Custom Query (1966 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (501 - 600 of 1966)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Ticket Summary Status Owner Type Priority Milestone
#19327 controller: expose fine-grained circuit detail. new enhancement Medium Tor: 0.4.3.x-final
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19661 tor refuses to use /dev/null as a config file needs_revision cypherpunks enhancement Medium Tor: unspecified
#19759 systemd tor.service hardening: add MemoryDenyWriteExecute=true new enhancement Medium Tor: unspecified
#19859 Expose stream isolation information to controllers needs_revision enhancement Medium Tor: 0.4.3.x-final
#19959 have a flag for Tor relay location, if a relay is hosted in a data center, cloud or physically secured new enhancement Medium Tor: unspecified
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#20006 HSFETCH fails for hidden services which use client authentication needs_revision rl1987 enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20082 Lower initial descriptor upload delay for hidden services needs_revision twim enhancement Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20169 hs_desc, hs_desc_content - BAD_DESC|NOT_FOUND new enhancement Low Tor: unspecified
#20188 hsfetch hs_desc FAILED with REASON missing new enhancement Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20212 Tor can be forced to open too many circuits by embedding .onion resources new tbb-team enhancement Medium Tor: unspecified
#20226 Support DNS-MX resource records with .onion-filtering for TOR as secure/anonymous email transport protocoll new enhancement Medium Tor: very long term
#20289 HS_DESC event while waiting for upload new enhancement Low Tor: unspecified
#20337 Support abstract namespace AF_UNIX sockets. new enhancement Low Tor: unspecified
#20340 nice to have: test torrc for incompatible transistions of config values new enhancement Low Tor: unspecified
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20371 Lower HSDir query backoff delay new enhancement Medium Tor: unspecified
#20469 Expose predicted-ports state over the control port new enhancement Medium Tor: unspecified
#20554 Refactor circuit_expire_building new enhancement Low Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20647 Tor and Chutney CI improvements assigned enhancement High Tor: 0.4.2.x-final
#20676 Disposable Exit Nodes new enhancement Low Tor: unspecified
#20719 prop271 -- make parameters configurable assigned enhancement Medium Tor: unspecified
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified
#20872 option to build non-standard code paths on x86 new enhancement Medium Tor: unspecified
#20930 Use new systemd hardening options new enhancement Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events assigned enhancement Medium Tor: unspecified
#20953 Isolate references to versioning new chelseakomlo enhancement Medium Tor: unspecified
#21020 Refactor dirserv_generate_networkstatus_vote_obj new enhancement Low Tor: unspecified
#21133 Add stem support to expose ed25519 relay key expire date new enhancement Medium Tor: unspecified
#21149 Document what Tor means by "using reasonable defaults" new enhancement Medium Tor: unspecified
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned enhancement Medium Tor: unspecified
#21281 Allow process poll rate to be customized new enhancement Very Low Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21360 add controller event to track changes to 'getinfo onions/detached' new enhancement Medium Tor: unspecified
#21397 Tor TransparentProxy documentation: add IPv6 support / port to nftables new enhancement Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21453 add ClientTransportPlugin configuration to tor-service-defaults-torrc by default new enhancement Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21502 create exitnode socksportoption since .node.exit is bad idea new enhancement Low Tor: unspecified
#21503 ship default MapAddress for at least torproject.org hosts new enhancement Low Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21813 create a JSON-based alternative control port protocol new enhancement Low Tor: unspecified
#21816 Add support for Pluggable Transports 2.0 needs_revision dasyatid1 enhancement Medium Tor: unspecified
#21910 Refactor connection_edge_process_relay_cell() new enhancement Low Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21996 Should we treat BUG messages as fatal errors during fuzzing? new enhancement Medium Tor: unspecified
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#22049 The various proxy options should support an AF_LOCAL socket. new enhancement Low Tor: unspecified
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22123 baseXX API strictness new enhancement Medium Tor: unspecified
#22203 Should a hup reload the geoip files? new enhancement Medium Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#22251 Spec should change: stop requiring Tor relays to support old link versions new enhancement Medium Tor: unspecified
#22304 Support generating HS private key / onion address without publishing new enhancement Medium Tor: unspecified
#22308 Consider resetting wfu/mtbf/tk values for relays when they switch IP addresses new enhancement Medium Tor: unspecified
#22312 Refactor/Simplify to clarify "we cache dir info" vs "we invite clients to use us as a directory guard" new enhancement Medium Tor: unspecified
#22358 should dir auths count it as a downtime if descriptor uptime resets? new enhancement Medium Tor: unspecified
#22359 Community team and network team are constructing glossaries in parallel assigned emmapeel enhancement Medium Tor: unspecified
#22363 Make our test network public new enhancement Medium Tor: unspecified
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22697 Tor should mandatory require brackets around ipv6 address new enhancement Medium Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22816 Run tests for single Rust module new enhancement Low Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#22826 Write a spec for unsanitised bridge descriptor formats assigned enhancement Low Tor: unspecified
#22893 prop224: Make intro point per-service and not per-descriptor assigned teor enhancement Very High Tor: 0.4.3.x-final
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note: See TracQuery for help on using queries.