Custom Query (1978 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1801 - 1900 of 1978)

Ticket Summary Status Owner Type Priority Milestone
#20340 nice to have: test torrc for incompatible transistions of config values new enhancement Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#31291 non-public relay health metrics for operators new enhancement Medium
#28899 nondeterministic coverage of dirvote.c and shared_random.c new defect Medium Tor: unspecified
#28113 notify systemd if shutdown will be longer than 30 seconds needs_revision Hello71 defect Medium Tor: unspecified
#29700 ntor handshake auth failures with RPs new defect Medium Tor: unspecified
#7869 ntor-onion-key is padded with an equal sign needs_revision Jigsaw52 defect Low Tor: unspecified
#18356 obfs4proxy cannot bind to <1024 port with systemd hardened service unit new asn defect Low Tor: unspecified
#21967 obfs4proxy not killed when unused new defect Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned defect Low Tor: unspecified
#25955 onion v2 deprecation plan new enhancement Medium Tor: unspecified
#18360 option not to use mman-win32 new enhancement Low Tor: unspecified
#20872 option to build non-standard code paths on x86 new enhancement Medium Tor: unspecified
#5507 option_transition_affects_workers could be split new enhancement Low Tor: unspecified
#32091 optional TUN interface to tor for mobile new enhancement Medium Tor: unspecified
#20956 optionally do not write command line config to torrc assigned defect Medium Tor: unspecified
#32036 output debug logs to logcat as early as possible on Android new enhancement Medium Tor: 0.4.3.x-final
#30045 output of "tor --key-expiration sign" should be a time stamp new enhancement Medium Tor: unspecified
#25687 over-report of observed / self-measure bandwidth on fast hardware -- important to torflow / peerflow new defect Medium Tor: unspecified
#8962 pathbias_count_use_attempt strange path state log lines new defect Medium Tor: unspecified
#24347 periodic network bw pattern in an exit relay new task Medium Tor: unspecified
#20849 periodic pattern in network connections ofa newly setup relay needs_information task Low Tor: unspecified
#29499 permission error: nyx requires executable permission bit for `/var/lib/tor` needs_information defect Very Low Tor: unspecified
#22572 please don't kill WarnUnsafeSocks option new defect Medium Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#32172 port test suite to Android to run in emulator needs_review task Medium Tor: 0.4.3.x-final
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#20356 prop220: unit tests for all new/changed circuit extension functions assigned defect Medium Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once assigned defect Medium Tor: unspecified
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified
#29054 prop224: Implement offline keys for v3 onion services new enhancement Medium Tor: unspecified
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation needs_revision haxxpop enhancement Medium Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor assigned teor enhancement Very High Tor: 0.4.3.x-final
#23301 prop224: Refactor connection_ap_handle_onion assigned neel defect Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#20719 prop271 -- make parameters configurable assigned enhancement Medium Tor: unspecified
#26886 prop295: revise proposal and determine feasability new task Medium Tor: unspecified
#30382 prop304: Implement SOCKS new HS error code needs_review dgoulet enhancement Medium Tor: 0.4.3.x-final
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#31290 provide DNS health metrics for tor exit relay operators new enhancement Medium
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#32299 read GeoIPFile and GeoIP6File straight out of ZIP (.apk, .jar, .zip, .ipa) new enhancement Medium Tor: unspecified
#25299 recent update to 7.5 on portable version breaks browser new defect Medium Tor: unspecified
#18298 reduce warn loglevel entry for missing ed25519_master_id_public_key to notice loglevel new enhancement Low Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#32181 remove custom Android logging, use syslog new defect Medium Tor: 0.4.3.x-final
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#27308 report bootstrap phase when we actually start, not just unblock something new enhancement Medium Tor: unspecified
#27104 report intermediate status when building application circuits new enhancement Medium Tor: unspecified
#27691 reset bootstrap progress when enough things change new enhancement Medium Tor: unspecified
#9998 resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 new enhancement Medium Tor: unspecified
#7971 review address lists in tor_addr_is_internal_() new defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#12990 route certificate errors new defect Medium Tor: unspecified
#17903 router_pick_trusteddirserver_impl should distinguish between fallbacks and authorities needs_revision attila enhancement Very Low Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#26287 run callgraph tool from Travis new enhancement Medium Tor: unspecified
#19560 running tor trying to access its ed25519_signing_secret_key, log message too loud new defect Medium Tor: unspecified
#27130 rust dependency updating instructions don't work accepted nickm defect Medium Tor: unspecified
#28081 rust protover discards all votes if one is not UTF-8 new defect Medium Tor: unspecified
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges new defect Medium Tor: unspecified
#27739 rust protover_all_supported() accepts too-long protocol names new defect Medium Tor: unspecified
#27201 rust/protover doesn't forbid version zero needs_information defect Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#24454 sandbox failure on arm64 needs_information defect Medium Tor: unspecified
#23579 sched: Add accessors for channel_pending list assigned enhancement Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler assigned defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t assigned enhancement Very High Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write assigned defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after assigned defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler assigned defect High Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified
#32388 sched: When OR connection opens, always indicate the channel is ready for cells assigned dgoulet defect Medium Tor: 0.4.3.x-final
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#30742 sendme: Better logging overall assigned enhancement Medium Tor: unspecified
#30440 sendme: Service introduction circuit ignore flow control assigned defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#19572 set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie new defect Medium Tor: unspecified
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#21503 ship default MapAddress for at least torproject.org hosts new enhancement Low Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#29793 show-distdir-core and friends should fail more quietly new defect Medium Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
#32140 single onion: Padding negotiated cell from wrong hop assigned asn defect Medium Tor: 0.4.2.x-final
Note: See TracQuery for help on using queries.