Custom Query (1930 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (501 - 600 of 1930)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Ticket Summary Status Owner Type Priority Milestone
#23013 Tor 0.3.0.9 tarball was missing ReleaseNotes entry new defect Low Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once assigned defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion assigned neel defect Medium Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23433 Windows relay: 85% of CPU power is wasted inside select() call new defect Medium Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays assigned defect Medium Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23613 some control protocol GETINFO downloads/networkstatus keys are lies new defect Medium Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23653 When accessing onion service with no fetchable descriptor, Tor sits around until timeout rather than hanging up assigned asn defect Medium Tor: unspecified
#23677 Tor should log what it thinks the time is sometime(s) new defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after assigned defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler assigned defect Medium Tor: unspecified
#23714 stop casting small integers to (void *) new defect Medium Tor: unspecified
#23720 'make test' writes into my /tmp new defect Medium Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler assigned defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge assigned defect High Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23818 Make v2 and v3 single onion services retry all failed intro and rend connections with a 3-hop path merge_ready teor defect Medium Tor: 0.4.0.x-final
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#24043 monotonic time test failure on 0.3.0.x reopened defect Medium Tor: unspecified
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24181 v3 Onion Services: Put IPv6 and unrecognised link specifiers in onion service EXTEND cells assigned defect Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24308 MaxMemInCellQueues minimum of 256MB is still too large for low-RAM relays (LEDE and OpenWRT routers) new defect Medium Tor: unspecified
#24368 Tune zstd parameters to decrease memory usage during streaming assigned defect Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write assigned defect Medium Tor: unspecified
#24453 Reduce log spam when child process creation failed new defect Medium Tor: unspecified
#24454 sandbox failure on arm64 needs_information defect Medium Tor: unspecified
#24455 messages out of order in the tor log due to stored logs new defect Medium Tor: unspecified
#24456 Figure out what to do with the guardfraction feature new defect Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned defect High Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_information defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24609 consdiff implementation in Rust new defect Medium Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows new defect High Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24737 Recommend a MaxMemInQueues value in the Tor man page new defect Medium Tor: unspecified
#24738 Abort trap: 6 after installation Mac OS 10.13.1 needs_information defect Very High Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#24806 LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable new defect Medium Tor: unspecified
#24815 Validate shared random state dates before each voting period assigned asn defect Medium Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? needs_revision defect Medium Tor: unspecified
#24850 tor2web option without the corresponding tag in torrc causes tor to fail with confusing console output new defect Medium Tor: unspecified
#24857 Tor uses 100% CPU when accessing the cache directory on Windows needs_revision defect Medium Tor: unspecified
#24864 directory authorities take a while to update relays' Tor versions because they use old descriptors for votes new defect Low Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#24888 tor 0.2.5.16: src/or/rendservice.c build error: comparison between signed and unsigned new defect Low Tor: unspecified
#24897 Tor seems to malfunction on FreeBSD needs_information defect Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#24937 tor failing to resolve some dns records new defect Medium Tor: unspecified
#24955 exit selection biases appear to result when very-long ExcludeExitNodes list is in effect new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#24973 Tor should be more gentle when launching dozens of circuits at once needs_information defect Medium Tor: unspecified
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note: See TracQuery for help on using queries.