Custom Query (1966 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1401 - 1500 of 1966)

5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#17495 Unit-test launch_resolve() in dns.c new task Medium Tor: unspecified
#17451 Tor controller [ControlPort] - bruteforce defence measures & detailed logging when listening non-locally new enhancement Very Low Tor: unspecified
#17391 (Sandbox) Caught a bad syscall attempt (syscall time) (__NR_time not defined?) reopened defect Medium Tor: unspecified
#17387 ExtraRelayDescriptorFields needs proposal number new task Low Tor: unspecified
#17366 Track consensus fetch times per country? new enhancement Medium Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced assigned enhancement Medium Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17278 Fix malleable relay crypto assigned defect High Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#17272 Finalize a proposal for postquantum circuit-extension assigned yawning task Medium Tor: unspecified
#17254 Scalable HSes by splitting intro/rendezvous needs_revision TvdW enhancement Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#17230 Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. new defect Medium Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms new defect Low Tor: unspecified
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages assigned defect Medium Tor: unspecified
#17147 long-running client path-selection not seeing some (fast) exit nodes needs_information defect Medium Tor: unspecified
#17146 "Sandbox 1" in chutney makes coverage underreported new defect Medium Tor: unspecified
#17145 <tor.exe --service install -options -f ...\torrc> returns Error 1064 on Windows new defect Medium Tor: unspecified
#17134 Add a way to say "Use this option only if supported" in torrc new enhancement Medium Tor: unspecified
#17127 Fix and re-enable --master-key option, possibly --out (for keys) and possibly --nopass for non-interactive key generation new enhancement Medium Tor: unspecified
#17120 Fire a circuit status control port event when circuit isolation changes. new enhancement Low Tor: unspecified
#17101 Tests for connection_ap_handshake_rewrite_and_attach needs_revision ipazmino defect Medium Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#17066 Avoid assuming relays have a single IPv4/IPv6 address new task Medium Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17032 Threadpool doesn't get shutdown when changing from relay to client new defect Low Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
#17020 Add test for Config options_act function needs_revision tcz001 enhancement Medium Tor: unspecified
#16997 Gather and report metrics for the number of channels a relay is servicing. new enhancement Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags needs_revision ffmancera defect High Tor: unspecified
#16845 make unverified consensus ISOTime accessible through Tor's ControlPort reopened enhancement Medium Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#16803 Unit tests for sandbox failures new enhancement Medium Tor: unspecified
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#16782 systemd unit file is not compatible with the AppArmorProfile= directive new defect Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#16648 Libevent configuration doesn't use pkg-config new defect Medium Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16608 "time published in the consensus network status" seems to be wrong new defect Medium Tor: unspecified
#16598 fsync ed25519 master key files before closing them. assigned defect Very Low Tor: unspecified
#16585 Long-running activity in scheduler_run() blocks network, creating information leaks new defect Medium Tor: unspecified
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted nickm defect Medium Tor: unspecified
#16564 WIP: Reject bridge descriptors posted to non-bridge authorities needs_revision teor enhancement High Tor: unspecified
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#16458 torspec references UTC, but tor uses unix time (leap second handling) new task Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#16350 tor.pid should be deleted on exit in every case possible, like assert termination, and catchable signals new defect Medium Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16294 Unable to bootstrap when no relays meet criteria; logging messages unhelpful new defect Low Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#16134 The various stream lists tied to the circuit structures should use tor_queue.h new yawning enhancement Medium Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16070 Tor log doesn't have to be world readable new defect Low Tor: unspecified
#16059 Add a "rendezvous approver" control API new enhancement Medium Tor: unspecified
#16027 APPLICATION_VERIFIER_NETWORKING_WSA_NOT_INITIALIZED in tor (via torbrowser 4.5.1) needs_information tbb-team defect Medium Tor: unspecified
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. new defect Medium Tor: unspecified
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints new enhancement Medium Tor: unspecified
#15998 suggestion: distributed captcha mechanism for hidden service DDOS defense new enhancement Medium Tor: very long term
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client new enhancement Medium Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever assigned task High Tor: unspecified
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.