Custom Query (1898 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (501 - 600 of 1898)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Ticket Summary Status Owner Type Priority Milestone
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21816 Add support for Pluggable Transports 2.0 needs_revision dasyatid1 enhancement Medium Tor: unspecified
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? needs_revision defect Medium Tor: unspecified
#24857 Tor uses 100% CPU when accessing the cache directory on Windows needs_revision defect Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25347 Tor keeps on trying the same overloaded guard over and over needs_revision asn defect Medium Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#26265 A proposal and demo for a fuzzing system that works with Rust through C code needs_revision enhancement Low Tor: unspecified
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: unspecified
#26754 stop using BUFFERS_PRIVATE needs_revision enhancement Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#27194 Reject protover extra commas in protover needs_revision defect Medium Tor: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#28113 notify systemd if shutdown will be longer than 30 seconds needs_revision Hello71 defect Medium Tor: unspecified
#28247 Use build.rs in place of test_linking_hack needs_revision defect Medium Tor: unspecified
#28930 consider reordering PT/proxy phases needs_revision ahf enhancement Medium Tor: unspecified
#29019 Make relays report bandwidth usage more often in test networks needs_revision enhancement Medium Tor: 0.4.2.x-final
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.0.x-final
#29223 List canonical abbreviations to use in Tor functions and identifiers needs_revision nickm task Medium Tor: 0.4.2.x-final
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#29528 UndefinedBehaviorSanitizer errors should fail the unit tests needs_revision defect Medium Tor: 0.4.1.x-final
#30092 Add a probability-to-apply field for circuitpadidng machines needs_revision enhancement Medium Tor: unspecified
#30381 Provide control port commands to ADD/REMOVE/VIEW v3 client-auth needs_revision asn defect Medium Tor: 0.4.2.x-final
#30382 Provide control port event for when we are missing v3 client auth for an onion needs_revision dgoulet defect Medium Tor: 0.4.2.x-final
#30578 The circuitpadding_circuitsetup_machine test: Re-enable, remove, re-document, or ___? needs_revision asn defect Medium Tor: 0.4.2.x-final
#30615 Factor random_uniform_01 into nondeterministic and deterministic parts, and automatically test the deterministic part needs_revision enhancement Low Tor: 0.4.2.x-final
#30839 Update EndOfLifeTor.md with our latest end of life process needs_revision teor task Medium Tor: 0.4.2.x-final
#30901 Add control port trace logging to tor needs_revision teor enhancement Medium Tor: 0.4.2.x-final
#30917 Add instructions for making a new maint branch to EndOfLifeTor.md, and rename the file needs_revision teor defect Medium Tor: 0.4.1.x-final
#30924 hs-v3: Implement proposal 305 - ESTABLISH_INTRO Cell DoS Defense Extension needs_revision dgoulet enhancement Medium Tor: 0.4.2.x-final
#30935 Move variable definition code out of confparse.c, and refactor needs_revision nickm enhancement Medium Tor: 0.4.2.x-final
#31009 Tor lets transports advertise private IP addresses in descriptor needs_revision defect Medium Tor: 0.4.2.x-final
#31039 Review proposal 306: IPv6 "Happy Eyeballs" for Tor clients needs_revision task Medium Tor: 0.4.2.x-final
#31081 GETCONF allows zero arguments, contrary to spec needs_revision defect Medium Tor: unspecified
#31372 Appveyor and Travis should use "make -k" needs_revision enhancement Medium Tor: 0.4.2.x-final
#31373 Print summary of features at end of configure needs_revision dgoulet enhancement Medium Tor: 0.4.2.x-final
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1250 strange SOCKS error code when connecting to a hidden service using the wrong port new enhancement Low Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#1802 ControlPort GETCONF does not recognize command aliases new defect Low Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2178 We launch dummy descriptor fetches more often than needed new defect Low Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2362 "GETINFO config-text" adds spurious DataDirectory, Log entries new defect Low Tor: unspecified
#2473 Develop a design to support multiple bridge authorities new project Low Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2665 Create a dirauth DoS response procedure new task High Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note: See TracQuery for help on using queries.