Custom Query (1902 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 1902)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#15692 'GETINFO config-file' command on ControlPort returns the standard torrc file when it was overridden in the command line new defect Medium Tor: unspecified
#15765 Tor doesn't reconnect automatically when tun/tap device goes down. new task Medium Tor: unspecified
#15785 New proxy settings don't close old TLS connections new defect Medium Tor: unspecified
#15883 Redesign/Rewrite the BridgeAuthority new enhancement Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#15938 HS descriptor cache leaks timing information to local users new defect Medium Tor: unspecified
#15940 Make a standard transition plan for killing off a client version assigned task High Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever assigned task High Tor: unspecified
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#15998 suggestion: distributed captcha mechanism for hidden service DDOS defense new enhancement Medium Tor: very long term
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints new enhancement Medium Tor: unspecified
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. new defect Medium Tor: unspecified
#16059 Add a "rendezvous approver" control API new enhancement Medium Tor: unspecified
#16070 Tor log doesn't have to be world readable new defect Low Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) new defect Medium Tor: unspecified
#16294 Unable to bootstrap when no relays meet criteria; logging messages unhelpful new defect Low Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16350 tor.pid should be deleted on exit in every case possible, like assert termination, and catchable signals new defect Medium Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16458 torspec references UTC, but tor uses unix time (leap second handling) new task Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#16585 Long-running activity in scheduler_run() blocks network, creating information leaks new defect Medium Tor: unspecified
#16598 fsync ed25519 master key files before closing them. assigned defect Very Low Tor: unspecified
#16608 "time published in the consensus network status" seems to be wrong new defect Medium Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#16648 Libevent configuration doesn't use pkg-config new defect Medium Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#16782 systemd unit file is not compatible with the AppArmorProfile= directive new defect Medium Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage new project High Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#16803 Unit tests for sandbox failures new enhancement Medium Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16822 make certificate lifetime accessible through Tor's ControlPort new enhancement Low Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop new defect High Tor: unspecified
#16845 make unverified consensus ISOTime accessible through Tor's ControlPort reopened enhancement Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#16997 Gather and report metrics for the number of channels a relay is servicing. new enhancement Medium Tor: unspecified
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified
#17032 Threadpool doesn't get shutdown when changing from relay to client new defect Low Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17038 Provide scripts to set up transparent proxying, where supported new enhancement Low Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#17120 Fire a circuit status control port event when circuit isolation changes. new enhancement Low Tor: unspecified
#17134 Add a way to say "Use this option only if supported" in torrc new enhancement Medium Tor: unspecified
#17145 <tor.exe --service install -options -f ...\torrc> returns Error 1064 on Windows new defect Medium Tor: unspecified
#17146 "Sandbox 1" in chutney makes coverage underreported new defect Medium Tor: unspecified
#17147 long-running client path-selection not seeing some (fast) exit nodes needs_information defect Medium Tor: unspecified
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages assigned defect Medium Tor: unspecified
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms new defect Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17230 Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. new defect Medium Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#17278 Fix malleable relay crypto assigned defect High Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced assigned enhancement Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17366 Track consensus fetch times per country? new enhancement Medium Tor: unspecified
#17387 ExtraRelayDescriptorFields needs proposal number new task Low Tor: unspecified
#17391 (Sandbox) Caught a bad syscall attempt (syscall time) (__NR_time not defined?) reopened defect Medium Tor: unspecified
#17451 Tor controller [ControlPort] - bruteforce defence measures & detailed logging when listening non-locally new enhancement Very Low Tor: unspecified
#17495 Unit-test launch_resolve() in dns.c new task Medium Tor: unspecified
#17543 Bring some clarity to behavior of net_is_disabled() vs DisableNetwork vs we_are_hibernating() new defect Medium Tor: unspecified
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#17591 Use channel padding to obscure circuit setup assigned enhancement Medium Tor: unspecified
#17627 Add missing controller events so we can link every step of the HS dance new enhancement Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#17665 Drop scheduler config options new defect Very Low Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17754 0.2.7.5 cannot work inside lxc container needs_information defect Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.