Custom Query (2027 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (801 - 900 of 2027)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Ticket Summary Status Owner Type Priority Milestone
#9729 Make bridges publish additional ORPort addresses in their descriptor needs_revision enhancement Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#6781 Make cell statistics useful in simulations again new enhancement Low Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#6256 Make circuit isolation isolate exits? (signal NEWNYM exit bucketing) new enhancement Medium Tor: unspecified
#29821 Make circuit/channel padding correctly respect dormant mode new defect Low Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#26748 Make core/proto depend only on lib/*, and not used by core/mainloop new defect Medium Tor: unspecified
#4539 Make dir auths write to disk digests that don't match new enhancement Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#14799 Make failure to create extrainfo an error? reopened defect Low Tor: unspecified
#13230 Make good use of unstable relays new enhancement Medium Tor: unspecified
#19162 Make it even harder to become HSDir accepted arma defect Medium Tor: unspecified
#13908 Make it safe to set NumDirectoryGuards=1 new enhancement Medium Tor: unspecified
#17949 Make loopback address search more accurate needs_revision rl1987 enhancement Medium Tor: unspecified
#31789 Make networking usage in circuit padding more abstract new enhancement Medium
#19333 Make node-selection functions testable and tested new defect Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#9662 Make ntor handshake faster assigned yawning defect Medium Tor: unspecified
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: unspecified
#6802 Make our config parsing less kludgy new enhancement Medium Tor: unspecified
#22363 Make our test network public new enhancement Medium Tor: unspecified
#6878 Make outbound DNS requests honor IPv6 OutboundBindAddress new enhancement Medium Tor: unspecified
#28673 Make private_nets aware of Carrier Grade NAT (RFC 6598) new enhancement Medium Tor: unspecified
#7572 Make relay crypto run on multiple CPU cores assigned yawning defect High Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#29019 Make relays report bandwidth usage more often in test networks needs_revision enhancement Medium Tor: unspecified
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#32162 Make router.c relay-only new enhancement Medium Tor: 0.4.3.x-final
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#27915 Make rust doctests get linked in same way as other rust tests new defect High Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#29115 Make sure state file data types match the struct datatypes new enhancement Medium Tor: unspecified
#27736 Make sure that Tor doesn't build an IPv4 and an IPv6 connection to the same relay assigned defect Medium Tor: unspecified
#6198 Make sure that we clear addresses before freeing connections new project Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#20462 Make test failures/bugs on Raspberry Pi 3 reopened defect Medium Tor: unspecified
#18665 Make test_util_time pieces pass on windows new defect Medium Tor: unspecified
#31011 Make the bridge authority reject private PT addresses when DirAllowPrivateAddresses is 0 assigned cjb defect Medium Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals accepted nickm enhancement High Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified
#30034 Make the pre-push hook check for fixups on both sides of a merge new defect Medium Tor: unspecified
#32722 Make the seccomp sandbox work with Ubuntu Xenial and Bionic new defect Medium Tor: 0.4.3.x-final
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#32688 Make tor_tls_get_buffer_sizes() work again new enhancement Low Tor: unspecified
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#29520 Makefile: let target "micro-revision.i" be a prerequisite of the default target new defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#13603 Many channels closing with "IOERROR" reason given on control port. new defect Medium Tor: unspecified
#6313 Many of Tor's complex functions should be refactored new project Medium Tor: unspecified
#29989 MapAddress directive added to torrc doesn't work for some websites, fails to assign specified exit node needs_information defect Medium Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#24308 MaxMemInCellQueues minimum of 256MB is still too large for low-RAM relays (LEDE and OpenWRT routers) new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations assigned enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned defect Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned enhancement Medium Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#19487 Meek and ReachableAddresses needs_revision dcf defect Medium Tor: unspecified
#33039 Memory leaks in handle_control_getconf needs_review catalyst defect Medium Tor: 0.4.3.x-final
#18757 Memunit config defaults say "KB" rather than "KBytes" needs_revision defect Medium Tor: unspecified
#32563 Merge HSv3 spec fixes we found during onionbalance creation assigned asn defect Medium Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config new enhancement High Tor: unspecified
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#29213 Minimize the boundary between src/core and src/{feature,app} new enhancement Medium Tor: 0.4.3.x-final
#26933 Minor memleak in HSv3 configuration needs_information defect Medium Tor: unspecified
#16978 Minority of hostile dirauths can influence consensus in dangerous ways new defect Medium Tor: unspecified
#25784 Misleading error message when asking for IPv6 in a network with no IPv6-capable exits new defect Medium Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#6939 Missing IPv6 ORPort reachability check needs_revision defect High Tor: unspecified
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#6837 More fine-grained modular decomposition new enhancement High Tor: unspecified
#14999 Most/all esc_for_log instances in control.c should change. new defect Medium Tor: unspecified
#32809 Move AuthDir* policy entries into feature/dirauth new defect Medium Tor: 0.4.3.x-final
#32813 Move V3BandwidthsFile into feature/dirauth module new defect Medium Tor: 0.4.3.x-final
#32815 Move all directory authority options into the dirauth man page section new task Medium Tor: 0.4.3.x-final
#32812 Move authority-mode options into dirauth module new defect Medium Tor: 0.4.3.x-final
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#22911 Move some style guidelines out of torguts into tor/doc/HACKING new defect Medium Tor: unspecified
#32816 Move the relay options into the correct man page sections new defect Medium Tor: 0.4.3.x-final
#32810 Move timing-related authority options into dirauth module new defect Medium Tor: 0.4.3.x-final
#3698 Multi-line torrc options conflict with Windows paths assigned Jigsaw52 defect Low Tor: unspecified
#7126 Multipath consensus integrity verification new enhancement Medium Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified
#6289 Multiple Socks Server support in Tor Client new enhancement Low Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#5565 MyFamily should provide an alternate non-idhex subscription mechanism reopened enhancement Medium Tor: unspecified
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information defect Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Note: See TracQuery for help on using queries.