Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1901 - 2000 of 2070)

Ticket Summary Status Owner Type Priority Milestone
#29700 ntor handshake auth failures with RPs new defect Medium Tor: unspecified
#7869 ntor-onion-key is padded with an equal sign needs_review Jigsaw52 defect Low Tor: unspecified
#18356 obfs4proxy cannot bind to <1024 port with systemd hardened service unit new asn defect Low Tor: unspecified
#21967 obfs4proxy not killed when unused new defect Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down new defect Low Tor: unspecified
#33210 old torrc in tor debian package in stable new defect Medium
#25955 onion v2 deprecation plan new enhancement Medium Tor: unspecified
#18360 option not to use mman-win32 new enhancement Low Tor: unspecified
#20872 option to build non-standard code paths on x86 new enhancement Medium Tor: unspecified
#5507 option_transition_affects_workers could be split new enhancement Low Tor: unspecified
#32091 optional TUN interface to tor for mobile new enhancement Medium Tor: unspecified
#20956 optionally do not write command line config to torrc new defect Medium Tor: unspecified
#33097 outbuf_flushlen seems to serve no purpose accepted nickm defect Medium Tor: 0.4.5.x-final
#32036 output debug logs to logcat as early as possible on Android new enhancement Medium Tor: unspecified
#30045 output of "tor --key-expiration sign" should be a time stamp new enhancement Medium Tor: unspecified
#25687 over-report of observed / self-measure bandwidth on fast hardware -- important to torflow / peerflow new defect Medium Tor: unspecified
#8962 pathbias_count_use_attempt strange path state log lines new defect Medium Tor: unspecified
#24347 periodic network bw pattern in an exit relay new task Medium Tor: unspecified
#20849 periodic pattern in network connections ofa newly setup relay needs_information task Low Tor: unspecified
#29499 permission error: nyx requires executable permission bit for `/var/lib/tor` needs_information defect Very Low Tor: unspecified
#22572 please don't kill WarnUnsafeSocks option new defect Medium Tor: unspecified
#34171 possible single circuit maximum transfer rate regression in typical circuit path cases needs_information defect Medium
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#20356 prop220: unit tests for all new/changed circuit extension functions new defect Medium Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once new defect Medium Tor: unspecified
#23300 prop224: General client side issues new defect Medium Tor: unspecified
#29054 prop224: Implement offline keys for v3 onion services new enhancement Medium Tor: unspecified
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation needs_revision haxxpop enhancement Medium Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor new enhancement Very High Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion new defect Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#26886 prop295: revise proposal and determine feasability new task Medium Tor: unspecified
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#31290 provide DNS health metrics for tor exit relay operators new enhancement Medium
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#32299 read GeoIPFile and GeoIP6File straight out of ZIP (.apk, .jar, .zip, .ipa) new enhancement Medium Tor: unspecified
#25299 recent update to 7.5 on portable version breaks browser new defect Medium Tor: unspecified
#18298 reduce warn loglevel entry for missing ed25519_master_id_public_key to notice loglevel new enhancement Low Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#32835 regression: log subsystem not closing files on switch back to syslog new defect Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#33361 relay: Warn about the lack of ContactInfo and the consequence merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#32181 remove custom Android logging, use syslog needs_information nickm defect Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round new defect Medium Tor: unspecified
#27308 report bootstrap phase when we actually start, not just unblock something new enhancement Medium Tor: unspecified
#27104 report intermediate status when building application circuits new enhancement Medium Tor: unspecified
#27691 reset bootstrap progress when enough things change new enhancement Medium Tor: unspecified
#9998 resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 new enhancement Medium Tor: unspecified
#7971 review address lists in tor_addr_is_internal_() new defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#17903 router_pick_trusteddirserver_impl should distinguish between fallbacks and authorities needs_revision attila enhancement Very Low Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#26287 run callgraph tool from Travis new enhancement Medium Tor: unspecified
#19560 running tor trying to access its ed25519_signing_secret_key, log message too loud new defect Medium Tor: unspecified
#27130 rust dependency updating instructions don't work accepted nickm defect Medium Tor: unspecified
#28081 rust protover discards all votes if one is not UTF-8 needs_review defect Medium Tor: 0.4.4.x-final
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges new defect Medium Tor: unspecified
#27739 rust protover_all_supported() accepts too-long protocol names new defect Medium Tor: unspecified
#27201 rust/protover doesn't forbid version zero needs_information defect Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 new defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs new defect Medium Tor: unspecified
#24454 sandbox failure on arm64 needs_information defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler new defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t new enhancement Very High Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write new defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after new defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler new defect High Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler new defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space new enhancement Medium Tor: unspecified
#32388 sched: When OR connection opens, always indicate the channel is ready for cells assigned dgoulet defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#30742 sendme: Better logging overall new enhancement Medium Tor: unspecified
#33623 sendme: Change default emit cell version from 0 to 1 merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#30440 sendme: Service introduction circuit ignore flow control new defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info new defect Medium Tor: unspecified
#19572 set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie new defect Medium Tor: unspecified
#32884 set_main_thread() not called on second initialization with pthreads merge_ready nickm defect Medium Tor: 0.4.2.x-final
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#21503 ship default MapAddress for at least torproject.org hosts new enhancement Low Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#29793 show-distdir-core and friends should fail more quietly new defect Medium Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#33796 socks: Prefer IPv6 by default on SOCKS port broke torsocks assigned dgoulet defect Medium Tor: 0.4.4.x-final
#23613 some control protocol GETINFO downloads/networkstatus keys are lies new defect Medium Tor: unspecified
#21084 sometimes we call circuit has_opened() more than 2 times on client side new defect Medium Tor: unspecified
#15715 spurious "Network is unreachable" error after setting DisableNetwork=1 accepted arma defect Medium Tor: unspecified
#31544 sr: Check why some sr_disk_state fields need to be cleared assigned nickm defect Medium Tor: unspecified
#26139 start aplication needs_information defect Medium Tor: unspecified
Note: See TracQuery for help on using queries.