Custom Query (1970 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1401 - 1500 of 1970)

5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21360 add controller event to track changes to 'getinfo onions/detached' new enhancement Medium Tor: unspecified
#21397 Tor TransparentProxy documentation: add IPv6 support / port to nftables new enhancement Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21453 add ClientTransportPlugin configuration to tor-service-defaults-torrc by default new enhancement Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21502 create exitnode socksportoption since .node.exit is bad idea new enhancement Low Tor: unspecified
#21503 ship default MapAddress for at least torproject.org hosts new enhancement Low Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21813 create a JSON-based alternative control port protocol new enhancement Low Tor: unspecified
#21816 Add support for Pluggable Transports 2.0 needs_revision dasyatid1 enhancement Medium Tor: unspecified
#21910 Refactor connection_edge_process_relay_cell() new enhancement Low Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#22049 The various proxy options should support an AF_LOCAL socket. new enhancement Low Tor: unspecified
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22123 baseXX API strictness new enhancement Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#22251 Spec should change: stop requiring Tor relays to support old link versions new enhancement Medium Tor: unspecified
#22304 Support generating HS private key / onion address without publishing new enhancement Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#22312 Refactor/Simplify to clarify "we cache dir info" vs "we invite clients to use us as a directory guard" new enhancement Medium Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#22363 Make our test network public new enhancement Medium Tor: unspecified
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22697 Tor should mandatory require brackets around ipv6 address new enhancement Medium Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#22826 Write a spec for unsanitised bridge descriptor formats assigned enhancement Low Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor assigned teor enhancement Very High Tor: 0.4.3.x-final
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#23006 Test connection speed new enhancement Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23119 Make Tors no longer warn if they're running a newer-than-recommended version? new enhancement Medium Tor: unspecified
#23126 HSDirs should publish some count about new-style onion addresses new enhancement Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23232 misleading log message related to used SSL vendor needs_information enhancement Low Tor: unspecified
#23277 ApplicationControlSocket: the way for apps to control Tor new enhancement Medium Tor: unspecified
#23278 Give user option to use non-Exit Guards only reopened enhancement Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile new enhancement Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23579 sched: Add accessors for channel_pending list assigned enhancement Medium Tor: unspecified
#23595 Support KIST on other platforms. new enhancement Medium Tor: unspecified
#23777 tor spends a lot of time in malloc/free new enhancement Medium Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#23886 Write FFI bindings and function pointers for ed25519-dalek new enhancement Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned enhancement Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#24100 Support exit notice page in multiple multiple languages new enhancement Low Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24194 Expose expiry of identity key in descriptor? new enhancement Medium Tor: unspecified
#24249 Create automated mechanism for C/Rust types to stay in sync needs_information chelseakomlo enhancement Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.