Custom Query (1897 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (601 - 700 of 1897)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Ticket Summary Status Owner Type Priority Milestone
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
#25061 Relays consider it a bootstrapping failure if they can't extend for somebody else's circuit new defect Medium Tor: unspecified
#25068 Make HSIntro consistent with rend_service_descriptor_t.protocols new defect Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25139 Link protocol negotiation without common version new defect Low Tor: unspecified
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#25152 Try to call less circuitmux_find_map_entry() needs_information defect Medium Tor: unspecified
#25173 No Control Socket when DisableNetwork and User options are set new defect Medium Tor: unspecified
#25208 Relays can upload a new descriptor every 2 minutes new defect Medium Tor: unspecified
#25224 Create a new consensus method that ignores guardfraction votes new defect Medium Tor: unspecified
#25299 recent update to 7.5 on portable version breaks browser new defect Medium Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#25335 Tor relay node CPUWORKER failed error mssage new defect Medium Tor: unspecified
#25347 Tor keeps on trying the same overloaded guard over and over needs_revision asn defect Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) assigned defect High Tor: unspecified
#25412 TrackHostExits option in torrc file not working as documented new defect Medium Tor: unspecified
#25416 [warn] Received http status code 404 ("Consensus is too old") from server '194.109.206.212:80' while fetching consensus directory. new defect Medium Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state assigned defect High Tor: unspecified
#25506 Tor's make clean and distclean should not depend on the exact automake version new defect Medium Tor: unspecified
#25528 When ClientTransportPlugin is missing, tor connects directly to bridge addresses, even if they have a transport name new defect Medium Tor: unspecified
#25530 Closing Tor cleanly from command line (when started from command line) on win32 new tbb-team defect Medium Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#25568 hs: Lookup failure cache when introducing to an intro point needs_review neel defect Medium Tor: unspecified
#25574 Eliminate "silent-drop" side channels in Tor protocol new defect Medium Tor: unspecified
#25576 Fix non-standard use of keccak in v3 hidden service code new defect Medium Tor: unspecified
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls assigned defect Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information defect Medium Tor: unspecified
#25687 over-report of observed / self-measure bandwidth on fast hardware -- important to torflow / peerflow new defect Medium Tor: unspecified
#25713 "DisableNetwork is set" log message in Tor Browser scares/confuses users new defect Medium Tor: unspecified
#25729 UTF8 encoded TORRC does NOT parse non-Latin paths reopened defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned defect Medium Tor: unspecified
#25754 Make Prop#291 choices new defect Medium Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#25803 Infinite restart loop when daemon crashes new defect Medium Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#25882 clients not detecting stale onion service introduction points assigned defect High Tor: unspecified
#25883 Onion services do not provide stream events to control port new defect Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#25922 Add an alias mechanism for controller commands and events, and use it for Onion Services new defect Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. assigned defect Medium Tor: unspecified
#25957 Tor 0.3.3.5-rc died: Caught signal 11 needs_information defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#25978 UseEntryGuards 0 disables EntryNodes new defect Very Low Tor: unspecified
#25987 Allow controller to receive log messages from outside main thread assigned defect Medium Tor: unspecified
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned defect Medium Tor: unspecified
#26076 test_keygen.sh and test_key_expiration.sh fail on Windows new defect Very Low Tor: unspecified
#26088 Duplicate creation of ReachableAddresses reject in torrc file new defect Low Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#26113 Control spec is ambiguous whether a GETCONF error message is specified new defect Medium Tor: unspecified
#26136 DirPort reachability test inconsistency when only "DirPort x.x.x.x:x NoAdvertise" configured new defect Medium Tor: unspecified
#26138 DirPort /tor/server/all document contains spurrious blank line following serving relay's descriptor new defect Very Low Tor: unspecified
#26139 start aplication needs_information defect Medium Tor: unspecified
#26181 Apparmor + systemd failures when loading included service files + DisableAllSwap Fix new defect Very High Tor: unspecified
#26240 Check Maxmind GeoIPLocation Database before distributing new defect Medium Tor: unspecified
#26294 attacker can force intro point rotation by ddos merge_ready asn defect Medium Tor: 0.4.2.x-final
#26295 Fix problems with the Windows event loop new defect Medium Tor: unspecified
#26300 Attempt by … to open a stream on first hop of circuit. Closing. assigned defect Medium Tor: unspecified
#26305 Can not set up a hidden service on Windows 10 needs_information defect Medium Tor: unspecified
#26310 Refusing to apply consensus diff because the base consensus doesn't match the digest as found in the consensus diff header. new defect Medium Tor: unspecified
#26311 Error in `/usr/bin/tor': free(): invalid next size (normal): 0x000055ed468598d0 needs_information defect Medium Tor: 0.3.5.x-final
#26316 Windows newlines in extrainfo descriptor new defect Medium Tor: unspecified
#26335 Use fewer travis builders for typical commits? new defect Medium Tor: unspecified
#26339 Use same traffic path if destination is the same but the protocol is different. new defect Medium Tor: unspecified
#26356 Tor 0.3.3.6 fails to compile under cygwin (x86_64) needs_information defect Medium Tor: unspecified
#26359 DoS and timed attacks via unencrypted network time protocols new defect Medium Tor: unspecified
#26366 Possible duplicated logic in connection_edge_finished_connecting() and connection_exit_connect() new defect Medium Tor: unspecified
#26368 Consider circuit isolation when closing redundant intro points needs_revision defect Low Tor: unspecified
#26369 Re-fetch onion service descriptor for isolated request new defect Medium Tor: unspecified
#26373 test_rust.sh should detect when it's being invoked improperly and error out new defect Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#26434 Bug: Emptied a dirserv buffer, but it's still spooling! new defect Medium Tor: unspecified
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
#26460 Some? autoconf tests that include stdio.h fail with a missing ssp.h on cygwin reopened defect Medium Tor: unspecified
#26464 Static cross-compiling for Windows is broken new Hello71 defect Medium Tor: unspecified
#26469 tor on SunOS: [err] Error from libevent: evport.c:425: Assertion evpd->ed_pending[i] == fd failed in evport_del needs_information defect Medium Tor: unspecified
#26478 Unify bandwidth related terms in dir-spec and Tor code. new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#26508 Allow DirAuthority address to be DNS hostname on test networks new defect Medium Tor: unspecified
#26521 Coverity issues for week 25: Coverity thinks some HS tests have memory leaks new defect Medium Tor: unspecified
#26567 Replace ArgumentCharValue with ValueChar in dir-spec and bandwidth-file-spec new defect Very Low Tor: unspecified
#26578 Do clients request new consensus documents more often than we expect? new defect Medium Tor: unspecified
#26587 --verify-config accepts RelayBandwidthRate with no value? new defect Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#26664 When an exit tells a client about an IPv6-only hostname, the client should choose another IPv6 exit new defect Medium Tor: unspecified
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#26737 File-level documentation for src/core/*/*.[ch] new defect Medium Tor: unspecified
#26738 File-level documentation for src/feature/*/*.[ch] new defect Medium Tor: unspecified
#26743 Further refactoring follow-on tasks: split files that don't fit well within their directory assigned defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Note: See TracQuery for help on using queries.