Custom Query (1862 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 1862)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#7346 Add stream-level pushback into n23 design new project Medium Tor: unspecified
#18323 Add support for HTTP/1.1 for Transfer-Encoding: chunked new enhancement Low Tor: unspecified
#21816 Add support for Pluggable Transports 2.0 needs_revision dasyatid1 enhancement Medium Tor: unspecified
#28000 Add support for performing signing operations using ssh-agent assigned ln5 task Medium Tor: unspecified
#5788 Add support for relays without an IPv4 address new ln5 enhancement Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#29801 Add teor's suggestions for Prop#299 (referring IPv4 or IPv6 based on IP Version Failure Count) needs_information neel enhancement Medium Tor: unspecified
#17020 Add test for Config options_act function needs_revision tcz001 enhancement Medium Tor: unspecified
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls assigned defect Medium Tor: unspecified
#28256 Add tests for UTF-8 encoded torrcs on Windows new defect Medium Tor: unspecified
#30949 Add the source= line to the dir list spec needs_review teor enhancement Medium Tor: 0.4.2.x-final
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines new enhancement Medium Tor: unspecified
#26639 Additional SSL Library Support and Fixes new task Medium Tor: unspecified
#30954 Address torrc option is ignored if set second time for the IPv6 address new enhancement Low Tor: unspecified
#6288 Aggressive reconnection attempt when using Tor Client with Socks new enhancement Low Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#26508 Allow DirAuthority address to be DNS hostname on test networks new defect Medium Tor: unspecified
#10307 Allow Tor relays to configure bandwidth limits around peak usage new enhancement Low Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#15059 Allow UI to identify servers by Ed25519 keys assigned enhancement Low Tor: unspecified
#9498 Allow bridge descriptors to contain no address if they are not being published new enhancement Very High Tor: unspecified
#25987 Allow controller to receive log messages from outside main thread assigned defect Medium Tor: unspecified
#3522 Allow controllers to post HS descriptors to Tor's cache new enhancement Low Tor: unspecified
#30053 Allow countrycodes in ExitPolicy new enhancement Medium Tor: unspecified
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_review neel enhancement Medium Tor: 0.4.2.x-final
#28361 Allow few nodes-list options in torrc new enhancement Low Tor: unspecified
#27999 Allow for long-running signing operations assigned ln5 enhancement Medium Tor: unspecified
#9208 Allow node operator to avoid Guard flag needs_information enhancement Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#29110 Allow passing seed value to slow/prop_distr/* tests new defect Low Tor: unspecified
#21281 Allow process poll rate to be customized new enhancement Very Low Tor: unspecified
#13705 Allow relays to promise in their descriptor that their IP address won't change new enhancement Medium Tor: unspecified
#19625 Allow relays to set peering policy needs_information project Medium Tor: unspecified
#7478 Allow routersets to include/exclude nodes by IPv6 address needs_revision enhancement High Tor: unspecified
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#7789 Also display configuration file (torrc) location when running as Windows service new defect Low Tor: unspecified
#8453 Alter flag-weight balancing equations new mikeperry enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#30172 Always send PADDING_NEGOTIATE if middle supports it new enhancement Medium Tor: unspecified
#28067 Annotations should be documented in dir-spec.txt new enhancement Medium Tor: unspecified
#18142 Anti-Automated-Scanning: Support "marking" with iptables TCP connections differently "for each circuits" new enhancement Low Tor: unspecified
#26181 Apparmor + systemd failures when loading included service files + DisableAllSwap Fix new defect Very High Tor: unspecified
#23277 ApplicationControlSocket: the way for apps to control Tor new enhancement Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#13987 Apply laplace noise to other statistics new enhancement Medium Tor: unspecified
#28659 Appveyor CI: error removing temporary directories - permission denied new defect Medium Tor: unspecified
#26954 Appveyor: Add Rust builds on Windows new enhancement Medium Tor: unspecified
#28455 Appveyor: add --enable-nss on Windows and macOS new enhancement Medium Tor: unspecified
#28457 Appveyor: make doesn't stop when the first child process fails new defect Medium Tor: unspecified
#25716 Arrange an experiment on the test network where we dump create cells on a relay and time the responses new task Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#22571 AssumeReachable 1 on a relay doesn't make it publish quickly new defect Medium Tor: unspecified
#26300 Attempt by … to open a stream on first hop of circuit. Closing. assigned defect Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#13815 Attempt to port tor to Google's BoringSSL new enhancement Medium Tor: unspecified
#29227 Audit Tor roles (relay, bridge, etc) and remove needless dependencies where possible new defect Medium Tor: 0.4.2.x-final
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#9062 Authorities should describe their bwauth version in their votes new enhancement Medium Tor: unspecified
#27047 Authorities should keep recent consensuses, votes, and bandwidth files new enhancement Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#9775 Authorities should report when they don't vote Running but some addresses are still reachable new enhancement Medium Tor: unspecified
#10968 Authorities should use past consensuses to decide how to vote on relay flags new task Medium Tor: unspecified
#27953 Authorization types for v3 onion service have to be clarified in documentation reopened defect Medium Tor: unspecified
#29226 Automate application of C formatting to code new task Medium Tor: 0.4.2.x-final
#3511 Automatically chosen published ports should be stable assigned blackpaw enhancement High Tor: unspecified
#17066 Avoid assuming relays have a single IPv4/IPv6 address new task Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified
#21716 Avoid recursive call to routerlist_remove_old_routers via router_rebuild_store new defect Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* assigned defect Low Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#27381 Bad consensus diffs on 0.3.4 and later [with chutney] assigned defect Medium Tor: unspecified
#27382 Bad valid-after time in 0.3.3 and 0.3.4 assigned defect Medium Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#29339 Bind outbound ports new enhancement Medium Tor: unspecified
#29548 Block back-merges of later release branches to earlier releases new enhancement Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned mikeperry enhancement Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#28679 Bridge connections on startup new enhancement High Tor: unspecified
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. needs_information defect Medium Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports new isis enhancement Medium Tor: unspecified
#5825 Bridges without geoip file report empty statistics new defect Low Tor: unspecified
#17543 Bring some clarity to behavior of net_is_disabled() vs DisableNetwork vs we_are_hibernating() new defect Medium Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned isis defect Very Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.