Custom Query (6262 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 6262)

1 2 3 4 5 6 7 8 9 10 11
Ticket Summary Status Owner Type Priority Milestone
#449 dns failures prevent legitimate options being set new defect Low Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#584 Clients process descriptor fetches as they arrive? new enhancement Low Tor: unspecified
#697 Wrong DNS configuration could break navigation new defect Low Tor: unspecified
#925 Tor fails badly when accept(2) returns EMFILE or ENFILE new defect Low Tor: unspecified
#966 Do positive DNS tests reopened defect Low Tor: unspecified
#1029 Tor relay should log message when it's working again after marking as down new enhancement Low Tor: unspecified
#1075 reachability controller status events too liberal new defect Low Tor: unspecified
#1099 Spurious bootstrap warnings if no-route-to-host new defect Low Tor: unspecified
#1102 Queuing v3 signature for next consensus, an hour later? needs_information defect Low Tor: unspecified
#1116 'Stable' flag assignment inconsistant new defect Low Tor: unspecified
#1127 no shutdown descriptor published when ORPort is closed but client stays up new defect Low Tor: unspecified
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1181 evdns_server_request_format_response() sets TC flag wrong new defect Low Tor: unspecified
#1193 Measured BW Authority will not work on private networks with less than 3 scanners new defect Low Tor: unspecified
#1238 Exit flag assigned can be assigned to nodes that don't really exit. new defect Low Tor: unspecified
#1247 bootstrap hickups when network is down new enhancement High Tor: unspecified
#1299 Tor should verify signatures before parsing new defect Medium Tor: unspecified
#1354 Configuring Tor with --with*dir gives wrong directories new defect High Tor: unspecified
#1926 Extra-info descriptors have corrupt {write,read}-history lines new defect Low Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#2161 Allow subscription to external rule feeds new enhancement High
#2395 Break Wed and Wee weights into two classes each new enhancement Medium Tor: unspecified
#2550 bwauth should reschedule quicker bandwidth test when bandwidthrate changes? new enhancement Medium sbws: unspecified
#2671 Better communication for authority operators, core developers in emergency situations new task Medium
#2888 Testing framework/dataset for bw auths new enhancement Medium sbws: unspecified
#3021 Make the microdesc format a little more flexible, with optional TAP key new defect High Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3591 We must implement the whole pluggable transports thing new project Medium
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#3780 GetTor and BridgeDB should share email processing code new enhancement Medium
#3781 Write a spec for GetTor new task Medium
#4079 Comb bw auth logs and fix or demote frequent ERRORs and WARNs new enhancement Medium
#4269 Improve slice handling in bw auths new defect Medium
#4270 Provide optimized postgres config for bw scanners new enhancement Medium
#4271 Perform some integrity checking in bw auth fetches new defect Medium
#4359 Minimize time between new relay appearing and having some bw vote for it new enhancement Medium sbws: unspecified
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf new defect Low Tor: unspecified
#4445 Gather WARN and ERROR log lines from bwauth children in aggregate.py new enhancement Medium
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#4708 Implement bwauth cap for latency new enhancement Medium sbws: unspecified
#4709 Implement bwauth cap for TCP socket exhaustion new enhancement Medium sbws: unspecified
#4909 bwscan never cleans up log files new defect Medium
#5130 Allow obfsproxy to daemonize new enhancement Low
#5148 SIGHUP managed proxies when logs reopened new task Medium
#5211 Discuss other ways for the bridge authority to run bridge reachability tests new task High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X new enhancement High Tor: unspecified
#5298 Relay does not pick the right IP addr of local node when multiple interfaces are available new defect Medium Tor: unspecified
#5457 Bw auths don't count circuit failures in descriptor mode new defect Medium sbws: unspecified
#5483 managed pluggable transports should be able to pause Tor's circuit-building? new enhancement Medium
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified
#5685 Publish node best practices doc and scripts new task High Tor: unspecified
#5707 Use end to end stream timing data to further prune circuits new enhancement Medium Tor: unspecified
#6228 NSS module for .onion DNS name resolution new enhancement Low
#6264 obfsproxy: Add support for dropping privileges and chrooting new enhancement Medium
#7144 Implement Bridge Guards and other anti-enumeration defenses new project High Tor: unspecified
#7153 Don't require pluggable transport proxies to be SOCKS proxies new project Medium
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: unspecified
#7177 Understand how accurate the bandwidth authority estimates are new project Medium sbws: unspecified
#7281 Bandwidth auths should publish average and weighted onionskin failure rates new enhancement Low
#7320 Write blog post to educate users about pluggable transports new task Medium
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: 0.4.5.x-final
#7532 Count unique IPs in an anonymous way new defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified
#7757 Maybe revisit node flag weight calculations new enhancement Medium Tor: unspecified
#7903 Research ways of adding Extended ORPort support to pyptlib new task Medium
#7918 HTML5 videos on Dailymotion are not working with TBB new defect Medium
#8001 obfsproxy makes tor warn when one bridge is down new defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() new defect Very Low Tor: unspecified
#8159 Consolidate thresholds for path build bias and use bias new enhancement Medium Tor: unspecified
#8160 Create separate pending counters during circuit construction new enhancement Medium Tor: unspecified
#8222 "Check certificates using Tor for anonymity" is reportedly sometimes grey in TBB new defect Medium
#8387 Unbuilt one-hop circuits sometimes hang around forever new defect High Tor: unspecified
#8453 Alter flag-weight balancing equations new enhancement Medium Tor: unspecified
#8593 Circuit build timeout not respected? new defect High Tor: unspecified
#8676 Research an HTTP pluggable transport that actually uses a browser and a web server new defect Medium
#8702 Support advanced polling features in OS new enhancement Medium
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified
#9121 SSL Observatory: tell users when they're being MITMed by a locally-trusted root CA new enhancement Medium
#9125 Allow reporting different obfs ports to bridge db new enhancement Medium
#9192 Create a git pluggable transport new task Medium
#9228 Create an SSH pluggable transport new task Medium
#9332 Implement whitelisting of (email_address, gpg_key_id) pairs for encrypted, automated email bridge distribution new task Low
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#9789 TorFlow BandwidthAuthority sleep schedule new defect Medium
#9825 -v returns 'unknown' for Obfsproxy.exe from '2.4.17-beta-2-pt3' new defect Low
#9902 need separate Obfsproxy Windows binary new defect Medium
#9957 Tor should consider stderr output of transport proxies new enhancement Very Low Tor: unspecified
#10059 capture tor log messages before control connection is opened new enhancement High Tor: unspecified
#10134 Create bananaphone transport for obfsproxy new task Medium
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#10519 tor uses default IP for dirport instead of the one defined in DirPort new defect Low Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#10566 tor relay hangs for 20 seconds periodically if domain from Address can not be resolved new defect Medium Tor: unspecified
#10609 aggregate.py should ignore empty scan-data files needs_review defect Medium
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.