Custom Query (1857 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 1857)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#7480 cached_resolve_t expiration is overengineered new defect Medium Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#7509 Publish and use circuit success rates in extrainfo descriptors new enhancement Medium Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#7590 [PATCH] New option LocalOutboundBindAddress needs_revision enhancement Medium Tor: unspecified
#7646 fix/enhance getinfo ns/id/* commands new defect Medium Tor: unspecified
#7660 Refactor circuit cannibalization into one place new enhancement Medium Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7679 Test integration of Minion (out-of-order data transmission thing) with Tor relays new project Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#7729 Reading pending TLS bytes can take us over at_most needs_revision defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision nickm defect Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#7750 Consider packaging inbuf when about to send an end cell new enhancement Medium Tor: unspecified
#7755 circuit_t::timestamp_dirty should be cleaned up new defect Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations new mikeperry enhancement Medium Tor: unspecified
#7789 Also display configuration file (torrc) location when running as Windows service new defect Low Tor: unspecified
#7798 Use directory guards even when consensus isn't live needs_information defect Medium Tor: unspecified
#7829 Support all kinds of DNS over Tor new task High Tor: unspecified
#7869 ntor-onion-key is padded with an equal sign needs_revision Jigsaw52 defect Low Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#7875 debian obfsproxies can't advertise ports under 1024 new asn defect Medium Tor: unspecified
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% assigned tbb-team defect High Tor: unspecified
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#7966 When Tor hibernates it should eventually resume, but on win7 it reports "address already in use". new defect Medium Tor: unspecified
#7971 review address lists in tor_addr_is_internal_() new defect Medium Tor: unspecified
#7986 Lengthen the consensus validity interval needs_revision enhancement Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned isis defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned isis defect Very Low Tor: unspecified
#8111 Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags new enhancement High Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias new mikeperry enhancement Medium Tor: unspecified
#8160 Create separate pending counters during circuit construction new mikeperry enhancement Medium Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#8190 Relays should publish number of refill intervals where the token bucket went dry new enhancement Medium Tor: unspecified
#8214 "getinfo address" should work more consistently soon after startup new enhancement Low Tor: unspecified
#8225 "We stalled too much while trying to write X bytes to address [scrubbed]. If this happens frequently, either something is wrong with your network connection, or with theirs. needs_information arma defect Medium Tor: unspecified
#8278 Wrap conditionally-compiled C files in #ifdefs new enhancement Medium Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#8351 Refactor our controller-command/torrc-option processing logic into a data-driven function needs_revision enhancement Medium Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever assigned defect High Tor: unspecified
#8453 Alter flag-weight balancing equations new mikeperry enhancement Medium Tor: unspecified
#8486 Introduce ExitNode country code per listener new enhancement Medium Tor: unspecified
#8593 Circuit build timeout not respected? needs_information mikeperry defect High Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#8749 Return information about the leaking application new enhancement Medium Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#8897 Faster curve25519 implementation for ntor needs_revision nickm enhancement Medium Tor: unspecified
#8908 Tor systemd socket activation support needs_revision intgr enhancement Very Low Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#8962 pathbias_count_use_attempt strange path state log lines new defect Medium Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#9024 add supplementary groups when changing uid new enhancement Medium Tor: unspecified
#9045 Don't let the call frequency of update_networkstatus_downloads() depend on TorTestingNetwork new defect Low Tor: unspecified
#9062 Authorities should describe their bwauth version in their votes new enhancement Medium Tor: unspecified
#9105 make heartbeat messages describe hibernation consistently new defect Low Tor: unspecified
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#9208 Allow node operator to avoid Guard flag needs_information enhancement Medium Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#9241 Abstract and decouple path selection from circuit construction new enhancement Medium Tor: unspecified
#9290 Use something other than "known relay" to decide on rate in connection_or_update_token_buckets_helper() on authorities new defect Low Tor: unspecified
#9323 Option to start as a bridge by default, but change to relay if bw is super-high. new chiiph enhancement Medium Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
#9476 Completely drop support for Tor 0.2.2.x new task Medium Tor: unspecified
#9494 Remove gratuitous newlines from log messages? new defect Low Tor: unspecified
#9498 Allow bridge descriptors to contain no address if they are not being published new enhancement Very High Tor: unspecified
#9655 Tor manual's config default options could be clearer new enhancement Very Low Tor: unspecified
#9662 Make ntor handshake faster assigned yawning defect Medium Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision nickm enhancement Medium Tor: unspecified
#9680 get_datadir_fname2_suffix() should create missing directories as needd new enhancement Low Tor: unspecified
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#9689 Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery new project Medium Tor: unspecified
#9729 Make bridges publish additional ORPort addresses in their descriptor needs_revision enhancement Medium Tor: unspecified
#9775 Authorities should report when they don't vote Running but some addresses are still reachable new enhancement Medium Tor: unspecified
#9860 junk log messages every time SETCONF changes the set of ORPorts needs_revision defect Very Low Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#9954 Replace broadcast voting protocol with something more robust new defect Medium Tor: unspecified
#9957 Tor should consider stderr output of transport proxies new enhancement Very Low Tor: unspecified
#9968 Time out quicker on microdesc fetch failures while we're bootstrapping new enhancement Medium Tor: unspecified
#9982 Use a better password-based KDF for controller passwords, authority identity key encryption, and more new defect Medium Tor: unspecified
#9998 resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 new enhancement Medium Tor: unspecified
#10024 Close and open sockets on IP change, tracking new enhancement Medium Tor: unspecified
#10027 Tor Windows service should be installed with the NetworkService account new defect Medium Tor: unspecified
#10052 Tor Windows service should reload its configuration on SERVICE_CONTROL_PARAMCHANGE control code new enhancement Medium Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#10168 Use monotonic clocks for time as appropriate new enhancement Medium Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#10307 Allow Tor relays to configure bandwidth limits around peak usage new enhancement Low Tor: unspecified
#10416 Tor won't start on Windows when path contains non-ascii characters new defect High Tor: unspecified
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.