Custom Query (1953 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 1953)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% assigned tbb-team defect High Tor: unspecified
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#7966 When Tor hibernates it should eventually resume, but on win7 it reports "address already in use". new defect Medium Tor: unspecified
#7971 review address lists in tor_addr_is_internal_() new defect Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned defect Very Low Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#8225 "We stalled too much while trying to write X bytes to address [scrubbed]. If this happens frequently, either something is wrong with your network connection, or with theirs. needs_information arma defect Medium Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever assigned defect High Tor: unspecified
#8593 Circuit build timeout not respected? assigned defect High Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#8962 pathbias_count_use_attempt strange path state log lines new defect Medium Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#9045 Don't let the call frequency of update_networkstatus_downloads() depend on TorTestingNetwork new defect Low Tor: unspecified
#9105 make heartbeat messages describe hibernation consistently new defect Low Tor: unspecified
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#9290 Use something other than "known relay" to decide on rate in connection_or_update_token_buckets_helper() on authorities new defect Low Tor: unspecified
#9494 Remove gratuitous newlines from log messages? new defect Low Tor: unspecified
#9662 Make ntor handshake faster assigned yawning defect Medium Tor: unspecified
#9860 junk log messages every time SETCONF changes the set of ORPorts needs_revision defect Very Low Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#9954 Replace broadcast voting protocol with something more robust new defect Medium Tor: unspecified
#9982 Use a better password-based KDF for controller passwords, authority identity key encryption, and more new defect Medium Tor: unspecified
#10027 Tor Windows service should be installed with the NetworkService account new defect Medium Tor: unspecified
#10416 Tor won't start on Windows when path contains non-ascii characters assigned ahf defect High Tor: 0.4.2.x-final
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#10519 tor uses default IP for dirport instead of the one defined in DirPort new defect Low Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#10566 tor relay hangs for 20 seconds periodically if domain from Address can not be resolved new defect Medium Tor: unspecified
#10812 CryptReleaseContext missed for windows new defect Low Tor: unspecified
#10871 Download more microdescriptors with a shorter request new defect Medium Tor: unspecified
#10915 Tool to find unused functions in Tor new defect Medium Tor: unspecified
#10922 tor connected to bwauth produces lots of pathbias_count_use_attempt BUG messages needs_information defect Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned defect High Tor: unspecified
#11119 Write a proposal for client-side key pinning needs_information defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#11145 coverage utility should merge multiple output files new defect Very Low Tor: unspecified
#11146 cov-diff utility should handle new source files new defect Very Low Tor: unspecified
#11151 Drop support for 0.2.2 clients new defect Medium Tor: unspecified
#11325 RFE: Adhere to XDB base directory specification new defect Low Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#11444 Drop support for long-obsolete versions of Windows new defect Medium Tor: unspecified
#11445 Drop support for Windows XP new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#11542 Add a new logging domain for transport proxies assigned yawning defect Low Tor: unspecified
#11625 Tor DNSPORT returns NXDOMAIN for AAAA records? new defect Medium Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision defect Medium Tor: unspecified
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened nickm defect Medium Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#12220 Give a better warning on header/library mismatch for openssl new defect Medium Tor: unspecified
#12377 get_interface_address6() behaviour iff all interface addresses are internal needs_revision defect Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#12399 "Hash of session info was not as expected" should be log_protocol_warn merge_ready defect Medium Tor: 0.4.0.x-final
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned defect High Tor: unspecified
#12799 fingerprints - descriptor Space removal, case normalization new defect Very Low Tor: unspecified
#12900 Remove config related naming stuff assigned Sebastian defect Low Tor: unspecified
#12901 Remove client-related naming stuff assigned Sebastian defect Low Tor: unspecified
#12990 route certificate errors new defect Medium Tor: unspecified
#13059 Create bad-relays file needs_revision defect Medium Tor: unspecified
#13081 Fix build with Visual Studio in Windows new defect Medium Tor: unspecified
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision defect Medium Tor: unspecified
#13147 Curious debian hurd unit test failure new defect Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#13167 Export dirauth files via directory protocol new defect Medium Tor: unspecified
#13231 Tor(Windows) don't close ports when killed from service control new defect Medium Tor: unspecified
#13234 Consensus Algorithm Causes Flip-Flopping new defect Medium Tor: unspecified
#13260 Transform code to cleaner c99 style needs_information defect Low Tor: unspecified
#13297 compute_weighted_bandwidths() broken for dirauths new defect Medium Tor: unspecified
#13386 "opening new log file" line goes to err-logfile despite being at loglevel notice new defect Low Tor: unspecified
#13603 Many channels closing with "IOERROR" reason given on control port. new defect Medium Tor: unspecified
#13800 circuit does not close after hidden service is shutdown via control port new defect Medium Tor: unspecified
#13817 Untange kludgey library detection, particularly for SSL forks new defect High Tor: unspecified
#13912 Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE registers) new defect Medium Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." needs_information defect Medium Tor: unspecified
#14034 Make TestingDirAuthVoteGuard/Exit/HSDir and AssumeReachable less essential in test networks new defect Medium Tor: unspecified
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#14066 SIGHUP: Reloading config and does not reset internal state of accounting new defect Very Low Tor: unspecified
#14186 Try to use fchmod() first when changing permissions on an AF_UNIX socket new defect Medium Tor: unspecified
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#14223 END_STREAM_REASON_TIMEOUT blurs together two very different error cases new defect Medium Tor: unspecified
#14266 Make address mapping conditional on having the particular address mapping types enabled. new defect Low Tor: unspecified
#14267 We should be smarter about fetching all missing votes new defect Medium Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#14389 little-t-tor: Provide support for better TBB UI of hidden service client authorization needs_revision tbb-team defect Medium Tor: 0.4.3.x-final
#14579 Clients cannot use multiple transports with a single bridge new defect Medium Tor: unspecified
#14581 Looking up bridge by ID may choose the wrong bridge new defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.