Custom Query (1865 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1501 - 1600 of 1865)

6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#30817 Write a proposal for tor bootstrapping that works on slow links, but avoids slow relays assigned teor task Medium Tor: unspecified
#22826 Write a spec for unsanitised bridge descriptor formats assigned isis enhancement Low Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#19068 Write and run a clique reachability test. new task Medium Tor: unspecified
#23891 Write blogpost on future/expectations for Rust in tor? new task Medium Tor: unspecified
#10817 Write instructions for using valgrind with the debian tor new task Very Low Tor: unspecified
#5915 Write patch to make socks handshakes succeed instantly needs_information enhancement Medium Tor: 0.4.2.x-final
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#6790 Write proposal draft for directory mirrors to accept, aggregate and hand off descriptors to dirauths new enhancement Medium Tor: unspecified
#9689 Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery new project Medium Tor: unspecified
#4826 Write proposal for improved consensus voting schedules new enhancement Medium Tor: unspecified
#5392 Write proposal for n23 patch behavior needs_revision task Medium Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. assigned project High Tor: unspecified
#25841 Write test for Rust fragile hardening new enhancement Medium Tor: unspecified
#28841 Write tool for onion service health assessment needs_information project Medium Tor: unspecified
#26333 Write trac templates for bug reports / other tickets, and link them from somewhere useful new task Medium Tor: unspecified
#26798 Write unit tests for reading measured bandwidths with non-NULL routerststuses new enhancement Medium Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? needs_revision defect Medium Tor: unspecified
#30987 [PATCH] Add support for seccomp on powerpc64 needs_review enhancement Medium Tor: 0.4.2.x-final
#7590 [PATCH] New option LocalOutboundBindAddress needs_revision enhancement Medium Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#28522 [armhf] (Sandbox) Caught a bad syscall attempt new defect Low Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#15660 [feature suggestion] Need signal to totally switch to the new set of circuits new defect Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events assigned enhancement Medium Tor: unspecified
#26929 [suggestion] Warning "Skipping obsolete configuration option" should suggest what the replacement is new defect Medium Tor: unspecified
#25708 [test] setenv() failure in util/expand_filename: test: environment corrupt; missing value for MAKEOVER assigned saper task Low Tor: unspecified
#26772 [warn] Introduction circuit established without a rend_intro_point_t object new defect Medium Tor: unspecified
#25416 [warn] Received http status code 404 ("Consensus is too old") from server '194.109.206.212:80' while fetching consensus directory. new defect Medium Tor: unspecified
#30942 [warn] Unexpected INTRODUCE_ACK on circuit 3944288021. new defect Medium Tor: 0.4.2.x-final
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#4391 `GETINFO ns/all` doesn't return 'p' lines -- make something that does! new defect Medium Tor: unspecified
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened nickm defect Medium Tor: unspecified
#19669 `log_prefix_` maybe getting weird output from strftime new defect Low Tor: unspecified
#26691 add 'working DNS' to the list of mandatory requirements for the 'exit' flag new enhancement Medium Tor: unspecified
#11010 add ClientConnectPolicy config option needs_revision enhancement Medium Tor: unspecified
#21453 add ClientTransportPlugin configuration to tor-service-defaults-torrc by default new enhancement Medium Tor: unspecified
#4696 add OutboundBindInterface option to torrc new enhancement Medium Tor: unspecified
#6777 add config option to not rate limit authority dir conns new defect Medium Tor: unspecified
#24498 add configurables for eventdns settings new enhancement Medium Tor: unspecified
#21360 add controller event to track changes to 'getinfo onions/detached' new enhancement Medium Tor: unspecified
#26376 add cross compiling docs needs_information Hello71 enhancement Low Tor: unspecified
#26217 add info that fingerprints in MyFamily are not case-sensitive new enhancement Medium Tor: unspecified
#5271 add log messages when a hidden service consistently doesn't have any preemptive circuit ready new enhancement Very Low Tor: unspecified
#9024 add supplementary groups when changing uid new enhancement Medium Tor: unspecified
#26646 add support for multiple OutboundBindAddressExit IP(ranges) new enhancement Medium Tor: unspecified
#27921 apparent DOS / impairment-of-service against FallbackDirs using DIR requests, please evaluate for possible mitigation new enhancement Medium Tor: unspecified
#30916 assert in dimap_add_entry() new defect Medium Tor: 0.4.2.x-final
#26294 attacker can force intro point rotation by ddos assigned asn defect Medium Tor: unspecified
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#5081 autoreload ServerTransportPlugin process when the underlying binary changes or requests it? new enhancement Medium Tor: unspecified
#29895 avoid storing ints in void* in mainloop event data new defect Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#19009 bandwidth testing circuits should be allowed to use our guards assigned juga defect Medium Tor: unspecified
#27896 base32 padding inconsistency between client and server in HS v3 client auth preview needs_information defect Medium Tor: unspecified
#22123 baseXX API strictness new enhancement Medium Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#28702 bootstrapping slow at times needs_information defect Medium Tor: unspecified
#28703 bootstrapping very slow with filtered network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#15000 bring some sanity to quoted strings in the controller api needs_revision defect Medium Tor: unspecified
#27563 cached_dir_t for consensus is redundant with conscache code new enhancement Medium Tor: unspecified
#7480 cached_resolve_t expiration is overengineered new defect Medium Tor: unspecified
#20285 can't create valid case 2b3 consens weight calculation new defect Medium Tor: unspecified
#21117 can't migrate onion services to single-hop onion services assigned defect Medium Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#5048 cbtmintimeout should have a lower maximum new defect Medium Tor: unspecified
#17911 check Tor for local clock leaks new task Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified
#13800 circuit does not close after hidden service is shutdown via control port new defect Medium Tor: unspecified
#29034 circuit: Cleanup an HS circuit when it is being re-purposed merge_ready mikeperry defect High Tor: 0.4.0.x-final
#27066 circuit_build_times_update_alpha(): Bug: Could not determine largest build time needs_information defect Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#30871 circuit_mark_for_close_(): Bug: Duplicate call to circuit_mark_for_close at ../src/feature/hs/hs_service.c:3166 (first at ../src/feature/hs/hs_service.c:2385) needs_review dgoulet defect Medium Tor: 0.4.2.x-final
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#7755 circuit_t::timestamp_dirty should be cleaned up new defect Medium Tor: unspecified
#28962 circuits are not both ready. Stalling conn. new defect Medium Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags needs_revision ffmancera defect High Tor: unspecified
#21499 client_dns_incr_failures while passing not hostname but only IP new defect Medium Tor: unspecified
#25882 clients not detecting stale onion service introduction points assigned defect High Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" assigned yawning enhancement Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance assigned neel enhancement Medium Tor: unspecified
#13297 compute_weighted_bandwidths() broken for dirauths new defect Medium Tor: unspecified
#27992 config DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDir new defect Low Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#30344 conn_read_callback is called on connections that are marked for closed new defect Medium Tor: 0.4.2.x-final
#23988 connection_dir_client_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#24609 consdiff implementation in Rust new defect Medium Tor: unspecified
#20284 consensus weight case 2b3 does not follow dir-spec needs_revision pastly defect Medium Tor: unspecified
#28930 consider reordering PT/proxy phases assigned ahf enhancement Medium Tor: unspecified
#20272 constraint broken in case 1 of consensus weight calculation new defect Medium Tor: unspecified
6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.