Custom Query (1894 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 1894)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Summary Status Owner Type Priority Milestone
#26787 Core file left on travis hardened rust builld needs_information defect Very High Tor: unspecified
#28241 Corrupt cached consensus and microdescs needs_information defect Medium Tor: unspecified
#29670 Could not create SOCKS args string merge_ready nickm defect Medium Tor: 0.4.0.x-final
#26910 Could tor drop privileges even earlier? (before trying to access anything on the filesystem beyond its torrc files) new enhancement Medium Tor: unspecified
#16831 Cover dns.c with unit tests new enhancement Medium Tor: unspecified
#31025 Coverity is confused by switch statement in siphash24 implementation merge_ready nickm defect Medium Tor: 0.4.2.x-final
#26521 Coverity issues for week 25: Coverity thinks some HS tests have memory leaks new defect Medium Tor: unspecified
#31030 Coverity: Several warnings from test code needs_review nickm defect Medium Tor: 0.4.2.x-final
#31024 Coverity: circpadding: always check circpad_machine_current_state() needs_review defect Medium Tor: 0.4.1.x-final
#31027 Coverity: circpadding: dead code in circpad_machine_remove_token needs_review defect Medium Tor: 0.4.2.x-final
#30759 Create (or edit) the wiki page for the CI role new task Medium Tor: unspecified
#29881 Create a GitHub bot that makes sure there is a pull request on master for every branch new enhancement Medium Tor: unspecified
#28220 Create a chutney network with a single authority, and make sure it bootstraps new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#29264 Create a libprivcount repository containing a rust crate, and new task Medium Tor: 0.4.2.x-final
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#29739 Create a new consensus method that does not include package lines new enhancement Medium Tor: unspecified
#25224 Create a new consensus method that ignores guardfraction votes new defect Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#24249 Create automated mechanism for C/Rust types to stay in sync needs_information chelseakomlo enhancement Medium Tor: unspecified
#13059 Create bad-relays file needs_revision defect Medium Tor: unspecified
#29261 Create consensus parameters to turn off all stats and individual stats new enhancement Medium Tor: 0.4.2.x-final
#7282 Create consensus-info directory commands new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#27229 Create fuzzing harness to compare C/Rust Functionality new task Medium Tor: unspecified
#29212 Create more modularity inside src/core new task Medium Tor: 0.4.2.x-final
#8160 Create separate pending counters during circuit construction assigned enhancement Medium Tor: unspecified
#26565 Create unit tests for reading measured bandwidths with non-NULL routerstatuses new enhancement Medium Tor: unspecified
#26262 Create unittests for circuit timeout tracking new enhancement Medium Tor: unspecified
#22094 Creating private_key/hostname fails with "RO filesystem" message but target dir is actually RW needs_information defect Medium Tor: unspecified
#10812 CryptReleaseContext missed for windows new defect Low Tor: unspecified
#13147 Curious debian hurd unit test failure new defect Medium Tor: unspecified
#24833 DNS not reliably returning AAAA records new enhancement Medium Tor: unspecified
#28772 DNS resolver at DNSPort stops working after some time, while tor is working. Only restart helps. new defect Medium Tor: unspecified
#28356 DataDirectoryGroupReadable and CacheDirectoryGroupReadable conflicts forcing sandboxed Tor to crash assigned defect High Tor: unspecified
#5978 Dead code, possible races, in NT service code new defect Low Tor: unspecified
#4682 Deal with 'double door' effects because our read and write rate limiting are independent assigned arma project Medium Tor: unspecified
#28944 Debian logrotate misses line "su" needs_information defect Low Tor: 0.4.2.x-final
#7358 Decide on list of stats to collect new task Medium Tor: unspecified
#15060 Decide the fate of MyFamily new enhancement Medium Tor: unspecified
#13755 Declare that Windows XP and earlier are not officially supported. new task Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#7027 Defend against Website Traffic Fingerprinting new enhancement High Tor: unspecified
#5456 Defend against path bias and tagging attacks new project High Tor: unspecified
#6495 Define ReducedExitPolicy/ExitPolicyGroups in tor/dirauths new enhancement Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#28675 Deprecate standard cookie authentication new enhancement Medium Tor: unspecified
#28664 Describe consensus digest calculation assigned defect Medium Tor: unspecified
#5379 Design adaptive n23 algorithm that works new enhancement Medium Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#30828 Design tests for as-yet-untested controller commands in Stem new defect Medium Tor: 0.4.2.x-final
#7382 Design/implement technique for measuring/collecting inter-relay network latency new enhancement Medium Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#17957 Detect stolen onion service key new enhancement Medium Tor: unspecified
#30920 Detect uint64 overflow in config_parse_units() new defect Low Tor: 0.4.2.x-final
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26138 DirPort /tor/server/all document contains spurrious blank line following serving relay's descriptor new defect Very Low Tor: unspecified
#26136 DirPort reachability test inconsistency when only "DirPort x.x.x.x:x NoAdvertise" configured new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#29547 Disable merging to unsupported branches on origin new enhancement Medium Tor: unspecified
#28307 DisableNetwork is set new defect Medium Tor: unspecified
#4857 Disabling an HS with service-side rend circs in progress may produce ‘Internal Error’ log message new defect Very Low Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned task High Tor: unspecified
#20676 Disposable Exit Nodes new enhancement Low Tor: unspecified
#29211 Distribute config.c functionality across more modules assigned nickm task Medium Tor: 0.4.2.x-final
#29210 Distribute control.c functionality across various modules new catalyst task Medium Tor: 0.4.2.x-final
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#22473 Do any controllers still use getinfo network-status? new defect Medium Tor: unspecified
#26578 Do clients request new consensus documents more often than we expect? new defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#30190 Do not warn about compatible OpenSSL upgrades merge_ready defect Medium Tor: 0.4.0.x-final
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#21345 Do relays count dir reqs as completed before they're complete? new task Medium Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? new task Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.