Custom Query (59 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Keywords Status Owner Type Priority
#18098 prop224: Implement tor-genkey tool for offline HS key creation tor-hs, prop224-extra new enhancement Very High
#20700 prop224: Implement client authorization prop224, tor-hs assigned asn enhancement Very High
#20742 prop224: Implement stealth client authorization prop224, needs-proposal, prop224-extra, tor-hs, client-authorization sealth-authorization, term-project assigned asn enhancement Very High
#22893 prop224: Make intro point per-service and not per-descriptor tor-hs, prop224-extra accepted dgoulet enhancement Very High
#20594 hs: Make HSDir produce HS statistics for prop224 tor-hs, prop224, tor-spec, prop224-extra, statistics, privcount-maybe new enhancement High
#21509 Fuzz v3 hidden services fuzz, prop224, tor-hs accepted nickm task High
#21935 prop224: Deeper testing of HS ntor subsystem prop224, prop224-extra, tor-hs, tests, technical-debt new defect High
#23681 prop224: Clients mark intro circs as timed-out within seconds prop224, tor-hs, 031-backport merge_ready dgoulet defect High
#23764 hs-v3: No live consensus on client with a bridge tor-hs, prop224 needs_revision dgoulet defect High
#24868 Check a consensus parameter before activating onion service IPv6 features prop224, tor-hs, single-onion, ipv6, must-do-before-033-stable assigned teor defect High
#3733 Tor should abandon rendezvous circuits that cause a client request to time out tor-hs, prop224, tor-client accepted dgoulet defect Medium
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold tor-hs, prop224, tor-dirauth new enhancement Medium
#16538 Limit the impact of a malicious HSDir tor-dirauth, tor-hs prop224 new project Medium
#17343 Add torrc option OnionService* alias for HiddenService* tor-hs prop224? torrc new enhancement Medium
#17520 Relax the rend cache failure cleanup timer tor-hs, tor-client, prop224 new enhancement Medium
#19162 Make it even harder to become HSDir tor-hs tor-dirauth prop224 security needs-design accepted arma defect Medium
#19647 HS Descriptors should only contain printable ASCII tor-hs, prop224 new enhancement Medium
#20371 Lower HSDir query backoff delay tor-hs, research, prop224 new enhancement Medium
#21600 Hidden service introduction point retries occur at 1 second intervals tor-hs, single-onion, prop224 assigned teor defect Medium
#21693 prop224: HS descriptors do wasteful double-base64 encoding tor-hs, prop224, 031-stretch assigned asn task Medium
#22455 Enumerate cases where we want to retry circuits, and correctly balance retry robustness with guard discovery needs-proposal prop224-extra needs-design tor-client term-project-ideass new task Medium
#22646 Implement hidden service client authentication support in chutney prop224, prop224-maybe new enhancement Medium
#22688 Make sure HSDir3s never know service, client, or bridge IP addresses prop224, relay-safety, 031-backport, maybe-030-backport-with-21406 needs_revision teor defect Medium
#22689 prop224: Stop rend and intro points being used as single hop proxies prop224, relay-safety needs_revision teor defect Medium
#23094 prop224: Optimize hsdir_index calculation tor-hs, prop224, prop224-extra, 032-unreached new defect Medium
#23107 prop224: Optimize hs_circ_service_get_intro_circ() digest calculation prop224, prop224-extra, tor-hs, optimization, 032-unreached new defect Medium
#23108 prop224: Don't rotate all service descriptors at once prop224-extra, tor-hs accepted dgoulet defect Medium
#23126 HSDirs should publish some count about new-style onion addresses prop224, tor-hs, prop224-extra, research, privcount, 032-unreached new enhancement Medium
#23260 Encoding onion key creation date in the url prop224 needs-design tricky needs_information enhancement Medium
#23300 prop224: General client side issues tor-hs, prop224 assigned dgoulet defect Medium
#23301 prop224: Refactor connection_ap_handle_onion tor-hs, prop224 assigned dgoulet defect Medium
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose tor-hs, prop224 assigned dgoulet defect Medium
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack tor-hs, prop224 assigned dgoulet defect Medium
#23493 IPv6 v3 Single Onion Services fail with a bug warning prop224, tor-hs, single-onion, ipv6 new defect Medium
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays prop224, tor-relay, tor-hs needs_information dgoulet defect Medium
#23507 Add single onion unreachable address algorithm to prop224 doc, tor-spec, prop224, tor-hs, single-onion, ipv6 accepted dgoulet defect Medium
#23545 UX improvement: Tor Browser should handle bogus HSv3 addresses prop224, ux-team new tbb-team defect Medium
#23576 Make service_intro_point_new() take a node instead of an extend_info prop224, tor-hs, single-onion, ipv6 assigned dgoulet defect Medium
#23588 Write fascist_firewall_choose_address_ls() and use it in hs_get_extend_info_from_lspecs() prop224, tor-hs, single-onion, ipv6 new defect Medium
#23662 prop224: Service edge-case where it re-uploads descriptor with same rev counter tor-hs, prop224 assigned dgoulet defect Medium
#23759 Refactor common code out of setup_introduce1_data and intro point functions prop224, tor-hs, single-onion, ipv6, refactor assigned dgoulet defect Medium
#23818 Make v3 single onion services retry failed connections with a 3-hop path prop224, tor-hs, single-onion, ipv6 new defect Medium
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info prop224, tor-hs, refactor accepted dgoulet defect Medium
#24047 Add new stats for v2 and v3 onion service traffic prop224, tor-hs, privcount-maybe new defect Medium
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells prop224, tor-hs, single-onion, ipv6, tor-spec accepted dgoulet defect Medium
#24182 Pad INTRODUCE cells to hide the number of link specifiers prop224, tor-hs, defence-in-depth assigned dgoulet defect Medium
#24193 Make v3 single onion services parse and use IPv6 introduce link specifiers prop224, tor-hs, single-onion, ipv6 accepted dgoulet enhancement Medium
#24269 Raise a FATAL error if the user tried to combine v2 and prop224 hidden service in same directory tor-hs prop224 new task Medium
#24298 Better handling of DoS attacks on onion services tor-hs, prop224, tor-dos new defect Medium
#24299 Allow onion services to distinguish clients from each other tor-hs, prop224, tor-dos new defect Medium
#24310 Consider encrypted bookmarks addon for storing onions on the browser prop224, tbb, network-need new tbb-team enhancement Medium
#24346 prop224: Service stops uploading one of its two descriptors prop224, tor-hs accepted dgoulet defect Medium
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services prop224, tor-hs, security-low, easy, intro needs_revision dgoulet defect Medium
#24544 Fix more prop224 spec inconsistencies tor-spec prop224 assigned asn defect Medium
#24610 assertion !(status == HS_CLIENT_FETCH_HAVE_DESC) failed prop224, tor-hs 032-backport new defect Medium
#24977 Non-fatal assertion !(tor_mem_is_zero((const char*)node->hsdir_index->fetch, DIGEST256_LEN)) tor-hs prop224 needs_information dgoulet defect Medium
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? tor-hs, prop224 new task Low
#15557 Improve relaunch logic for failed rendezvous circuits tor-hs, tor-client, prop224, prop224-extra new defect Low
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c tor-hs, prop224, prop224-extra refactor code-movement new enhancement Low
Note: See TracQuery for help on using queries.