Custom Query (1978 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (501 - 600 of 1978)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Ticket Summary Status Owner Type Priority Milestone
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification assigned defect Low Tor: unspecified
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#27896 base32 padding inconsistency between client and server in HS v3 client auth preview needs_information defect Medium Tor: unspecified
#27879 Remove pathbias code new task Medium Tor: unspecified
#27869 "netstatus" in core should not depend on "hibernate" in features new defect Medium Tor: unspecified
#27859 update travis CI to ubuntu xenial image when available new defect Medium Tor: unspecified
#27858 enable zstd on linux CI new defect Medium Tor: unspecified
#27855 Tor exited during startup needs_information defect Medium Tor: unspecified
#27854 Integration test(s) for tor-resolve needs_information rl1987 enhancement Medium Tor: unspecified
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#27816 Rendezvous failures could distinguish "unknown cookie" from "outdated cookie" new defect Medium Tor: unspecified
#27811 Eventual inability to connect to a HS from a client that lists most countries in ExcludeNodes new defect Medium Tor: unspecified
#27805 Update CodingStandardsRust.md with allocate_and_copy_string() new defect Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: 0.4.2.x-final
#27801 tor_api: CreateConnection() interface new enhancement Medium Tor: unspecified
#27785 updateRustDependencies.sh shouldn't use realpath new defect Medium Tor: unspecified
#27778 Travis: add link-time optimisation to detect function signature mismatches assigned enhancement Medium Tor: unspecified
#27739 rust protover_all_supported() accepts too-long protocol names new defect Medium Tor: unspecified
#27736 Make sure that Tor doesn't build an IPv4 and an IPv6 connection to the same relay assigned defect Medium Tor: unspecified
#27725 Stealthy onions should appear to be offline new defect Medium Tor: unspecified
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges new defect Medium Tor: unspecified
#27713 uncrustify config file to autofix C code whitespace and indentation new enhancement Medium Tor: unspecified
#27712 Introduce Finite State Machine abstraction into Tor codebase new enhancement Medium Tor: very long term
#27694 what happens if we have both a firewall-bypass proxy and a pluggable transport? new project Medium Tor: unspecified
#27691 reset bootstrap progress when enough things change new enhancement Medium Tor: unspecified
#27679 Test dropped cell counting from command_process_relay_cell() new enhancement Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#27661 use C99 bool from stdbool.h instead of int everywhere new defect Medium Tor: unspecified
#27648 Stop setting the IPv6 preferred flag on nodes assigned neel enhancement Medium Tor: unspecified
#27647 When randomly choosing IPv4 or IPv6, set IPv6 probability based on IPv6 weight assigned neel enhancement Medium Tor: unspecified
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines new enhancement Medium Tor: unspecified
#27615 Travis cache sticky failures new defect Medium Tor: unspecified
#27594 new warning: Requested exit point '<snip>' is not known. Closing. new defect Medium Tor: unspecified
#27593 Call CRYPTO_set_mem_functions with tor_malloc, tor_realloc and tor_free new enhancement Medium Tor: unspecified
#27563 cached_dir_t for consensus is redundant with conscache code new enhancement Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#27519 missing "Service configured in" for hs-v3 lines in info log new defect Medium Tor: unspecified
#27492 Try IPv4 or IPv6 more often based on public or private IP addresses assigned neel enhancement Medium Tor: unspecified
#27491 Prefer IPv4 or IPv6 based on the number of failures assigned neel enhancement Medium Tor: unspecified
#27468 CI: add builds with the latest clang and gcc assigned enhancement High Tor: unspecified
#27450 Test "make install" in Travis CI new enhancement Medium Tor: unspecified
#27446 hs: Report configuration error on the control port assigned neel defect Low Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27414 Relays should check that their descriptors are UTF-8 before uploading them new enhancement Medium Tor: unspecified
#27382 Bad valid-after time in 0.3.3 and 0.3.4 assigned defect Medium Tor: unspecified
#27381 Bad consensus diffs on 0.3.4 and later [with chutney] assigned defect Medium Tor: unspecified
#27376 Travis: Actually use gcc on OS X new defect Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#27353 intern project idea: a chutney or shadow framework for testing bootstrap speed/success new project Medium Tor: unspecified
#27334 RelaxDirModeCheck on ControlSocket still requires group to m reopened defect Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27329 Rework RELAY cell wire format handling with trunnel new enhancement Medium Tor: unspecified
#27328 Rework EXTEND and EXTENDED cells with trunnel new enhancement Medium Tor: unspecified
#27327 Parse and generate CREATE, CREATE_FAST and CREATED cell wire format with trunnel new enhancement Medium Tor: unspecified
#27326 Replace packed_cell_t and supporting code with stuff generated by trunnel new enhancement Medium Tor: unspecified
#27324 Rework AUTHENTICATE cell parsing and remaining generation with trunnel accepted rl1987 enhancement Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#27315 Sandbox regression in 0.3.4.7-rc needs_information defect Medium Tor: 0.3.5.x-final
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#27308 report bootstrap phase when we actually start, not just unblock something new enhancement Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#27245 Don't store (micro)descriptor text on the heap so much. assigned defect Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#27241 Extract information from more kinds of wedged directory connections. needs_information enhancement Medium Tor: unspecified
#27229 Create fuzzing harness to compare C/Rust Functionality new task Medium Tor: unspecified
#27207 Examples in CodingStandardsRust.md are wrong new defect Medium Tor: unspecified
#27201 rust/protover doesn't forbid version zero needs_information defect Medium Tor: unspecified
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#27194 Reject protover extra commas in protover needs_revision defect Medium Tor: unspecified
#27192 Perform --verify-config before reloading tor reopened defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#27162 Travis: consider running CI on beta, nightly, and tor's lowest supported rust assigned enhancement Medium Tor: unspecified
#27161 Add make check-rustfmt to make check assigned enhancement Low Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#27143 Look for parts of code that relies on non-trunnel code for binary wire format handling accepted rl1987 task Medium Tor: unspecified
#27130 rust dependency updating instructions don't work accepted nickm defect Medium Tor: unspecified
#27104 report intermediate status when building application circuits new enhancement Medium Tor: unspecified
#27066 circuit_build_times_update_alpha(): Bug: Could not determine largest build time needs_information defect Medium Tor: unspecified
#27052 document rust/crypto new enhancement Medium Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27047 Authorities should keep recent consensuses, votes, and bandwidth files new enhancement Medium Tor: unspecified
#27024 Tor is now TSR and no way to terminate it new defect Medium Tor: unspecified
#26999 tor_api: Some way to capture stdout/stderr new enhancement Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#26993 Tor silently ignores hidden directory when it isn't writable new defect Medium Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells new defect Medium Tor: unspecified
#26970 Privcount: plan the modules and components assigned task Low Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible assigned defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note: See TracQuery for help on using queries.