Custom Query (2073 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1201 - 1300 of 2073)

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Ticket Summary Status Owner Type Priority Milestone
#5903 Restore ExcludeEntryNodes feature new enhancement Medium Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#8749 Return information about the leaking application new enhancement Medium Tor: unspecified
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#24487 Reverse path selection (choose outer hops first) new defect High Tor: unspecified
#4712 Review and update any existing patches for proposal 182 ("credit buckets") new task Medium Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#31502 Revise authority and fallback code so that they use the same "defaults" logic as other code new defect Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#22729 Revisit relay read/write history resolution (for onion services) new defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#27324 Rework AUTHENTICATE cell parsing and remaining generation with trunnel accepted rl1987 enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#5159 Round robin on connection level (more unfairness) new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced new enhancement Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. new defect Medium Tor: unspecified
#30225 Run clang's scan-build in Tor's CI new defect Medium Tor: unspecified
#31869 Run doctest on all of our python files new task Medium Tor: 0.4.2.x-final
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#31378 Run in ram mode new enhancement Medium Tor: unspecified
#32817 Run sandbox tests on Xenial and Bionic new defect Medium Tor: 0.4.3.x-final
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#29780 Run travis with python2 and python3 new enhancement Medium Tor: unspecified
#31443 Rust's default allocator is the system allocator since rust 1.32 new defect Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14066 SIGHUP: Reloading config and does not reset internal state of accounting new defect Very Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#15661 Same "non-loopback address" notice is printed twice new defect Very Low Tor: unspecified
#20007 Sandbox causing crash when setting HidServAuth when there is a hidden service running needs_information defect Medium Tor: unspecified
#27315 Sandbox regression in 0.3.4.7-rc needs_information defect Medium Tor: 0.3.5.x-final
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file new task High Tor: unspecified
#17254 Scalable HSes by splitting intro/rendezvous needs_revision TvdW enhancement Medium Tor: unspecified
#29217 Script to add new tor files and modules in rust and/or C new enhancement Medium Tor: 0.4.4.x-final
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#33346 Seccomp soft fail (no write) in 0.4.2.6 needs_review nickm defect Medium Tor: 0.4.4.x-final
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#32190 Send a control port event when a stream enters the controller_wait state new enhancement Medium
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#6883 Separate configuration options for separate Socks/NATD/Trans/DNS ports new project Medium Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV new enhancement High Tor: unspecified
#28638 Serialize state machines in the torrc new defect Low Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#30301 Set bridge running status on a timer? new enhancement Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint new defect High Tor: unspecified
#32335 Set up a .github repository on GitHub needs_review task Medium Tor: unspecified
#32588 Setting ORPort [ipv6]:auto mistakenly advertises port 94 needs_revision teor defect Medium Tor: 0.4.3.x-final
#14987 Settle on a name for descriptors new defect Low Tor: unspecified
#31530 Shall we require STMT_BEGIN/STMT_END everywhere? new enhancement Medium Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#18987 Ship a cached-certs file with Tor, to speed first bootstrap new enhancement Medium Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#31654 Should --list-torrc-options and GETINFO config/names have more in common? new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#31647 Should OBSOLETE and ___invisible configuration obtions be available to GETCONF? new defect Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? new defect Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#32369 Should rename_c_identifier.py also update practracker/exceptions.txt assigned nickm defect Medium Tor: 0.4.3.x-final
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#31560 Should we CI-build with --disable-module-dirauth and -O0? new task Medium Tor: unspecified
#28344 Should we log \r\n on Windows? new defect Medium Tor: unspecified
#30420 Should we recommend that relay operators turn on tcp bbr? new task Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#30267 Simplify the code logic of launching HS circuits new defect Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
#31183 Situational symlink attacks on ControlPortWriteToFile etc. new defect Medium Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#32756 SocksPolicy has no way to refer to AF_UNIX sockets new defect Medium Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#30409 Some of our tests require internet connectivity / an IPv4 stack needs_information defect Medium Tor: unspecified
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#13932 Some way for multiple Tor processes to share directory information new enhancement Medium Tor: unspecified
#26460 Some? autoconf tests that include stdio.h fail with a missing ssp.h on cygwin reopened defect Medium Tor: unspecified
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
Note: See TracQuery for help on using queries.