Custom Query (1977 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1501 - 1600 of 1977)

6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Ticket Summary Status Owner Type Priority Milestone
#26333 Write trac templates for bug reports / other tickets, and link them from somewhere useful new task Medium Tor: unspecified
#26334 Investigate how much our CI performance would improve (if at all) with paid builders new task Medium Tor: unspecified
#26335 Use fewer travis builders for typical commits? new defect Medium Tor: unspecified
#26339 Use same traffic path if destination is the same but the protocol is different. new defect Medium Tor: unspecified
#26359 DoS and timed attacks via unencrypted network time protocols new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() new defect Medium Tor: unspecified
#26369 Re-fetch onion service descriptor for isolated request new defect Medium Tor: unspecified
#26373 test_rust.sh should detect when it's being invoked improperly and error out new defect Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#26464 Static cross-compiling for Windows is broken new Hello71 defect Medium Tor: unspecified
#26478 Unify bandwidth related terms in dir-spec and Tor code. new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#26508 Allow DirAuthority address to be DNS hostname on test networks new defect Medium Tor: unspecified
#26521 Coverity issues for week 25: Coverity thinks some HS tests have memory leaks new defect Medium Tor: unspecified
#26565 Create unit tests for reading measured bandwidths with non-NULL routerstatuses new enhancement Medium Tor: unspecified
#26567 Replace ArgumentCharValue with ValueChar in dir-spec and bandwidth-file-spec new defect Very Low Tor: unspecified
#26578 Do clients request new consensus documents more often than we expect? new defect Medium Tor: unspecified
#26587 --verify-config accepts RelayBandwidthRate with no value? new defect Medium Tor: unspecified
#26591 doc/ missing in build directory for out-of-tree builds new enhancement Low Tor: unspecified
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#26639 Additional SSL Library Support and Fixes new task Medium Tor: unspecified
#26646 add support for multiple OutboundBindAddressExit IP(ranges) new enhancement Medium Tor: unspecified
#26664 When an exit tells a client about an IPv6-only hostname, the client should choose another IPv6 exit new defect Medium Tor: unspecified
#26685 Add ed25519 id support for the hard-coded fallback and authority lists new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#26691 add 'working DNS' to the list of mandatory requirements for the 'exit' flag new enhancement Medium Tor: unspecified
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#26737 File-level documentation for src/core/*/*.[ch] new defect Medium Tor: unspecified
#26738 File-level documentation for src/feature/*/*.[ch] new defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26748 Make core/proto depend only on lib/*, and not used by core/mainloop new defect Medium Tor: unspecified
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#26772 [warn] Introduction circuit established without a rend_intro_point_t object new defect Medium Tor: unspecified
#26778 Enable supporting multiple bridge authorities new defect Medium Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26798 Write unit tests for reading measured bandwidths with non-NULL routerststuses new enhancement Medium Tor: unspecified
#26803 Add a bwfile test to tor's make test-network-all new enhancement Medium Tor: unspecified
#26805 Work out why Tor networks with all-zero bandwidths are unstable new defect Medium Tor: unspecified
#26886 prop295: revise proposal and determine feasability new task Medium Tor: unspecified
#26900 Reduce background compression thread priority new enhancement Low Tor: unspecified
#26904 Work out if we need to round scanner measured bandwidths to protect individual client usage new task Medium Tor: unspecified
#26905 Work out if we need to round observed relay bandwidths to protect individual client usage new task Medium Tor: unspecified
#26910 Could tor drop privileges even earlier? (before trying to access anything on the filesystem beyond its torrc files) new enhancement Medium Tor: unspecified
#26928 Taint untrusted link authentication keys new defect Medium Tor: unspecified
#26929 [suggestion] Warning "Skipping obsolete configuration option" should suggest what the replacement is new defect Medium Tor: unspecified
#26954 Appveyor: Add Rust builds on Windows new enhancement Medium Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells new defect Medium Tor: unspecified
#26993 Tor silently ignores hidden directory when it isn't writable new defect Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#26999 tor_api: Some way to capture stdout/stderr new enhancement Medium Tor: unspecified
#27024 Tor is now TSR and no way to terminate it new defect Medium Tor: unspecified
#27047 Authorities should keep recent consensuses, votes, and bandwidth files new enhancement Medium Tor: unspecified
#27052 document rust/crypto new enhancement Medium Tor: unspecified
#27104 report intermediate status when building application circuits new enhancement Medium Tor: unspecified
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#27207 Examples in CodingStandardsRust.md are wrong new defect Medium Tor: unspecified
#27229 Create fuzzing harness to compare C/Rust Functionality new task Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#27308 report bootstrap phase when we actually start, not just unblock something new enhancement Medium Tor: unspecified
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#27326 Replace packed_cell_t and supporting code with stuff generated by trunnel new enhancement Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27353 intern project idea: a chutney or shadow framework for testing bootstrap speed/success new project Medium Tor: unspecified
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#27376 Travis: Actually use gcc on OS X new defect Medium Tor: unspecified
#27414 Relays should check that their descriptors are UTF-8 before uploading them new enhancement Medium Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27450 Test "make install" in Travis CI new enhancement Medium Tor: unspecified
#27519 missing "Service configured in" for hs-v3 lines in info log new defect Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#27563 cached_dir_t for consensus is redundant with conscache code new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#27594 new warning: Requested exit point '<snip>' is not known. Closing. new defect Medium Tor: unspecified
#27615 Travis cache sticky failures new defect Medium Tor: unspecified
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines new enhancement Medium Tor: unspecified
#27661 use C99 bool from stdbool.h instead of int everywhere new defect Medium Tor: unspecified
#27679 Test dropped cell counting from command_process_relay_cell() new enhancement Medium Tor: unspecified
#27691 reset bootstrap progress when enough things change new enhancement Medium Tor: unspecified
#27694 what happens if we have both a firewall-bypass proxy and a pluggable transport? new project Medium Tor: unspecified
#27712 Introduce Finite State Machine abstraction into Tor codebase new enhancement Medium Tor: very long term
#27713 uncrustify config file to autofix C code whitespace and indentation new enhancement Medium Tor: unspecified
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges new defect Medium Tor: unspecified
#27725 Stealthy onions should appear to be offline new defect Medium Tor: unspecified
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Note: See TracQuery for help on using queries.