Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (401 - 500 of 2070)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Ticket Summary Status Owner Type Priority Milestone
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision enhancement Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25347 Tor keeps on trying the same overloaded guard over and over needs_revision asn defect Medium Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#26265 A proposal and demo for a fuzzing system that works with Rust through C code needs_revision enhancement Low Tor: unspecified
#26294 attacker can force intro point rotation by ddos needs_revision asn defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() needs_revision neel defect Medium Tor: unspecified
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: unspecified
#26754 stop using BUFFERS_PRIVATE needs_revision enhancement Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#27241 Extract information from more kinds of wedged directory connections. needs_revision enhancement Medium Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#28113 notify systemd if shutdown will be longer than 30 seconds needs_revision Hello71 defect Medium Tor: unspecified
#28247 Use build.rs in place of test_linking_hack needs_revision defect Medium Tor: unspecified
#28280 control: Add a key to GETINFO to get the DoS subsystem stats needs_revision enhancement Low Tor: 0.4.4.x-final
#28930 consider reordering PT/proxy phases needs_revision ahf enhancement Medium Tor: unspecified
#29019 Make relays report bandwidth usage more often in test networks needs_revision enhancement Medium Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.4.x-final
#29427 kist: Poor performance with a small amount of sockets needs_revision dgoulet defect Medium Tor: 0.4.4.x-final
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#29528 UndefinedBehaviorSanitizer errors should fail the unit tests needs_revision defect Medium Tor: unspecified
#29698 Edge case that causes improper circuit prioritization for one scheduling run needs_revision dgoulet defect Medium Tor: unspecified
#30092 Add a probability-to-apply field for circuitpadidng machines needs_revision enhancement Medium Tor: unspecified
#30578 The circuitpadding_circuitsetup_machine test: Re-enable, remove, re-document, or ___? needs_revision asn defect Medium Tor: unspecified
#30615 Factor random_uniform_01 into nondeterministic and deterministic parts, and automatically test the deterministic part needs_revision enhancement Low Tor: unspecified
#31011 Make the bridge authority reject private PT addresses when DirAllowPrivateAddresses is 0 needs_revision cjb defect Medium Tor: 0.4.4.x-final
#31180 Remove easy deprecated options in 0.4.4 needs_revision nickm task Medium Tor: unspecified
#31482 Avoid possible overflow when converting between coarse stamp to approx ms needs_revision nickm defect Medium Tor: 0.4.4.x-final
#31632 hs-v3: Service doesn't re-upload descriptor on circuit failure needs_revision dgoulet defect Medium Tor: 0.4.4.x-final
#31699 Remove unused configure.ac checks needs_revision defect Medium Tor: 0.4.4.x-final
#31812 http URL's in docs/comments should be https needs_revision defect Medium Tor: 0.4.4.x-final
#31820 Drop support for OpenSSL < 1.1.1 needs_revision nickm task Medium Tor: unspecified
#32040 HS intro padding machine reactivates after receiving INTRODUCE_ACK needs_revision asn defect Medium Tor: 0.4.4.x-final
#32165 On first boot, Tor mistakenly tells me "The current consensus has no exit nodes" needs_revision ahf defect Medium Tor: 0.4.4.x-final
#32178 Tor adds trailing space character to log events needs_revision defect Medium Tor: unspecified
#32314 Can't connect to literal IPv6 address containing double colon needs_revision defect Medium Tor: 0.4.4.x-final
#32604 Add HiddenServiceExportRendPoint and HiddenServiceExportInstanceID directive needs_revision moonsikpark enhancement Medium Tor: unspecified
#32883 Use tor_api.h entry points for ntmain.c needs_revision nickm defect Medium Tor: unspecified
#32910 trace: Add tracepoints and userspace tracer support needs_revision dgoulet enhancement Medium Tor: 0.4.4.x-final
#33072 When under load, give 503 aggressively for dirport requests without compression needs_revision dgoulet defect Medium Tor: 0.4.4.x-final
#33193 Travis CI: Find and fix Python syntax errors needs_revision enhancement Medium Tor: 0.4.4.x-final
#33346 Seccomp soft fail (no write) in 0.4.2.6 needs_revision nickm defect Medium Tor: 0.4.4.x-final
#33414 Split router.c, and disable it (mostly) when building without relay support. needs_revision nickm defect Medium Tor: 0.4.4.x-final
#33617 Add a BandwidthStatistics option and consensus parameter needs_revision MrSquanchee enhancement Medium Tor: 0.4.4.x-final
#33618 Add IPv6 Support to is_local_addr() needs_revision kimimaro enhancement Medium Tor: 0.4.4.x-final
#33624 Static building tor with openssl does not work needs_revision defect Medium Tor: 0.4.4.x-final
#33919 Write unit tests for channel_matches_target_addr_for_extend() needs_revision task Medium Tor: 0.4.4.x-final
#34238 Space out some function calls in parse_short_policy() needs_revision neel defect Medium Tor: 0.4.4.x-final
#449 dns failures prevent legitimate options being set new defect Low Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories new defect High Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2395 Break Wed and Wee weights into two classes each new enhancement Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Note: See TracQuery for help on using queries.