Custom Query (1929 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 1929)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile new enhancement Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23579 sched: Add accessors for channel_pending list assigned enhancement Medium Tor: unspecified
#23595 Support KIST on other platforms. new enhancement Medium Tor: unspecified
#23777 tor spends a lot of time in malloc/free new enhancement Medium Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#23886 Write FFI bindings and function pointers for ed25519-dalek new enhancement Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned enhancement Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#24100 Support exit notice page in multiple multiple languages new enhancement Low Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24194 Expose expiry of identity key in descriptor? new enhancement Medium Tor: unspecified
#24249 Create automated mechanism for C/Rust types to stay in sync needs_information chelseakomlo enhancement Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24400 Seccomp filter incorrectly tries to act on strings, allowing sandbox bypass new enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#24498 add configurables for eventdns settings new enhancement Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t assigned enhancement Very High Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24617 Feature flags for new controller-accessible Tor features new enhancement Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24833 DNS not reliably returning AAAA records new enhancement Medium Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25066 Rendezvous points should return signed proof of the established rend point new enhancement Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25203 document max. value of SigningKeyLifetime new enhancement Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#25504 Find more generic ways to handle smartlist_t/Vec<T> between C and Rust new enhancement Medium Tor: unspecified
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells assigned enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#25786 Policies for HTTPTunnelPort new enhancement Medium Tor: unspecified
#25841 Write test for Rust fragile hardening new enhancement Medium Tor: unspecified
#25892 Replace RejectPlaintextPorts with RejectPlaintextPortPolicy reopened enhancement Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#25955 onion v2 deprecation plan new enhancement Medium Tor: unspecified
#25964 Remove hs_index_t fetch, and use one of the stores instead new enhancement Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26094 increase minimal bandwidth requirements, update the manpage, relay guide and FAQ assigned enhancement Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.