Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1601 - 1700 of 2070)

Ticket Summary Status Owner Type Priority Milestone
#29083 WTF-PAD: Specify exit policy for machine conditions new defect Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#5409 Warn if we're on Windows, and the user ends a line accepting a directory path with a backslash? assigned Jigsaw52 defect Medium Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#33352 Warning: RELAY_COMMAND_INTRODUCE_ACK on padding circuit assigned asn defect Medium Tor: 0.4.4.x-final
#29930 Warning: can't unlink unverified-consensus on Windows new asn defect Medium Tor: unspecified
#17928 Warnings in syslog for wrong permissions on hidden service dir are misleading new enhancement Very Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#14267 We should be smarter about fetching all missing votes new defect Medium Tor: unspecified
#26769 We should make HSv3 desc upload less frequent needs_information defect Medium Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#21969 We're missing descriptors for some of our primary entry guards new asn defect Medium Tor: unspecified
#25528 When ClientTransportPlugin is missing, tor connects directly to bridge addresses, even if they have a transport name new defect Medium Tor: unspecified
#19069 When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can still launch circuits new defect Medium Tor: unspecified
#7966 When Tor hibernates it should eventually resume, but on win7 it reports "address already in use". new defect Medium Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#28742 When a PT listens on IPv4 and IPv6, tor logs [::]:PORT new defect Medium Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#23653 When accessing onion service with no fetchable descriptor, Tor sits around until timeout rather than hanging up assigned asn defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#26664 When an exit tells a client about an IPv6-only hostname, the client should choose another IPv6 exit new defect Medium Tor: unspecified
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#32157 When bridges lines leave out the fingerprint, how should controllers look them up by id? new defect Medium
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#28510 When relays reset bandwidth tests, the test waits until the next directory document is received new defect Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#33072 When under load, give 503 aggressively for dirport requests without compression needs_revision dgoulet defect Medium Tor: 0.4.4.x-final
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf new defect Low Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#18157 Which hidden services am I running? new enhancement Medium Tor: unspecified
#28438 Which macOS build image should we use on Travis? new enhancement Medium Tor: unspecified
#26316 Windows newlines in extrainfo descriptor new defect Medium Tor: unspecified
#23433 Windows relay: 85% of CPU power is wasted inside select() call new defect Medium Tor: unspecified
#28014 Windows support for Travis CI new enhancement Medium Tor: unspecified
#7003 Wipe relay key material from memory on common crash conditions new enhancement High Tor: unspecified
#30060 Work out how (and where) to test chutney's coverage of tor new defect Medium Tor: unspecified
#29130 Work out how to handle multiple reports from the same relay in PrivCount new defect Medium Tor: unspecified
#30049 Work out how to test mixed-version chutney networks in Tor's CI new enhancement Medium Tor: unspecified
#26905 Work out if we need to round observed relay bandwidths to protect individual client usage new task Medium Tor: unspecified
#26904 Work out if we need to round scanner measured bandwidths to protect individual client usage new task Medium Tor: unspecified
#29270 Work out the config and control interfaces to PrivCount new enhancement Medium Tor: unspecified
#26805 Work out why Tor networks with all-zero bandwidths are unstable new defect Medium Tor: unspecified
#8278 Wrap conditionally-compiled C files in #ifdefs new enhancement Medium Tor: unspecified
#31921 Wrap our Travis commands with travis_retry, to mitigate network timeouts new defect Medium Tor: unspecified
#7106 Write "how to be nice to the Tor network" spec new project Medium Tor: unspecified
#29219 Write (more) guidelines for Tor coding best practices new enhancement Medium Tor: unspecified
#23886 Write FFI bindings and function pointers for ed25519-dalek new enhancement Medium Tor: unspecified
#29232 Write a function that prints a link specifier and link specifier list new enhancement Medium Tor: unspecified
#25507 Write a guide for groups planning to submit big patches to Tor. new task Medium Tor: unspecified
#31238 Write a nontrivial "preferred" rust module new enhancement Medium Tor: unspecified
#18638 Write a proposal for PK handshake that uses more client resources than server. assigned yawning task Medium Tor: unspecified
#11158 Write a proposal for a "couldn't reach consensus" statement new enhancement Medium Tor: unspecified
#24990 Write a proposal for a post-quantum lattice KEX new task Medium Tor: unspecified
#11119 Write a proposal for client-side key pinning needs_information defect Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#30817 Write a proposal for tor bootstrapping that works on slow links, but avoids slow relays new task Medium Tor: unspecified
#31742 Write a script or makefile target to install git hooks new enhancement Medium
#22826 Write a spec for unsanitised bridge descriptor formats new enhancement Low Tor: unspecified
#31631 Write a test for round-trip encode/decode operations on configuration objects. accepted nickm enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#19068 Write and run a clique reachability test. new task Medium Tor: unspecified
#23891 Write blogpost on future/expectations for Rust in tor? new task Medium Tor: unspecified
#33843 Write detailed priority queue scheduler design on the proposal assigned dgoulet defect Medium Tor: unspecified
#10817 Write instructions for using valgrind with the debian tor new task Very Low Tor: unspecified
#5915 Write patch to make socks handshakes succeed instantly needs_revision enhancement Medium Tor: unspecified
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#6790 Write proposal draft for directory mirrors to accept, aggregate and hand off descriptors to dirauths new enhancement Medium Tor: unspecified
#9689 Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery new project Medium Tor: unspecified
#5392 Write proposal for n23 patch behavior needs_revision task Medium Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. new project High Tor: unspecified
#25841 Write test for Rust fragile hardening new enhancement Medium Tor: unspecified
#26333 Write trac templates for bug reports / other tickets, and link them from somewhere useful new task Medium Tor: unspecified
#33919 Write unit tests for channel_matches_target_addr_for_extend() needs_revision task Medium Tor: 0.4.4.x-final
#26798 Write unit tests for reading measured bandwidths with non-NULL routerststuses new enhancement Medium Tor: unspecified
#32340 [Android] FAIL src/test/test_process_slow.c:240: assert(smartlist_len(process_data->stdout_data) OP_EQ 12): 2 vs 12 assigned ahf defect Medium Tor: unspecified
#30987 [PATCH] Add support for seccomp on powerpc64 needs_information enhancement Medium Tor: unspecified
#7590 [PATCH] New option LocalOutboundBindAddress needs_revision enhancement Medium Tor: unspecified
#4260 [PATCH] Update TOR build instructions for mingw assigned erinn enhancement High Tor: unspecified
#28522 [armhf] (Sandbox) Caught a bad syscall attempt new defect Low Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#15660 [feature suggestion] Need signal to totally switch to the new set of circuits new defect Medium Tor: unspecified
Note: See TracQuery for help on using queries.