Custom Query (1896 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (801 - 900 of 1896)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24269 Raise a FATAL error if the user tried to combine v2 and prop224 hidden service in same directory new task Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24259 Simulate out-of-disk situations in chutney and/or unit tests? new enhancement Medium Tor: unspecified
#24250 In a private network some relays advertise zero bandwidth-observed new defect Medium Tor: unspecified
#24249 Create automated mechanism for C/Rust types to stay in sync needs_information chelseakomlo enhancement Medium Tor: unspecified
#24238 Bug: Generated a networkstatus vote we couldn't parse because of invalid consensus param new defect Very Low Tor: unspecified
#24194 Expose expiry of identity key in descriptor? new enhancement Medium Tor: unspecified
#24181 v3 Onion Services: Put IPv6 and unrecognised link specifiers in onion service EXTEND cells assigned defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24102 Help DirAuths rejecting certain relays based on their properties new enhancement Medium Tor: unspecified
#24100 Support exit notice page in multiple multiple languages new enhancement Low Tor: unspecified
#24063 Look into battery usage for Tor on Android devices assigned task Medium Tor: unspecified
#24062 CPU profiling of Tor on Android device assigned task Medium Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics assigned project High Tor: unspecified
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24046 Building circuits through Fast (actually) relays new enhancement Medium Tor: unspecified
#24043 monotonic time test failure on 0.3.0.x reopened defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned enhancement Medium Tor: unspecified
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#23927 I can not get Tor to start on my ubuntu relay 16.04.3 LTS new defect Medium Tor: unspecified
#23891 Write blogpost on future/expectations for Rust in tor? new task Medium Tor: unspecified
#23886 Write FFI bindings and function pointers for ed25519-dalek new enhancement Medium Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#23869 Pull in control port parser test cases from Zcash new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#23818 Make v2 and v3 single onion services retry all failed intro and rend connections with a 3-hop path needs_review teor defect Medium Tor: 0.4.2.x-final
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23777 tor spends a lot of time in malloc/free new enhancement Medium Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge assigned defect High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler assigned defect High Tor: unspecified
#23720 'make test' writes into my /tmp new defect Medium Tor: unspecified
#23714 stop casting small integers to (void *) new defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler assigned defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after assigned defect Medium Tor: unspecified
#23677 Tor should log what it thinks the time is sometime(s) new defect Medium Tor: unspecified
#23653 When accessing onion service with no fetchable descriptor, Tor sits around until timeout rather than hanging up assigned asn defect Medium Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23613 some control protocol GETINFO downloads/networkstatus keys are lies new defect Medium Tor: unspecified
#23595 Support KIST on other platforms. new enhancement Medium Tor: unspecified
#23579 sched: Add accessors for channel_pending list assigned enhancement Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23521 detect if clock skew is probably really time zone misconfiguration new enhancement Medium Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays assigned defect Medium Tor: unspecified
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#23493 IPv6 v3 Onion Services support new defect Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile new enhancement Medium Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#23433 Windows relay: 85% of CPU power is wasted inside select() call new defect Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23378 Call "Sandbox 1" no longer an experimental feature? new enhancement Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23351 Create a rustfmt.toml defining our whitespace/formatting standards new enhancement Low Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion assigned neel defect Medium Tor: unspecified
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present new enhancement Medium Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23288 refactor temporary file cleanup and make it more consistent new defect Medium Tor: unspecified
#23280 Censorship resistant onion sites new enhancement Medium Tor: unspecified
#23278 Give user option to use non-Exit Guards only reopened enhancement Medium Tor: unspecified
#23277 ApplicationControlSocket: the way for apps to control Tor new enhancement Medium Tor: unspecified
#23232 misleading log message related to used SSL vendor needs_information enhancement Low Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23126 HSDirs should publish some count about new-style onion addresses new enhancement Medium Tor: unspecified
#23119 Make Tors no longer warn if they're running a newer-than-recommended version? new enhancement Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once assigned defect Medium Tor: unspecified
#23079 Support 80-bit Onion Model In Perpetuity new project Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23013 Tor 0.3.0.9 tarball was missing ReleaseNotes entry new defect Low Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.