Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1801 - 1900 of 2070)

Ticket Summary Status Owner Type Priority Milestone
#33248 Prop 312: 3.5.5. Detailed Address Resolution Logs new enhancement Medium
#33249 Prop 312: 4. Update Directory Spec for IPv6 X-Your-Address-Is assigned enhancement Medium
#33252 Prop 312: 5.1. Test Relay IPv6 Addresses Discovery on the Tor Network assigned task Medium
#33253 Prop 312: 5.1. Ask Relay Operators to Test IPv6 Addresses Discovery assigned task Medium
#33262 Prop 313: 3. Write a Script that Counts IPv6 Relays in the Consensus assigned enhancement Medium Tor: unspecified
#33263 Prop 313: 4. Collect IPv6 Bandwidth Stats on Relays and Bridges assigned enhancement Medium Tor: unspecified
#33264 Prop 313: 5. Collect IPv6 Connection Stats on Relays assigned enhancement Medium Tor: unspecified
#33265 Prop 313: 6. Update Directory Spec for IPv6 Stats assigned task Medium Tor: unspecified
#33268 Prop 313: 8.1. Test IPv6 Relay Consensus Counts on the Tor Network assigned task Medium Tor: unspecified
#33270 Prop 313: 8.1. Monitor IPv6 Relay Counts in the Consensus assigned task Medium Tor: unspecified
#33272 Prop 313: 8.2. Test IPv6 Stats on the Tor Network assigned task Medium Tor: unspecified
#33290 Add diagnostics for confusing corruption issue #32564 in ewma merge_ready nickm defect Medium Tor: 0.4.2.x-final
#33291 Making the tor library size smaller assigned dgoulet project Medium
#33346 Seccomp soft fail (no write) in 0.4.2.6 needs_revision nickm defect Medium Tor: 0.4.4.x-final
#33348 hourly network throughput dropdown new enhancement Medium
#33352 Warning: RELAY_COMMAND_INTRODUCE_ACK on padding circuit assigned asn defect Medium Tor: 0.4.4.x-final
#33361 relay: Warn about the lack of ContactInfo and the consequence merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#33371 Build only with required libevent2 libraries new task Medium Tor: unspecified
#33372 Add support for disabling DNSPort new task Medium
#33375 Stop advertising an IPv6 exit policy when DNS is broken for IPv6 needs_information neel defect Medium Tor: 0.4.4.x-final
#33383 Do we actually need the orconn_ext_or_id_map? new defect Medium Tor: unspecified
#33398 Remove documentation for `--dump-config non-builtin` and deprecate it assigned nickm task Medium Tor: unspecified
#33408 Make tor versions sortable, by adding the commit number to EXTRA_INFO new enhancement Medium Tor: unspecified
#33409 Pre-commit hook does not stash unstaged changes before running code style checkers new defect Medium
#33411 Make DirCache default to 0 on Windows relays, if we can't fix the mmap issues assigned ahf defect Medium Tor: 0.4.4.x-final
#33414 Split router.c, and disable it (mostly) when building without relay support. needs_revision nickm defect Medium Tor: 0.4.4.x-final
#33415 Adjust clang-format name in script to be parameterized new defect Medium Tor: unspecified
#33437 Unsuccessful compilation of tor on FreeBSD system with libssl.so.11 needs_information defect Medium Tor: unspecified
#33503 LeakSanitizer detected memory leak with Tor 0.4.4.0-alpha-dev (git-6472d9cfdf1198cf) assigned asn defect Medium Tor: 0.4.4.x-final
#33513 Check boolean values and semantic versioning in the bandwidth file specification new defect Medium Tor: unspecified
#33530 Dir auths should notice relays with wrong clocks and act somehow (BadClock flag, withhold Guard) new enhancement Medium Tor: unspecified
#33538 v3bw files with too large of weights lead to relays being selected nearly uniformly at random new defect Medium Tor: unspecified
#33547 Config: add a type or helper for range-restricted variables new enhancement Medium Tor: unspecified
#33550 Bandbreiten Problem mit der Brücke new defect Medium Tor: unspecified
#33554 Excessive CPU usage in windows tor_cond_t code? new defect Medium Tor: unspecified
#33582 Make bridges wait until they have bootstrapped, before publishing their descriptor new defect Medium Tor: unspecified
#33589 Copy Outreachy developer advice to the wiki or doc/HACKING assigned ahf task Medium Tor: 0.4.4.x-final
#33603 Catch common errors in tor bash scripts new task Medium Tor: unspecified
#33607 Stop forcing IPv4 and IPv6 traffic on non-SOCKSPorts new defect Medium Tor: 0.4.5.x-final
#33617 Add a BandwidthStatistics option and consensus parameter needs_revision MrSquanchee enhancement Medium Tor: 0.4.4.x-final
#33618 Add IPv6 Support to is_local_addr() needs_revision kimimaro enhancement Medium Tor: 0.4.4.x-final
#33623 sendme: Change default emit cell version from 0 to 1 merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#33624 Static building tor with openssl does not work needs_revision defect Medium Tor: 0.4.4.x-final
#33629 Use stale bot to close old pull requests assigned ahf task Medium Tor: 0.4.4.x-final
#33632 List ed25519 fingerprints on the command line new enhancement Medium Tor: unspecified
#33639 Add CHANNEL_CLOSED reason to specs assigned nickm defect Medium Tor: 0.4.4.x-final
#33640 Add PATH_BIAS_TESTING purpose to specs assigned nickm defect Medium Tor: 0.4.4.x-final
#33648 vanguards: What is the recommended value? assigned mikeperry task Medium Tor: unspecified
#33669 "Pluggable Transport process terminated" but Tor keeps on going (and of course doesn't work) assigned asn defect Medium Tor: 0.4.4.x-final
#33681 Refactor using_default_dir_authorities() local address checks assigned task Medium Tor: unspecified
#33687 Create rotating DNS DoH/DoT server list option Trr Core Tor new defect Medium Tor: unspecified
#33702 RSA_get0_d could not be located in the dynamic link library tor.exe assigned defect Medium
#33703 Improving HS availability under DoS (master ticket) new defect Medium Tor: unspecified
#33704 Understand code performance of onion services under DoS new defect Medium Tor: unspecified
#33712 Design a PoW scheme for HS DoS defence new defect Medium Tor: unspecified
#33739 Authority-mode keys and certificates should be owned by dirauth module new defect Medium Tor: unspecified
#33747 If the ExtORPort doesn't report an external IP address, Tor won't apply rate limiting or account for bandwidth on that connection assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33757 Fix log message when multiple tors try the same data directory assigned asn defect Medium Tor: 0.4.4.x-final
#33763 Consider setting TCP_NOTSENT_LOWAT to 1 byte on our TCP connections new enhancement Medium Tor: unspecified
#33767 consider using a GitHub mirror for tor-rust-dependencies new defect Medium Tor: unspecified
#33768 Make tor_inet_pton() handle bad addresses consistently on Windows assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33781 DocTor chokes on malformed dirreq-stats-end line assigned ahf defect Medium Tor: 0.4.4.x-final
#33796 socks: Prefer IPv6 by default on SOCKS port broke torsocks assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33812 Add unit tests for bandwidth statistics functions needs_review MrSquanchee task Medium Tor: unspecified
#33816 Fill in missing IPv6 addresses in extend cells needs_review neel task Medium Tor: 0.4.5.x-final
#33818 Add options for clients and relays to enable IPv6 extends assigned task Medium Tor: unspecified
#33819 Make clients and bridges send IPv6 extends by default in Tor 0.4.5 new task Medium Tor: 0.4.5.x-final
#33826 Add a testing-only option that turns off IPv4 extends assigned enhancement Medium Tor: unspecified
#33843 Write detailed priority queue scheduler design on the proposal assigned dgoulet defect Medium Tor: unspecified
#33844 Do next iteration of proposal by folding in comments from dgoulet/mike assigned asn defect Medium Tor: unspecified
#33850 log rotation for /var/log/tor/debug.log did not close handle to old file after compression new defect Medium Tor: unspecified
#33860 Finish test_onionskin_answer() assigned nickm task Medium Tor: unspecified
#33873 client: Send back SOCKS extended error F6 in case of bad hostname assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33880 Confusing "Your relay has a very large number of connections to other relays" relay message assigned nickm defect Medium Tor: unspecified
#33889 Functions with char* arguments are dangerous when used with casting new defect Medium Tor: 0.4.4.x-final
#33894 make (retroactive) proposal for DoS subsystem accepted dgoulet task Medium Tor: unspecified
#33905 Adjust "large number of connections to other relays" warnings new task Medium Tor: unspecified
#33919 Write unit tests for channel_matches_target_addr_for_extend() needs_revision task Medium Tor: 0.4.4.x-final
#33978 *Proxy and accept *:80 can't coexist new defect Medium Tor: unspecified
#34004 Support for full DNS and DNSSEC resolution needs_review enhancement Medium Tor: 0.4.4.x-final
#34021 Bundling .a files together in a single libtor.a file new enhancement Medium Tor: unspecified
#34064 Add an AssumeReachable consensus parameter new enhancement Medium Tor: unspecified
#34065 Make routerset_contains_router() support IPv6 needs_review neel enhancement Medium Tor: 0.4.4.x-final
#34067 Separate tor's IPv4 and IPv6 reachability flags assigned teor enhancement Medium Tor: 0.4.5.x-final
#34068 Decide how to handle control port events for IPv6 reachability self-tests new defect Medium Tor: unspecified
#34069 Allow extend_info to contain both IPv4 and IPv6 ORPorts new enhancement Medium Tor: 0.4.5.x-final
#34082 Master ticket for client side rendezvous circuit related bugs that cause reachability problems in HSv3 land new defect Medium Tor: unspecified
#34083 Client rendezvous circuit is no longer in circuit_wait but in pending_entry_connections new defect Medium Tor: unspecified
#34084 HSv3: Bug at setup_intro_circ_auth_key at ../src/feature/hs/hs_client.c:739 assigned asn defect Medium Tor: 0.4.4.x-final
#34086 HSv3: Bug Non-fatal assertion in hs_client.c:776: client_rendezvous_circ_has_opened assigned dgoulet defect Medium Tor: 0.4.4.x-final
#34087 HSv3: Bug: Non-fatal assertion in hs_client.c:981: close_or_reextend_intro_circ assigned dgoulet defect Medium Tor: 0.4.4.x-final
#34088 circuit_build_times_update_alpha(): Bug: Could not determine largest build time new defect Medium Tor: unspecified
#34130 Tor won't start with seccomp sandbox when compiled with --enable-nss merge_ready defect Medium Tor: 0.4.3.x-final
#34135 Feature suggestion: SOCKS5 internal DNS resolver. new enhancement Medium
#34137 Make sure inform_testing_reachability() reports the correct ports new defect Medium Tor: unspecified
#34167 PublishServerDescriptor via IPv6 new enhancement Medium Tor: unspecified
#34171 possible single circuit maximum transfer rate regression in typical circuit path cases needs_information defect Medium
#34232 Make summarize_protover_flags() handle NULL and empty string the same new defect Medium Tor: unspecified
#34238 Space out some function calls in parse_short_policy() needs_revision neel defect Medium Tor: 0.4.4.x-final
#34249 Make sure the C and Rust protovers can't get out of sync assigned nickm defect Medium Tor: 0.4.4.x-final
Note: See TracQuery for help on using queries.