Custom Query (1974 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1601 - 1700 of 1974)

Ticket Summary Status Owner Type Priority Milestone
#20931 [prop271] Generate GUARD controller events assigned enhancement Medium Tor: unspecified
#26929 [suggestion] Warning "Skipping obsolete configuration option" should suggest what the replacement is new defect Medium Tor: unspecified
#25708 [test] setenv() failure in util/expand_filename: test: environment corrupt; missing value for MAKEOVER assigned saper task Low Tor: unspecified
#26772 [warn] Introduction circuit established without a rend_intro_point_t object new defect Medium Tor: unspecified
#25416 [warn] Received http status code 404 ("Consensus is too old") from server '194.109.206.212:80' while fetching consensus directory. new defect Medium Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#4391 `GETINFO ns/all` doesn't return 'p' lines -- make something that does! new defect Medium Tor: unspecified
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened nickm defect Medium Tor: unspecified
#19669 `log_prefix_` maybe getting weird output from strftime new defect Low Tor: unspecified
#26691 add 'working DNS' to the list of mandatory requirements for the 'exit' flag new enhancement Medium Tor: unspecified
#11010 add ClientConnectPolicy config option needs_revision enhancement Medium Tor: unspecified
#21453 add ClientTransportPlugin configuration to tor-service-defaults-torrc by default new enhancement Medium Tor: unspecified
#4696 add OutboundBindInterface option to torrc new enhancement Medium Tor: unspecified
#6777 add config option to not rate limit authority dir conns new defect Medium Tor: unspecified
#24498 add configurables for eventdns settings new enhancement Medium Tor: unspecified
#21360 add controller event to track changes to 'getinfo onions/detached' new enhancement Medium Tor: unspecified
#26376 add cross compiling docs needs_information Hello71 enhancement Low Tor: unspecified
#26217 add info that fingerprints in MyFamily are not case-sensitive new enhancement Medium Tor: unspecified
#5271 add log messages when a hidden service consistently doesn't have any preemptive circuit ready new enhancement Very Low Tor: unspecified
#9024 add supplementary groups when changing uid new enhancement Medium Tor: unspecified
#26646 add support for multiple OutboundBindAddressExit IP(ranges) new enhancement Medium Tor: unspecified
#27921 apparent DOS / impairment-of-service against FallbackDirs using DIR requests, please evaluate for possible mitigation new enhancement Medium Tor: unspecified
#26294 attacker can force intro point rotation by ddos needs_revision asn defect Medium Tor: 0.4.3.x-final
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#5081 autoreload ServerTransportPlugin process when the underlying binary changes or requests it? new enhancement Medium Tor: unspecified
#29895 avoid storing ints in void* in mainloop event data new defect Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#19009 bandwidth testing circuits should be allowed to use our guards assigned juga defect Medium Tor: unspecified
#27896 base32 padding inconsistency between client and server in HS v3 client auth preview needs_information defect Medium Tor: unspecified
#22123 baseXX API strictness new enhancement Medium Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#28702 bootstrapping slow at times needs_information defect Medium Tor: unspecified
#28703 bootstrapping very slow with filtered network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#15000 bring some sanity to quoted strings in the controller api needs_revision defect Medium Tor: unspecified
#32472 buf_flush_to_tls: Non-fatal assertion !(flushlen > *buf_flushlen) new defect Medium Tor: 0.4.3.x-final
#27563 cached_dir_t for consensus is redundant with conscache code new enhancement Medium Tor: unspecified
#7480 cached_resolve_t expiration is overengineered new defect Medium Tor: unspecified
#20285 can't create valid case 2b3 consens weight calculation new defect Medium Tor: unspecified
#21117 can't migrate onion services to single-hop onion services assigned defect Medium Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#5048 cbtmintimeout should have a lower maximum new defect Medium Tor: unspecified
#17911 check Tor for local clock leaks new task Medium Tor: unspecified
#32306 check-local target to enforce doxygen-correctness assigned nickm defect Medium Tor: 0.4.3.x-final
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#30990 checkSpace.pl: clean up our list of types new enhancement Low Tor: 0.4.2.x-final
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified
#30992 circpadding machines have shutdown sync issues (with intro circ NACKs and other cases) assigned mikeperry defect Medium Tor: unspecified
#31002 circpadding: Middle node did not accept our padding request assigned mikeperry defect Medium Tor: 0.4.2.x-final
#13800 circuit does not close after hidden service is shutdown via control port new defect Medium Tor: unspecified
#27066 circuit_build_times_update_alpha(): Bug: Could not determine largest build time needs_information defect Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#31608 circuit_state_publish() never triggers when a new origin circuit is created new defect Medium Tor: unspecified
#7755 circuit_t::timestamp_dirty should be cleaned up new defect Medium Tor: unspecified
#28962 circuits are not both ready. Stalling conn. new defect Medium Tor: unspecified
#31116 clarify socks-extensions.txt spec resolve command and response new defect Medium Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags needs_revision ffmancera defect High Tor: unspecified
#21499 client_dns_incr_failures while passing not hostname but only IP new defect Medium Tor: unspecified
#25882 clients not detecting stale onion service introduction points new defect High Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" assigned yawning enhancement Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#13297 compute_weighted_bandwidths() broken for dirauths new defect Medium Tor: unspecified
#27992 config DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDir new defect Low Tor: unspecified
#31638 config: Always check for valid function arguments at the start of each function assigned nickm task Medium Tor: 0.4.3.x-final
#32230 configure summary is confusing or incorrect assigned dgoulet defect Medium Tor: 0.4.3.x-final
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#30344 conn_read_callback is called on connections that are marked for closed merge_ready asn defect Medium Tor: 0.4.1.x-final
#23988 connection_dir_client_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#24609 consdiff implementation in Rust new defect Medium Tor: unspecified
#20284 consensus weight case 2b3 does not follow dir-spec needs_revision pastly defect Medium Tor: unspecified
#28930 consider reordering PT/proxy phases needs_revision ahf enhancement Medium Tor: unspecified
#20272 constraint broken in case 1 of consensus weight calculation new defect Medium Tor: unspecified
#18457 continues to start on unix socket open errors new defect Medium Tor: unspecified
#28279 control: Add a key to GETINFO to fetch the circuit onion handshake rephist values new enhancement Low Tor: unspecified
#28280 control: Add a key to GETINFO to get the DoS subsystem stats new enhancement Low Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19319 controller: GETINFO stats to expose OOM details assigned yawning enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19318 controller: expose cache details. assigned yawning enhancement Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. needs_review enhancement Medium Tor: 0.4.3.x-final
#19325 controller: getinfo to get status of cpuworker queues assigned yawning enhancement Medium Tor: unspecified
#11146 cov-diff utility should handle new source files new defect Very Low Tor: unspecified
#11145 coverage utility should merge multiple output files new defect Very Low Tor: unspecified
#21813 create a JSON-based alternative control port protocol new enhancement Low Tor: unspecified
#21502 create exitnode socksportoption since .node.exit is bad idea new enhancement Low Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#19931 curve25519-donna runtime math errors on armhf needs_information defect Medium Tor: unspecified
#7875 debian obfsproxies can't advertise ports under 1024 new asn defect Medium Tor: unspecified
#31937 decide and document that stuff in the CacheDirectory can be deleted while Tor is running new enhancement Medium
#29656 describe global initialization in our tinytest-based unit tests new defect Medium Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#28095 dirauth key pinning can be bypassed sometimes? new defect Medium Tor: unspecified
Note: See TracQuery for help on using queries.