#19308 |
Group C files into module-groups for module callgraph purposes
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19309 |
Make target to count and list module callgraph violations
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19310 |
Make code-movement functionality of module tool easier to preview
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19311 |
Create error vs warning distinction for module callgraph tool.
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19318 |
controller: expose cache details.
|
assigned
|
yawning
|
enhancement
|
Medium
|
Tor: unspecified
|
#19319 |
controller: GETINFO stats to expose OOM details
|
assigned
|
yawning
|
enhancement
|
Medium
|
Tor: unspecified
|
#19320 |
controller: expose and adjust timer values
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19321 |
controller: Ensure events exist for all guard state transitions
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19322 |
colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor"
|
assigned
|
yawning
|
enhancement
|
Medium
|
Tor: unspecified
|
#19324 |
controller: events for hidden service intro point changes, descriptor changes, uploads, etc
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19325 |
controller: getinfo to get status of cpuworker queues
|
assigned
|
yawning
|
enhancement
|
Medium
|
Tor: unspecified
|
#19326 |
Examine fine-grained connection detail; expose via control API
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19327 |
controller: expose fine-grained circuit detail.
|
needs_review
|
|
enhancement
|
Medium
|
Tor: 0.4.3.x-final
|
#19329 |
Integrate callgraph complexity measures into our regular process
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#19333 |
Make node-selection functions testable and tested
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19377 |
Consider retry/backoff behavior when building new circuits
|
new
|
|
task
|
Medium
|
Tor: unspecified
|
#19378 |
Remove completely irrelevant warnings from the clang list
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#19379 |
Consider adding even more compiler warnings, even when they require code changes.
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19380 |
Hand-audit compiler warning results which we wouldn't want to have on-by-default.
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19431 |
ratelimit message is incorrect.
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#19487 |
Meek and ReachableAddresses
|
needs_revision
|
dcf
|
defect
|
Medium
|
Tor: unspecified
|
#19507 |
tor and tor-gencert disagree on what a month is
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19518 |
Configure argument --without-tcmalloc causes linking with libtcmalloc library
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19522 |
HS intro circuit retry logic fails when network interface is down
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#19531 |
Major cleanup in our baseXX APIs
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19535 |
A can't-happen case for one-hop circuits actually can happen
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19552 |
Provide mechanism to find dirconns associated with a download_status_t, and expose active download attempts in GETINFO response
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19560 |
running tor trying to access its ed25519_signing_secret_key, log message too loud
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19565 |
SR: Use trunnel for the shared random value construction
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#19570 |
Shared random round gets out of sync
|
reopened
|
|
enhancement
|
High
|
Tor: unspecified
|
#19572 |
set Tor Control Authcookie default file location from /var/lib/tor/control.authcookie to /var/run/tor/control.authcookie
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19625 |
Allow relays to set peering policy
|
needs_information
|
|
project
|
Medium
|
Tor: unspecified
|
#19647 |
HS Descriptors should only contain UTF-8
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19656 |
Shared random state doesn't expire when clock changes?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19661 |
tor refuses to use /dev/null as a config file
|
needs_revision
|
cypherpunks
|
enhancement
|
Medium
|
Tor: unspecified
|
#19665 |
Should *Port_set count sockets?
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19669 |
`log_prefix_` maybe getting weird output from strftime
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#19759 |
systemd tor.service hardening: add MemoryDenyWriteExecute=true
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19761 |
Tor systemd service should have RuntimeDirectory=tor
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19762 |
Tor systemd service should have ReadWriteDirectories=/var/run/tor
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19777 |
tor-gencert should warn nicely when PEM passphrases are too short
|
new
|
|
defect
|
Very Low
|
Tor: unspecified
|
#19853 |
ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#19919 |
If ORPort address is publicly routable, use it to guess Address
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19926 |
BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :*
|
assigned
|
|
defect
|
Low
|
Tor: unspecified
|
#19931 |
curve25519-donna runtime math errors on armhf
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#19959 |
have a flag for Tor relay location, if a relay is hosted in a data center, cloud or physically secured
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19980 |
Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good)
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19983 |
Is openssl 1.1.0's "secure heap" feature useful for us?
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19984 |
Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS
|
assigned
|
|
defect
|
High
|
Tor: unspecified
|
#19987 |
Unit Test Guard, Middle, Exit, Intro, and Rend node choices
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#19988 |
Warn when Port addresses have no effect
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#19989 |
Tor fails to bootstrap with an Exit as EntryNode
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20006 |
HSFETCH fails for hidden services which use client authentication
|
needs_revision
|
rl1987
|
enhancement
|
Medium
|
Tor: unspecified
|
#20007 |
Sandbox causing crash when setting HidServAuth when there is a hidden service running
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#20021 |
Require ntor-onion-key in microdescriptors, descriptors
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#20022 |
Tor should deprecate insecure cookie auth
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20035 |
Identify client-specific options that work with hidden services
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20046 |
Test hidden services with different consensuses
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20050 |
Testing: add a controller feature to generate paths without building circuits
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#20055 |
Remove relays that fail to rotate onion keys from the consensus
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20061 |
When unit testing in Tor2web mode, set the config correctly
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20071 |
Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4
|
new
|
|
defect
|
Low
|
Tor: unspecified
|
#20082 |
Lower initial descriptor upload delay for hidden services
|
needs_revision
|
twim
|
enhancement
|
Medium
|
Tor: unspecified
|
#20153 |
VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7"
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20164 |
Warn relay operators when we guess an address from several equally valid alternatives
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20165 |
When a relay advertises a new, unreachable address, OR reachability can succeed via the old address
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20169 |
hs_desc, hs_desc_content - BAD_DESC|NOT_FOUND
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#20188 |
hsfetch hs_desc FAILED with REASON missing
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20191 |
Prevent a recurrence of #20103
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20194 |
Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20212 |
Tor can be forced to open too many circuits by embedding .onion resources
|
new
|
tbb-team
|
enhancement
|
Medium
|
Tor: unspecified
|
#20218 |
Fix and refactor and redocument routerstatus_has_changed
|
needs_revision
|
|
defect
|
Medium
|
Tor: 0.4.3.x-final
|
#20225 |
tor "wedged" and become unable to connect to a hidden service
|
needs_information
|
|
defect
|
Medium
|
Tor: unspecified
|
#20226 |
Support DNS-MX resource records with .onion-filtering for TOR as secure/anonymous email transport protocoll
|
new
|
|
enhancement
|
Medium
|
Tor: very long term
|
#20232 |
Relays get stuck on resolve_my_address() if unable to guess address
|
assigned
|
|
defect
|
Very Low
|
Tor: unspecified
|
#20272 |
constraint broken in case 1 of consensus weight calculation
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20284 |
consensus weight case 2b3 does not follow dir-spec
|
needs_revision
|
pastly
|
defect
|
Medium
|
Tor: unspecified
|
#20285 |
can't create valid case 2b3 consens weight calculation
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20289 |
HS_DESC event while waiting for upload
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#20332 |
Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20337 |
Support abstract namespace AF_UNIX sockets.
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#20340 |
nice to have: test torrc for incompatible transistions of config values
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#20346 |
Do we need Tor unstable binary releases for Windows, OS X, BSD?
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20353 |
evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails
|
new
|
|
defect
|
Very Low
|
Tor: unspecified
|
#20356 |
prop220: unit tests for all new/changed circuit extension functions
|
assigned
|
|
defect
|
Medium
|
Tor: unspecified
|
#20362 |
Bug: Used circuit is in strange path state new
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20371 |
Lower HSDir query backoff delay
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20423 |
Clock jumps on relay due to hostname lookup timeouts
|
reopened
|
|
defect
|
High
|
Tor: unspecified
|
#20462 |
Make test failures/bugs on Raspberry Pi 3
|
reopened
|
|
defect
|
Medium
|
Tor: unspecified
|
#20469 |
Expose predicted-ports state over the control port
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20528 |
Make sure bridge clients update bridges when options are updated
|
needs_revision
|
|
defect
|
Medium
|
Tor: unspecified
|
#20531 |
rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20535 |
A 304 "Not Modified" should update the time to when we next expect a modification
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20554 |
Refactor circuit_expire_building
|
new
|
|
enhancement
|
Low
|
Tor: unspecified
|
#20555 |
Stream isolation for DNS
|
new
|
|
defect
|
Medium
|
Tor: unspecified
|
#20594 |
hs: Make HSDir produce HS statistics for prop224
|
new
|
|
enhancement
|
High
|
Tor: unspecified
|
#20601 |
Clients should reject outdated consensuses as soon as they parse them
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20617 |
Write a unit test abstraction for tests that need to be repeated multiple times to prove failure
|
new
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20625 |
When a consensus doesn't have enough signatures, write it (and sigs) to a file
|
needs_revision
|
|
enhancement
|
Medium
|
Tor: unspecified
|
#20647 |
Tor and Chutney CI improvements
|
assigned
|
|
enhancement
|
High
|
Tor: 0.4.2.x-final
|