Custom Query (1930 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 1930)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." needs_information defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#31056 Hidden service sometimes unable to create circuit new defect High
#21297 Hidden service unavailable. new defect Medium Tor: unspecified
#28190 Hidden service v2 exceeded launch limit with 11 intro points in the last 37 seconds new defect Medium Tor: unspecified
#21602 HiddenServiceAuthorizeClient failed to work if the user specify multiple hiddensite. new defect Medium Tor: unspecified
#16420 Hide number of tor clients running on a shared network new enhancement Medium Tor: unspecified
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16809 High coverage on node/path selection functions new defect High Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#29549 How can we close obsolete GitHub pull requests? new task Medium Tor: unspecified
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag assigned defect High Tor: unspecified
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#4631 Idea to make consensus voting more resistant new enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#14209 Implement SOCKSPort windows:path for named pipes new enhancement Medium Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#31614 Implement clean_up_backtrace_handler() needs_revision teor defect Medium Tor: 0.4.2.x-final
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#29746 Improve Tor best practices tracker assigned nickm enhancement Medium Tor: 0.4.2.x-final
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#29225 Improve efficiency and flexibility of threadpool/workqueue API new task Medium Tor: 0.4.3.x-final
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#29847 Improve our handling of stochastic tests new defect Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#15237 Improve tooling and usability for approved-routers file and its allies new defect Medium Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#30164 Inconsistent Guard flag assignment new defect Medium Tor: unspecified
#17793 Inconsistent function comment cache_failure_intro_lookup new defect Very Low Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#28512 Increase NUM_PARALLEL_TESTING_CIRCS to avoid circuit windows new defect Medium Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#28860 Increased DNS failure rate when using ServerDNSResolvConfFile with tor 0.3.4.9 (as opposed to 0.3.3.x) new defect Medium Tor: unspecified
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#31635 Initialise and reset the sigsafe error fds to -1 new enhancement Medium Tor: 0.4.2.x-final
#21205 Instrument clients to measure directory usage assigned project Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
#19329 Integrate callgraph complexity measures into our regular process assigned defect Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#27854 Integration test(s) for tor-resolve needs_information rl1987 enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X assigned enhancement High Tor: unspecified
#5221 Intelligently use capabilities/privileges and drop what we don't need for Windows new project High Tor: unspecified
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms new enhancement High Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#8486 Introduce ExitNode country code per listener new enhancement Medium Tor: unspecified
#27712 Introduce Finite State Machine abstraction into Tor codebase new enhancement Medium Tor: very long term
#28821 Introduce timer_is_scheduled() method and replace padding_scheduled_at_us new defect Low Tor: unspecified
#31669 Invalid signature for service descriptor signing key: expired new defect Medium Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#26334 Investigate how much our CI performance would improve (if at all) with paid builders new task Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#26337 Investigate making rust error types use the failure crate needs_information enhancement Medium Tor: unspecified
#30801 Investigate running CI with hardened dependencies vs running CI with valgrind new task Medium Tor: unspecified
#22769 Investigate the reproducibility of Rust binaries new task Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#14921 Investigate whether we sometimes remove all predicted ports at startup new defect Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#20953 Isolate references to versioning new chelseakomlo enhancement Medium Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#13258 Keep stats on effectiveness of consensus diffs new enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.