Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (401 - 500 of 2070)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Ticket Summary Status Owner Type Priority Milestone
#33032 Decode key files with Unix or Windows newlines merge_ready nickm defect Medium Tor: 0.4.2.x-final
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#7027 Defend against Website Traffic Fingerprinting new enhancement High Tor: unspecified
#5456 Defend against path bias and tagging attacks new project High Tor: unspecified
#6495 Define ReducedExitPolicy/ExitPolicyGroups in tor/dirauths new enhancement Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) new enhancement Medium Tor: unspecified
#31181 Deprecate more options in 0.4.3 new task Medium Tor: unspecified
#28675 Deprecate standard cookie authentication new enhancement Medium Tor: unspecified
#28664 Describe consensus digest calculation new defect Medium Tor: unspecified
#33712 Design a PoW scheme for HS DoS defence new defect Medium Tor: unspecified
#5379 Design adaptive n23 algorithm that works new enhancement Medium Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#3290 Design some way to ensure circuit reuse for FTP (and other?) multi-connection protocols new enhancement Low Tor: unspecified
#30828 Design tests for as-yet-untested controller commands in Stem new enhancement Medium Tor: unspecified
#7382 Design/implement technique for measuring/collecting inter-relay network latency new enhancement Medium Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy needs_revision enhancement High Tor: unspecified
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#17957 Detect stolen onion service key new enhancement Medium Tor: unspecified
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#33530 Dir auths should notice relays with wrong clocks and act somehow (BadClock flag, withhold Guard) new enhancement Medium Tor: unspecified
#16558 Dir auths should vote about Invalid like they do about BadExit new defect Medium Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26138 DirPort /tor/server/all document contains spurrious blank line following serving relay's descriptor new defect Very Low Tor: unspecified
#26136 DirPort reachability test inconsistency when only "DirPort x.x.x.x:x NoAdvertise" configured new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures needs_revision enhancement Medium Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#32139 Disable all dirauth options when those modules are disabled accepted nickm enhancement Medium Tor: unspecified
#32395 Disable all relay options when those modules are disabled new enhancement Medium Tor: unspecified
#29547 Disable merging to unsupported branches on origin new enhancement Medium Tor: unspecified
#28307 DisableNetwork is set new defect Medium Tor: unspecified
#4857 Disabling an HS with service-side rend circs in progress may produce ‘Internal Error’ log message new defect Very Low Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#5211 Discuss other ways for the bridge authority to run bridge reachability tests new task High Tor: unspecified
#20676 Disposable Exit Nodes new enhancement Low Tor: unspecified
#29211 Distribute config.c functionality across more modules assigned nickm task Medium Tor: unspecified
#7486 Divergent behavior for over-long length on begin cells new defect Low Tor: unspecified
#31770 Divide connection_edge.c into separate files. assigned nickm task Medium Tor: 0.4.5.x-final
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#33102 Do an updated version of "top changes since 2004 paper"? new task Medium
#22473 Do any controllers still use getinfo network-status? new defect Medium Tor: unspecified
#26578 Do clients request new consensus documents more often than we expect? new defect Medium Tor: unspecified
#33844 Do next iteration of proposal by folding in comments from dgoulet/mike assigned asn defect Medium Tor: unspecified
#19220 Do not override Makefile user variables new defect Medium Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#21345 Do relays count dir reqs as completed before they're complete? new task Medium Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#3863 Do something smarter with Windows Tor crash dumps reopened tbb-team task Medium Tor: unspecified
#33383 Do we actually need the orconn_ext_or_id_map? new defect Medium Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? new task Low Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#28449 Do we really need to run retry_listeners_callback so often? new defect Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#26359 DoS and timed attacks via unencrypted network time protocols new defect Medium Tor: unspecified
#33156 DoS subsystem should compare IPv6 /64 assigned neel defect Medium Tor: unspecified
#33781 DocTor chokes on malformed dirreq-stats-end line assigned ahf defect Medium Tor: 0.4.4.x-final
#12401 Document EntryGuardPathBias in doc/state-contents.txt new defect High Tor: unspecified
#28597 Document SOCKSPolicy better new defect Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19288 Document circuitpathbias in detail new defect Medium Tor: unspecified
#19293 Document connection-attachment and addressmapping in detail new defect Medium Tor: unspecified
#28037 Document how to fix or disable failing CI new enhancement Medium Tor: unspecified
#29216 Document how to make new files/modules in Tor new task Medium Tor: unspecified
#30349 Document member-hiding conventions for structs new task Medium Tor: unspecified
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#7360 Document process of collection and extraction, formatting, etc. new task Medium Tor: unspecified
#29215 Document target, modular tor architecture new task Medium Tor: unspecified
#32661 Document that we avoid changing src/ext new task Medium Tor: 0.4.4.x-final
#14854 Document the hardlimit of HiddenServiceAuthorizeClient basic new defect Medium Tor: unspecified
#28582 Document the load-balancing goal for sbws needs_information task Medium Tor: unspecified
#29134 Document the max number of v3 client auths I can make assigned haxxpop defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() new enhancement Medium Tor: unspecified
#29802 Document the v3 onion service key files in the tor man page new defect Medium Tor: unspecified
#21149 Document what Tor means by "using reasonable defaults" new enhancement Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#7362 Don't kill the managed proxy if a transport failed to launch new defect Medium Tor: unspecified
#9045 Don't let the call frequency of update_networkstatus_downloads() depend on TorTestingNetwork new defect Low Tor: unspecified
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages new defect Medium Tor: unspecified
#34382 Don't require M_SYSCALL in sandbox.c needs_review nickm defect Medium Tor: 0.4.4.x-final
#33095 Don't say "future instances of this warning will be suppressed" when we don't mean it. merge_ready nickm defect Medium Tor: 0.4.2.x-final
#27245 Don't store (micro)descriptor text on the heap so much. new defect Medium Tor: unspecified
#10871 Download more microdescriptors with a shorter request new defect Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#17665 Drop scheduler config options new defect Very Low Tor: unspecified
#31820 Drop support for OpenSSL < 1.1.1 needs_revision nickm task Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Note: See TracQuery for help on using queries.