Custom Query (124 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 124)

1 2
Ticket Summary Status Type Priority Milestone Component
#23170 Include ed25519 relay id keys in the consensus needs_revision task Very High Tor: 0.3.3.x-final Core Tor/Tor
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified Core Tor/Tor
#1749 Split relay and link crypto across multiple CPU cores accepted project High Tor: unspecified Core Tor/Tor
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified Core Tor/Tor
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified Core Tor/Tor
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X new enhancement High Tor: unspecified Core Tor/Tor
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed accepted defect High Tor: 0.3.3.x-final Core Tor/Tor
#7118 add Thandy support for censored areas to Thandy Design new task High Archived/Thandy
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: 0.3.3.x-final Core Tor/Tor
#8387 Unbuilt one-hop circuits sometimes hang around forever new defect High Tor: unspecified Core Tor/Tor
#10059 capture tor log messages before control connection is opened new enhancement High Tor: 0.3.3.x-final Core Tor/Tor
#11301 Tor does not reconnect after network loss with guards used as bridges new defect High Tor: unspecified Core Tor/Tor
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified Core Tor/Tor
#14039 Many unnecessary CPU wakeups per second accepted defect High Tor: 0.3.3.x-final Core Tor/Tor
#15940 Make a standard transition plan for killing off a client version accepted task High Tor: 0.3.3.x-final Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever accepted task High Tor: 0.3.3.x-final Core Tor/Tor
#17278 Fix malleable relay crypto accepted defect High Tor: unspecified Core Tor/Tor
#17282 Chutney could use a HOWTO for writing new test cases, network tests, etc assigned enhancement High Core Tor/Chutney
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted enhancement High Tor: unspecified Core Tor/Tor
#18537 Resist keyboard and mouse biometrics and tracking assigned enhancement High Applications/Tor Browser
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted project High Tor: 0.3.3.x-final Core Tor/Tor
#18637 Have OOM handler look at all memory consumption, not just some accepted enhancement High Tor: unspecified Core Tor/Tor
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned enhancement High Tor: unspecified Core Tor/Tor
#18788 Make the copyright license clear for torspec and proposals accepted enhancement High Tor: 0.3.4.x-final Core Tor/Tor
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS accepted defect High Tor: 0.3.3.x-final Core Tor/Tor
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted task High Tor: unspecified Core Tor/Tor
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified Core Tor/Tor
#21509 Fuzz v3 hidden services accepted task High Tor: 0.3.3.x-final Core Tor/Tor
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag new defect High Tor: unspecified Core Tor/Tor
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified Core Tor/Tor
#2536 Disable outgoing token bucket and reduce token bucket refill interval needs_review enhancement Medium Tor: unspecified Core Tor/Tor
#2671 Better communication for authority operators, core developers in emergency situations assigned task Medium Company
#3794 tor-chroot scripts needs_review task Medium Tor: unspecified Core Tor/Tor
#3970 Automatically migrate bookmarks/settings/add-ons between versions of TBB? new enhancement Medium Archived/Thandy
#4843 Thp packages should be able to install into arbitrary paths needs_review enhancement Medium Archived/Thandy
#4844 Helper scripts for Thandy thp, packages and bundle creation needs_review enhancement Medium Archived/Thandy
#4846 Safe password caching for package/bundle creation new enhancement Medium Archived/Thandy
#5489 Write up a "how to report bugs and security issues, and what happens then" post or FAQ assigned task Medium WebsiteV3 Webpages/Website
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified Core Tor/Tor
#7176 Adapt and update AccessLabs' patches for reduced Tor memory consumption for embedded devices accepted enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified Core Tor/Tor
#8855 thandy needs a README or other easy to find documentation new defect Medium Archived/Thandy
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified Core Tor/Tor
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened defect Medium Tor: unspecified Core Tor/Tor
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted defect Medium Tor: unspecified Core Tor/Tor
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified Core Tor/Tor
#17201 Migrate everything from internal SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17202 Shut down SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17295 Route-selection and guard-selection logic completely replaced accepted enhancement Medium Tor: unspecified Core Tor/Tor
#17799 Use a better PRNG unless OpenSSL starts using a better one on their own. needs_review defect Medium Tor: unspecified Core Tor/Tor
#18308 Use a better pattern for "create mutex if not already initialized" accepted defect Medium Tor: unspecified Core Tor/Tor
#18321 Exclude our own vote from the consensus if we think our own vote is invalid accepted defect Medium Tor: unspecified Core Tor/Tor
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size assigned enhancement Medium Tor: unspecified Core Tor/Tor
#19171 Update all relevant online-services addresses and phone numbers to new office needs_review defect Medium Internal Services
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19329 Integrate callgraph complexity measures into our regular process accepted defect Medium Tor: unspecified Core Tor/Tor
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified Core Tor/Tor
#20356 prop220: unit tests for all new/changed circuit extension functions new defect Medium Tor: unspecified Core Tor/Tor
#20522 Enable DISABLE_DISABLING_ED25519 accepted defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#20719 prop271 -- make parameters configurable accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: unspecified Core Tor/Tor
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#20918 Switch onion.c to use TRUNNEL_OPAQUE merge_ready defect Medium Tor: unspecified Core Tor/Tor
#20931 [prop271] Generate GUARD controller events accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20956 optionally do not write command line config to torrc reopened defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#21074 setrlimit fails OSX Sierra needs_information defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#21119 Deprecate and replace type_getarray_val() new enhancement Medium Core Tor/Trunnel
#21474 Fix make test-fuzz-corpora warnings accepted defect Medium Tor: unspecified Core Tor/Tor
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#22264 Remove old cached_dir_t code accepted defect Medium Tor: unspecified Core Tor/Tor
#22351 Should bridge lines in the state file use unlisted_since? accepted defect Medium Tor: unspecified Core Tor/Tor
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file needs_information defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#22589 Tor circuit is too slow! new defect Medium Tor: unspecified Core Tor/Tor
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified Core Tor/Tor
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t accepted defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#22878 Trunnel needs a debug mode new defect Medium Core Tor/Trunnel
#22955 Specify how PrivCount will work with Tor accepted task Medium Tor: 0.3.3.x-final Core Tor/Tor
#22962 Clarify the security severity of issues that make denial of service easier accepted task Medium Tor: 0.3.3.x-final Core Tor/Tor
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int needs_revision defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23146 prop280: Finish privcount-in-Tor proposal (280) accepted defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23318 compute_weighted_bandwidths: do not add 0.5 to final_weight merge_ready defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23406 Sampled guards are not re-weighted when a new consensus arrives accepted defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23693 0.3.1.7: Assertion threadpool failed in cpuworker_queue_work reopened defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23750 Isolate libevent usage to a few locations assigned enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#23816 Use exponential backoff with jitter and/or tune its parameters merge_ready defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23954 Race condition in LOG_PROTOCOL_WARN assigned defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23989 entry_guards_update_all() will pretend to update primaries even if sampled set is empty accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24107 Write a design document for the control interface for enhanced battery awareness on Android devices assigned defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24108 Write a design document for the bandwidth control port interface for Android devices assigned task Medium Tor: 0.3.4.x-final Core Tor/Tor
#24198 (Sandbox) Caught a bad syscall attempt (syscall kill) merge_ready defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#24204 Improve the in-process Tor API: create owning control port accepted defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#24315 sandbox incompatible with glibc 2.26 (openat() not handled for all our files) merge_ready defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#24423 Fix STACK warnings in Tor needs_review defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24454 sandbox failure on arm64 accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24581 Don't crash when restarting Tor in the same process needs_review defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24583 Make it easy to debug restart-in-process needs_review enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
1 2
Note: See TracQuery for help on using queries.