Custom Query (1930 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1301 - 1400 of 1930)

4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23433 Windows relay: 85% of CPU power is wasted inside select() call new defect Medium Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile new enhancement Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23595 Support KIST on other platforms. new enhancement Medium Tor: unspecified
#23613 some control protocol GETINFO downloads/networkstatus keys are lies new defect Medium Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23677 Tor should log what it thinks the time is sometime(s) new defect Medium Tor: unspecified
#23714 stop casting small integers to (void *) new defect Medium Tor: unspecified
#23720 'make test' writes into my /tmp new defect Medium Tor: unspecified
#23777 tor spends a lot of time in malloc/free new enhancement Medium Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#23886 Write FFI bindings and function pointers for ed25519-dalek new enhancement Medium Tor: unspecified
#23891 Write blogpost on future/expectations for Rust in tor? new task Medium Tor: unspecified
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24100 Support exit notice page in multiple multiple languages new enhancement Low Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24194 Expose expiry of identity key in descriptor? new enhancement Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24269 Raise a FATAL error if the user tried to combine v2 and prop224 hidden service in same directory new task Medium Tor: unspecified
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24308 MaxMemInCellQueues minimum of 256MB is still too large for low-RAM relays (LEDE and OpenWRT routers) new defect Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24347 periodic network bw pattern in an exit relay new task Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#24453 Reduce log spam when child process creation failed new defect Medium Tor: unspecified
#24455 messages out of order in the tor log due to stored logs new defect Medium Tor: unspecified
#24456 Figure out what to do with the guardfraction feature new defect Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24498 add configurables for eventdns settings new enhancement Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24609 consdiff implementation in Rust new defect Medium Tor: unspecified
#24617 Feature flags for new controller-accessible Tor features new enhancement Medium Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows new defect High Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24737 Recommend a MaxMemInQueues value in the Tor man page new defect Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24806 LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable new defect Medium Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#24833 DNS not reliably returning AAAA records new enhancement Medium Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#24850 tor2web option without the corresponding tag in torrc causes tor to fail with confusing console output new defect Medium Tor: unspecified
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24864 directory authorities take a while to update relays' Tor versions because they use old descriptors for votes new defect Low Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#24888 tor 0.2.5.16: src/or/rendservice.c build error: comparison between signed and unsigned new defect Low Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#24937 tor failing to resolve some dns records new defect Medium Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#24955 exit selection biases appear to result when very-long ExcludeExitNodes list is in effect new defect Medium Tor: unspecified
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.