Custom Query (1931 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 1931)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#31004 Bad element "$C" while parsing a node family. new defect Medium Tor: unspecified
#27382 Bad valid-after time in 0.3.3 and 0.3.4 assigned defect Medium Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#31707 Better handling and UX for missing and expired guard descriptors new defect Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#29339 Bind outbound ports new enhancement Medium Tor: unspecified
#29548 Block back-merges of later release branches to earlier releases new enhancement Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned enhancement Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#28679 Bridge connections on startup new enhancement High Tor: unspecified
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. needs_information defect Medium Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports assigned enhancement Medium Tor: unspecified
#5825 Bridges without geoip file report empty statistics new defect Low Tor: unspecified
#17543 Bring some clarity to behavior of net_is_disabled() vs DisableNetwork vs we_are_hibernating() new defect Medium Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned defect Very Low Tor: unspecified
#31091 Bug stracktrace when pluggable transport cannot bind to port assigned ahf defect Very High Tor: 0.4.2.x-final
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#30085 Bug: Unexpectedly high use successes counts (101.500000/100.000000) for guard new defect Very Low Tor: unspecified
#20362 Bug: Used circuit is in strange path state new new defect Medium Tor: unspecified
#31793 Bug: tor_addr_is_internal() called from src/feature/dirauth/process_descs.c:447 with a non-IP address of type 0 needs_review teor defect High Tor: 0.4.2.x-final
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#4850 Build multiple circuits and use the fastest? new enhancement Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#30458 CID 1444999 dead trunnel-generated code new defect Medium Tor: unspecified
#31682 CID 1453653: Integer handling (NEGATIVE_RETURNS) in build_establish_intro_dos_extension() accepted dgoulet defect Medium Tor: 0.4.2.x-final
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#28734 CIRC_BW is only for origin circuits new defect Medium Tor: unspecified
#24062 CPU profiling of Tor on Android device assigned task Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#28311 Call expand_filename (e.g. for ~ expansion) on all FILENAME config options new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#26305 Can not set up a hidden service on Windows 10 needs_information defect Medium Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#31542 Cannot connect to IPv6 addresses using Tor SOCKS new defect Medium Tor: 0.4.2.x-final
#17962 Cannot connect to Tor needs_information defect Medium Tor: unspecified
#13697 Carry entropy across invocations new enhancement Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it assigned neel enhancement Low Tor: unspecified
#31737 Change handling of relative paths in %include directives? new task Medium Tor: unspecified
#31507 Change the client default to AvoidDiskWrites 1 new defect Medium Tor: 0.4.3.x-final
#14715 Change the default for automaphostsonresolve to be on-by-default? new defect Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#31634 Check .may_include order and tor subsystem init order are compatible new enhancement Medium Tor: 0.4.2.x-final
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#31413 Check for internal IPv6 connects and extends new defect Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen assigned defect High Tor: 0.4.3.x-final
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#31147 Check tor_vasprintf for error return values. needs_review defect Low Tor: 0.4.2.x-final
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned defect Medium Tor: unspecified
#29490 Chutney fails (sometimes?) when tor is built with --enable-coverage new defect Medium Tor: unspecified
#29491 Chutney fails when Tor is built with --enable-nss new defect Medium Tor: unspecified
#8593 Circuit build timeout not respected? assigned defect High Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#31782 Circuit padding is not subject to flow control new enhancement Medium
#31783 Circuit padding support for multi-circuit behavior new enhancement Medium
#31788 Circuit padding trace simulator new enhancement Medium
#31636 Circuit padding: Add meta probability distribution type new enhancement Medium Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#29132 Clean up dirserv_read_measured_bandwidths after #26223 new defect Medium Tor: unspecified
#17607 Clean up section 2 in control-spec assigned gk enhancement Very Low Tor: unspecified
#6176 Clean up service IDs new defect Low Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#30796 ClientDNSRejectInternalAddresses inteferes with ClientRejectInternalAddresses=1 new defect Medium Tor: unspecified
#14579 Clients cannot use multiple transports with a single bridge new defect Medium Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#20423 Clock jumps on relay due to hostname lookup timeouts reopened defect High Tor: unspecified
#31594 Close all the log fds before aborting merge_ready teor defect Medium Tor: 0.4.1.x-final
#10024 Close and open sockets on IP change, tracking new enhancement Medium Tor: unspecified
#25530 Closing Tor cleanly from command line (when started from command line) on win32 new tbb-team defect Medium Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics assigned project High Tor: unspecified
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: unspecified
#7357 Collect more statistics to better understand simulations new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned defect Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.