#23061 |
crypto_rand_double() should produce all possible outputs on platforms with 32-bit int
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#19931 |
curve25519-donna runtime math errors on armhf
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#7875 |
debian obfsproxies can't advertise ports under 1024
|
new
|
asn
|
defect
|
Medium
|
Tor: unspecified
|
#31937 |
decide and document that stuff in the CacheDirectory can be deleted while Tor is running
|
new
|
|
enhancement
|
Medium
|
|
#32627 |
deploy torspec as HTML to GitLab Pages
|
merge_ready
|
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#29656 |
describe global initialization in our tinytest-based unit tests
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#23521 |
detect if clock skew is probably really time zone misconfiguration
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#28095 |
dirauth key pinning can be bypassed sometimes?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24864 |
directory authorities take a while to update relays' Tor versions because they use old descriptors for votes
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#18276 |
directory_send_command doesn't check string operation return values
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#30487 |
dirmngr goes berserk making tor requests after gpg --recv-key attempt ends
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27190 |
disparate duplicate subproto handling in protover
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#18795 |
diversity weighting system
|
needs_information
|
|
task
|
Very Low
|
Tor: unspecified
|
#449 |
dns failures prevent legitimate options being set
|
assigned
|
|
defect
|
Low
|
Tor: unspecified
|
#32334 |
do not throw enable_tool_name_check error when compiling for Android and iOS
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#26591 |
doc/ missing in build directory for out-of-tree builds
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#24110 |
document control protocol router status format surprises when using microdescriptors
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25203 |
document max. value of SigningKeyLifetime
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#27052 |
document rust/crypto
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#27858 |
enable zstd on linux CI
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25141 |
enabling CellStatistics results in gigabytes of incremental memory consumption
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#21425 |
entry_list_is_constrained() should look at the guard_selection_t object
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#21902 |
evdns adds default DNS servers, but chutney wants a consistent environment
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#1181 |
evdns_server_request_format_response() sets TC flag wrong
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#28845 |
evloop could be better at handling fork() in tests
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20353 |
evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails
|
new
|
|
defect
|
Very Low
|
Tor: unspecified
|
#3145 |
excludeexitnodes by ip misleading when exit relay uses outboundbindaddress
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#18580 |
exit relay fails with 'unbound' DNS resolver when lots of requests time-out
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24955 |
exit selection biases appear to result when very-long ExcludeExitNodes list is in effect
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#26745 |
extract resolver functions into a new library
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#16016 |
extrainfo_insert(): Bug: No entry found in extrainfo map.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#26291 |
find all instances of SHA-1 in our design and implementation and kill them with fire
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#12799 |
fingerprints - descriptor Space removal, case normalization
|
new
|
|
defect
|
Very Low
|
Tor: unspecified
|
#7646 |
fix/enhance getinfo ns/id/* commands
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#16598 |
fsync ed25519 master key files before closing them.
|
assigned
|
|
defect
|
Very Low
|
Tor: unspecified
|
#28954 |
fuzz-descriptor aborts with a crash
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#3266 |
gabelmoo publishes only 1 extra-info descriptor per week
|
needs_information
|
|
defect
|
Low
|
Tor: unspecified
|
#9680 |
get_datadir_fname2_suffix() should create missing directories as needd
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#12377 |
get_interface_address6() behaviour iff all interface addresses are internal
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#29905 |
git-maintainance-scripts: merge-forward should provide indications of merges actually occuring
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#29625 |
git-pull-all.sh should say which branches it updated, and which files changed
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#29485 |
guidelines for POSIX sh vs bash
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27191 |
handling double spaces in protover
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#19959 |
have a flag for Tor relay location, if a relay is hosted in a data center, cloud or physically secured
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#393 |
hidden services resolve hosts only once
|
assigned
|
rransom
|
defect
|
Low
|
Tor: unspecified
|
#32349 |
hs-v2: Intro point circuit TIMEOUT failure is not reported
|
assigned
|
dgoulet
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#32542 |
hs-v3: Add the 2 missing SOCKS extended errors from prop304
|
assigned
|
dgoulet
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#27544 |
hs-v3: Client authorization fixes and improvements post-merge
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#32614 |
hs-v3: Consider flagging an intro point as bad if rendezvous fails multiple times
|
assigned
|
neel
|
defect
|
Medium
|
Tor: unspecified
|
#32021 |
hs-v3: Handle rendezvous client circuit build expire properly
|
needs_review
|
dgoulet
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#23764 |
hs-v3: No live consensus on client with a bridge
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#31632 |
hs-v3: Service doesn't re-upload descriptor on circuit failure
|
assigned
|
dgoulet
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#30466 |
hs: Do not allow more than one control cell on a circuit
|
needs_information
|
neel
|
defect
|
Medium
|
Tor: unspecified
|
#23307 |
hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#20594 |
hs: Make HSDir produce HS statistics for prop224
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#22220 |
hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#27446 |
hs: Report configuration error on the control port
|
assigned
|
neel
|
defect
|
Low
|
Tor: unspecified
|
#23306 |
hs: Use the state of a directory connection instead of the HAS_FETCHED purpose
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#20169 |
hs_desc, hs_desc_content - BAD_DESC|NOT_FOUND
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#20188 |
hsfetch hs_desc FAILED with REASON missing
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#27299 |
hsv3: Clarify timing sources around hsv3 code
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#31812 |
http URL's in docs/comments should be https
|
needs_revision
|
|
defect
|
Medium
|
Tor: 0.4.2.x-final
|
#25550 |
improve continuous integration support
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#31078 |
improve docs for config var abstraction
|
assigned
|
nickm
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#28423 |
improve precision of finegrained periodic event scheduling?
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#28926 |
improve reporting of directory bootstrap progress
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#26094 |
increase minimal bandwidth requirements, update the manpage, relay guide and FAQ
|
assigned
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#27353 |
intern project idea: a chutney or shadow framework for testing bootstrap speed/success
|
new
|
|
project
|
Medium
|
Tor: unspecified
|
#6419 |
is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid?
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#9860 |
junk log messages every time SETCONF changes the set of ORPorts
|
needs_revision
|
|
defect
|
Very Low
|
Tor: unspecified
|
#29427 |
kist: Poor performance with a small amount of sockets
|
needs_revision
|
dgoulet
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#23508 |
large clock skews cause numerous bootstrap UX issues
|
new
|
|
defect
|
High
|
Tor: unspecified
|
#19174 |
libscrypt check fails when libscrypt requires libm
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#6936 |
link to librt and libdl only when needed
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#14389 |
little-t-tor: Provide support for better TBB UI of hidden service client authorization
|
needs_revision
|
tbb-team
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#18988 |
log error level messages if relay (self) is not in consensus
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#15380 |
log messages are doubled and unclear
|
new
|
|
defect
|
Very Low
|
Tor: unspecified
|
#18451 |
log msg is printed twice after 5 sec
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#17147 |
long-running client path-selection not seeing some (fast) exit nodes
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#25461 |
main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state
|
assigned
|
|
defect
|
High
|
Tor: unspecified
|
#16822 |
make certificate lifetime accessible through Tor's ControlPort
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#9105 |
make heartbeat messages describe hibernation consistently
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#26908 |
make it more clear that torrc files should not contain any bridges in their MyFamily lines
|
reopened
|
|
defect
|
Medium
|
Tor: unspecified
|
#16845 |
make unverified consensus ISOTime accessible through Tor's ControlPort
|
reopened
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#31188 |
make[1]: don't know how to make ./src/rust/target/release/libtor_rust.a
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#22992 |
master pubkey of the hidden service quantum computer resistance
|
new
|
|
defect
|
Medium
|
Tor: very long term
|
#30623 |
may prop 110 + 292 making hs discovery easier?
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#31683 |
md: Bad family line in cached-microdescs.new
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#24455 |
messages out of order in the tor log due to stored logs
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#7164 |
microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1
|
needs_revision
|
|
defect
|
High
|
Tor: 0.4.3.x-final
|
#23232 |
misleading log message related to used SSL vendor
|
needs_information
|
|
enhancement
|
Low
|
Tor: unspecified
|
#27519 |
missing "Service configured in" for hs-v3 lines in info log
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#25989 |
module: Improve dirauth module by extracting more code
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#24043 |
monotonic time test failure on 0.3.0.x
|
reopened
|
|
defect
|
Medium
|
Tor: unspecified
|
#31882 |
move Android build config into core tor
|
needs_review
|
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#25519 |
move away from asciidoc
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#30545 |
must not *skip* obsolete options.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#7216 |
networkstatus_check_consensus_signature() shouldn't warn because of missing certs
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#15214 |
networkstatus_compute_consensus() is unreasonably large and should be refactored
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#27594 |
new warning: Requested exit point '<snip>' is not known. Closing.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|