Custom Query (1986 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (801 - 900 of 1986)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#24850 tor2web option without the corresponding tag in torrc causes tor to fail with confusing console output new defect Medium Tor: unspecified
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24857 Tor uses 100% CPU when accessing the cache directory on Windows needs_revision defect Medium Tor: unspecified
#24864 directory authorities take a while to update relays' Tor versions because they use old descriptors for votes new defect Low Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#24888 tor 0.2.5.16: src/or/rendservice.c build error: comparison between signed and unsigned new defect Low Tor: unspecified
#24897 Tor seems to malfunction on FreeBSD needs_information defect Medium Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#24937 tor failing to resolve some dns records new defect Medium Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#24955 exit selection biases appear to result when very-long ExcludeExitNodes list is in effect new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#24973 Tor should be more gentle when launching dozens of circuits at once new defect Medium Tor: unspecified
#24985 Preserve circuit-layer confidentiality against a quantum-capable adversary new project Medium Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#24990 Write a proposal for a post-quantum lattice KEX new task Medium Tor: unspecified
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25061 Relays consider it a bootstrapping failure if they can't extend for somebody else's circuit new defect Medium Tor: unspecified
#25066 Rendezvous points should return signed proof of the established rend point new enhancement Medium Tor: unspecified
#25068 Make HSIntro consistent with rend_service_descriptor_t.protocols new defect Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25139 Link protocol negotiation without common version new defect Low Tor: unspecified
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25152 Try to call less circuitmux_find_map_entry() needs_information defect Medium Tor: unspecified
#25153 Specify how PrivCount in Tor statistics are configured and interpreted assigned task Medium Tor: unspecified
#25173 No Control Socket when DisableNetwork and User options are set new defect Medium Tor: unspecified
#25203 document max. value of SigningKeyLifetime new enhancement Medium Tor: unspecified
#25208 Relays can upload a new descriptor every 2 minutes new defect Medium Tor: unspecified
#25224 Create a new consensus method that ignores guardfraction votes new defect Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25263 Fix the hidden service statistics noise (and the privcount noise by extension) assigned task Medium Tor: unspecified
#25299 recent update to 7.5 on portable version breaks browser new defect Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#25335 Tor relay node CPUWORKER failed error mssage new defect Medium Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) assigned defect High Tor: unspecified
#25412 TrackHostExits option in torrc file not working as documented new defect Medium Tor: unspecified
#25416 [warn] Received http status code 404 ("Consensus is too old") from server '194.109.206.212:80' while fetching consensus directory. new defect Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state assigned defect High Tor: unspecified
#25500 Reduce client CPU usage when idle assigned task Medium Tor: unspecified
#25503 Use less space for client-side directory cache assigned task Medium Tor: unspecified
#25504 Find more generic ways to handle smartlist_t/Vec<T> between C and Rust new enhancement Medium Tor: unspecified
#25506 Tor's make clean and distclean should not depend on the exact automake version new defect Medium Tor: unspecified
#25507 Write a guide for groups planning to submit big patches to Tor. new task Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: unspecified
#25519 move away from asciidoc new task Medium Tor: unspecified
#25528 When ClientTransportPlugin is missing, tor connects directly to bridge addresses, even if they have a transport name new defect Medium Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#25550 improve continuous integration support new project Medium Tor: unspecified
#25574 Eliminate "silent-drop" side channels in Tor protocol new defect Medium Tor: unspecified
#25576 Fix non-standard use of keccak in v3 hidden service code new defect Medium Tor: unspecified
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls assigned defect Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#25630 Bug: 3-hop circuit 0x55e55d447270 with purpose 5 has no guard state new defect Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells assigned enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information defect Medium Tor: unspecified
#25687 over-report of observed / self-measure bandwidth on fast hardware -- important to torflow / peerflow new defect Medium Tor: unspecified
#25713 "DisableNetwork is set" log message in Tor Browser scares/confuses users new defect Medium Tor: unspecified
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x new task High Tor: unspecified
#25716 Arrange an experiment on the test network where we dump create cells on a relay and time the responses new task Medium Tor: unspecified
#25729 UTF8 encoded TORRC does NOT parse non-Latin paths reopened defect Medium Tor: unspecified
#25753 Check/enforce path restrictions for each path position assigned defect Medium Tor: unspecified
#25754 Make Prop#291 choices new defect Medium Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.