Custom Query (1931 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1801 - 1900 of 1931)

Ticket Summary Status Owner Type Priority Milestone
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7829 Support all kinds of DNS over Tor new task High Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% assigned tbb-team defect High Tor: unspecified
#8111 Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags new enhancement High Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever assigned defect High Tor: unspecified
#8593 Circuit build timeout not respected? assigned defect High Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#10416 Tor won't start on Windows when path contains non-ascii characters new defect High Tor: 0.4.2.x-final
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned defect High Tor: unspecified
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned defect High Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned task High Tor: unspecified
#13444 "GhostNode" - support relays that cannot accept incoming connections. new project High Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#13753 Validate is_canonical more thoroughly new enhancement High Tor: unspecified
#13817 Untange kludgey library detection, particularly for SSL forks new defect High Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#14581 Looking up bridge by ID may choose the wrong bridge new defect High Tor: unspecified
#15272 Think of more research questions that we can answer with statistics new task High Tor: unspecified
#15469 Remove data structure containing unique IP address sets new enhancement High Tor: unspecified
#15940 Make a standard transition plan for killing off a client version assigned task High Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever assigned task High Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#16564 WIP: Reject bridge descriptors posted to non-bridge authorities needs_revision teor enhancement High Tor: 0.4.2.x-final
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags needs_revision ffmancera defect High Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#17278 Fix malleable relay crypto assigned defect High Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents needs_revision jryans defect High Tor: unspecified
#17811 Tor Clients on IPv6 new task High Tor: unspecified
#17901 Tor would bind ControlPort to public ip address if it has no localhost interface new defect High Tor: unspecified
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags new defect High Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV assigned enhancement High Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. assigned project High Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some assigned enhancement High Tor: unspecified
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned enhancement High Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals accepted nickm enhancement High Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS assigned defect High Tor: unspecified
#20423 Clock jumps on relay due to hostname lookup timeouts reopened defect High Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#20647 Tor and Chutney CI improvements assigned enhancement High Tor: 0.4.2.x-final
#20835 Refactor choose_good_entry_server so it is (almost) never used assigned task High Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21509 Fuzz v3 hidden services assigned task High Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag assigned defect High Tor: unspecified
#22331 Tor needs to stop trying to read directories before it changes users new defect High Tor: unspecified
#22422 Add noise to PaddingStatistics assigned defect High Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler assigned defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge assigned defect High Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics assigned project High Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned defect High Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows new defect High Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_review Jigsaw52 task High Tor: 0.4.2.x-final
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) assigned defect High Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state assigned defect High Tor: unspecified
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x new task High Tor: unspecified
#25882 clients not detecting stale onion service introduction points assigned defect High Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen assigned defect High Tor: 0.4.3.x-final
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#27915 Make rust doctests get linked in same way as other rust tests new defect High Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#28183 tor-0.3.5.3_alpha unexpected stop bug: (Sandbox) Caught a bad syscall attempt (syscall shutdown) needs_information defect High Tor: 0.3.5.x-final
#28244 Followup tasks for Rust asan CI fixes new defect High Tor: unspecified
Note: See TracQuery for help on using queries.