Custom Query (2028 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1501 - 1600 of 2028)

Ticket Summary Status Owner Type Priority Milestone
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#24100 Support exit notice page in multiple multiple languages new enhancement Low Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24194 Expose expiry of identity key in descriptor? new enhancement Medium Tor: unspecified
#24249 Create automated mechanism for C/Rust types to stay in sync needs_information chelseakomlo enhancement Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends needs_review enhancement Medium Tor: 0.4.4.x-final
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#24498 add configurables for eventdns settings new enhancement Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t assigned enhancement Very High Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24617 Feature flags for new controller-accessible Tor features new enhancement Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24833 DNS not reliably returning AAAA records new enhancement Medium Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25066 Rendezvous points should return signed proof of the established rend point new enhancement Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25203 document max. value of SigningKeyLifetime new enhancement Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#25504 Find more generic ways to handle smartlist_t/Vec<T> between C and Rust new enhancement Medium Tor: unspecified
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells assigned enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#25841 Write test for Rust fragile hardening new enhancement Medium Tor: unspecified
#25892 Replace RejectPlaintextPorts with RejectPlaintextPortPolicy reopened enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#25955 onion v2 deprecation plan new enhancement Medium Tor: unspecified
#25964 Remove hs_index_t fetch, and use one of the stores instead new enhancement Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26094 increase minimal bandwidth requirements, update the manpage, relay guide and FAQ assigned enhancement Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#26168 Rename HSDir consensus flag to OnionDir new enhancement Medium Tor: unspecified
#26217 add info that fingerprints in MyFamily are not case-sensitive new enhancement Medium Tor: unspecified
#26262 Create unittests for circuit timeout tracking new enhancement Medium Tor: unspecified
#26265 A proposal and demo for a fuzzing system that works with Rust through C code needs_revision enhancement Low Tor: unspecified
#26286 Update contributor document to explain the transition to travis-ci.com new enhancement Medium Tor: unspecified
#26287 run callgraph tool from Travis new enhancement Medium Tor: unspecified
#26289 use a pub/sub model for the "consensus changed" event new enhancement Medium Tor: unspecified
#26290 Log information from the relay connection failed cache in heartbeats new enhancement Medium Tor: unspecified
#26292 Subsystem for gathering information about local connection states assigned enhancement Medium Tor: unspecified
#26296 Refactor cell crypto to pre/post crypto operations assigned chelseakomlo enhancement Medium Tor: unspecified
#26306 HTTPS proxy doesn't use TLS new enhancement Low Tor: unspecified
#26337 Investigate making rust error types use the failure crate needs_information enhancement Medium Tor: unspecified
#26374 MacOS Sandbox assigned enhancement Medium Tor: unspecified
#26376 add cross compiling docs needs_information Hello71 enhancement Low Tor: unspecified
#26425 Add functionality to set SNI for client connections needs_information enhancement Medium Tor: unspecified
#26565 Create unit tests for reading measured bandwidths with non-NULL routerstatuses new enhancement Medium Tor: unspecified
#26591 doc/ missing in build directory for out-of-tree builds new enhancement Low Tor: unspecified
#26646 add support for multiple OutboundBindAddressExit IP(ranges) new enhancement Medium Tor: unspecified
#26685 Add ed25519 id support for the hard-coded fallback and authority lists new enhancement Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#26689 No support for an upstream proxy that uses NTLM authentication new enhancement Medium Tor: unspecified
#26691 add 'working DNS' to the list of mandatory requirements for the 'exit' flag new enhancement Medium Tor: unspecified
Note: See TracQuery for help on using queries.