Custom Query (2111 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1301 - 1400 of 2111)

4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Ticket Summary Status Owner Type Priority Milestone
#22351 Should bridge lines in the state file use unlisted_since? new defect Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#3566 Should controller events respect SafeLogging 1 torrc option? new chiiph enhancement Low Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#32369 Should rename_c_identifier.py also update practracker/exceptions.txt assigned nickm defect Medium Tor: 0.4.4.x-final
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#31560 Should we CI-build with --disable-module-dirauth and -O0? new task Medium Tor: unspecified
#28344 Should we log \r\n on Windows? new defect Medium Tor: unspecified
#30420 Should we recommend that relay operators turn on tcp bbr? new task Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#30267 Simplify the code logic of launching HS circuits new defect Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
#31183 Situational symlink attacks on ControlPortWriteToFile etc. new defect Medium Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#32756 SocksPolicy has no way to refer to AF_UNIX sockets new defect Medium Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#30409 Some of our tests require internet connectivity / an IPv4 stack needs_information defect Medium Tor: unspecified
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#13932 Some way for multiple Tor processes to share directory information new enhancement Medium Tor: unspecified
#26460 Some? autoconf tests that include stdio.h fail with a missing ssp.h on cygwin reopened defect Medium Tor: unspecified
#34311 Space out code in relay.c needs_review neel enhancement Medium Tor: 0.4.4.x-final
#34238 Space out some function calls in parse_short_policy() needs_revision neel defect Medium Tor: 0.4.4.x-final
#22251 Spec should change: stop requiring Tor relays to support old link versions new enhancement Medium Tor: unspecified
#15232 Specify a potential TLS-replacing protocol for future use in Tor. new defect Medium Tor: unspecified
#25153 Specify how PrivCount in Tor statistics are configured and interpreted new task Medium Tor: unspecified
#29602 Speed up builds using Appveyor's build cache new enhancement Medium Tor: unspecified
#32249 Speed up practracker, by passing it a list of modified file names new enhancement Medium Tor: 0.4.4.x-final
#28777 Split circuitpadding.c code into multiple modules new defect Low Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores assigned chelseakomlo project High Tor: unspecified
#29131 Split rephist.c into modules for each type of statistic new enhancement Medium Tor: unspecified
#33414 Split router.c, and disable it (mostly) when building without relay support. needs_revision nickm defect Medium Tor: 0.4.4.x-final
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#21511 State.tmp is not erased and it may contain sensitive information needs_information defect Medium Tor: unspecified
#33624 Static building tor with openssl does not work needs_revision defect Medium Tor: 0.4.4.x-final
#26464 Static cross-compiling for Windows is broken new Hello71 defect Medium Tor: unspecified
#32871 Static linking issue with OpenSSL needs_information defect Medium Tor: 0.4.4.x-final
#27725 Stealthy onions should appear to be offline new defect Medium Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#14763 Stochastic Guard Flag new defect Medium Tor: unspecified
#17605 Stop HTTP caches storing or modifying X-Your-Address-Is from Tor Directory documents needs_revision jryans defect High Tor: unspecified
#33375 Stop advertising an IPv6 exit policy when DNS is broken for IPv6 needs_information neel defect Medium Tor: 0.4.4.x-final
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#33607 Stop forcing IPv4 and IPv6 traffic on non-SOCKSPorts new defect Medium Tor: 0.4.5.x-final
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#33898 Stop modifying addr on connections, and delete real_addr assigned nickm defect High Tor: 0.4.4.x-final
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#32954 Stop public authorities specifying an internal address for their IPv6 ORPort new defect Medium Tor: unspecified
#29570 Stop relays publishing descriptors containing NoListen IPv6 ORPorts new defect Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#28079 Stop returning the empty string when the cstr! macro fails new enhancement Medium Tor: unspecified
#27648 Stop setting the IPv6 preferred flag on nodes new enhancement Medium Tor: unspecified
#30797 Stop shipping an abandoned systemd script? new defect Medium Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#20555 Stream isolation for DNS new defect Medium Tor: unspecified
#29744 Streams sometimes stall for up to 1 hour without making any progress new defect Medium Tor: unspecified
#15458 StrongSocksIsolation option (w/ virtual circuits?) new enhancement Low Tor: unspecified
#32103 Subsystem "thread_cleanup" is never called accepted nickm defect Medium Tor: 0.4.4.x-final
#26292 Subsystem for gathering information about local connection states new enhancement Medium Tor: unspecified
#18509 Summarize our crypto migration plans in one place new enhancement Medium Tor: unspecified
#32354 Support "Cache Directory Tagging Standard" (already implemented e.g. in GNU tar) new enhancement Medium Tor: unspecified
#23079 Support 80-bit Onion Model In Perpetuity new project Medium Tor: unspecified
#21864 Support Bridges setting MyFamily to include Relays new defect Medium Tor: unspecified
#20226 Support DNS-MX resource records with .onion-filtering for TOR as secure/anonymous email transport protocoll new enhancement Medium Tor: very long term
#15061 Support Ed25519 identities in controller interface new defect Low Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints new enhancement Medium Tor: unspecified
#23595 Support KIST on other platforms. new enhancement Medium Tor: unspecified
#31103 Support ORPort picking a random port that persists across restarts new enhancement Medium
#6504 Support Windows environment variables in HiddenServiceDir needs_information enhancement Low Tor: unspecified
#20337 Support abstract namespace AF_UNIX sockets. new enhancement Low Tor: unspecified
#7829 Support all kinds of DNS over Tor new task High Tor: unspecified
#10747 Support alternate DNS such as Namecoin/OpenNIC/etc new enhancement Medium Tor: unspecified
#33086 Support brotli compression for directory requests accepted rl1987 enhancement Medium Tor: 0.4.4.x-final
#17521 Support capsicum(4) on FreeBSD assigned shawn.webb enhancement Medium Tor: unspecified
#21237 Support domain isolation for onion connections too? new defect Medium Tor: unspecified
#24100 Support exit notice page in multiple multiple languages new enhancement Low Tor: unspecified
#34004 Support for full DNS and DNSSEC resolution needs_review enhancement Medium Tor: 0.4.4.x-final
#22304 Support generating HS private key / onion address without publishing new enhancement Medium Tor: unspecified
#15062 Support identifying nodes by ed25519 keys in state file, other misc files new defect Low Tor: unspecified
#31228 Support spawning multiple transport instances new enhancement Medium
#30299 Switch network interface new enhancement Very Low Tor: unspecified
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Note: See TracQuery for help on using queries.