Custom Query (117 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 117)

1 2
Ticket Summary Status Type Priority Milestone Component
#23170 Include ed25519 relay id keys in the consensus accepted task Very High Tor: 0.3.3.x-final Core Tor/Tor
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified Core Tor/Tor
#1749 Split relay and link crypto across multiple CPU cores accepted project High Tor: unspecified Core Tor/Tor
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified Core Tor/Tor
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified Core Tor/Tor
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X new enhancement High Tor: unspecified Core Tor/Tor
#7118 add Thandy support for censored areas to Thandy Design new task High Archived/Thandy
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_review defect High Tor: 0.3.3.x-final Core Tor/Tor
#8185 circuit_package_relay_cell(): Bug: outgoing relay cell has n_chan==NULL. Dropping. merge_ready defect High Tor: 0.3.1.x-final Core Tor/Tor
#8387 Unbuilt one-hop circuits sometimes hang around forever new defect High Tor: unspecified Core Tor/Tor
#11301 Tor does not reconnect after network loss with guards used as bridges new defect High Tor: unspecified Core Tor/Tor
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified Core Tor/Tor
#14039 Many unnecessary CPU wakeups per second accepted defect High Tor: 0.3.3.x-final Core Tor/Tor
#15940 Make a standard transition plan for killing off a client version accepted task High Tor: 0.3.3.x-final Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever accepted task High Tor: 0.3.3.x-final Core Tor/Tor
#17278 Fix malleable relay crypto accepted defect High Tor: unspecified Core Tor/Tor
#17282 Chutney could use a HOWTO for writing new test cases, network tests, etc assigned enhancement High Core Tor/Chutney
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted enhancement High Tor: unspecified Core Tor/Tor
#18537 Resist keyboard and mouse biometrics and tracking assigned enhancement High Applications/Tor Browser
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted project High Tor: 0.3.3.x-final Core Tor/Tor
#18637 Have OOM handler look at all memory consumption, not just some accepted enhancement High Tor: unspecified Core Tor/Tor
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned enhancement High Tor: unspecified Core Tor/Tor
#18788 Make the copyright license clear for torspec and proposals accepted enhancement High Tor: 0.3.4.x-final Core Tor/Tor
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted task High Tor: unspecified Core Tor/Tor
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified Core Tor/Tor
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified Core Tor/Tor
#2536 Disable outgoing token bucket and reduce token bucket refill interval needs_review enhancement Medium Tor: unspecified Core Tor/Tor
#2671 Better communication for authority operators, core developers in emergency situations assigned task Medium Company
#3794 tor-chroot scripts needs_review task Medium Tor: unspecified Core Tor/Tor
#3970 Automatically migrate bookmarks/settings/add-ons between versions of TBB? new enhancement Medium Archived/Thandy
#4843 Thp packages should be able to install into arbitrary paths needs_review enhancement Medium Archived/Thandy
#4844 Helper scripts for Thandy thp, packages and bundle creation needs_review enhancement Medium Archived/Thandy
#4846 Safe password caching for package/bundle creation new enhancement Medium Archived/Thandy
#5489 Write up a "how to report bugs and security issues, and what happens then" post or FAQ assigned task Medium WebsiteV3 Webpages/Website
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified Core Tor/Tor
#7176 Adapt and update AccessLabs' patches for reduced Tor memory consumption for embedded devices accepted enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified Core Tor/Tor
#8855 thandy needs a README or other easy to find documentation new defect Medium Archived/Thandy
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#10059 capture tor log messages before control connection is opened new enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified Core Tor/Tor
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened defect Medium Tor: unspecified Core Tor/Tor
#12062 Audit DisableNetwork, we_are_hibernating usage needs_review defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted defect Medium Tor: unspecified Core Tor/Tor
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified Core Tor/Tor
#17201 Migrate everything from internal SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17202 Shut down SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17295 Route-selection and guard-selection logic completely replaced accepted enhancement Medium Tor: unspecified Core Tor/Tor
#17799 Use a better PRNG unless OpenSSL starts using a better one on their own. needs_review defect Medium Tor: unspecified Core Tor/Tor
#18308 Use a better pattern for "create mutex if not already initialized" accepted defect Medium Tor: unspecified Core Tor/Tor
#18321 Exclude our own vote from the consensus if we think our own vote is invalid accepted defect Medium Tor: unspecified Core Tor/Tor
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size assigned enhancement Medium Tor: unspecified Core Tor/Tor
#19171 Update all relevant online-services addresses and phone numbers to new office needs_review defect Medium Internal Services
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19329 Integrate callgraph complexity measures into our regular process accepted defect Medium Tor: unspecified Core Tor/Tor
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified Core Tor/Tor
#20356 prop220: unit tests for all new/changed circuit extension functions new defect Medium Tor: unspecified Core Tor/Tor
#20522 Enable DISABLE_DISABLING_ED25519 accepted defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#20719 prop271 -- make parameters configurable accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: unspecified Core Tor/Tor
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#20918 Switch onion.c to use TRUNNEL_OPAQUE merge_ready defect Medium Tor: unspecified Core Tor/Tor
#20931 [prop271] Generate GUARD controller events accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20956 optionally do not write command line config to torrc reopened defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#21119 Deprecate and replace type_getarray_val() new enhancement Medium Core Tor/Trunnel
#21474 Fix make test-fuzz-corpora warnings accepted defect Medium Tor: unspecified Core Tor/Tor
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag accepted defect Medium Tor: unspecified Core Tor/Tor
#22264 Remove old cached_dir_t code accepted defect Medium Tor: unspecified Core Tor/Tor
#22342 Add a nice append-only stringbuffer, and refactor code to use it needs_review defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#22349 dir auth attempts to fetch a descriptor every minute for every relay with mismatched rsa/ed key merge_ready defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#22351 Should bridge lines in the state file use unlisted_since? accepted defect Medium Tor: unspecified Core Tor/Tor
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file needs_information defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#22589 Tor circuit is too slow! new defect Medium Tor: unspecified Core Tor/Tor
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified Core Tor/Tor
#22719 Bug: src/common/compress.c:576: tor_compress_process: reopened defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t accepted defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#22801 Warnings from isnan, isinfinite, signbit on mingw needs_review defect Medium Tor: 0.2.8.x-final Core Tor/Tor
#22878 Trunnel needs a debug mode new defect Medium Core Tor/Trunnel
#23053 Memory leak of unix_socket_path when validating multiple unix sockets merge_ready task Medium Tor: 0.3.0.x-final Core Tor/Tor
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int needs_revision defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23146 prop280: Finish privcount-in-Tor proposal (280) accepted defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23318 compute_weighted_bandwidths: do not add 0.5 to final_weight needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23406 Sampled guards are not re-weighted when a new consensus arrives accepted defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#23533 Repair bug in geoip/rephist reporting from relays that only download microdescriptors. merge_ready defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#23690 Assertion *buf_flushlen <= buf->datalen failed merge_ready defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#23693 0.3.1.7: Assertion threadpool failed in cpuworker_queue_work needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23750 Isolate libevent usage to a few locations assigned enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#23816 Use expontial backoff with jitter and/or tune its parameters needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23845 Document a stable tor main function needs_review enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#23900 Let programs call tor_main with a preconstructed control socket needs_review enhancement Medium Tor: 0.3.3.x-final Core Tor/Tor
#6 Confused server clocks can screw up timing assigned defect Low Mixminion-Server
#30 multiple client processes colliding assigned defect Low Mixminion-Other
#39 Certificate rotation sometimes does not happen. assigned defect Low Mixminion-Server
#54 log format lacks year assigned defect Low 0.0.8 final Mixminion-Other
#139 decoded binary file differs from the file sent. assigned defect Low Mixminion-Other
#206 Failure to create user data on single-users win32 systems assigned defect Low Mixminion-Client
1 2
Note: See TracQuery for help on using queries.