Custom Query (1976 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 1976)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Summary Status Owner Type Priority Milestone
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified
#8908 Tor systemd socket activation support needs_revision intgr enhancement Very Low Tor: unspecified
#9024 add supplementary groups when changing uid new enhancement Medium Tor: unspecified
#9062 Authorities should describe their bwauth version in their votes new enhancement Medium Tor: unspecified
#9208 Allow node operator to avoid Guard flag needs_information enhancement Medium Tor: unspecified
#9241 Abstract and decouple path selection from circuit construction new enhancement Medium Tor: unspecified
#9323 Option to start as a bridge by default, but change to relay if bw is super-high. new chiiph enhancement Medium Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
#9498 Allow bridge descriptors to contain no address if they are not being published new enhancement Very High Tor: unspecified
#9655 Tor manual's config default options could be clearer new enhancement Very Low Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#9680 get_datadir_fname2_suffix() should create missing directories as needd new enhancement Low Tor: unspecified
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#9729 Make bridges publish additional ORPort addresses in their descriptor needs_revision enhancement Medium Tor: unspecified
#9775 Authorities should report when they don't vote Running but some addresses are still reachable new enhancement Medium Tor: unspecified
#9957 Tor should consider stderr output of transport proxies new enhancement Very Low Tor: unspecified
#9968 Time out quicker on microdesc fetch failures while we're bootstrapping new enhancement Medium Tor: unspecified
#9998 resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 new enhancement Medium Tor: unspecified
#10024 Close and open sockets on IP change, tracking new enhancement Medium Tor: unspecified
#10052 Tor Windows service should reload its configuration on SERVICE_CONTROL_PARAMCHANGE control code new enhancement Medium Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#10168 Use monotonic clocks for time as appropriate new enhancement Medium Tor: unspecified
#10186 Backtrace support for windows assigned tom enhancement Very High Tor: unspecified
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#10307 Allow Tor relays to configure bandwidth limits around peak usage new enhancement Low Tor: unspecified
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10747 Support alternate DNS such as Namecoin/OpenNIC/etc new enhancement Medium Tor: unspecified
#11010 add ClientConnectPolicy config option needs_revision enhancement Medium Tor: unspecified
#11059 Nodes' country codes should be "definite" and "possible" new enhancement Medium Tor: unspecified
#11101 Bridges should report implementation versions of their pluggable transports assigned enhancement Medium Tor: unspecified
#11158 Write a proposal for a "couldn't reach consensus" statement new enhancement Medium Tor: unspecified
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#11397 Keep using too-dirty circuits if no new circuit can be built? new enhancement Medium Tor: unspecified
#11458 A newer signing cert should innoculate us against older ones? new enhancement Medium Tor: unspecified
#11462 Re-promote "We stalled too much while trying to write" warning if it happens too much new enhancement Medium Tor: unspecified
#11595 Use smarter data structures for keeping track of circuit IDs per channel new enhancement Low Tor: unspecified
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#12500 Add an option to upload hidden service descriptors some time after startup new enhancement Medium Tor: unspecified
#12572 Proposal for __OwningControllerTimeout option new enhancement Medium Tor: unspecified
#12898 Remove naming support from Tor assigned Sebastian enhancement Low Tor: unspecified
#13078 Add a ROUTERSET_ML config type, accept spaces in fingerprints? needs_revision enhancement Low Tor: unspecified
#13082 Use a better default torrc new enhancement Medium Tor: unspecified
#13194 Track time between ESTABLISH_RENDEZVOUS and RENDEZVOUS1 cell new enhancement Very Low Tor: unspecified
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13230 Make good use of unstable relays new enhancement Medium Tor: unspecified
#13258 Keep stats on effectiveness of consensus diffs new enhancement Medium Tor: unspecified
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#13494 Regression test about Hidden Service time synchronization new enhancement Low Tor: unspecified
#13508 Add messaging protocol that is resistant to traffic analysis new enhancement Medium Tor: unspecified
#13590 Extend HiddenServicePort VIRTPORT semantics new enhancement Low Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#13697 Carry entropy across invocations new enhancement Medium Tor: unspecified
#13705 Allow relays to promise in their descriptor that their IP address won't change new enhancement Medium Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#13753 Validate is_canonical more thoroughly new enhancement High Tor: unspecified
#13792 HS statistics for private tor network to gather info on services, clients and relays new enhancement Medium Tor: unspecified
#13815 Attempt to port tor to Google's BoringSSL new enhancement Medium Tor: unspecified
#13908 Make it safe to set NumDirectoryGuards=1 new enhancement Medium Tor: unspecified
#13932 Some way for multiple Tor processes to share directory information new enhancement Medium Tor: unspecified
#13987 Apply laplace noise to other statistics new enhancement Medium Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#14164 Controller method to get our own descriptor new enhancement Medium Tor: unspecified
#14209 Implement SOCKSPort windows:path for named pipes new enhancement Medium Tor: unspecified
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14899 Enable Tor to work without using filesystem for cached files new enhancement Medium Tor: unspecified
#15017 Experiment: does BIO_f_buffer help performance with read/write syscalls? new enhancement Medium Tor: unspecified
#15059 Allow UI to identify servers by Ed25519 keys assigned enhancement Low Tor: unspecified
#15060 Decide the fate of MyFamily new enhancement Medium Tor: unspecified
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? new enhancement Low Tor: unspecified
#15458 StrongSocksIsolation option (w/ virtual circuits?) new enhancement Low Tor: unspecified
#15469 Remove data structure containing unique IP address sets new enhancement High Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#15621 Kill the pre-version 3 intro protocol code with fire. assigned enhancement Medium Tor: unspecified
#15729 Proposal: Hidden Service Revocation new Nathaniel enhancement Medium Tor: unspecified
#15883 Redesign/Rewrite the BridgeAuthority new enhancement Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client new enhancement Medium Tor: unspecified
#15991 Option to skip authorization verification in INTRODUCE2 cell new enhancement Medium Tor: unspecified
#15998 suggestion: distributed captcha mechanism for hidden service DDOS defense new enhancement Medium Tor: very long term
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints new enhancement Medium Tor: unspecified
#16059 Add a "rendezvous approver" control API new enhancement Medium Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16134 The various stream lists tied to the circuit structures should use tor_queue.h new yawning enhancement Medium Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16537 Allow onion services to publish voluntary usage stats new enhancement Medium Tor: unspecified
#16564 WIP: Reject bridge descriptors posted to non-bridge authorities needs_revision teor enhancement High Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.