Custom Query (27 matches)


Show under each result:

Ticket Summary Keywords Status Milestone
#3733 Tor should abandon rendezvous circuits that cause a client request to time out tor-hs, prop224, tor-client accepted Tor: 0.3.4.x-final
#15621 Kill the pre-version 3 intro protocol code with fire. tor-hs technical-debt deprecation accepted Tor: unspecified
#19162 Make it even harder to become HSDir tor-hs tor-dirauth prop224 security needs-design accepted Tor: unspecified
#21509 Fuzz v3 hidden services fuzz, prop224, tor-hs accepted Tor: 0.3.4.x-final
#22893 prop224: Make intro point per-service and not per-descriptor tor-hs, prop224-extra accepted Tor: 0.3.4.x-final
#20700 prop224: Implement client authorization prop224, tor-hs assigned Tor: 0.3.4.x-final
#20742 prop224: Implement stealth client authorization prop224, needs-proposal, prop224-extra, tor-hs, client-authorization sealth-authorization, term-project assigned Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals tor-hs, single-onion, prop224 assigned Tor: 0.3.4.x-final
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO tor-hs, teor-was-assigned assigned Tor: 0.3.4.x-final
#21693 prop224: HS descriptors do wasteful double-base64 encoding tor-hs, prop224, 031-stretch assigned Tor: unspecified
#23300 prop224: General client side issues tor-hs, prop224 assigned Tor: 0.3.4.x-final
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose tor-hs, prop224 assigned Tor: 0.3.4.x-final
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack tor-hs, prop224 assigned Tor: 0.3.4.x-final
#16966 Better solution for an HS client descriptor cache entry to expire tor-hs, timing, needs-design needs_information Tor: unspecified
#6418 Drop support for older versions of the hidden service protocol tor-hs technical-debt deprecation new Tor: unspecified
#12500 Add an option to upload hidden service descriptors some time after startup tor-hs, easy, traffic-analysis security new Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? tor-hs, prop224 new Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold tor-hs, prop224, tor-dirauth new Tor: unspecified
#15463 Tor deals poorly with a very large number of incoming connection requests. tor-hs, performance, tor-dos new Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits tor-hs, tor-client, prop224, prop224-extra new Tor: unspecified
#16538 Limit the impact of a malicious HSDir tor-dirauth, tor-hs prop224 new Tor: unspecified
#17110 Hardening security - HidServAuth tor-hs hs-ng new Tor: unspecified
#17520 Relax the rend cache failure cleanup timer tor-hs, tor-client, prop224 new Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation tor-hs, prop224-extra new Tor: unspecified
#19647 HS Descriptors should only contain printable ASCII tor-hs, prop224 new Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c tor-hs, prop224, prop224-extra refactor code-movement new Tor: unspecified
#23107 prop224: Optimize hs_circ_service_get_intro_circ() digest calculation prop224, prop224-extra, tor-hs, optimization, 032-unreached new Tor: unspecified
Note: See TracQuery for help on using queries.