Custom Query (1864 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1201 - 1300 of 1864)

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#25335 Tor relay node CPUWORKER failed error mssage new defect Medium Tor: unspecified
#25347 Tor keeps on trying the same overloaded guard over and over needs_revision asn defect Medium Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) accepted nickm defect High Tor: unspecified
#25412 TrackHostExits option in torrc file not working as documented new defect Medium Tor: unspecified
#25416 [warn] Received http status code 404 ("Consensus is too old") from server '194.109.206.212:80' while fetching consensus directory. new defect Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state assigned defect High Tor: unspecified
#25493 Improve patterns for cleaning up static variables on exit/restart new enhancement Medium Tor: unspecified
#25500 Reduce client CPU usage when idle assigned task Medium Tor: unspecified
#25503 Use less space for client-side directory cache assigned task Medium Tor: unspecified
#25504 Find more generic ways to handle smartlist_t/Vec<T> between C and Rust new enhancement Medium Tor: unspecified
#25506 Tor's make clean and distclean should not depend on the exact automake version new defect Medium Tor: unspecified
#25507 Write a guide for groups planning to submit big patches to Tor. assigned catalyst task Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned nickm project Medium Tor: unspecified
#25519 move away from asciidoc new task Medium Tor: unspecified
#25528 When ClientTransportPlugin is missing, tor connects directly to bridge addresses, even if they have a transport name new defect Medium Tor: unspecified
#25530 Closing Tor cleanly from command line (when started from command line) on win32 new tbb-team defect Medium Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#25550 improve continuous integration support assigned catalyst project Medium Tor: unspecified
#25568 hs: Lookup failure cache when introducing to an intro point assigned neel defect Medium Tor: unspecified
#25574 Eliminate "silent-drop" side channels in Tor protocol new defect Medium Tor: unspecified
#25576 Fix non-standard use of keccak in v3 hidden service code new defect Medium Tor: unspecified
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls assigned defect Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned nickm defect Medium Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells needs_revision isis enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information nickm defect Medium Tor: unspecified
#25687 over-report of observed / self-measure bandwidth on fast hardware -- important to torflow / peerflow new defect Medium Tor: unspecified
#25708 [test] setenv() failure in util/expand_filename: test: environment corrupt; missing value for MAKEOVER assigned saper task Low Tor: unspecified
#25713 "DisableNetwork is set" log message in Tor Browser scares/confuses users new defect Medium Tor: unspecified
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x new task High Tor: unspecified
#25716 Arrange an experiment on the test network where we dump create cells on a relay and time the responses new task Medium Tor: unspecified
#25729 UTF8 encoded TORRC does NOT parse non-Latin paths reopened defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned mikeperry defect Medium Tor: unspecified
#25754 Make Prop#291 choices new defect Medium Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#25841 Write test for Rust fragile hardening new enhancement Medium Tor: unspecified
#25882 clients not detecting stale onion service introduction points assigned defect High Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#25892 Replace RejectPlaintextPorts with RejectPlaintextPortPolicy reopened enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. assigned nickm defect Medium Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#25922 Add an alias mechanism for controller commands and events, and use it for Onion Services new defect Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. assigned nickm defect Medium Tor: unspecified
#25955 onion v2 deprecation plan new enhancement Medium Tor: unspecified
#25957 Tor 0.3.3.5-rc died: Caught signal 11 needs_information defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#25964 Remove hs_index_t fetch, and use one of the stores instead new enhancement Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#25978 UseEntryGuards 0 disables EntryNodes new defect Very Low Tor: unspecified
#25987 Allow controller to receive log messages from outside main thread assigned nickm defect Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned nickm defect Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26076 test_keygen.sh and test_key_expiration.sh fail on Windows new defect Very Low Tor: unspecified
#26088 Duplicate creation of ReachableAddresses reject in torrc file new defect Low Tor: unspecified
#26094 increase minimal bandwidth requirements, update the manpage, relay guide and FAQ assigned enhancement Medium Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#26113 Control spec is ambiguous whether a GETCONF error message is specified new defect Medium Tor: unspecified
#26136 DirPort reachability test inconsistency when only "DirPort x.x.x.x:x NoAdvertise" configured new defect Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
#26138 DirPort /tor/server/all document contains spurrious blank line following serving relay's descriptor new defect Very Low Tor: unspecified
#26139 start aplication needs_information defect Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#26168 Rename HSDir consensus flag to OnionDir new enhancement Medium Tor: unspecified
#26181 Apparmor + systemd failures when loading included service files + DisableAllSwap Fix new defect Very High Tor: unspecified
#26217 add info that fingerprints in MyFamily are not case-sensitive new enhancement Medium Tor: unspecified
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#26262 Create unittests for circuit timeout tracking new enhancement Medium Tor: unspecified
#26265 A proposal and demo for a fuzzing system that works with Rust through C code needs_revision enhancement Low Tor: unspecified
#26285 Trac / Github service bot new project Medium Tor: unspecified
#26286 Update contributor document to explain the transition to travis-ci.com new enhancement Medium Tor: unspecified
#26287 run callgraph tool from Travis new enhancement Medium Tor: unspecified
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.