Custom Query (2029 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 2029)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#15938 HS descriptor cache leaks timing information to local users new defect Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#32040 HS intro padding machine reactivates after receiving INTRODUCE_ACK new defect Medium Tor: 0.4.4.x-final
#30221 HS performance optimizations of codebase (master ticket) new defect Medium Tor: unspecified
#28186 HS v3 suggestion as to how to generate a secure service client authentication key pair new enhancement Medium Tor: unspecified
#23126 HSDirs should publish some count about new-style onion addresses new enhancement Medium Tor: unspecified
#20006 HSFETCH fails for hidden services which use client authentication needs_revision rl1987 enhancement Medium Tor: unspecified
#18620 HSFORGET command to clear cached client state for a HS needs_revision str4d enhancement Medium Tor: unspecified
#20289 HS_DESC event while waiting for upload new enhancement Low Tor: unspecified
#30378 HSv2 regression: Not possible to add HidServAuth line using SETCONF without restart new defect Medium Tor: unspecified
#29583 HSv3: Faulty cross-certs in introduction point keys (allows naive onionbalance for v3s) new defect High Tor: unspecified
#26306 HTTPS proxy doesn't use TLS new enhancement Low Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#17640 Handle CREATE/CREATED cell processing gracefully under load. assigned yawning enhancement Medium Tor: unspecified
#28849 Handle dormant mode in process library and for PT's needs_information enhancement High Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#32408 Handle options_act_reversible() in new config system. assigned nickm defect Medium Tor: unspecified
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some assigned enhancement High Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." needs_information defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#31056 Hidden service sometimes unable to create circuit new defect High
#21297 Hidden service unavailable. new defect Medium Tor: unspecified
#28190 Hidden service v2 exceeded launch limit with 11 intro points in the last 37 seconds new defect Medium Tor: unspecified
#21602 HiddenServiceAuthorizeClient failed to work if the user specify multiple hiddensite. new defect Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#29549 How can we close obsolete GitHub pull requests? new task Medium Tor: unspecified
#32720 How much bandwidth does a user use to bootstrap and maintain dir info? How has that changed over time? accepted nickm task Medium
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#32808 I can't connect anymore to tor 2 new defect Medium Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag assigned defect High Tor: unspecified
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#4631 Idea to make consensus voting more resistant new enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#32691 Image broken in 'src-ref' documentation accepted nickm defect Medium Tor: 0.4.3.x-final
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#14209 Implement SOCKSPort windows:path for named pipes new enhancement Medium Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#31614 Implement clean_up_backtrace_handler() merge_ready teor defect Medium Tor: 0.4.0.x-final
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#29225 Improve efficiency and flexibility of threadpool/workqueue API new task Medium Tor: unspecified
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#29847 Improve our handling of stochastic tests new defect Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#15237 Improve tooling and usability for approved-routers file and its allies new defect Medium Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#31829 In 0.4.3, drop support for Python 2 new defect Medium Tor: 0.4.4.x-final
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#30164 Inconsistent Guard flag assignment new defect Medium Tor: unspecified
#32438 Inconsistent failure-then-success bootstrap behavior with clock set 24h in the past new brade defect Medium
#17793 Inconsistent function comment cache_failure_intro_lookup new defect Very Low Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#28512 Increase NUM_PARALLEL_TESTING_CIRCS to avoid circuit windows new defect Medium Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#33045 Increase the number of Tor network relays that support IPv6 new project Medium
#28860 Increased DNS failure rate when using ServerDNSResolvConfFile with tor 0.3.4.9 (as opposed to 0.3.3.x) new defect Medium Tor: unspecified
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#33069 Init sk if loaded from service blob to be on the curve new enhancement Medium
#31635 Initialise and reset the sigsafe error fds to -1 new enhancement Medium Tor: 0.4.2.x-final
#32778 Initialise pubsub in Windows NT service mode merge_ready nickm defect High Tor: 0.4.2.x-final
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.