Custom Query (1971 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1701 - 1800 of 1971)

Ticket Summary Status Owner Type Priority Milestone
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#19931 curve25519-donna runtime math errors on armhf needs_information defect Medium Tor: unspecified
#7875 debian obfsproxies can't advertise ports under 1024 new asn defect Medium Tor: unspecified
#31937 decide and document that stuff in the CacheDirectory can be deleted while Tor is running new enhancement Medium
#32627 deploy torspec as HTML to GitLab Pages merge_ready enhancement Medium Tor: 0.4.3.x-final
#29656 describe global initialization in our tinytest-based unit tests new defect Medium Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#28095 dirauth key pinning can be bypassed sometimes? new defect Medium Tor: unspecified
#24864 directory authorities take a while to update relays' Tor versions because they use old descriptors for votes new defect Low Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#30487 dirmngr goes berserk making tor requests after gpg --recv-key attempt ends new defect Medium Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#18795 diversity weighting system needs_information task Very Low Tor: unspecified
#449 dns failures prevent legitimate options being set assigned defect Low Tor: unspecified
#32334 do not throw enable_tool_name_check error when compiling for Android and iOS new defect Medium Tor: unspecified
#26591 doc/ missing in build directory for out-of-tree builds new enhancement Low Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#25203 document max. value of SigningKeyLifetime new enhancement Medium Tor: unspecified
#27052 document rust/crypto new enhancement Medium Tor: unspecified
#27858 enable zstd on linux CI new defect Medium Tor: unspecified
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#21902 evdns adds default DNS servers, but chutney wants a consistent environment new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#28845 evloop could be better at handling fork() in tests new enhancement Medium Tor: unspecified
#20353 evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails new defect Very Low Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#18580 exit relay fails with 'unbound' DNS resolver when lots of requests time-out new defect Medium Tor: unspecified
#24955 exit selection biases appear to result when very-long ExcludeExitNodes list is in effect new defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. new defect Medium Tor: unspecified
#26291 find all instances of SHA-1 in our design and implementation and kill them with fire new project Medium Tor: unspecified
#12799 fingerprints - descriptor Space removal, case normalization new defect Very Low Tor: unspecified
#7646 fix/enhance getinfo ns/id/* commands new defect Medium Tor: unspecified
#16598 fsync ed25519 master key files before closing them. assigned defect Very Low Tor: unspecified
#28954 fuzz-descriptor aborts with a crash new defect Medium Tor: unspecified
#3266 gabelmoo publishes only 1 extra-info descriptor per week needs_information defect Low Tor: unspecified
#9680 get_datadir_fname2_suffix() should create missing directories as needd new enhancement Low Tor: unspecified
#12377 get_interface_address6() behaviour iff all interface addresses are internal needs_revision defect Medium Tor: unspecified
#29905 git-maintainance-scripts: merge-forward should provide indications of merges actually occuring new defect Medium Tor: unspecified
#29625 git-pull-all.sh should say which branches it updated, and which files changed assigned defect Medium Tor: unspecified
#29485 guidelines for POSIX sh vs bash new defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#19959 have a flag for Tor relay location, if a relay is hosted in a data center, cloud or physically secured new enhancement Medium Tor: unspecified
#393 hidden services resolve hosts only once assigned rransom defect Low Tor: unspecified
#32349 hs-v2: Intro point circuit TIMEOUT failure is not reported assigned dgoulet defect Medium Tor: 0.4.3.x-final
#32542 hs-v3: Add the 2 missing SOCKS extended errors from prop304 assigned dgoulet defect Medium Tor: 0.4.3.x-final
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#32614 hs-v3: Consider flagging an intro point as bad if rendezvous fails multiple times assigned neel defect Medium Tor: unspecified
#32021 hs-v3: Handle rendezvous client circuit build expire properly needs_review dgoulet defect Medium Tor: 0.4.3.x-final
#23764 hs-v3: No live consensus on client with a bridge new defect High Tor: unspecified
#31632 hs-v3: Service doesn't re-upload descriptor on circuit failure assigned dgoulet defect Medium Tor: 0.4.3.x-final
#30466 hs: Do not allow more than one control cell on a circuit needs_information neel defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#27446 hs: Report configuration error on the control port assigned neel defect Low Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified
#20169 hs_desc, hs_desc_content - BAD_DESC|NOT_FOUND new enhancement Low Tor: unspecified
#20188 hsfetch hs_desc FAILED with REASON missing new enhancement Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#31812 http URL's in docs/comments should be https needs_revision defect Medium Tor: 0.4.2.x-final
#25550 improve continuous integration support new project Medium Tor: unspecified
#31078 improve docs for config var abstraction assigned nickm enhancement Medium Tor: 0.4.3.x-final
#28423 improve precision of finegrained periodic event scheduling? assigned defect Medium Tor: unspecified
#28926 improve reporting of directory bootstrap progress new enhancement Medium Tor: unspecified
#26094 increase minimal bandwidth requirements, update the manpage, relay guide and FAQ assigned enhancement Medium Tor: unspecified
#27353 intern project idea: a chutney or shadow framework for testing bootstrap speed/success new project Medium Tor: unspecified
#6419 is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid? new defect Low Tor: unspecified
#9860 junk log messages every time SETCONF changes the set of ORPorts needs_revision defect Very Low Tor: unspecified
#29427 kist: Poor performance with a small amount of sockets needs_revision dgoulet defect Medium Tor: 0.4.3.x-final
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#19174 libscrypt check fails when libscrypt requires libm needs_revision defect Medium Tor: unspecified
#6936 link to librt and libdl only when needed new defect Medium Tor: unspecified
#14389 little-t-tor: Provide support for better TBB UI of hidden service client authorization needs_revision tbb-team defect Medium Tor: 0.4.3.x-final
#18988 log error level messages if relay (self) is not in consensus needs_revision enhancement Medium Tor: unspecified
#15380 log messages are doubled and unclear new defect Very Low Tor: unspecified
#18451 log msg is printed twice after 5 sec new defect Medium Tor: unspecified
#17147 long-running client path-selection not seeing some (fast) exit nodes needs_information defect Medium Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state assigned defect High Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#9105 make heartbeat messages describe hibernation consistently new defect Low Tor: unspecified
#26908 make it more clear that torrc files should not contain any bridges in their MyFamily lines reopened defect Medium Tor: unspecified
#16845 make unverified consensus ISOTime accessible through Tor's ControlPort reopened enhancement Medium Tor: unspecified
#31188 make[1]: don't know how to make ./src/rust/target/release/libtor_rust.a new defect Medium Tor: unspecified
#22992 master pubkey of the hidden service quantum computer resistance new defect Medium Tor: very long term
#30623 may prop 110 + 292 making hs discovery easier? new task Medium Tor: unspecified
#31683 md: Bad family line in cached-microdescs.new new defect Medium Tor: unspecified
#24455 messages out of order in the tor log due to stored logs new defect Medium Tor: unspecified
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: 0.4.3.x-final
#23232 misleading log message related to used SSL vendor needs_information enhancement Low Tor: unspecified
#27519 missing "Service configured in" for hs-v3 lines in info log new defect Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#24043 monotonic time test failure on 0.3.0.x reopened defect Medium Tor: unspecified
#31882 move Android build config into core tor needs_review defect Medium Tor: 0.4.3.x-final
#25519 move away from asciidoc new task Medium Tor: unspecified
#30545 must not *skip* obsolete options. new defect Medium Tor: unspecified
#7216 networkstatus_check_consensus_signature() shouldn't warn because of missing certs needs_revision defect Medium Tor: unspecified
#15214 networkstatus_compute_consensus() is unreasonably large and should be refactored new defect Medium Tor: unspecified
#27594 new warning: Requested exit point '<snip>' is not known. Closing. new defect Medium Tor: unspecified
Note: See TracQuery for help on using queries.