Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 2070)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Summary Status Owner Type Priority Milestone
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified
#31482 Avoid possible overflow when converting between coarse stamp to approx ms needs_revision nickm defect Medium Tor: 0.4.4.x-final
#21716 Avoid recursive call to routerlist_remove_old_routers via router_rebuild_store assigned MrSquanchee defect Medium Tor: unspecified
#32282 Avoid regressions to raw log mask calculations new task Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* new defect Low Tor: unspecified
#32666 BUG: Non-fatal assertion info failed in onion_extend_cpath at src/core/or/circuitbuild.c:2663. (Stack trace not available) (on Tor 0.4.1.5 439ca48989ece545) new defect Medium Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision new defect High Tor: unspecified
#32961 Backport the diagnostic logs for is_possible_guard crash merge_ready teor task Medium Tor: 0.4.2.x-final
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#27381 Bad consensus diffs on 0.3.4 and later [with chutney] new defect Medium Tor: unspecified
#31004 Bad element "$C" while parsing a node family. new defect Medium Tor: unspecified
#33550 Bandbreiten Problem mit der Brücke new defect Medium Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#31707 Better handling and UX for missing and expired guard descriptors new defect Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#29339 Bind outbound ports new enhancement Medium Tor: unspecified
#29548 Block back-merges of later release branches to earlier releases new enhancement Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each new enhancement Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#28679 Bridge connections on startup new enhancement High Tor: unspecified
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. needs_information defect Medium Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports new enhancement Medium Tor: unspecified
#5825 Bridges without geoip file report empty statistics new defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() new defect Very Low Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#32059 Bug when reading accounting interval while starting a new relay new defect Low Tor: unspecified
#28992 Bug: ../src/feature/hs/hs_client.c:571: send_introduce1: Non-fatal assertion !(ip == NULL) failed. merge_ready dgoulet defect High Tor: 0.4.2.x-final
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#30085 Bug: Unexpectedly high use successes counts (101.500000/100.000000) for guard new defect Very Low Tor: unspecified
#20362 Bug: Used circuit is in strange path state new new defect Medium Tor: unspecified
#33131 Bug: buf->datalen >= 0x7fffffff merge_ready defect Medium Tor: 0.4.3.x-final
#32022 Bug: buffers_tls.c:73: buf_read_from_tls: Non-fatal assertion !(buf->datalen >= INT_MAX - at_most) failed. new defect Medium Tor: unspecified
#34139 Build Tor without warnings or test failures with OpenSSL 3.0.0 new enhancement High Tor: unspecified
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#4850 Build multiple circuits and use the fastest? new enhancement Medium Tor: unspecified
#33371 Build only with required libevent2 libraries new task Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#34021 Bundling .a files together in a single libtor.a file new enhancement Medium Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc new enhancement High Tor: unspecified
#30458 CID 1444999 dead trunnel-generated code new defect Medium Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#28734 CIRC_BW is only for origin circuits new defect Medium Tor: unspecified
#24062 CPU profiling of Tor on Android device new task Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#28311 Call expand_filename (e.g. for ~ expansion) on all FILENAME config options new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#26305 Can not set up a hidden service on Windows 10 needs_information defect Medium Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#32314 Can't connect to literal IPv6 address containing double colon needs_revision defect Medium Tor: 0.4.4.x-final
#32315 Can't perform reverse DNS lookup for a (binary) IPv6 address merge_ready defect Medium Tor: 0.4.2.x-final
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#31542 Cannot connect to IPv6 addresses using Tor SOCKS new defect Medium Tor: unspecified
#17962 Cannot connect to Tor needs_information defect Medium Tor: unspecified
#13697 Carry entropy across invocations new enhancement Medium Tor: unspecified
#33603 Catch common errors in tor bash scripts new task Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it new enhancement Low Tor: unspecified
#31737 Change handling of relative paths in %include directives? new task Medium Tor: unspecified
#31507 Change the client default to AvoidDiskWrites 1, or otherwise make disk writes less frequent. new defect Medium Tor: unspecified
#14715 Change the default for automaphostsonresolve to be on-by-default? new defect Medium Tor: unspecified
#32850 Channel padding timeout scheduled xxx ms in the past. new defect Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#33513 Check boolean values and semantic versioning in the bandwidth file specification new defect Medium Tor: unspecified
#31413 Check for internal IPv6 connects and extends new defect Medium Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position new defect Medium Tor: unspecified
#29490 Chutney fails (sometimes?) when tor is built with --enable-coverage new defect Medium Tor: unspecified
#29491 Chutney fails when Tor is built with --enable-nss new defect Medium Tor: unspecified
#32958 Chutney: remove support for Tor's pre-0.3.5 directory structure new task Medium
#32671 Circpad padding timer flag is not properly reset new defect Medium Tor: unspecified
#32680 Circpad: More/better pattern recognition events new enhancement Medium Tor: unspecified
#8593 Circuit build timeout not respected? new defect High Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#31782 Circuit padding is not subject to flow control new enhancement Medium
#31783 Circuit padding support for multi-circuit behavior new enhancement Medium
#31788 Circuit padding trace simulator new enhancement Medium
#31636 Circuit padding: Add meta probability distribution type new enhancement Medium Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.