Custom Query (1970 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (501 - 600 of 1970)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Ticket Summary Status Owner Type Priority Milestone
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: unspecified
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified
#20082 Lower initial descriptor upload delay for hidden services needs_revision twim enhancement Medium Tor: unspecified
#20218 Fix and refactor and redocument routerstatus_has_changed needs_revision defect Medium Tor: unspecified
#20284 consensus weight case 2b3 does not follow dir-spec needs_revision pastly defect Medium Tor: unspecified
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21816 Add support for Pluggable Transports 2.0 needs_revision dasyatid1 enhancement Medium Tor: unspecified
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? needs_revision defect Medium Tor: unspecified
#24857 Tor uses 100% CPU when accessing the cache directory on Windows needs_revision defect Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_revision Jigsaw52 task High Tor: 0.4.3.x-final
#25347 Tor keeps on trying the same overloaded guard over and over needs_revision asn defect Medium Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#26265 A proposal and demo for a fuzzing system that works with Rust through C code needs_revision enhancement Low Tor: unspecified
#26294 attacker can force intro point rotation by ddos needs_revision asn defect Medium Tor: 0.4.2.x-final
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: unspecified
#26754 stop using BUFFERS_PRIVATE needs_revision enhancement Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#27194 Reject protover extra commas in protover needs_revision defect Medium Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#28113 notify systemd if shutdown will be longer than 30 seconds needs_revision Hello71 defect Medium Tor: unspecified
#28247 Use build.rs in place of test_linking_hack needs_revision defect Medium Tor: unspecified
#28930 consider reordering PT/proxy phases needs_revision ahf enhancement Medium Tor: unspecified
#29019 Make relays report bandwidth usage more often in test networks needs_revision enhancement Medium Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.0.x-final
#29223 List canonical abbreviations to use in Tor functions and identifiers needs_revision nickm task Medium Tor: 0.4.2.x-final
#29427 kist: Poor performance with a small amount of sockets needs_revision dgoulet defect Medium Tor: 0.4.3.x-final
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#29528 UndefinedBehaviorSanitizer errors should fail the unit tests needs_revision defect Medium Tor: 0.4.1.x-final
#29698 Edge case that causes improper circuit prioritization for one scheduling run needs_revision dgoulet defect Medium Tor: 0.4.2.x-final
#29801 Write a proposal for IPv6 "Happy Eyeballs" on Tor clients needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#30092 Add a probability-to-apply field for circuitpadidng machines needs_revision enhancement Medium Tor: unspecified
#30381 Provide control port commands to ADD/REMOVE/VIEW v3 client-auth needs_revision asn enhancement Medium Tor: 0.4.3.x-final
#30382 prop304: Implement SOCKS new HS error code needs_revision dgoulet enhancement Medium Tor: 0.4.3.x-final
#30578 The circuitpadding_circuitsetup_machine test: Re-enable, remove, re-document, or ___? needs_revision asn defect Medium Tor: unspecified
#30615 Factor random_uniform_01 into nondeterministic and deterministic parts, and automatically test the deterministic part needs_revision enhancement Low Tor: unspecified
#30839 Update EndOfLifeTor.md with our latest end of life process needs_revision teor task Medium Tor: 0.4.2.x-final
#30917 Add instructions for making a new maint branch to EndOfLifeTor.md, and rename the file needs_revision teor enhancement Medium Tor: 0.4.2.x-final
#30920 Detect uint64 overflow in config_parse_units() needs_revision defect Low Tor: 0.4.3.x-final
#31009 Tor lets transports advertise private IP addresses in descriptor needs_revision defect Medium Tor: unspecified
#31039 Review proposal 306: IPv6 "Happy Eyeballs" for Tor clients needs_revision task Medium Tor: unspecified
#31081 GETCONF allows zero arguments, contrary to spec needs_revision defect Medium Tor: unspecified
#31241 Refactor config validation needs_revision nickm task Medium Tor: 0.4.3.x-final
#31482 Avoid possible overflow when converting between coarse stamp to approx ms needs_revision teor defect Medium Tor: 0.4.2.x-final
#31518 HAProxy implementation in TCPProxy option. needs_revision haxxpop enhancement Medium Tor: 0.4.3.x-final
#31634 Check .may_include order and tor subsystem init order are compatible needs_revision nickm enhancement Medium Tor: 0.4.3.x-final
#31705 Add sufficient coccinelle tooling to run coccinelle without stress needs_revision nickm task Medium Tor: 0.4.2.x-final
#31812 http URL's in docs/comments should be https needs_revision defect Medium Tor: 0.4.2.x-final
#31837 Make test_rebind.py more robust needs_revision teor defect Medium Tor: 0.4.2.x-final
#31853 Move this_not_that.md into our coding standards document needs_revision task Medium Tor: 0.4.3.x-final
#31999 Default log file is handled inconsistently needs_revision defect Medium Tor: 0.4.3.x-final
#32123 Implement minimal --disable-relay-mode needs_revision teor enhancement Medium Tor: 0.4.3.x-final
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note: See TracQuery for help on using queries.