Custom Query (1901 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (401 - 500 of 1901)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Ticket Summary Status Owner Type Priority Milestone
#9290 Use something other than "known relay" to decide on rate in connection_or_update_token_buckets_helper() on authorities new defect Low Tor: unspecified
#9390 Warn if you're being a public relay but have too-low file descriptor limit needs_revision enhancement Medium Tor: unspecified
#9476 Completely drop support for Tor 0.2.2.x new task Medium Tor: unspecified
#9494 Remove gratuitous newlines from log messages? new defect Low Tor: unspecified
#9498 Allow bridge descriptors to contain no address if they are not being published new enhancement Very High Tor: unspecified
#9655 Tor manual's config default options could be clearer new enhancement Very Low Tor: unspecified
#9680 get_datadir_fname2_suffix() should create missing directories as needd new enhancement Low Tor: unspecified
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#9689 Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery new project Medium Tor: unspecified
#9729 Make bridges publish additional ORPort addresses in their descriptor needs_revision enhancement Medium Tor: unspecified
#9775 Authorities should report when they don't vote Running but some addresses are still reachable new enhancement Medium Tor: unspecified
#9860 junk log messages every time SETCONF changes the set of ORPorts needs_revision defect Very Low Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#9954 Replace broadcast voting protocol with something more robust new defect Medium Tor: unspecified
#9968 Time out quicker on microdesc fetch failures while we're bootstrapping new enhancement Medium Tor: unspecified
#9982 Use a better password-based KDF for controller passwords, authority identity key encryption, and more new defect Medium Tor: unspecified
#9998 resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 new enhancement Medium Tor: unspecified
#10024 Close and open sockets on IP change, tracking new enhancement Medium Tor: unspecified
#10027 Tor Windows service should be installed with the NetworkService account new defect Medium Tor: unspecified
#10052 Tor Windows service should reload its configuration on SERVICE_CONTROL_PARAMCHANGE control code new enhancement Medium Tor: unspecified
#10168 Use monotonic clocks for time as appropriate new enhancement Medium Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#10307 Allow Tor relays to configure bandwidth limits around peak usage new enhancement Low Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#14164 Controller method to get our own descriptor new enhancement Medium Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#17066 Avoid assuming relays have a single IPv4/IPv6 address new task Medium Tor: unspecified
#17127 Fix and re-enable --master-key option, possibly --out (for keys) and possibly --nopass for non-interactive key generation new enhancement Medium Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#17740 Unit Tests for Recent Consensuses new enhancement Medium Tor: unspecified
#17901 Tor would bind ControlPort to public ip address if it has no localhost interface new defect High Tor: unspecified
#17953 Fallback to resolving localhost when interface searches fail new defect Medium Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#19333 Make node-selection functions testable and tested new defect Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#21133 Add stem support to expose ed25519 relay key expire date new enhancement Medium Tor: unspecified
#21511 State.tmp is not erased and it may contain sensitive information needs_information defect Medium Tor: unspecified
#21716 Avoid recursive call to routerlist_remove_old_routers via router_rebuild_store new defect Medium Tor: unspecified
#449 dns failures prevent legitimate options being set assigned defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each assigned enhancement Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified
#3733 Tor should abandon rendezvous circuits that cause a client request to time out assigned defect Medium Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf assigned defect Low Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned task High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X assigned enhancement High Tor: unspecified
#5298 Relay does not pick the right IP addr of local node when multiple interfaces are available new defect Medium Tor: unspecified
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified
#5685 Publish node best practices doc and scripts assigned task High Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits assigned enhancement Medium Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: unspecified
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations assigned enhancement Medium Tor: unspecified
#8001 obfsproxy makes tor warn when one bridge is down assigned defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned defect Very Low Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias assigned enhancement Medium Tor: unspecified
#8160 Create separate pending counters during circuit construction assigned enhancement Medium Tor: unspecified
#8387 Unbuilt one-hop circuits sometimes hang around forever assigned defect High Tor: unspecified
#8453 Alter flag-weight balancing equations assigned enhancement Medium Tor: unspecified
#8593 Circuit build timeout not respected? assigned defect High Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#9957 Tor should consider stderr output of transport proxies new enhancement Very Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Note: See TracQuery for help on using queries.