Custom Query (1901 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1401 - 1500 of 1901)

5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#31089 Consider using data-URI to embed how_tor_works_thumb.png image into tor-exit-notice.html merge_ready enhancement Low Tor: 0.4.1.x-final
#31091 Bug stracktrace when pluggable transport cannot bind to port new defect Medium Tor: 0.4.2.x-final
#31103 Support ORPort picking a random port that persists across restarts new enhancement Medium
#31107 channel: channel_tls_handle_cell() CELL_VERSIONS code reached new defect Medium Tor: 0.4.2.x-final
#31111 negotiate one machine per index needs_information defect Medium Tor: 0.4.2.x-final
#31116 clarify socks-extensions.txt spec resolve command and response new defect Medium Tor: unspecified
#31121 Use publish-subscribe system in more places new enhancement Medium Tor: unspecified
#31122 Use subsystems architecture in more places new defect Medium Tor: 0.4.2.x-final
#31136 tor_bug_occurred_() channel_tls_handle_cell: This line should not have been reached. new defect Medium Tor: 0.4.2.x-final
#31147 Check tor_vasprintf for error return values. needs_review enhancement Low Tor: 0.4.2.x-final
#31149 Tor is stuck at "Loading Network Status" needs_information defect High Tor: 0.4.2.x-final
#31156 Add support of TBytes keyword to torrc for AccountingMax setting (and maybe others) new enhancement Low Tor: 0.4.2.x-final
#31163 A flag to use hostname than IP as relay new enhancement Medium
#31177 Start conversation about auto-formatting our C code new task Medium Tor: 0.4.2.x-final
#31178 Scripts to help with backport branches assigned enhancement Medium Tor: 0.4.2.x-final
#31179 Eliminate non tor_queue.h linked lists. new task Medium
#31180 Remove deprecated options in 0.4.3. assigned task Medium Tor: 0.4.3.x-final
#31181 Deprecate more options in 0.4.3 assigned task Medium Tor: 0.4.3.x-final
#31182 Add more typesafe containers to tor new task Medium Tor: 0.4.3.x-final
#31183 Situational symlink attacks on ControlPortWriteToFile etc. new defect Medium Tor: 0.4.2.x-final
#31188 make[1]: don't know how to make ./src/rust/target/release/libtor_rust.a new defect Medium Tor: 0.4.2.x-final
#31189 potential docs update needed for GuardLifetime? new defect Medium Tor: 0.4.2.x-final
#31190 List all valid DirPort urls new enhancement Medium Tor: unspecified
#31221 Line unexpectedly reached at channel_tls_handle_cell at ../src/core/or/channeltls.c:1111 new defect Medium Tor: 0.4.2.x-final
#31223 Research approaches for improving the availability of services under DoS new defect Medium Tor: 0.4.3.x-final
#31228 Support spawning multiple transport instances new enhancement Medium
#31238 Write a nontrivial "preferred" rust module new defect Medium Tor: 0.4.2.x-final
#31290 provide DNS health metrics for tor exit relay operators new enhancement Medium
#31291 non-public relay health metrics for operators new enhancement Medium
#31292 please sign Tor releases with an OpenPGP tool that includes Issuer Fingerprint subpackets new defect Medium Tor: 0.4.2.x-final
#31301 error building tor-0.4.1.4-rc new defect High Tor: 0.4.1.x-final
#31335 make check-includes does not check out of tree builds correctly new defect Medium Tor: 0.4.3.x-final
#31336 Fix usage for add_c_file.py new defect Medium Tor: 0.4.2.x-final
#31354 Compiler "note" in test_addr.c: variable tracking size limit exceeded with ‘-fvar-tracking-assignments’ new defect Medium Tor: 0.4.2.x-final
#31364 tor_bug_occurred_(): Bug: ../src/feature/nodelist/microdesc.c:494: warn_if_nul_found: Non-fatal assertion !(nul_found) failed. (on Tor 0.4.0.5 ) new defect Medium Tor: 0.4.2.x-final
#31371 hs: Add DoS defense counter to DoS heartbeat message new defect Medium Tor: 0.4.2.x-final
#31372 Appveyor and Travis should use "make -k" needs_revision enhancement Medium Tor: 0.4.2.x-final
#31378 Run in ram mode new enhancement Medium Tor: unspecified
#31390 --enable-rust with pre-downloaded Rust dependencies fails: no .cargo-checksum.json files needs_information defect Medium Tor: 0.4.2.x-final
#31408 torrc : ClientOnionAuthDir after include directives breaks client to v2 services new defect Medium Tor: 0.4.2.x-final
#31413 Check for internal IPv6 connects and extends new defect Medium Tor: unspecified
#31443 Rust's default allocator is the system allocator since rust 1.32 new defect Medium Tor: unspecified
#31463 Redundant build exclusion not working corrently on travis merge_ready defect Medium Tor: 0.4.0.x-final
#31466 Consider demoting ".exit is disabled" log message to info new defect Medium Tor: 0.4.2.x-final
#31475 config: stop using atof() new defect Low Tor: 0.4.2.x-final
#31484 Add a tor-libtor-gen tool, which generates libtor C code that executed that command line new enhancement Medium Tor: unspecified
#31498 clarify that tor's license is free software / open source needs_review enhancement Medium Tor: 0.4.2.x-final
#31502 Revise authority and fallback code so that they use the same "defaults" logic as other code new defect Medium Tor: 0.4.2.x-final
#31507 Change the client default to AvoidDiskWrites 1 new defect Medium Tor: 0.4.2.x-final
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3028 META: Support non-clique topologies on the network new enhancement Low Tor: very long term
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#3266 gabelmoo publishes only 1 extra-info descriptor per week needs_information defect Low Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#3317 Tor should lock its HiddenServiceDirs new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3501 Teach Tor to run the Control Port over TLS new enhancement Low Tor: unspecified
#3522 Allow controllers to post HS descriptors to Tor's cache new enhancement Low Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3782 Add native chroot support to Tor new enhancement Medium Tor: unspecified
#3852 Make DNS resolution happen on particular exit nodes for particular hostnames new enhancement Low Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#3948 "fooport auto" should be able to get a hint new enhancement Low Tor: unspecified
#3982 MAPADDRESS for IP ranges (CIDR, etc) reopened enhancement Medium Tor: unspecified
#4036 Tor relays/bridges can detect when they are being filtered by SSL cert new enhancement Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4233 Exact addition/summation and memory allocation needs_revision enhancement Medium Tor: unspecified
#4310 Reorder tor manpage entries within sections new task Medium Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.