Custom Query (1969 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 1969)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#6288 Aggressive reconnection attempt when using Tor Client with Socks new enhancement Low Tor: unspecified
#6289 Multiple Socks Server support in Tor Client new enhancement Low Tor: unspecified
#6419 is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid? new defect Low Tor: unspecified
#6504 Support Windows environment variables in HiddenServiceDir needs_information enhancement Low Tor: unspecified
#6505 GETINFO dir/status-vote/current/consensus returns "Unrecognized key" if no consensus available needs_revision zwol defect Low Tor: unspecified
#6515 Treat timeout of all name lookup tests as also meaning that DNS is broken new enhancement Low Tor: unspecified
#6781 Make cell statistics useful in simulations again new enhancement Low Tor: unspecified
#7117 One of our code-checking tools should make sure that we don't add more reserved identifiers new enhancement Low Tor: unspecified
#7457 Add client-side log indicator that an obfsbridge works new enhancement Low Tor: unspecified
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#7789 Also display configuration file (torrc) location when running as Windows service new defect Low Tor: unspecified
#7869 ntor-onion-key is padded with an equal sign needs_revision Jigsaw52 defect Low Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned defect Low Tor: unspecified
#8214 "getinfo address" should work more consistently soon after startup new enhancement Low Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#9045 Don't let the call frequency of update_networkstatus_downloads() depend on TorTestingNetwork new defect Low Tor: unspecified
#9105 make heartbeat messages describe hibernation consistently new defect Low Tor: unspecified
#9290 Use something other than "known relay" to decide on rate in connection_or_update_token_buckets_helper() on authorities new defect Low Tor: unspecified
#9494 Remove gratuitous newlines from log messages? new defect Low Tor: unspecified
#9680 get_datadir_fname2_suffix() should create missing directories as needd new enhancement Low Tor: unspecified
#10307 Allow Tor relays to configure bandwidth limits around peak usage new enhancement Low Tor: unspecified
#10519 tor uses default IP for dirport instead of the one defined in DirPort new defect Low Tor: unspecified
#10812 CryptReleaseContext missed for windows new defect Low Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#11325 RFE: Adhere to XDB base directory specification new defect Low Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#11542 Add a new logging domain for transport proxies assigned yawning defect Low Tor: unspecified
#11595 Use smarter data structures for keeping track of circuit IDs per channel new enhancement Low Tor: unspecified
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#12898 Remove naming support from Tor assigned Sebastian enhancement Low Tor: unspecified
#12900 Remove config related naming stuff assigned Sebastian defect Low Tor: unspecified
#12901 Remove client-related naming stuff assigned Sebastian defect Low Tor: unspecified
#13078 Add a ROUTERSET_ML config type, accept spaces in fingerprints? needs_revision enhancement Low Tor: unspecified
#13260 Transform code to cleaner c99 style needs_information defect Low Tor: unspecified
#13386 "opening new log file" line goes to err-logfile despite being at loglevel notice new defect Low Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? new task Low Tor: unspecified
#13494 Regression test about Hidden Service time synchronization new enhancement Low Tor: unspecified
#13590 Extend HiddenServicePort VIRTPORT semantics new enhancement Low Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#14266 Make address mapping conditional on having the particular address mapping types enabled. new defect Low Tor: unspecified
#14799 Make failure to create extrainfo an error? reopened defect Low Tor: unspecified
#14987 Settle on a name for descriptors assigned defect Low Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned defect Low Tor: unspecified
#15059 Allow UI to identify servers by Ed25519 keys assigned enhancement Low Tor: unspecified
#15061 Support Ed25519 identities in controller interface assigned defect Low Tor: unspecified
#15062 Support identifying nodes by ed25519 keys in state file, other misc files assigned defect Low Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#15458 StrongSocksIsolation option (w/ virtual circuits?) new enhancement Low Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#16070 Tor log doesn't have to be world readable new defect Low Tor: unspecified
#16294 Unable to bootstrap when no relays meet criteria; logging messages unhelpful new defect Low Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#17032 Threadpool doesn't get shutdown when changing from relay to client new defect Low Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#17120 Fire a circuit status control port event when circuit isolation changes. new enhancement Low Tor: unspecified
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms new defect Low Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#17387 ExtraRelayDescriptorFields needs proposal number new task Low Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#17800 Tor Unit Tests should TT_FORK before initialising global PRNG state new defect Low Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17881 Use return codes from test programs to simplify test scripts new enhancement Low Tor: unspecified
#17971 Unrecognized relay in exit address '[scrubbed].exit'. Refusing. new defect Low Tor: unspecified
#18037 Should the user be allowed to specify FQDNs for HS TARGETs? new defect Low Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18134 tor issues missleading permission warning when torrc overrides User config directive of default torrc new defect Low Tor: unspecified
#18142 Anti-Automated-Scanning: Support "marking" with iptables TCP connections differently "for each circuits" new enhancement Low Tor: unspecified
#18154 attempt to open a socket after DisableNetwork=1 transition new defect Low Tor: unspecified
#18213 The parameter WarnUnsafeSocks does not work as specified in the documentation, no warning is logged in the log file accepted arma defect Low Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#18298 reduce warn loglevel entry for missing ed25519_master_id_public_key to notice loglevel new enhancement Low Tor: unspecified
#18323 Add support for HTTP/1.1 for Transfer-Encoding: chunked new enhancement Low Tor: unspecified
#18356 obfs4proxy cannot bind to <1024 port with systemd hardened service unit new asn defect Low Tor: unspecified
#18360 option not to use mman-win32 new enhancement Low Tor: unspecified
#18402 Reduce duplicate code in parse_*_time functions needs_revision enhancement Low Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#18674 Tor rejects [::]/8 and [::]/127 explicitly, but the latter is sometimes eliminated new defect Low Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#19669 `log_prefix_` maybe getting weird output from strftime new defect Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.