Custom Query (1962 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 1962)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Summary Status Owner Type Priority Milestone
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: unspecified
#7357 Collect more statistics to better understand simulations new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#15054 Complete implementation of prop220 (ed25519 identity keys) assigned defect Low Tor: unspecified
#9476 Completely drop support for Tor 0.2.2.x new task Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#4624 Config option to declare whether you're using bridges for reachability or for security new project Medium Tor: unspecified
#19518 Configure argument --without-tcmalloc causes linking with libtcmalloc library new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#13234 Consensus Algorithm Causes Flip-Flopping new defect Medium Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: unspecified
#31466 Consider demoting ".exit is disabled" log message to info merge_ready nickm defect Medium Tor: 0.4.1.x-final
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#7750 Consider packaging inbuf when about to send an end cell new enhancement Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#29488 Consider renaming all bash scripts to have .bash extension new defect Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#19377 Consider retry/backoff behavior when building new circuits new task Medium Tor: unspecified
#30411 Consider rewriting git hooks in Python new enhancement Medium Tor: unspecified
#30695 Consider running tor's stem CI job in --target ONLINE mode, maybe with chutney new defect Medium Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias assigned enhancement Medium Tor: unspecified
#32067 Content revisions on doc/HACKING/design: describe important parts of lib. assigned nickm defect Medium Tor: 0.4.3.x-final
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#26113 Control spec is ambiguous whether a GETCONF error message is specified new defect Medium Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#21892 ControlSockets are not created if tor starts with DisableNetwork set new defect Medium Tor: unspecified
#14164 Controller method to get our own descriptor new enhancement Medium Tor: unspecified
#26787 Core file left on travis hardened rust builld needs_information defect Very High Tor: unspecified
#28241 Corrupt cached consensus and microdescs needs_information defect Medium Tor: unspecified
#26910 Could tor drop privileges even earlier? (before trying to access anything on the filesystem beyond its torrc files) new enhancement Medium Tor: unspecified
#31756 Cover all configuration options with test_parseconf.sh new task Medium Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#31832 Coverage flapping in hs_get_responsible_hsdirs() new defect Low Tor: unspecified
#26521 Coverity issues for week 25: Coverity thinks some HS tests have memory leaks new defect Medium Tor: unspecified
#30759 Create (or edit) the wiki page for the CI role new task Medium Tor: unspecified
#29881 Create a GitHub bot that makes sure there is a pull request on master for every branch new enhancement Medium Tor: unspecified
#28220 Create a chutney network with a single authority, and make sure it bootstraps new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#29264 Create a libprivcount repository containing a rust crate new task Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#29739 Create a new consensus method that does not include package lines new enhancement Medium Tor: unspecified
#25224 Create a new consensus method that ignores guardfraction votes new defect Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#24249 Create automated mechanism for C/Rust types to stay in sync needs_information chelseakomlo enhancement Medium Tor: unspecified
#13059 Create bad-relays file needs_revision defect Medium Tor: unspecified
#29261 Create consensus parameters to turn off all stats and individual stats new enhancement Medium Tor: unspecified
#7282 Create consensus-info directory commands new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#27229 Create fuzzing harness to compare C/Rust Functionality new task Medium Tor: unspecified
#29212 Create more modularity inside src/core new task Medium Tor: 0.4.3.x-final
#8160 Create separate pending counters during circuit construction assigned enhancement Medium Tor: unspecified
#26565 Create unit tests for reading measured bandwidths with non-NULL routerstatuses new enhancement Medium Tor: unspecified
#26262 Create unittests for circuit timeout tracking new enhancement Medium Tor: unspecified
#22094 Creating private_key/hostname fails with "RO filesystem" message but target dir is actually RW needs_information defect Medium Tor: unspecified
#10812 CryptReleaseContext missed for windows new defect Low Tor: unspecified
#13147 Curious debian hurd unit test failure new defect Medium Tor: unspecified
#24833 DNS not reliably returning AAAA records new enhancement Medium Tor: unspecified
#28772 DNS resolver at DNSPort stops working after some time, while tor is working. Only restart helps. new defect Medium Tor: unspecified
#28356 DataDirectoryGroupReadable and CacheDirectoryGroupReadable conflicts forcing sandboxed Tor to crash assigned defect High Tor: unspecified
#5978 Dead code, possible races, in NT service code new defect Low Tor: unspecified
#4682 Deal with 'double door' effects because our read and write rate limiting are independent assigned arma project Medium Tor: unspecified
#28944 Debian logrotate misses line "su" needs_information defect Low Tor: unspecified
#7358 Decide on list of stats to collect new task Medium Tor: unspecified
#15060 Decide the fate of MyFamily new enhancement Medium Tor: unspecified
#13755 Declare that Windows XP and earlier are not officially supported. new task Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#31999 Default log file is handled inconsistently new defect Medium Tor: 0.4.3.x-final
#7027 Defend against Website Traffic Fingerprinting new enhancement High Tor: unspecified
#5456 Defend against path bias and tagging attacks new project High Tor: unspecified
#31884 Define ExecuteBash in the Appveyor error block merge_ready teor defect Medium Tor: 0.4.1.x-final
#6495 Define ReducedExitPolicy/ExitPolicyGroups in tor/dirauths new enhancement Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#31181 Deprecate more options in 0.4.3 assigned task Medium Tor: 0.4.3.x-final
#28675 Deprecate standard cookie authentication new enhancement Medium Tor: unspecified
#28664 Describe consensus digest calculation assigned defect Medium Tor: unspecified
#5379 Design adaptive n23 algorithm that works new enhancement Medium Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#30828 Design tests for as-yet-untested controller commands in Stem new enhancement Medium Tor: 0.4.3.x-final
#7382 Design/implement technique for measuring/collecting inter-relay network latency new enhancement Medium Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#17957 Detect stolen onion service key new enhancement Medium Tor: unspecified
#30920 Detect uint64 overflow in config_parse_units() needs_revision defect Low Tor: 0.4.3.x-final
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.