Custom Query (86 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Type Priority Milestone Component
#22893 prop224: Make intro point per-service and not per-descriptor accepted enhancement Very High Tor: unspecified Core Tor/Tor
#24554 sched: Have per-scheduler type data in a channel_t needs_revision enhancement Very High Tor: unspecified Core Tor/Tor
#27471 HS intermittently fails: Non-fatal assertion failed in send_introduce1 merge_ready defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#27750 conn_close_if_marked: Non-fatal assertion !(connection_is_writing(conn)) merge_ready defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#19700 torsocks does not work with "connectx" (in netcat / nc) needs_information defect High Core Tor/Torsocks
#23681 prop224: Clients mark intro circs as timed-out within seconds merge_ready defect High Tor: 0.2.9.x-final Core Tor/Tor
#23744 sched: Notification events have different meaning for each scheduler accepted defect High Tor: unspecified Core Tor/Tor
#23764 hs-v3: No live consensus on client with a bridge needs_revision defect High Tor: unspecified Core Tor/Tor
#25882 clients not detecting stale onion service introduction points assigned defect High Tor: unspecified Core Tor/Tor
#26794 tsocks_gethostbyname_r does not assign result new defect High Core Tor/Torsocks
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen accepted defect High Tor: unspecified Core Tor/Tor
#3733 Tor should abandon rendezvous circuits that cause a client request to time out accepted defect Medium Tor: unspecified Core Tor/Tor
#8702 Support advanced polling features in OS assigned enhancement Medium Core Tor/Torsocks
#11579 Torsocks should support Java accepted enhancement Medium Core Tor/Torsocks
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket accepted enhancement Medium Core Tor/Torsocks
#11727 Support shared onion pool for DNS resolution in separate process accepted enhancement Medium Core Tor/Torsocks
#13184 Add an option to whitelist networks accepted enhancement Medium Core Tor/Torsocks
#14322 torsocks fails to wrap setcap binaries accepted defect Medium Core Tor/Torsocks
#14954 Chutney: add control socket to torrc templates needs_revision enhancement Medium Core Tor/Chutney
#15618 Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending) needs_information defect Medium Tor: unspecified Core Tor/Tor
#16934 youtube-dl (recent), torsocks 2.1.0 and TBB5+ failure accepted defect Medium Core Tor/Torsocks
#17945 Stop single hop client connections to Single Onion Services accepted enhancement Medium Tor: unspecified Core Tor/Tor
#19376 Fix a few torsocks bugs caused by unquoted variables needs_review defect Medium Core Tor/Torsocks
#19407 Support FD passing on Unix socket accepted enhancement Medium Core Tor/Torsocks
#19566 SR: Use BUG() instead of tor_assert() when we can assigned enhancement Medium Tor: unspecified Core Tor/Tor
#20305 organizing new speakers-bureau list new task Medium Community/Outreach
#21084 sometimes we call circuit has_opened() more than 2 times on client side accepted defect Medium Tor: unspecified Core Tor/Tor
#21117 can't migrate onion services to single-hop onion services assigned defect Medium Tor: unspecified Core Tor/Tor
#21227 Ship a git-remote-tor helper new enhancement Medium Core Tor/Torsocks
#22689 hs: Stop intro points being used as single hop proxies needs_revision defect Medium Tor: unspecified Core Tor/Tor
#22781 hs: Unify link specifier API/ABI needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#23108 prop224: Don't rotate all service descriptors at once accepted defect Medium Tor: unspecified Core Tor/Tor
#23300 prop224: General client side issues assigned defect Medium Tor: unspecified Core Tor/Tor
#23301 prop224: Refactor connection_ap_handle_onion assigned defect Medium Tor: unspecified Core Tor/Tor
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned defect Medium Tor: unspecified Core Tor/Tor
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned defect Medium Tor: unspecified Core Tor/Tor
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays new defect Medium Tor: unspecified Core Tor/Tor
#23507 Add single onion unreachable address algorithm to prop224 accepted defect Medium Tor: unspecified Core Tor/Tor
#23579 sched: Add accessors for channel_pending list accepted enhancement Medium Tor: unspecified Core Tor/Tor
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after accepted defect Medium Tor: unspecified Core Tor/Tor
#23712 sched: DESTROY cell on a circuit bypasses the scheduler accepted defect Medium Tor: unspecified Core Tor/Tor
#23759 Refactor common code out of setup_introduce1_data and intro point functions assigned defect Medium Tor: unspecified Core Tor/Tor
#23790 rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when copying intro points merge_ready defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23872 torsocks hangs recent firefox versions new defect Medium Core Tor/Torsocks
#23988 connection_dir_client_request_failed() not handling HS purposes new defect Medium Tor: unspecified Core Tor/Tor
#23993 sched: Refactor and fix interactions between channel and scheduler assigned defect Medium Tor: unspecified Core Tor/Tor
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info accepted defect Medium Tor: unspecified Core Tor/Tor
#24037 Use syscall blacklist rather than whitelist for torsocks needs_review enhancement Medium Core Tor/Torsocks
#24116 Torsocks deadlocks every Rust program needs_review defect Medium Core Tor/Torsocks
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells accepted defect Medium Tor: unspecified Core Tor/Tor
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned defect Medium Tor: unspecified Core Tor/Tor
#24449 sched: KIST scheduler should handle limited or failed connection write assigned defect Medium Tor: unspecified Core Tor/Tor
#24451 Put IPv6 link specifiers in client EXTEND cells accepted enhancement Medium Tor: unspecified Core Tor/Tor
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services needs_revision defect Medium Tor: unspecified Core Tor/Tor
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified Core Tor/Tor
#25096 Bump up NumNTorsPerTAP to squeeze out v2 onion service traffic? new task Medium Core Tor/DirAuth
#25113 monotonic_time unit test fail, 0.3.3.1-alpha debian armel merge_ready defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25116 hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit merge_ready defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified Core Tor/Tor
#25500 Reduce client CPU usage when idle assigned task Medium Tor: unspecified Core Tor/Tor
#25884 add support for exitmap requirements new enhancement Medium Core Tor/Torsocks
#25899 Only run retry_dns() and check_dns_honesty() on exits needs_revision enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26094 manpage: increase minimal bandwidth requirements to be consistent with the relay guide and FAQ needs_information enhancement Medium Tor: unspecified Core Tor/Tor
#26288 prop289: Implement authenticated SENDME assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26292 Subsystem for gathering information about local connection states assigned enhancement Medium Tor: unspecified Core Tor/Tor
#26300 Attempt by … to open a stream on first hop of circuit. Closing. needs_information defect Medium Tor: unspecified Core Tor/Tor
#26580 torsocks complains about unknown system call #417 on FreeBSD new defect Medium Core Tor/Torsocks
#26821 [torsocks] configure script from the tarball breaks new defect Medium Core Tor/Torsocks
#26831 Feature: conditionally allow non-localhost inbound connections with command-line flag new defect Medium Core Tor/Torsocks
#26839 prop289: Make a relay remember last cell digests before SENDME assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26840 prop289: Modify SENDME cell to have a version and payload assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26841 prop289: Have tor handle the new SENDME cell format and validate assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26842 prop289: Add consensus parameters to control new SENDME behavior assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26846 prop289: Leave unused random bytes in relay cell payload assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26871 prop289: randomize the unused part of relay payloads needs_revision enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#26888 torsocks: --quiet option new enhancement Medium Core Tor/Torsocks
#27920 torsocks fails to open socks 4 connection: [socks5] Resolve destination buffer too small (in socks5_recv_resolve_reply() at socks5.c:707) new defect Medium Core Tor/Torsocks
#28020 Run another memory profile in late 0.3.6 to figure out how much memory we saved. assigned task Medium Tor: 0.4.0.x-final Core Tor/Tor
#28128 v3 client auth: No interned sandbox parameter found needs_review defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#28181 spec: Add to pt-spec.txt control messages going back to main process (tor) assigned enhancement Medium Tor: 0.4.0.x-final Core Tor/Tor
#6228 NSS module for .onion DNS name resolution new enhancement Low Tor: unspecified Core Tor/Torsocks
#18295 Make shared random rounds configurable in test networks new enhancement Low Tor: unspecified Core Tor/Tor
#19793 Torsocks - only torify .onion domains accepted enhancement Low Core Tor/Torsocks
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* accepted defect Low Tor: unspecified Core Tor/Tor
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified Core Tor/Tor
#26889 torsocks: option to disable all network traffic new enhancement Low Core Tor/Torsocks
Note: See TracQuery for help on using queries.