Custom Query (1970 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1601 - 1700 of 1970)

Ticket Summary Status Owner Type Priority Milestone
#31669 Invalid signature for service descriptor signing key: expired new defect Medium Tor: unspecified
#31683 md: Bad family line in cached-microdescs.new assigned nickm defect Medium Tor: 0.4.2.x-final
#31684 Add control port GETINFO support for dumping the local consensus merge_ready task Medium Tor: 0.4.3.x-final
#31699 Remove unused configure.ac checks new defect Medium Tor: unspecified
#31705 Add sufficient coccinelle tooling to run coccinelle without stress needs_revision nickm task Medium Tor: 0.4.2.x-final
#31706 Expose config flags to the controller new enhancement Medium Tor: unspecified
#31707 Better handling and UX for missing and expired guard descriptors new defect Medium Tor: unspecified
#31713 Automatically run the autostyle scripts before every commit new enhancement Medium Tor: unspecified
#31735 Exit and join all threads, before destroying any mutexes in the main thread new defect Medium Tor: unspecified
#31736 Stop using mutex_destroy(), when multiple threads can still access the mutex merge_ready teor defect Medium Tor: 0.4.1.x-final
#31737 Change handling of relative paths in %include directives? new task Medium Tor: unspecified
#31742 Write a script or makefile target to install git hooks new enhancement Medium
#31754 Add HS DoS defence stats to heartbeat new defect Medium Tor: 0.4.3.x-final
#31756 Cover all configuration options with test_parseconf.sh new task Medium Tor: unspecified
#31762 Add GETINFO dir/status-vote/current/consensus-microdesc to the control spec new task Medium Tor: 0.4.3.x-final
#31770 Divide connection_edge.c into separate files. assigned nickm task Medium Tor: 0.4.2.x-final
#31782 Circuit padding is not subject to flow control new enhancement Medium
#31783 Circuit padding support for multi-circuit behavior new enhancement Medium
#31787 Full HMM support for circuit padding state transition new enhancement Medium
#31788 Circuit padding trace simulator new enhancement Medium
#31789 Make networking usage in circuit padding more abstract new enhancement Medium
#31790 Add easy-to-parse event and packet tracing logs to circuit padding new enhancement Medium
#31812 http URL's in docs/comments should be https needs_revision defect Medium Tor: 0.4.2.x-final
#31820 Drop support for OpenSSL < 1.1.1 new task Medium Tor: 0.4.3.x-final
#31829 In 0.4.3, drop support for Python 2 new defect Medium Tor: 0.4.3.x-final
#31837 Make test_rebind.py more robust needs_revision teor defect Medium Tor: 0.4.2.x-final
#31850 Integrate tor-guts Makefile into tor's build process new defect Medium Tor: 0.4.3.x-final
#31851 Allow Tor to be compiled without support for relay mode new teor task Medium Tor: 0.4.3.x-final
#31852 Rename doc/HACKING/design members to reflect current architectural division assigned nickm defect Medium Tor: 0.4.3.x-final
#31853 Move this_not_that.md into our coding standards document needs_revision task Medium Tor: 0.4.3.x-final
#31862 Add a beta RUST_VERSION build to Travis CI new task Medium Tor: unspecified
#31869 Run doctest on all of our python files new task Medium Tor: 0.4.2.x-final
#31882 move Android build config into core tor needs_review defect Medium Tor: 0.4.3.x-final
#31884 Define ExecuteBash in the Appveyor error block merge_ready teor defect Medium Tor: 0.4.1.x-final
#31891 make autostyle doesn't work when building outside the source tree new defect Medium Tor: unspecified
#31898 Occasional crash during shutdown when using Tor API merge_ready nickm defect Medium Tor: 0.4.1.x-final
#31908 Unify meaning of routerset NULL and routerset "" to avoid recurrence of #31495 new enhancement Medium Tor: 0.4.3.x-final
#31912 Port miscellaneous scripts to Python 3. new task Medium Tor: 0.4.3.x-final
#31913 Add more robust Tor API documentation new enhancement Medium Tor: 0.4.3.x-final
#31919 Add a check-local target that runs our coccinelle parsing problems script new enhancement Medium Tor: 0.4.2.x-final
#31921 Wrap our Travis commands with travis_retry, to mitigate network timeouts new defect Medium Tor: unspecified
#31937 decide and document that stuff in the CacheDirectory can be deleted while Tor is running new enhancement Medium
#31939 log spam: Bug: buffers_tls.c:73: buf_read_from_tls: Non-fatal assertion !(buf->datalen >= INT_MAX - at_most) failed. merge_ready teor defect Medium Tor: 0.4.1.x-final
#31940 Fail unit tests that hang new enhancement Medium Tor: 0.4.3.x-final
#31943 Review pull request: reorganized Tor manual needs_review swati enhancement Medium Tor: 0.4.3.x-final
#31970 Address not work with Socks5Proxy new defect Medium
#31972 tor-spec: We should specify how clients pick between different handshake types new defect Medium Tor: unspecified
#31999 Default log file is handled inconsistently needs_revision defect Medium Tor: 0.4.3.x-final
#32020 hsv3: Client do not report failing circuit back into HS subsystem new defect Medium Tor: 0.4.3.x-final
#32021 hs-v3: Handle rendezvous client circuit build expire properly new defect Medium Tor: 0.4.3.x-final
#32022 Bug: buffers_tls.c:73: buf_read_from_tls: Non-fatal assertion !(buf->datalen >= INT_MAX - at_most) failed. new defect Medium Tor: unspecified
#32032 Assertion mp->conf_state == PT_PROTO_COMPLETED failed in managed_proxy_stdout_callback assigned ahf defect Medium Tor: 0.4.2.x-final
#32034 tor reads PT protocol messages from stderr new defect Medium Tor: 0.4.3.x-final
#32036 output debug logs to logcat as early as possible on Android new enhancement Medium
#32040 HS intro padding machine reactivates after receiving INTRODUCE_ACK new defect Medium Tor: 0.4.3.x-final
#32048 Loading a high number of Onion V3 Descriptors trough Tor Control Port lead to sustained 100% CPU new defect Medium Tor: 0.4.3.x-final
#32060 CID 1454761: wrong type passed to unlock_cb_buf()? assigned teor defect Medium Tor: 0.4.2.x-final
#32067 Content revisions on doc/HACKING/design: describe important parts of lib. assigned nickm defect Medium Tor: 0.4.3.x-final
#32071 Remove perl scripts from development process? new defect Medium Tor: unspecified
#32086 Try Visual Studio 2019 image in appveyor assigned teor enhancement Medium Tor: 0.4.2.x-final
#32088 Proposal 271 - straightforward improvements needs_review enhancement Medium Tor: 0.4.3.x-final
#32091 optional TUN interface to tor for mobile new enhancement Medium Tor: unspecified
#32094 hs-v3: Stop using ip->circuit_established flag assigned dgoulet defect Medium Tor: 0.4.3.x-final
#32100 Resolve all doxygen warnings accepted nickm defect Medium Tor: 0.4.3.x-final
#32101 Generate and publish doxygen output automatically new task Medium Tor: 0.4.3.x-final
#32102 Add build information to binary new enhancement Medium Tor: unspecified
#32103 Subsystem "thread_cleanup" is never called needs_review defect Medium Tor: 0.4.2.x-final
#32106 tor man page should clarify that KBytes is 1024 bytes needs_review defect Medium Tor: 0.4.3.x-final
#32108 tor can overrun its accountingmax if it enters soft hibernation first new defect Medium Tor: 0.4.3.x-final
#32121 Refactor some common configs and functions out of the git scripts. new enhancement Medium Tor: unspecified
#32122 Add tests for the git scripts new enhancement Medium Tor: unspecified
#32123 Implement minimal --disable-relay-mode needs_revision teor enhancement Medium Tor: 0.4.3.x-final
#32137 Split feature/include.am out of core/include.am new task Medium Tor: unspecified
#32139 Disable dirauth and relay options when those modules are disabled new enhancement Medium Tor: 0.4.3.x-final
#32140 single onion: Padding negotiated cell from wrong hop new defect Medium Tor: 0.4.2.x-final
#32141 single onion v3 IPv6 intro circuit BUG() warnings new defect Medium Tor: 0.4.2.x-final
#32143 Build some CI jobs with ALL_BUGS_ARE_FATAL new task Medium Tor: 0.4.2.x-final
#32157 When bridges lines leave out the fingerprint, how should controllers look them up by id? new defect Medium
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#449 dns failures prevent legitimate options being set assigned defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
Note: See TracQuery for help on using queries.