Custom Query (77 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Type Priority Milestone Component
#22781 hs: Unify link specifier API/ABI needs_revision enhancement Very High Tor: unspecified Core Tor/Tor
#22893 prop224: Make intro point per-service and not per-descriptor accepted enhancement Very High Tor: unspecified Core Tor/Tor
#24554 sched: Have per-scheduler type data in a channel_t needs_revision enhancement Very High Tor: unspecified Core Tor/Tor
#19700 torsocks does not work with "connectx" (in netcat / nc) needs_information defect High Core Tor/Torsocks
#23681 prop224: Clients mark intro circs as timed-out within seconds merge_ready defect High Tor: 0.3.1.x-final Core Tor/Tor
#23744 sched: Notification events have different meaning for each scheduler accepted defect High Tor: unspecified Core Tor/Tor
#23764 hs-v3: No live consensus on client with a bridge needs_revision defect High Tor: unspecified Core Tor/Tor
#25616 Non-fatal assertion in hs_desc_encode_descriptor similar to #24972 accepted defect High Tor: 0.3.5.x-final Core Tor/Tor
#25939 A Tor commit seems to have broken creation of V3 onion services with stem accepted defect High Tor: 0.3.4.x-final Core Tor/Tor
#3733 Tor should abandon rendezvous circuits that cause a client request to time out accepted defect Medium Tor: unspecified Core Tor/Tor
#8702 Support advanced polling features in OS assigned enhancement Medium Core Tor/Torsocks
#11579 Torsocks should support Java accepted enhancement Medium Core Tor/Torsocks
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket accepted enhancement Medium Core Tor/Torsocks
#11727 Support shared onion pool for DNS resolution in separate process accepted enhancement Medium Core Tor/Torsocks
#13184 Add an option to whitelist networks accepted enhancement Medium Core Tor/Torsocks
#14322 torsocks fails to wrap setcap binaries accepted defect Medium Core Tor/Torsocks
#14954 Chutney: add control socket to torrc templates needs_revision enhancement Medium Core Tor/Chutney
#15618 Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending) needs_information defect Medium Tor: unspecified Core Tor/Tor
#15621 Kill the pre-version 3 intro protocol code with fire. accepted enhancement Medium Tor: unspecified Core Tor/Tor
#16934 youtube-dl (recent), torsocks 2.1.0 and TBB5+ failure accepted defect Medium Core Tor/Torsocks
#17945 Stop single hop client connecting to (Rendezvous) Single Onion Services accepted enhancement Medium Tor: unspecified Core Tor/Tor
#19376 Fix a few torsocks bugs caused by unquoted variables needs_review defect Medium Core Tor/Torsocks
#19407 Support FD passing on Unix socket accepted enhancement Medium Core Tor/Torsocks
#19566 SR: Use BUG() instead of tor_assert() when we can assigned enhancement Medium Tor: unspecified Core Tor/Tor
#20305 organizing new speakers-bureau list new task Medium Community/Outreach
#21084 sometimes we call circuit has_opened() more than 2 times on client side accepted defect Medium Tor: unspecified Core Tor/Tor
#21117 can't migrate onion services to single-hop onion services assigned defect Medium Tor: unspecified Core Tor/Tor
#21227 Ship a git-remote-tor helper new enhancement Medium Core Tor/Torsocks
#22689 hs: Stop rend and intro points being used as single hop proxies needs_revision defect Medium Tor: unspecified Core Tor/Tor
#23108 prop224: Don't rotate all service descriptors at once accepted defect Medium Tor: unspecified Core Tor/Tor
#23250 tor-0.3.0.10: test failure on NetBSD needs_information defect Medium Tor: unspecified Core Tor/Tor
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified Core Tor/Tor
#23301 prop224: Refactor connection_ap_handle_onion assigned defect Medium Tor: unspecified Core Tor/Tor
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified Core Tor/Tor
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified Core Tor/Tor
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays new defect Medium Tor: unspecified Core Tor/Tor
#23507 Add single onion unreachable address algorithm to prop224 accepted defect Medium Tor: unspecified Core Tor/Tor
#23576 Make service_intro_point_new() take a node instead of an extend_info assigned defect Medium Tor: unspecified Core Tor/Tor
#23579 sched: Add accessors for channel_pending list accepted enhancement Medium Tor: unspecified Core Tor/Tor
#23662 prop224: Service edge-case where it re-uploads descriptor with same rev counter new defect Medium Tor: unspecified Core Tor/Tor
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after accepted defect Medium Tor: unspecified Core Tor/Tor
#23712 sched: DESTROY cell on a circuit bypasses the scheduler accepted defect Medium Tor: unspecified Core Tor/Tor
#23759 Refactor common code out of setup_introduce1_data and intro point functions assigned defect Medium Tor: unspecified Core Tor/Tor
#23790 rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when copying intro points merge_ready defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23872 torsocks hangs recent firefox versions new defect Medium Core Tor/Torsocks
#23988 connection_dir_request_failed() not handling HS purposes assigned defect Medium Tor: unspecified Core Tor/Tor
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified Core Tor/Tor
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info accepted defect Medium Tor: unspecified Core Tor/Tor
#24037 Use syscall blacklist rather than whitelist for torsocks needs_review enhancement Medium Core Tor/Torsocks
#24116 Torsocks deadlocks every Rust program needs_review defect Medium Core Tor/Torsocks
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells accepted defect Medium Tor: unspecified Core Tor/Tor
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned defect Medium Tor: unspecified Core Tor/Tor
#24193 Make v3 single onion services parse and use IPv6 introduce link specifiers accepted enhancement Medium Tor: unspecified Core Tor/Tor
#24346 prop224: Service stops uploading one of its two descriptors accepted defect Medium Tor: unspecified Core Tor/Tor
#24449 sched: KIST scheduler should handle limited or failed connection write assigned defect Medium Tor: unspecified Core Tor/Tor
#24451 Put IPv6 link specifiers in client EXTEND cells accepted enhancement Medium Tor: unspecified Core Tor/Tor
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services needs_revision defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified Core Tor/Tor
#24977 Non-fatal assertion !(tor_mem_is_zero((const char*)node->hsdir_index->fetch, DIGEST256_LEN)) accepted defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25096 Bump up NumNTorsPerTAP to squeeze out v2 onion service traffic? needs_review task Medium Core Tor/DirAuth
#25113 monotonic_time unit test fail, 0.3.3.1-alpha debian armel merge_ready defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25116 hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit merge_ready defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25306 tor_assertion_failed_(): Bug: ../src/or/hs_service.c:1985: rotate_all_descriptors: Assertion service->desc_current failed; aborting. merge_ready defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified Core Tor/Tor
#25461 main event-loop spins consuming 100% of a CPU core at times accepted defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#25500 Reduce client CPU usage when idle assigned task Medium Tor: 0.3.5.x-final Core Tor/Tor
#25501 Control-flow issues solved for WTF-pad assigned task Medium Tor: 0.3.5.x-final Core Tor/Tor
#25552 prop224: Onion service rev counters are useless and actually harmful for scalability new defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#25568 hs: Lookup failure cache when introducing to an intro point assigned defect Medium Tor: unspecified Core Tor/Tor
#25882 clients not detecting stale onion service introduction points assigned defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25884 add support for exitmap requirements new enhancement Medium Core Tor/Torsocks
#25899 Only run retry_dns() and check_dns_honesty() on exits needs_revision enhancement Medium Tor: 0.3.5.x-final Core Tor/Tor
#6228 NSS module for .onion DNS name resolution new enhancement Low Tor: unspecified Core Tor/Torsocks
#18295 Make shared random rounds configurable in test networks new enhancement Low Tor: unspecified Core Tor/Tor
#19793 Torsocks - only torify .onion domains accepted enhancement Low Core Tor/Torsocks
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* accepted defect Low Tor: unspecified Core Tor/Tor
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified Core Tor/Tor
Note: See TracQuery for help on using queries.