Custom Query (2070 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 2070)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#26743 Further refactoring follow-on tasks: split files that don't fit well within their directory new defect Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#21509 Fuzz v3 hidden services new task High Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#18263 GETCONF provides incorrect value when undefined new defect Medium Tor: unspecified
#31524 GETINFO bw-event-cache spike value(s) in it new defect Medium Tor: unspecified
#6505 GETINFO dir/status-vote/current/consensus returns "Unrecognized key" if no consensus available needs_revision zwol defect Low Tor: unspecified
#16997 Gather and report metrics for the number of channels a relay is servicing. new enhancement Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: unspecified
#28097 Get the actual Windows version from Kernel32.dll new defect Medium Tor: unspecified
#13978 Get tor working with ns-3 new task Medium Tor: very long term
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#12220 Give a better warning on header/library mismatch for openssl new defect Medium Tor: unspecified
#23278 Give user option to use non-Exit Guards only reopened enhancement Medium Tor: unspecified
#20986 Gracefully handle build configurations on systems without AsciiDoc new defect Medium Tor: unspecified
#16710 Graph or plot test coverage over time? new enhancement Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#15938 HS descriptor cache leaks timing information to local users new defect Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#32040 HS intro padding machine reactivates after receiving INTRODUCE_ACK needs_revision asn defect Medium Tor: 0.4.4.x-final
#30221 HS performance optimizations of codebase (master ticket) new defect Medium Tor: unspecified
#28186 HS v3 suggestion as to how to generate a secure service client authentication key pair new enhancement Medium Tor: unspecified
#23126 HSDirs should publish some count about new-style onion addresses new enhancement Medium Tor: unspecified
#20006 HSFETCH fails for hidden services which use client authentication needs_revision rl1987 enhancement Medium Tor: unspecified
#18620 HSFORGET command to clear cached client state for a HS needs_revision str4d enhancement Medium Tor: unspecified
#20289 HS_DESC event while waiting for upload new enhancement Low Tor: unspecified
#30378 HSv2 regression: Not possible to add HidServAuth line using SETCONF without restart new defect Medium Tor: unspecified
#34086 HSv3: Bug Non-fatal assertion in hs_client.c:776: client_rendezvous_circ_has_opened assigned dgoulet defect Medium Tor: 0.4.4.x-final
#34084 HSv3: Bug at setup_intro_circ_auth_key at ../src/feature/hs/hs_client.c:739 assigned asn defect Medium Tor: 0.4.4.x-final
#34087 HSv3: Bug: Non-fatal assertion in hs_client.c:981: close_or_reextend_intro_circ assigned dgoulet defect Medium Tor: 0.4.4.x-final
#29583 HSv3: Faulty cross-certs in introduction point keys (allows naive onionbalance for v3s) new defect High Tor: unspecified
#26306 HTTPS proxy doesn't use TLS new enhancement Low Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#17640 Handle CREATE/CREATED cell processing gracefully under load. assigned yawning enhancement Medium Tor: unspecified
#28849 Handle dormant mode in process library and for PT's needs_information enhancement High Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() new defect Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) new enhancement Medium Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#32408 Handle options_act_reversible() in new config system. assigned nickm defect Medium Tor: unspecified
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some new enhancement High Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." needs_information defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#31056 Hidden service sometimes unable to create circuit new defect High
#21297 Hidden service unavailable. new defect Medium Tor: unspecified
#28190 Hidden service v2 exceeded launch limit with 11 intro points in the last 37 seconds new defect Medium Tor: unspecified
#21602 HiddenServiceAuthorizeClient failed to work if the user specify multiple hiddensite. new defect Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#29549 How can we close obsolete GitHub pull requests? new task Medium Tor: unspecified
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag new defect High Tor: unspecified
#33469 INTERNAL ERROR: Raw assertion failed at src/lib/malloc/map_anon.c:239: lock_result == 0 needs_information defect High Tor: unspecified
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#33747 If the ExtORPort doesn't report an external IP address, Tor won't apply rate limiting or account for bandwidth on that connection assigned dgoulet defect Medium Tor: 0.4.4.x-final
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#32691 Image broken in 'src-ref' documentation accepted nickm defect Medium Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#14209 Implement SOCKSPort windows:path for named pipes new enhancement Medium Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#29225 Improve efficiency and flexibility of threadpool/workqueue API new task Medium Tor: unspecified
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#29847 Improve our handling of stochastic tests new defect Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.