#28220 |
Create a chutney network with a single authority, and make sure it bootstraps
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28229 |
Possible race condition opening SOCKS Port in test_rebind.py
|
new
|
rl1987
|
defect
|
Medium
|
Tor: unspecified
|
#28241 |
Corrupt cached consensus and microdescs
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#28244 |
Followup tasks for Rust asan CI fixes
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#28246 |
Use rust stable in Travis
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28247 |
Use build.rs in place of test_linking_hack
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#28248 |
Add comments around rust compilation flags
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28250 |
"___UsingTestNetworkDefaults" not in "GETINFO config/names"
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28256 |
Add tests for UTF-8 encoded torrcs on Windows
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28279 |
control: Add a key to GETINFO to fetch the circuit onion handshake rephist values
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#28280 |
control: Add a key to GETINFO to get the DoS subsystem stats
|
needs_revision
|
|
enhancement
|
Low
|
Tor: 0.4.3.x-final
|
#28307 |
DisableNetwork is set
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28309 |
Log the rust version when printing other library versions
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28311 |
Call expand_filename (e.g. for ~ expansion) on all FILENAME config options
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28344 |
Should we log \r\n on Windows?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28356 |
DataDirectoryGroupReadable and CacheDirectoryGroupReadable conflicts forcing sandboxed Tor to crash
|
assigned
|
|
defect
|
High
|
Tor: unspecified
|
#28361 |
Allow few nodes-list options in torrc
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#28363 |
Make a torrc option which prevents Tor from falling asleep
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28377 |
Add libnss to the travis apt and macOS packages
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28378 |
Add libsystemd-devel to the travis config, if available
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28423 |
improve precision of finegrained periodic event scheduling?
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28424 |
Refactor hs_service_callback() to no longer need to run once per second?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28438 |
Which macOS build image should we use on Travis?
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28439 |
Test static builds using Travis CI
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28449 |
Do we really need to run retry_listeners_callback so often?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28455 |
Appveyor: add --enable-nss on Windows and macOS
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28457 |
Appveyor: make doesn't stop when the first child process fails
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28465 |
Use or remove "package" lines from votes
|
new
|
metrics-team
|
task
|
Medium
|
Tor: unspecified
|
#28481 |
Tor's startup time is getting slower on Android
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28509 |
Limit relay bandwidth self-tests based on RelayBandwidthRate, not BandwidthRate
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28510 |
When relays reset bandwidth tests, the test waits until the next directory document is received
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28511 |
Limit the number of open testing circuits, and the total number of testing circuits
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28512 |
Increase NUM_PARALLEL_TESTING_CIRCS to avoid circuit windows
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28514 |
Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28522 |
[armhf] (Sandbox) Caught a bad syscall attempt
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#28582 |
Document the load-balancing goal for sbws
|
needs_information
|
|
task
|
Medium
|
Tor: unspecified
|
#28593 |
On macOS/iOS, experiment with SystemConfiguration.framework to get a list of network interfaces
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28597 |
Document SOCKSPolicy better
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28611 |
Add `-mstack-protector-guard=global` to CFLAGS instead of `--disable-gcc-hardening` configure option on Windows?
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28638 |
Serialize state machines in the torrc
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#28653 |
Specify IPv4 and IPv6 weight calculations in dir-spec.txt
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28659 |
Appveyor CI: error removing temporary directories - permission denied
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28664 |
Describe consensus digest calculation
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28673 |
Make private_nets aware of Carrier Grade NAT (RFC 6598)
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28675 |
Deprecate standard cookie authentication
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28676 |
Tor versions of Tor nodes should be accessible through ControlPort
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28679 |
Bridge connections on startup
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#28702 |
bootstrapping slow at times
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#28703 |
bootstrapping very slow with filtered network
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28714 |
"No circuits are opened" on controllers that DisablePredictedCircuits and build 2-hop circuits
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28733 |
{CONSDIFF} Refusing to apply consensus diff
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#28734 |
CIRC_BW is only for origin circuits
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28739 |
Add more tests for assigning voting flags in test_voting_flags.c
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28742 |
When a PT listens on IPv4 and IPv6, tor logs [::]:PORT
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28743 |
Tinytest library leaks out into non-test codebase
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28760 |
Option/* format for ControlPort options needs to be homogeneous
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28772 |
DNS resolver at DNSPort stops working after some time, while tor is working. Only restart helps.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28777 |
Split circuitpadding.c code into multiple modules
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#28804 |
Add circuit padding to padding-spec.txt and write a doc for researchers
|
needs_revision
|
mikeperry
|
defect
|
High
|
Tor: unspecified
|
#28821 |
Introduce timer_is_scheduled() method and replace padding_scheduled_at_us
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#28845 |
evloop could be better at handling fork() in tests
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28849 |
Handle dormant mode in process library and for PT's
|
needs_information
|
|
enhancement
|
High
|
Tor: unspecified
|
#28860 |
Increased DNS failure rate when using ServerDNSResolvConfFile with tor 0.3.4.9 (as opposed to 0.3.3.x)
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28877 |
'GETINFO desc/fingerprints' command to get known relays
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28899 |
nondeterministic coverage of dirvote.c and shared_random.c
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28919 |
Log IPv4 and IPv6 connections in Tor's heartbeat message
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28926 |
improve reporting of directory bootstrap progress
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28930 |
consider reordering PT/proxy phases
|
needs_revision
|
ahf
|
enhancement
|
Medium
|
Tor: unspecified
|
#28944 |
Debian logrotate misses line "su"
|
needs_information
|
|
defect
|
Low
|
Tor: unspecified
|
#28954 |
fuzz-descriptor aborts with a crash
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28962 |
circuits are not both ready. Stalling conn.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#28967 |
Tor control command to connect to Onion Service
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28968 |
Onion Service v2 connection status update event
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28969 |
Onion Service v3 connection status update event
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28977 |
Remove workaround from ticket #28973 once OpenSSL 1.1.1a is long-gone
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#28982 |
Refactor GETINFO dir/ so that new tor/ URLs automatically become GETINFOs
|
accepted
|
rl1987
|
enhancement
|
Medium
|
Tor: unspecified
|
#29004 |
PrivCount proof of concept: implement check counters
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29005 |
PrivCount proof of concept: implement consumed bandwidth counters
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29006 |
PrivCount proof of concept: add noise to counters
|
assigned
|
|
enhancement
|
Low
|
Tor: unspecified
|
#29007 |
PrivCount proof of concept: implement debugging for PrivCount
|
assigned
|
|
enhancement
|
Low
|
Tor: unspecified
|
#29008 |
PrivCount proof of concept: add a PrivCount module, torrc option, and protocol
|
assigned
|
|
enhancement
|
Low
|
Tor: unspecified
|
#29009 |
PrivCount proof of concept: use blinding and Shamir secret sharing
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29010 |
PrivCount proof of concept: work out how to do CI for PrivCount using chutney
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29019 |
Make relays report bandwidth usage more often in test networks
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29027 |
PrivCount proof of concept: put the PrivCount statistics in a stats/ file
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29053 |
Use descriptor structs to deterministically create descriptor dumps
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29054 |
prop224: Implement offline keys for v3 onion services
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29083 |
WTF-PAD: Specify exit policy for machine conditions
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29084 |
Ensure circuit padding RTT estimate handes var cells/wide creates
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29090 |
Tor Browser session resumption is very slow
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#29098 |
Load balance properly in the presence of padding overhead
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#29110 |
Allow passing seed value to slow/prop_distr/* tests
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#29112 |
PTs should pass user count events back to Tor
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29113 |
Add IPv4/IPv6 connections to the heartbeat
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29114 |
Extended ORPort and TransportControlPort spec (#196) is "Finished" but not "Closed"
|
new
|
|
project
|
Low
|
Tor: unspecified
|
#29115 |
Make sure state file data types match the struct datatypes
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#29128 |
Place complete obfs4 bridge line in accessible location
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29129 |
PrivCount proof of concept: decide if we want to remove bandwidth statistics
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29130 |
Work out how to handle multiple reports from the same relay in PrivCount
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29131 |
Split rephist.c into modules for each type of statistic
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|