Custom Query (1898 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 1898)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Summary Status Owner Type Priority Milestone
#6010 UpdateBridgesFromAuthority isn't actually usable new enhancement Medium Tor: unspecified
#6176 Clean up service IDs new defect Low Tor: unspecified
#6198 Make sure that we clear addresses before freeing connections new project Medium Tor: unspecified
#6256 Make circuit isolation isolate exits? (signal NEWNYM exit bucketing) new enhancement Medium Tor: unspecified
#6288 Aggressive reconnection attempt when using Tor Client with Socks new enhancement Low Tor: unspecified
#6289 Multiple Socks Server support in Tor Client new enhancement Low Tor: unspecified
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config new enhancement High Tor: unspecified
#6313 Many of Tor's complex functions should be refactored new project Medium Tor: unspecified
#6418 Drop support for older versions of the hidden service protocol new enhancement Medium Tor: unspecified
#6419 is it really a protocolwarn when connection_or_client_learned_peer_id() finds a different keyid? new defect Low Tor: unspecified
#6495 Define ReducedExitPolicy/ExitPolicyGroups in tor/dirauths new enhancement Medium Tor: unspecified
#6504 Support Windows environment variables in HiddenServiceDir needs_information enhancement Low Tor: unspecified
#6515 Treat timeout of all name lookup tests as also meaning that DNS is broken new enhancement Low Tor: unspecified
#6622 Tor link against static zlib broken by -pie switch new defect High Tor: unspecified
#6623 --enable-static-tor cannot succeed needs_revision defect Medium Tor: unspecified
#6761 PDS_NO_EXISTING_SERVERDESC_FETCH is somewhat archaic new defect Medium Tor: unspecified
#6772 Fall back to alternative OR or Dir port if the current fails new enhancement Medium Tor: unspecified
#6777 add config option to not rate limit authority dir conns new defect Medium Tor: unspecified
#6781 Make cell statistics useful in simulations again new enhancement Low Tor: unspecified
#6790 Write proposal draft for directory mirrors to accept, aggregate and hand off descriptors to dirauths new enhancement Medium Tor: unspecified
#6802 Make our config parsing less kludgy new enhancement Medium Tor: unspecified
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#6841 "We have no recent usable consensus" (0.2.4.2-alpha) new defect Medium Tor: unspecified
#6877 Finally replace all char[] buffers with uint8_t[] buffers new defect High Tor: unspecified
#6878 Make outbound DNS requests honor IPv6 OutboundBindAddress new enhancement Medium Tor: unspecified
#6883 Separate configuration options for separate Socks/NATD/Trans/DNS ports new project Medium Tor: unspecified
#6936 link to librt and libdl only when needed new defect Medium Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#7003 Wipe relay key material from memory on common crash conditions new enhancement High Tor: unspecified
#7027 Defend against Website Traffic Fingerprinting new enhancement High Tor: unspecified
#7043 Tor reports clock jumps when no actual clock jumps occurred new defect Medium Tor: unspecified
#7077 Recover from junk in cached-descriptors new defect Medium Tor: unspecified
#7106 Write "how to be nice to the Tor network" spec new project Medium Tor: unspecified
#7117 One of our code-checking tools should make sure that we don't add more reserved identifiers new enhancement Low Tor: unspecified
#7126 Multipath consensus integrity verification new enhancement Medium Tor: unspecified
#7134 Add statistics on time spent on crypto operations needs_information project Medium Tor: unspecified
#7148 Even better parameter voting protocol new defect High Tor: unspecified
#7174 Refactor node_t and router lists to make it easier to identify bugs new project Medium Tor: unspecified
#7193 Tor's sybil protection doesn't consider IPv6 new enhancement Medium Tor: unspecified
#7216 networkstatus_check_consensus_signature() shouldn't warn because of missing certs needs_revision defect Medium Tor: unspecified
#7282 Create consensus-info directory commands new enhancement Medium Tor: unspecified
#7346 Add stream-level pushback into n23 design new project Medium Tor: unspecified
#7357 Collect more statistics to better understand simulations new enhancement Medium Tor: unspecified
#7358 Decide on list of stats to collect new task Medium Tor: unspecified
#7360 Document process of collection and extraction, formatting, etc. new task Medium Tor: unspecified
#7362 Don't kill the managed proxy if a transport failed to launch new defect Medium Tor: unspecified
#7382 Design/implement technique for measuring/collecting inter-relay network latency new enhancement Medium Tor: unspecified
#7457 Add client-side log indicator that an obfsbridge works new enhancement Low Tor: unspecified
#7478 Allow routersets to include/exclude nodes by IPv6 address needs_revision enhancement High Tor: unspecified
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#7480 cached_resolve_t expiration is overengineered new defect Medium Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#7509 Publish and use circuit success rates in extrainfo descriptors new enhancement Medium Tor: unspecified
#7590 [PATCH] New option LocalOutboundBindAddress needs_revision enhancement Medium Tor: unspecified
#7646 fix/enhance getinfo ns/id/* commands new defect Medium Tor: unspecified
#7660 Refactor circuit cannibalization into one place new enhancement Medium Tor: unspecified
#7678 Check if a stream could send a cell but the circuit hasn't asked it to new defect High Tor: unspecified
#7679 Test integration of Minion (out-of-order data transmission thing) with Tor relays new project Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#7729 Reading pending TLS bytes can take us over at_most needs_revision defect Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#7750 Consider packaging inbuf when about to send an end cell new enhancement Medium Tor: unspecified
#7755 circuit_t::timestamp_dirty should be cleaned up new defect Medium Tor: unspecified
#7789 Also display configuration file (torrc) location when running as Windows service new defect Low Tor: unspecified
#7798 Use directory guards even when consensus isn't live needs_information defect Medium Tor: unspecified
#7829 Support all kinds of DNS over Tor new task High Tor: unspecified
#7870 Retry on a new circuit for more reasons. needs_revision defect Medium Tor: unspecified
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#7966 When Tor hibernates it should eventually resume, but on win7 it reports "address already in use". new defect Medium Tor: unspecified
#7971 review address lists in tor_addr_is_internal_() new defect Medium Tor: unspecified
#7986 Lengthen the consensus validity interval needs_revision enhancement Medium Tor: unspecified
#8111 Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags new enhancement High Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#8190 Relays should publish number of refill intervals where the token bucket went dry new enhancement Medium Tor: unspecified
#8214 "getinfo address" should work more consistently soon after startup new enhancement Low Tor: unspecified
#8278 Wrap conditionally-compiled C files in #ifdefs new enhancement Medium Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#8351 Refactor our controller-command/torrc-option processing logic into a data-driven function needs_revision enhancement Medium Tor: unspecified
#8486 Introduce ExitNode country code per listener new enhancement Medium Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#8742 Byte history leaks information about local usage/hidden services reopened defect High Tor: unspecified
#8749 Return information about the leaking application new enhancement Medium Tor: unspecified
#8787 Check return values for more unix functions new defect Medium Tor: unspecified
#8954 Need a better convention for testing option variable names new defect Low Tor: unspecified
#8962 pathbias_count_use_attempt strange path state log lines new defect Medium Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients new defect High Tor: unspecified
#9024 add supplementary groups when changing uid new enhancement Medium Tor: unspecified
#9045 Don't let the call frequency of update_networkstatus_downloads() depend on TorTestingNetwork new defect Low Tor: unspecified
#9062 Authorities should describe their bwauth version in their votes new enhancement Medium Tor: unspecified
#9105 make heartbeat messages describe hibernation consistently new defect Low Tor: unspecified
#9165 Evaluate datagram-based transports; build and merge as appropriate new project Medium Tor: very long term
#9188 Our weighting algorithms probably behave strangely when guards are disabled new defect Medium Tor: unspecified
#9208 Allow node operator to avoid Guard flag needs_information enhancement Medium Tor: unspecified
#9213 Shouldn't ~/.torrc override /etc/torrc ? new defect Medium Tor: unspecified
#9241 Abstract and decouple path selection from circuit construction new enhancement Medium Tor: unspecified
#9290 Use something other than "known relay" to decide on rate in connection_or_update_token_buckets_helper() on authorities new defect Low Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.