Custom Query (1898 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1401 - 1500 of 1898)

5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17807 Use OpenSSL 1.1.0 ASYNC engine support new enhancement Medium Tor: unspecified
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#17927 Use SRWLock for non-recursive locks on vista and later new enhancement Medium Tor: unspecified
#29830 Use UndefinedBehaviorSanitizer when the UBSan configure checks pass, rather than the ASan configure checks new defect Medium Tor: unspecified
#13082 Use a better default torrc new enhancement Medium Tor: unspecified
#9982 Use a better password-based KDF for controller passwords, authority identity key encryption, and more new defect Medium Tor: unspecified
#18308 Use a better pattern for "create mutex if not already initialized" assigned defect Medium Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS assigned defect High Tor: unspecified
#15043 Use acx_pthread.m4 to find pthreads library new defect Medium Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#28247 Use build.rs in place of test_linking_hack needs_revision defect Medium Tor: unspecified
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#17591 Use channel padding to obscure circuit setup assigned enhancement Medium Tor: unspecified
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#29053 Use descriptor structs to deterministically create descriptor dumps new enhancement Medium Tor: unspecified
#7798 Use directory guards even when consensus isn't live needs_information defect Medium Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits assigned enhancement Medium Tor: unspecified
#26335 Use fewer travis builders for typical commits? new defect Medium Tor: unspecified
#25503 Use less space for client-side directory cache assigned task Medium Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#10168 Use monotonic clocks for time as appropriate new enhancement Medium Tor: unspecified
#20930 Use new systemd hardening options new enhancement Medium Tor: unspecified
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#28465 Use or remove "package" lines from votes new metrics-team task Medium Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#31121 Use publish-subscribe system in more places new enhancement Medium Tor: unspecified
#17881 Use return codes from test programs to simplify test scripts new enhancement Low Tor: unspecified
#28246 Use rust stable in Travis new defect Medium Tor: unspecified
#26339 Use same traffic path if destination is the same but the protocol is different. new defect Medium Tor: unspecified
#11595 Use smarter data structures for keeping track of circuit IDs per channel new enhancement Low Tor: unspecified
#9290 Use something other than "known relay" to decide on rate in connection_or_update_token_buckets_helper() on authorities new defect Low Tor: unspecified
#31122 Use subsystems architecture in more places new defect Medium Tor: 0.4.2.x-final
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#31074 Use tor_queue.h macros in config_line_t new defect Low Tor: unspecified
#25978 UseEntryGuards 0 disables EntryNodes new defect Very Low Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#13753 Validate is_canonical more thoroughly new enhancement High Tor: unspecified
#24815 Validate shared random state dates before each voting period assigned asn defect Medium Tor: unspecified
#20153 VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" new defect Medium Tor: unspecified
#16564 WIP: Reject bridge descriptors posted to non-bridge authorities needs_revision teor enhancement High Tor: 0.4.2.x-final
#29840 WTF-PAD: Log padding counters into the heartbeat new defect Low Tor: unspecified
#29083 WTF-PAD: Specify exit policy for machine conditions new defect Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#5409 Warn if we're on Windows, and the user ends a line accepting a directory path with a backslash? assigned Jigsaw52 defect Medium Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#29930 Warning: can't unlink unverified-consensus on Windows new asn defect Medium Tor: unspecified
#17928 Warnings in syslog for wrong permissions on hidden service dir are misleading new enhancement Very Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#14267 We should be smarter about fetching all missing votes new defect Medium Tor: unspecified
#26769 We should make HSv3 desc upload less frequent needs_information neel defect Medium Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#21969 We're missing descriptors for some of our primary entry guards new asn defect Medium Tor: unspecified
#25528 When ClientTransportPlugin is missing, tor connects directly to bridge addresses, even if they have a transport name new defect Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#7966 When Tor hibernates it should eventually resume, but on win7 it reports "address already in use". new defect Medium Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#28742 When a PT listens on IPv4 and IPv6, tor logs [::]:PORT new defect Medium Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#23653 When accessing onion service with no fetchable descriptor, Tor sits around until timeout rather than hanging up assigned asn defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#26664 When an exit tells a client about an IPv6-only hostname, the client should choose another IPv6 exit new defect Medium Tor: unspecified
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#28057 When randomly choosing IPv4 or IPv6, log better IPv6 preference info new enhancement Medium Tor: unspecified
#27647 When randomly choosing IPv4 or IPv6, set IPv6 probability based on IPv6 weight assigned neel enhancement Medium Tor: unspecified
#28510 When relays reset bandwidth tests, the test waits until the next directory document is received new defect Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#20061 When unit testing in Tor2web mode, set the config correctly new defect Medium Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf assigned defect Low Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#18157 Which hidden services am I running? new enhancement Medium Tor: unspecified
#28438 Which macOS build image should we use on Travis? new enhancement Medium Tor: unspecified
#26316 Windows newlines in extrainfo descriptor new defect Medium Tor: unspecified
#23433 Windows relay: 85% of CPU power is wasted inside select() call new defect Medium Tor: unspecified
#28014 Windows support for Travis CI new enhancement Medium Tor: unspecified
#7003 Wipe relay key material from memory on common crash conditions new enhancement High Tor: unspecified
#30060 Work out how (and where) to test chutney's coverage of tor new defect Medium Tor: unspecified
#29130 Work out how to handle multiple reports from the same relay in PrivCount new defect Medium Tor: unspecified
#30049 Work out how to test mixed-version chutney networks in Tor's CI new enhancement Medium Tor: unspecified
#26905 Work out if we need to round observed relay bandwidths to protect individual client usage new task Medium Tor: unspecified
#26904 Work out if we need to round scanner measured bandwidths to protect individual client usage new task Medium Tor: unspecified
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.