Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1501 - 1600 of 2070)

Ticket Summary Status Owner Type Priority Milestone
#33239 Prop 312: 3.2.3 Limit Directory Authority Addresses to Address and ORPort assigned enhancement Medium
#33240 Prop 312: 3.2.4. Use Own Hostname IPv6 Addresses assigned enhancement Medium
#33241 Prop 312: 3.2.5. Use Directory Header IPv6 Addresses assigned task Medium
#33242 Prop 312: 3.2.5. Make Relays do IPv4 and IPv6 Directory Fetches assigned defect Medium
#33243 Prop 312: 3.2.5. Handle IPv6 Directory Fetch Failures assigned defect Medium
#33244 Prop 312: 3.2.5. Use IPv6 Addresses from Directory Servers assigned enhancement Medium
#33245 Prop 312: 3.2.6. Add an AddressDisableIPv6 torrc option assigned enhancement Medium
#33246 Prop 312: 3.2.7. Automatically Enable an IPv6 ORPort assigned enhancement Medium
#33247 Prop 312: 3.2.7. Publish IPv4 Descriptor on Guessed IPv6 Reachability Failure assigned enhancement Medium
#33248 Prop 312: 3.5.5. Detailed Address Resolution Logs new enhancement Medium
#33249 Prop 312: 4. Update Directory Spec for IPv6 X-Your-Address-Is assigned enhancement Medium
#33252 Prop 312: 5.1. Test Relay IPv6 Addresses Discovery on the Tor Network assigned task Medium
#33253 Prop 312: 5.1. Ask Relay Operators to Test IPv6 Addresses Discovery assigned task Medium
#33262 Prop 313: 3. Write a Script that Counts IPv6 Relays in the Consensus assigned enhancement Medium Tor: unspecified
#33263 Prop 313: 4. Collect IPv6 Bandwidth Stats on Relays and Bridges assigned enhancement Medium Tor: unspecified
#33264 Prop 313: 5. Collect IPv6 Connection Stats on Relays assigned enhancement Medium Tor: unspecified
#33265 Prop 313: 6. Update Directory Spec for IPv6 Stats assigned task Medium Tor: unspecified
#33268 Prop 313: 8.1. Test IPv6 Relay Consensus Counts on the Tor Network assigned task Medium Tor: unspecified
#33270 Prop 313: 8.1. Monitor IPv6 Relay Counts in the Consensus assigned task Medium Tor: unspecified
#33272 Prop 313: 8.2. Test IPv6 Stats on the Tor Network assigned task Medium Tor: unspecified
#33344 mmdb-convert and fresh MMDB - error new defect High
#33348 hourly network throughput dropdown new enhancement Medium
#33371 Build only with required libevent2 libraries new task Medium Tor: unspecified
#33372 Add support for disabling DNSPort new task Medium
#33383 Do we actually need the orconn_ext_or_id_map? new defect Medium Tor: unspecified
#33408 Make tor versions sortable, by adding the commit number to EXTRA_INFO new enhancement Medium Tor: unspecified
#33409 Pre-commit hook does not stash unstaged changes before running code style checkers new defect Medium
#33415 Adjust clang-format name in script to be parameterized new defect Medium Tor: unspecified
#33437 Unsuccessful compilation of tor on FreeBSD system with libssl.so.11 needs_information defect Medium Tor: unspecified
#33469 INTERNAL ERROR: Raw assertion failed at src/lib/malloc/map_anon.c:239: lock_result == 0 needs_information defect High Tor: unspecified
#33513 Check boolean values and semantic versioning in the bandwidth file specification new defect Medium Tor: unspecified
#33530 Dir auths should notice relays with wrong clocks and act somehow (BadClock flag, withhold Guard) new enhancement Medium Tor: unspecified
#33538 v3bw files with too large of weights lead to relays being selected nearly uniformly at random new defect Medium Tor: unspecified
#33542 Orbot not working after the update. new defect Very High
#33547 Config: add a type or helper for range-restricted variables new enhancement Medium Tor: unspecified
#33550 Bandbreiten Problem mit der Brücke new defect Medium Tor: unspecified
#33554 Excessive CPU usage in windows tor_cond_t code? new defect Medium Tor: unspecified
#33582 Make bridges wait until they have bootstrapped, before publishing their descriptor new defect Medium Tor: unspecified
#33603 Catch common errors in tor bash scripts new task Medium Tor: unspecified
#33607 Stop forcing IPv4 and IPv6 traffic on non-SOCKSPorts new defect Medium Tor: 0.4.5.x-final
#33624 Static building tor with openssl does not work needs_revision defect Medium Tor: 0.4.4.x-final
#33632 List ed25519 fingerprints on the command line new enhancement Medium Tor: unspecified
#33681 Refactor using_default_dir_authorities() local address checks assigned task Medium Tor: unspecified
#33687 Create rotating DNS DoH/DoT server list option Trr Core Tor new defect Medium Tor: unspecified
#33702 RSA_get0_d could not be located in the dynamic link library tor.exe assigned defect Medium
#33703 Improving HS availability under DoS (master ticket) new defect Medium Tor: unspecified
#33704 Understand code performance of onion services under DoS new defect Medium Tor: unspecified
#33712 Design a PoW scheme for HS DoS defence new defect Medium Tor: unspecified
#33739 Authority-mode keys and certificates should be owned by dirauth module new defect Medium Tor: unspecified
#33741 Format code blocks inside markdown files (documentation) new enhancement Very Low Tor: unspecified
#33742 Add information about design paper and anonbib inside README.1st new enhancement Very Low Tor: unspecified
#33763 Consider setting TCP_NOTSENT_LOWAT to 1 byte on our TCP connections new enhancement Medium Tor: unspecified
#33767 consider using a GitHub mirror for tor-rust-dependencies new defect Medium Tor: unspecified
#33818 Add options for clients and relays to enable IPv6 extends assigned task Medium Tor: unspecified
#33819 Make clients and bridges send IPv6 extends by default in Tor 0.4.5 new task Medium Tor: 0.4.5.x-final
#33826 Add a testing-only option that turns off IPv4 extends assigned enhancement Medium Tor: unspecified
#33850 log rotation for /var/log/tor/debug.log did not close handle to old file after compression new defect Medium Tor: unspecified
#33861 vanguards: circ_max_megabytes applied to all connection new task High Tor: unspecified
#33889 Functions with char* arguments are dangerous when used with casting new defect Medium Tor: 0.4.4.x-final
#33905 Adjust "large number of connections to other relays" warnings new task Medium Tor: unspecified
#33919 Write unit tests for channel_matches_target_addr_for_extend() needs_revision task Medium Tor: 0.4.4.x-final
#33978 *Proxy and accept *:80 can't coexist new defect Medium Tor: unspecified
#34004 Support for full DNS and DNSSEC resolution needs_review enhancement Medium Tor: 0.4.4.x-final
#34010 Use io_uring when available new enhancement Low Tor: unspecified
#34021 Bundling .a files together in a single libtor.a file new enhancement Medium Tor: unspecified
#34064 Add an AssumeReachable consensus parameter new enhancement Medium Tor: unspecified
#34068 Decide how to handle control port events for IPv6 reachability self-tests new defect Medium Tor: unspecified
#34069 Allow extend_info to contain both IPv4 and IPv6 ORPorts new enhancement Medium Tor: 0.4.5.x-final
#34082 Master ticket for client side rendezvous circuit related bugs that cause reachability problems in HSv3 land new defect Medium Tor: unspecified
#34083 Client rendezvous circuit is no longer in circuit_wait but in pending_entry_connections new defect Medium Tor: unspecified
#34088 circuit_build_times_update_alpha(): Bug: Could not determine largest build time new defect Medium Tor: unspecified
#34130 Tor won't start with seccomp sandbox when compiled with --enable-nss merge_ready defect Medium Tor: 0.4.3.x-final
#34135 Feature suggestion: SOCKS5 internal DNS resolver. new enhancement Medium
#34137 Make sure inform_testing_reachability() reports the correct ports new defect Medium Tor: unspecified
#34139 Build Tor without warnings or test failures with OpenSSL 3.0.0 new enhancement High Tor: unspecified
#34167 PublishServerDescriptor via IPv6 new enhancement Medium Tor: unspecified
#34171 possible single circuit maximum transfer rate regression in typical circuit path cases needs_information defect Medium
#34232 Make summarize_protover_flags() handle NULL and empty string the same new defect Medium Tor: unspecified
#34357 Reject relays running 0.4.1 new task Medium Tor: unspecified
#34400 control: HSFETCH command fails to validate v2 addresses new defect Medium Tor: 0.4.5.x-final
#34412 Additonal unit tests for functions related to ipv6 self-test new defect Medium Tor: 0.4.5.x-final
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
Note: See TracQuery for help on using queries.