Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1201 - 1300 of 2070)

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Ticket Summary Status Owner Type Priority Milestone
#9954 Replace broadcast voting protocol with something more robust new defect Medium Tor: unspecified
#34433 Replace clang-format.sh with a faster, better version needs_review nickm enhancement Medium Tor: 0.4.4.x-final
#21023 Replace custom checks with Autoconf macros new defect Medium Tor: unspecified
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#27326 Replace packed_cell_t and supporting code with stuff generated by trunnel new enhancement Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#26299 Reproducible Tor releases new project Medium Tor: unspecified
#4386 Requesting better "too slow" warning message new defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#32698 Require client protocol versions based on 0.3.5.7 new task Medium Tor: unspecified
#32697 Require supported relay protocol versions based on 0.3.5.7 new task Medium Tor: unspecified
#31223 Research approaches for improving the availability of services under DoS new defect Medium Tor: unspecified
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#33119 Resolve TROVE-2020-001 needs_review ahf defect High Tor: 0.4.4.x-final
#5903 Restore ExcludeEntryNodes feature new enhancement Medium Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#8749 Return information about the leaking application new enhancement Medium Tor: unspecified
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#24487 Reverse path selection (choose outer hops first) new defect High Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#31502 Revise authority and fallback code so that they use the same "defaults" logic as other code new defect Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#22729 Revisit relay read/write history resolution (for onion services) new defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#27324 Rework AUTHENTICATE cell parsing and remaining generation with trunnel accepted rl1987 enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#5159 Round robin on connection level (more unfairness) new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced new enhancement Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. new defect Medium Tor: unspecified
#30225 Run clang's scan-build in Tor's CI new defect Medium Tor: unspecified
#31869 Run doctest on all of our python files new task Medium Tor: 0.4.5.x-final
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#31378 Run in ram mode new enhancement Medium Tor: unspecified
#32817 Run sandbox tests on Xenial and Bionic new defect Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#29780 Run travis with python2 and python3 new enhancement Medium Tor: unspecified
#31443 Rust's default allocator is the system allocator since rust 1.32 new defect Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14066 SIGHUP: Reloading config and does not reset internal state of accounting new defect Very Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#15661 Same "non-loopback address" notice is printed twice new defect Very Low Tor: unspecified
#20007 Sandbox causing crash when setting HidServAuth when there is a hidden service running needs_information defect Medium Tor: unspecified
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file new task High Tor: unspecified
#17254 Scalable HSes by splitting intro/rendezvous needs_revision TvdW enhancement Medium Tor: unspecified
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#33346 Seccomp soft fail (no write) in 0.4.2.6 needs_revision nickm defect Medium Tor: 0.4.4.x-final
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#32190 Send a control port event when a stream enters the controller_wait state new enhancement Medium
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#6883 Separate configuration options for separate Socks/NATD/Trans/DNS ports new project Medium Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV new enhancement High Tor: unspecified
#34067 Separate tor's IPv4 and IPv6 reachability flags assigned teor enhancement Medium Tor: 0.4.5.x-final
#28638 Serialize state machines in the torrc new defect Low Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#30301 Set bridge running status on a timer? new enhancement Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint new defect High Tor: unspecified
#32335 Set up a .github repository on GitHub needs_review task Medium Tor: unspecified
#32588 Setting ORPort [ipv6]:auto mistakenly advertises port 94 merge_ready teor defect Medium Tor: 0.4.3.x-final
#14987 Settle on a name for descriptors new defect Low Tor: unspecified
#31530 Shall we require STMT_BEGIN/STMT_END everywhere? new enhancement Medium Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#31654 Should --list-torrc-options and GETINFO config/names have more in common? new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#31647 Should OBSOLETE and ___invisible configuration obtions be available to GETCONF? new defect Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? new defect Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#32369 Should rename_c_identifier.py also update practracker/exceptions.txt assigned nickm defect Medium Tor: unspecified
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#31560 Should we CI-build with --disable-module-dirauth and -O0? new task Medium Tor: unspecified
#28344 Should we log \r\n on Windows? new defect Medium Tor: unspecified
#30420 Should we recommend that relay operators turn on tcp bbr? new task Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Note: See TracQuery for help on using queries.