Custom Query (1909 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (401 - 500 of 1909)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Ticket Summary Status Owner Type Priority Milestone
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#21043 Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses new defect Medium Tor: unspecified
#21044 ORPort self reachability test happens also when it shouldn't new defect Medium Tor: unspecified
#21081 tor --service install -options does not work new cypherpunks defect Medium Tor: unspecified
#21084 sometimes we call circuit has_opened() more than 2 times on client side assigned defect Medium Tor: unspecified
#21117 can't migrate onion services to single-hop onion services assigned defect Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned defect Medium Tor: unspecified
#21237 Support domain isolation for onion connections too? new defect Medium Tor: unspecified
#21297 Hidden service unavailable. new defect Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit needs_information defect Medium Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#21358 Tor fails to reconnect after computer resumes from sleep new defect Medium Tor: unspecified
#21413 Exits can get the Exit flag without having any ports in their microdescriptor port summary new defect Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time needs_information defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent assigned defect Low Tor: unspecified
#21465 Tor relays fix data directory permissions, but tor clients do not new defect Medium Tor: unspecified
#21474 Fix make test-fuzz-corpora warnings assigned defect Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#21494 Fix scan-build warnings about assigning to char** new defect Low Tor: unspecified
#21497 Fix scan-build warnings: memory accesses new defect Medium Tor: unspecified
#21499 client_dns_incr_failures while passing not hostname but only IP new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#21511 State.tmp is not erased and it may contain sensitive information needs_information defect Medium Tor: unspecified
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#21573 Fix tor warnings that chutney is currently ignoring new defect Medium Tor: unspecified
#21597 ExitRelay configuration option is confusingly named new defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: 0.4.2.x-final
#21602 HiddenServiceAuthorizeClient failed to work if the user specify multiple hiddensite. new defect Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#21716 Avoid recursive call to routerlist_remove_old_routers via router_rebuild_store new defect Medium Tor: unspecified
#21809 Tor sometimes waits much longer than ShutdownWaitLength new defect Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#21864 Support Bridges setting MyFamily to include Relays new defect Medium Tor: unspecified
#21892 ControlSockets are not created if tor starts with DisableNetwork set new defect Medium Tor: unspecified
#21902 evdns adds default DNS servers, but chutney wants a consistent environment new defect Medium Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#21967 obfs4proxy not killed when unused new defect Medium Tor: unspecified
#21969 We're missing descriptors for some of our primary entry guards new asn defect Medium Tor: unspecified
#21974 Race: Tor declares controlport listener open before it has written its controlcookie to disk new defect Medium Tor: unspecified
#22094 Creating private_key/hostname fails with "RO filesystem" message but target dir is actually RW needs_information defect Medium Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag assigned defect High Tor: unspecified
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22233 Reconsider behavior on .z URLs with Accept-Encoding header accepted Hello71 defect Medium Tor: unspecified
#22264 Remove old cached_dir_t code assigned defect Medium Tor: unspecified
#22331 Tor needs to stop trying to read directories before it changes users new defect High Tor: unspecified
#22339 META: Implement some form of jurisdiction/geography/topology-aware routing reopened defect Medium Tor: very long term
#22340 META: allow exits to restrict on something more sophisticated than IPs new defect Medium Tor: very long term
#22351 Should bridge lines in the state file use unlisted_since? assigned defect Medium Tor: unspecified
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#22382 Fix fd leak-on-close from tor-fw-helper pipe new defect Very Low Tor: unspecified
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#22408 Refactor functions over 300 lines long. new defect Medium Tor: unspecified
#22422 Add noise to PaddingStatistics assigned defect High Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() new defect Low Tor: unspecified
#22450 Tor works in compatibility mode on Windows 7 and later new defect Medium Tor: unspecified
#22453 Relays should regularly do a larger bandwidth self-test needs_information juga defect Medium Tor: unspecified
#22469 tor should probably reject "0x00" in port range specifications new defect Medium Tor: unspecified
#22473 Do any controllers still use getinfo network-status? new defect Medium Tor: unspecified
#22477 Add -Wl,--large-address-aware to tor-for-Windows build chain new defect Low Tor: unspecified
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. needs_information defect Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22571 AssumeReachable 1 on a relay doesn't make it publish quickly new defect Medium Tor: unspecified
#22572 please don't kill WarnUnsafeSocks option new defect Medium Tor: unspecified
#22589 Tor circuit is too slow! assigned defect Medium Tor: unspecified
#22619 SessionGroup = Reading config failed merge_ready nickm defect Medium Tor: 0.4.0.x-final
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed new defect Medium Tor: unspecified
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22663 Tor keeps using a very slow guard new defect Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned defect Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#22728 Long-lived onion service circuits can enable guard discovery new defect Medium Tor: unspecified
#22729 Revisit relay read/write history resolution (for onion services) new defect Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22972 tor expert bundle only read the first letter from config new erinn defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Note: See TracQuery for help on using queries.