Custom Query (1969 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (401 - 500 of 1969)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Ticket Summary Status Owner Type Priority Milestone
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26138 DirPort /tor/server/all document contains spurrious blank line following serving relay's descriptor new defect Very Low Tor: unspecified
#26136 DirPort reachability test inconsistency when only "DirPort x.x.x.x:x NoAdvertise" configured new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#32139 Disable dirauth and relay options when those modules are disabled new enhancement Medium Tor: 0.4.3.x-final
#29547 Disable merging to unsupported branches on origin new enhancement Medium Tor: unspecified
#28307 DisableNetwork is set new defect Medium Tor: unspecified
#4857 Disabling an HS with service-side rend circs in progress may produce ‘Internal Error’ log message new defect Very Low Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests assigned task High Tor: unspecified
#20676 Disposable Exit Nodes new enhancement Low Tor: unspecified
#29211 Distribute config.c functionality across more modules assigned nickm task Medium Tor: 0.4.3.x-final
#29210 Distribute control.c functionality across various modules new catalyst task Medium Tor: 0.4.3.x-final
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#31770 Divide connection_edge.c into separate files. assigned nickm task Medium Tor: 0.4.2.x-final
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#22473 Do any controllers still use getinfo network-status? new defect Medium Tor: unspecified
#26578 Do clients request new consensus documents more often than we expect? new defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#21345 Do relays count dir reqs as completed before they're complete? new task Medium Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? new task Low Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#28449 Do we really need to run retry_listeners_callback so often? new defect Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#26359 DoS and timed attacks via unencrypted network time protocols new defect Medium Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned defect High Tor: unspecified
#28597 Document SOCKSPolicy better assigned defect Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified
#30745 Document disabled CI assigned teor enhancement Medium Tor: 0.4.3.x-final
#28037 Document how to fix or disable failing CI assigned enhancement Medium Tor: unspecified
#29216 Document how to make new files/modules in Tor new task Medium Tor: 0.4.3.x-final
#30349 Document member-hiding conventions for structs new task Medium Tor: unspecified
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#7360 Document process of collection and extraction, formatting, etc. new task Medium Tor: unspecified
#29215 Document target, modular tor architecture accepted catalyst task Medium Tor: 0.4.3.x-final
#14854 Document the hardlimit of HiddenServiceAuthorizeClient basic new defect Medium Tor: unspecified
#28582 Document the load-balancing goal for sbws needs_information task Medium Tor: unspecified
#29134 Document the max number of v3 client auths I can make assigned haxxpop defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#29802 Document the v3 onion service key files in the tor man page new defect Medium Tor: unspecified
#21149 Document what Tor means by "using reasonable defaults" new enhancement Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#7362 Don't kill the managed proxy if a transport failed to launch new defect Medium Tor: unspecified
#9045 Don't let the call frequency of update_networkstatus_downloads() depend on TorTestingNetwork new defect Low Tor: unspecified
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages assigned defect Medium Tor: unspecified
#27245 Don't store (micro)descriptor text on the heap so much. assigned defect Medium Tor: unspecified
#10871 Download more microdescriptors with a shorter request new defect Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#17665 Drop scheduler config options new defect Very Low Tor: unspecified
#11151 Drop support for 0.2.2 clients new defect Medium Tor: unspecified
#31820 Drop support for OpenSSL < 1.1.1 new task Medium Tor: 0.4.3.x-final
#11445 Drop support for Windows XP new defect Medium Tor: unspecified
#11444 Drop support for long-obsolete versions of Windows new defect Medium Tor: unspecified
#6418 Drop support for older versions of the hidden service protocol new enhancement Medium Tor: unspecified
#26088 Duplicate creation of ReachableAddresses reject in torrc file new defect Low Tor: unspecified
#20332 Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS new defect Medium Tor: unspecified
#14223 END_STREAM_REASON_TIMEOUT blurs together two very different error cases new defect Medium Tor: unspecified
#29698 Edge case that causes improper circuit prioritization for one scheduling run needs_revision dgoulet defect Medium Tor: 0.4.2.x-final
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#25574 Eliminate "silent-drop" side channels in Tor protocol new defect Medium Tor: unspecified
#31179 Eliminate non tor_queue.h linked lists. new task Medium
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#14899 Enable Tor to work without using filesystem for cached files new enhancement Medium Tor: unspecified
#4565 Enable relays to talk to other relays via IPv6 assigned ln5 project Medium Tor: unspecified
#26778 Enable supporting multiple bridge authorities new defect Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells assigned enhancement Medium Tor: unspecified
#29883 Enforce lower practracker limits for every new release new defect Medium Tor: unspecified
#29570 Enforce mutually exclusive logic for IPv6 ORPort flags new defect Medium Tor: unspecified
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile new enhancement Medium Tor: unspecified
#29084 Ensure circuit padding RTT estimate handes var cells/wide creates new defect Medium Tor: unspecified
#22455 Enumerate cases where we want to retry circuits, and correctly balance retry robustness with guard discovery new task Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#26311 Error in `/usr/bin/tor': free(): invalid next size (normal): 0x000055ed468598d0 needs_information defect Medium Tor: 0.3.5.x-final
#22908 Establish guidelines for contributing large bodies of code new task Medium Tor: unspecified
#22745 Establish policy for writing regression tests new task Medium Tor: unspecified
#13977 Evaluate alternate SSL/TLS libraries: CyaSSL, GnuTLS, ... new task Medium Tor: unspecified
#9165 Evaluate datagram-based transports; build and merge as appropriate new project Medium Tor: very long term
#7148 Even better parameter voting protocol new defect High Tor: unspecified
#27811 Eventual inability to connect to a HS from a client that lists most countries in ExcludeNodes new defect Medium Tor: unspecified
#4233 Exact addition/summation and memory allocation needs_revision enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#27207 Examples in CodingStandardsRust.md are wrong new defect Medium Tor: unspecified
#18321 Exclude our own vote from the consensus if we think our own vote is invalid assigned defect Medium Tor: unspecified
#5641 Exit Enclave equivalent for encrypted Tor-to-Tor connections new enhancement Low Tor: unspecified
#31735 Exit and join all threads, before destroying any mutexes in the main thread new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Note: See TracQuery for help on using queries.