Custom Query (1962 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 1962)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#30917 Add instructions for making a new maint branch to EndOfLifeTor.md, and rename the file needs_revision teor enhancement Medium Tor: 0.4.2.x-final
#31482 Avoid possible overflow when converting between coarse stamp to approx ms needs_revision teor defect Medium Tor: 0.4.2.x-final
#31524 GETINFO bw-event-cache spike value(s) in it assigned teor defect Medium Tor: 0.4.2.x-final
#31571 Add the tor version and a newline to raw_assert() merge_ready teor defect Medium Tor: 0.4.1.x-final
#31594 Close all the log fds before aborting merge_ready teor defect Medium Tor: 0.4.1.x-final
#31614 Implement clean_up_backtrace_handler() merge_ready teor defect Medium Tor: 0.4.1.x-final
#31615 Reorder the early subsystems based on their dependencies merge_ready teor defect Medium Tor: 0.4.1.x-final
#31736 Stop using mutex_destroy(), when multiple threads can still access the mutex merge_ready teor defect Medium Tor: 0.4.1.x-final
#31837 Make test_rebind.py more robust needs_revision teor defect Medium Tor: 0.4.2.x-final
#31851 Allow Tor to be compiled without support for relay mode new teor task Medium Tor: 0.4.3.x-final
#31884 Define ExecuteBash in the Appveyor error block merge_ready teor defect Medium Tor: 0.4.1.x-final
#31897 util/map_anon_nofork test fails on SunOS merge_ready teor defect High Tor: 0.4.1.x-final
#31939 log spam: Bug: buffers_tls.c:73: buf_read_from_tls: Non-fatal assertion !(buf->datalen >= INT_MAX - at_most) failed. merge_ready teor defect Medium Tor: 0.4.1.x-final
#32060 CID 1454761: wrong type passed to unlock_cb_buf()? assigned teor defect Medium Tor: 0.4.2.x-final
#32086 Try Visual Studio 2019 image in appveyor assigned teor enhancement Medium Tor: 0.4.2.x-final
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#20082 Lower initial descriptor upload delay for hidden services needs_revision twim enhancement Medium Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#9662 Make ntor handshake faster assigned yawning defect Medium Tor: unspecified
#11542 Add a new logging domain for transport proxies assigned yawning defect Low Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#16134 The various stream lists tied to the circuit structures should use tor_queue.h new yawning enhancement Medium Tor: unspecified
#16785 Only build/use ed25519-donna. new yawning enhancement Medium Tor: unspecified
#17272 Finalize a proposal for postquantum circuit-extension assigned yawning task Medium Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#17640 Handle CREATE/CREATED cell processing gracefully under load. assigned yawning enhancement Medium Tor: unspecified
#18638 Write a proposal for PK handshake that uses more client resources than server. assigned yawning task Medium Tor: unspecified
#19318 controller: expose cache details. assigned yawning enhancement Medium Tor: unspecified
#19319 controller: GETINFO stats to expose OOM details assigned yawning enhancement Medium Tor: unspecified
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" assigned yawning enhancement Medium Tor: unspecified
#19325 controller: getinfo to get status of cpuworker queues assigned yawning enhancement Medium Tor: unspecified
#6505 GETINFO dir/status-vote/current/consensus returns "Unrecognized key" if no consensus available needs_revision zwol defect Low Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3028 META: Support non-clique topologies on the network new enhancement Low Tor: very long term
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#3266 gabelmoo publishes only 1 extra-info descriptor per week needs_information defect Low Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#3317 Tor should lock its HiddenServiceDirs new defect Low Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3501 Teach Tor to run the Control Port over TLS new enhancement Low Tor: unspecified
#3522 Allow controllers to post HS descriptors to Tor's cache new enhancement Low Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3782 Add native chroot support to Tor new enhancement Medium Tor: unspecified
#3852 Make DNS resolution happen on particular exit nodes for particular hostnames new enhancement Low Tor: unspecified
#3943 self-test the socks port before bootstrapping is complete? needs_information enhancement Low Tor: unspecified
#3948 "fooport auto" should be able to get a hint new enhancement Low Tor: unspecified
#3982 MAPADDRESS for IP ranges (CIDR, etc) reopened enhancement Medium Tor: unspecified
#4036 Tor relays/bridges can detect when they are being filtered by SSL cert new enhancement Low Tor: unspecified
#4085 We discard up to one second's worth of accounting bytes when time moves backward? new defect Low Tor: unspecified
#4229 smartlist_len returns a (signed) int new defect High Tor: unspecified
#4233 Exact addition/summation and memory allocation needs_revision enhancement Medium Tor: unspecified
#4310 Reorder tor manpage entries within sections new task Medium Tor: unspecified
#4320 Audit functions called during options_act_reversible() new defect High Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#4378 Tor guesses IP address when Address is 127.0.0.1 new defect Low Tor: unspecified
#4386 Requesting better "too slow" warning message new defect Medium Tor: unspecified
#4391 `GETINFO ns/all` doesn't return 'p' lines -- make something that does! new defect Medium Tor: unspecified
#4477 Relays that are not directory authorities shouldn't load the approved-routers file new defect Low Tor: unspecified
#4539 Make dir auths write to disk digests that don't match new enhancement Medium Tor: unspecified
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus new defect High Tor: unspecified
#4624 Config option to declare whether you're using bridges for reachability or for security new project Medium Tor: unspecified
#4631 Idea to make consensus voting more resistant new enhancement Medium Tor: unspecified
#4648 Tor shouldn't call expand_filename on filenames specified on the command line new defect Low Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#4696 add OutboundBindInterface option to torrc new enhancement Medium Tor: unspecified
#4712 Review and update any existing patches for proposal 182 ("credit buckets") new task Medium Tor: unspecified
#4734 Tor DNS resolver only supports UDP sockets so can't resolve large RRs new enhancement Low Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#4816 Request: add count to "[warn] Your computer is too slow..." new enhancement Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.