Custom Query (1908 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 1908)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag assigned defect High Tor: unspecified
#29699 INTRO2 replay warn logs with v3 onions new defect Medium Tor: 0.4.2.x-final
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#23493 IPv6 v3 Onion Services support new defect Medium Tor: unspecified
#4631 Idea to make consensus voting more resistant new enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#4374 If you explicitly specify a geoip file and it's not there, shouldn't Tor fail? needs_revision enhancement Very Low Tor: unspecified
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus new enhancement High Tor: unspecified
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#14209 Implement SOCKSPort windows:path for named pipes new enhancement Medium Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17284 Implement multiple new testing-focused controller features assigned yawning defect High Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#29746 Improve Tor best practices tracker needs_review nickm defect Medium Tor: 0.4.2.x-final
#9685 Improve Tor2web mode performance by having Tor2web client to be the RendezVous Point reopened enhancement Very Low Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#29225 Improve efficiency and flexibility of threadpool/workqueue API new task Medium Tor: 0.4.2.x-final
#5968 Improve onion key and TLS management new enhancement High Tor: unspecified
#29847 Improve our handling of stochastic tests new defect Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#15237 Improve tooling and usability for approved-routers file and its allies new defect Medium Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#30164 Inconsistent Guard flag assignment new defect Medium Tor: unspecified
#17793 Inconsistent function comment cache_failure_intro_lookup new defect Very Low Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#28512 Increase NUM_PARALLEL_TESTING_CIRCS to avoid circuit windows new defect Medium Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 new enhancement Medium Tor: unspecified
#28860 Increased DNS failure rate when using ServerDNSResolvConfFile with tor 0.3.4.9 (as opposed to 0.3.3.x) new defect Medium Tor: unspecified
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#21205 Instrument clients to measure directory usage assigned project Medium Tor: unspecified
#26137 Integrate AS-aware circuit selection new enhancement Medium Tor: unspecified
#19329 Integrate callgraph complexity measures into our regular process assigned defect Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#27854 Integration test(s) for tor-resolve needs_information rl1987 enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X assigned enhancement High Tor: unspecified
#5221 Intelligently use capabilities/privileges and drop what we don't need for Windows new project High Tor: unspecified
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms new enhancement High Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#8486 Introduce ExitNode country code per listener new enhancement Medium Tor: unspecified
#27712 Introduce Finite State Machine abstraction into Tor codebase new enhancement Medium Tor: very long term
#28821 Introduce timer_is_scheduled() method and replace padding_scheduled_at_us new defect Low Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#26334 Investigate how much our CI performance would improve (if at all) with paid builders new task Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#26337 Investigate making rust error types use the failure crate needs_information enhancement Medium Tor: unspecified
#30801 Investigate running CI with hardened dependencies vs running CI with valgrind new task Medium Tor: 0.4.2.x-final
#22769 Investigate the reproducibility of Rust binaries new task Medium Tor: unspecified
#15918 Investigate using the EVP interface for non-oneshot hash calls. new enhancement Low Tor: unspecified
#14921 Investigate whether we sometimes remove all predicted ports at startup new defect Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#20953 Isolate references to versioning new chelseakomlo enhancement Medium Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit new defect Medium Tor: unspecified
#2507 It's probably not spelled "NATD" new defect Very Low Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#13258 Keep stats on effectiveness of consensus diffs new enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#11397 Keep using too-dirty circuits if no new circuit can be built? new enhancement Medium Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#13912 Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE registers) new defect Medium Tor: unspecified
#15621 Kill the pre-version 3 intro protocol code with fire. assigned enhancement Medium Tor: unspecified
#24806 LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable new defect Medium Tor: unspecified
#28036 Launch tests inside a single dirauth instance new defect Medium Tor: unspecified
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#7986 Lengthen the consensus validity interval needs_revision enhancement Medium Tor: unspecified
#17956 Let tor handle disconnects better new defect Medium Tor: unspecified
#16648 Libevent configuration doesn't use pkg-config new defect Medium Tor: unspecified
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned defect Medium Tor: unspecified
#28509 Limit relay bandwidth self-tests based on RelayBandwidthRate, not BandwidthRate new defect Medium Tor: unspecified
#16538 Limit the impact of a malicious HSDir new project Medium Tor: unspecified
#28511 Limit the number of open testing circuits, and the total number of testing circuits assigned neel defect Medium Tor: unspecified
#18608 Limiting ADD_ONION TARGET access. new defect Medium Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) assigned defect High Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.