Custom Query (1909 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (701 - 800 of 1909)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Ticket Summary Status Owner Type Priority Milestone
#26713 relays should explicitly dirty their descriptors on entering/exiting hibernation, rather than implicitly doing it by triggering a bandwidth change new defect Medium Tor: unspecified
#26737 File-level documentation for src/core/*/*.[ch] new defect Medium Tor: unspecified
#26738 File-level documentation for src/feature/*/*.[ch] new defect Medium Tor: unspecified
#26743 Further refactoring follow-on tasks: split files that don't fit well within their directory assigned defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26748 Make core/proto depend only on lib/*, and not used by core/mainloop new defect Medium Tor: unspecified
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#26768 Support onionbalance in HSv3 new defect Medium Tor: unspecified
#26769 We should make HSv3 desc upload less frequent needs_information neel defect Medium Tor: unspecified
#26772 [warn] Introduction circuit established without a rend_intro_point_t object new defect Medium Tor: unspecified
#26778 Enable supporting multiple bridge authorities new defect Medium Tor: unspecified
#26780 Fix division by zero error reports from Coverity (CID: 1415721, 1415722, and 1415723) needs_information defect Medium Tor: unspecified
#26787 Core file left on travis hardened rust builld needs_information defect Very High Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26805 Work out why Tor networks with all-zero bandwidths are unstable new defect Medium Tor: unspecified
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen assigned defect High Tor: unspecified
#26908 make it more clear that torrc files should not contain any bridges in their MyFamily lines reopened defect Medium Tor: unspecified
#26928 Taint untrusted link authentication keys new defect Medium Tor: unspecified
#26929 [suggestion] Warning "Skipping obsolete configuration option" should suggest what the replacement is new defect Medium Tor: unspecified
#26933 Minor memleak in HSv3 configuration needs_information defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies assigned defect Medium Tor: unspecified
#26944 Privcount blinding and encryption: Add tests assigned defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 assigned defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible assigned defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells assigned neel defect Medium Tor: unspecified
#26993 Tor silently ignores hidden directory when it isn't writable new defect Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#27024 Tor is now TSR and no way to terminate it new defect Medium Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27066 circuit_build_times_update_alpha(): Bug: Could not determine largest build time needs_information defect Medium Tor: unspecified
#27130 rust dependency updating instructions don't work needs_review defect Medium Tor: 0.4.2.x-final
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#27190 disparate duplicate subproto handling in protover needs_revision defect Medium Tor: unspecified
#27191 handling double spaces in protover needs_revision defect Medium Tor: unspecified
#27192 Perform --verify-config before reloading tor reopened defect Medium Tor: unspecified
#27194 Reject protover extra commas in protover needs_revision defect Medium Tor: unspecified
#27198 protover doesn't forbid version zero new defect Medium Tor: unspecified
#27201 rust/protover doesn't forbid version zero needs_information defect Medium Tor: unspecified
#27207 Examples in CodingStandardsRust.md are wrong new defect Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#27245 Don't store (micro)descriptor text on the heap so much. assigned defect Medium Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#27284 Check IPv6 exit policies on microdescs assigned defect Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#27309 Deterministic builds / ar warns about u modifier new defect Medium Tor: unspecified
#27315 Sandbox regression in 0.3.4.7-rc needs_information defect Medium Tor: 0.3.5.x-final
#27317 setting RelayBandwidthRate changes RelayBandwidthBurst new defect Medium Tor: unspecified
#27319 remove buf_get_oldest_chunk_timestamp() new defect Medium Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27334 RelaxDirModeCheck on ControlSocket still requires group to m reopened defect Medium Tor: unspecified
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#27376 Travis: Actually use gcc on OS X new defect Medium Tor: unspecified
#27381 Bad consensus diffs on 0.3.4 and later [with chutney] assigned defect Medium Tor: unspecified
#27382 Bad valid-after time in 0.3.3 and 0.3.4 assigned defect Medium Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27446 hs: Report configuration error on the control port assigned neel defect Low Tor: unspecified
#27448 router_have_consensus_path() logs an incorrect "no exits in consensus" assigned defect Medium Tor: unspecified
#27471 HS intermittently fails: Non-fatal assertion failed in send_introduce1 accepted dgoulet defect Very High Tor: 0.4.2.x-final
#27519 missing "Service configured in" for hs-v3 lines in info log new defect Medium Tor: unspecified
#27594 new warning: Requested exit point '<snip>' is not known. Closing. new defect Medium Tor: unspecified
#27615 Travis cache sticky failures new defect Medium Tor: unspecified
#27655 TB 8.5a1 fails to load reachable onion services needs_information tbb-team defect Medium Tor: unspecified
#27661 use C99 bool from stdbool.h instead of int everywhere new defect Medium Tor: unspecified
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges new defect Medium Tor: unspecified
#27725 Stealthy onions should appear to be offline new defect Medium Tor: unspecified
#27736 Make sure that Tor doesn't build an IPv4 and an IPv6 connection to the same relay assigned defect Medium Tor: unspecified
#27739 rust protover_all_supported() accepts too-long protocol names new defect Medium Tor: unspecified
#27785 updateRustDependencies.sh shouldn't use realpath new defect Medium Tor: unspecified
#27802 OpenSSL 1.1.0 issue during static link new defect Medium Tor: unspecified
#27805 Update CodingStandardsRust.md with allocate_and_copy_string() new defect Medium Tor: unspecified
#27811 Eventual inability to connect to a HS from a client that lists most countries in ExcludeNodes new defect Medium Tor: unspecified
#27816 Rendezvous failures could distinguish "unknown cookie" from "outdated cookie" new defect Medium Tor: unspecified
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#27855 Tor exited during startup needs_information defect Medium Tor: unspecified
#27858 enable zstd on linux CI new defect Medium Tor: unspecified
#27859 update travis CI to ubuntu xenial image when available new defect Medium Tor: unspecified
#27869 "netstatus" in core should not depend on "hibernate" in features new defect Medium Tor: unspecified
#27896 base32 padding inconsistency between client and server in HS v3 client auth preview needs_information defect Medium Tor: unspecified
#27901 Build fails on FreeBSD/mips, but succeeds when auroreconf is run before the build new defect Medium Tor: unspecified
#27906 PrivCount noise specification assigned defect Low Tor: unspecified
#27915 Make rust doctests get linked in same way as other rust tests new defect High Tor: unspecified
#27946 "ExitRelay 0" ignored if config files are in include directories needs_information defect Medium Tor: unspecified
#27953 Authorization types for v3 onion service have to be clarified in documentation reopened defect Medium Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#27992 config DataDirectoryGroupReadable 1 is overridden if you set KeyDir == DataDir new defect Low Tor: unspecified
#28036 Launch tests inside a single dirauth instance new defect Medium Tor: unspecified
#28081 rust protover discards all votes if one is not UTF-8 new defect Medium Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#28095 dirauth key pinning can be bypassed sometimes? new defect Medium Tor: unspecified
#28097 Get the actual Windows version from Kernel32.dll new defect Medium Tor: unspecified
#28113 notify systemd if shutdown will be longer than 30 seconds needs_revision Hello71 defect Medium Tor: unspecified
#28183 tor-0.3.5.3_alpha unexpected stop bug: (Sandbox) Caught a bad syscall attempt (syscall shutdown) needs_information defect High Tor: 0.3.5.x-final
#28190 Hidden service v2 exceeded launch limit with 11 intro points in the last 37 seconds new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Note: See TracQuery for help on using queries.