27712 Introduce Finite State Machine abstraction into Tor codebase new enhancement Medium Tor: very long term
#8486 Introduce ExitNode country code per listener new enhancement Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#32124 Interpret --disable-module-dirauth=no correctly needs_revision teor defect Medium Tor: 0.4.3.x-final
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms new enhancement High Tor: unspecified
#5221 Intelligently use capabilities/privileges and drop what we don't need for Windows new project High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X assigned enhancement High Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#27854 Integration test(s) for tor-resolve needs_information rl1987 enhancement Medium Tor: unspecified
#31850 Integrate tor-guts Makefile into tor's build process new defect Medium Tor: 0.4.3.x-final
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#19329 Integrate callgraph complexity measures into our regular process assigned defect Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
#21205 Instrument clients to measure directory usage assigned project Medium Tor: unspecified
#31635 Initialise and reset the sigsafe error fds to -1 new enhancement Medium Tor: 0.4.2.x-final
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#28860 Increased DNS failure rate when using ServerDNSResolvConfFile with tor 0.3.4.9 (as opposed to 0.3.3.x) new defect Medium Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#28512 Increase NUM_PARALLEL_TESTING_CIRCS to avoid circuit windows new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#17793 Inconsistent function comment cache_failure_intro_lookup new defect Very Low Tor: unspecified
#30164 Inconsistent Guard flag assignment new defect Medium Tor: unspecified
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#31829 In 0.4.3, drop support for Python 2 new defect Medium Tor: 0.4.3.x-final
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.