Custom Query (127 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 127)

1 2
Ticket Summary Status Type Priority Milestone Component
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified Core Tor/Tor
#1749 Split relay and link crypto across multiple CPU cores accepted project High Tor: unspecified Core Tor/Tor
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified Core Tor/Tor
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: 0.3.2.x-final Core Tor/Tor
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X new enhancement High Tor: unspecified Core Tor/Tor
#7118 add Thandy support for censored areas to Thandy Design new task High Archived/Thandy
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: 0.3.2.x-final Core Tor/Tor
#8387 Unbuilt one-hop circuits sometimes hang around forever new defect High Tor: unspecified Core Tor/Tor
#11301 Tor does not reconnect after network loss with guards used as bridges new defect High Tor: unspecified Core Tor/Tor
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified Core Tor/Tor
#15940 Make a standard transition plan for killing off a client version accepted task High Tor: 0.3.2.x-final Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever accepted task High Tor: 0.3.2.x-final Core Tor/Tor
#17278 Fix malleable relay crypto accepted defect High Tor: unspecified Core Tor/Tor
#17282 Chutney could use a HOWTO for writing new test cases, network tests, etc assigned enhancement High Core Tor/Chutney
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted enhancement High Tor: unspecified Core Tor/Tor
#18537 Resist keyboard and mouse biometrics and tracking assigned enhancement High Applications/Tor Browser
#18637 Have OOM handler look at all memory consumption, not just some accepted enhancement High Tor: unspecified Core Tor/Tor
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned enhancement High Tor: unspecified Core Tor/Tor
#18788 Make the copyright license clear for torspec and proposals accepted enhancement High Tor: 0.3.2.x-final Core Tor/Tor
#19281 Potential heap corruption via `write_escaped_data` in control.c needs_review defect High Tor: 0.3.2.x-final Core Tor/Tor
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted task High Tor: unspecified Core Tor/Tor
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified Core Tor/Tor
#22173 Support looking up node by ed25519 identity accepted enhancement High Tor: 0.3.2.x-final Core Tor/Tor
#22276 Merge prop220/prop244 to tor-spec/dir-spec accepted defect High Tor: 0.3.1.x-final Core Tor/Tor
#22789 Tor 0.3.1.4-alpha crash on OpenBSD-current reopened defect High Tor: 0.3.1.x-final Core Tor/Tor
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified Core Tor/Tor
#2536 Disable outgoing token bucket and reduce token bucket refill interval needs_review enhancement Medium Tor: unspecified Core Tor/Tor
#2671 Better communication for authority operators, core developers in emergency situations assigned task Medium Company
#3794 tor-chroot scripts needs_review task Medium Tor: unspecified Core Tor/Tor
#3970 Automatically migrate bookmarks/settings/add-ons between versions of TBB? new enhancement Medium Archived/Thandy
#4843 Thp packages should be able to install into arbitrary paths needs_review enhancement Medium Archived/Thandy
#4844 Helper scripts for Thandy thp, packages and bundle creation needs_review enhancement Medium Archived/Thandy
#4846 Safe password caching for package/bundle creation new enhancement Medium Archived/Thandy
#5489 Write up a "how to report bugs and security issues, and what happens then" post or FAQ assigned task Medium WebsiteV3 Webpages/Website
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified Core Tor/Tor
#7176 Adapt and update AccessLabs' patches for reduced TOR memory consumption for embedded devices accepted enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#8855 thandy needs a README or other easy to find documentation new defect Medium Archived/Thandy
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#10059 capture tor log messages before control connection is opened new enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified Core Tor/Tor
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened defect Medium Tor: unspecified Core Tor/Tor
#14312 tor-spec says additional fields in exitpolicy response are "optional" when they're not accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#14948 Clarify in control-spec which relays have ns and md entries and which don't accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted defect Medium Tor: unspecified Core Tor/Tor
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified Core Tor/Tor
#17201 Migrate everything from internal SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17202 Shut down SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17295 Route-selection and guard-selection logic completely replaced accepted enhancement Medium Tor: unspecified Core Tor/Tor
#17799 Use a better PRNG unless OpenSSL starts using a better one on their own. needs_review defect Medium Tor: unspecified Core Tor/Tor
#18308 Use a better pattern for "create mutex if not already initialized" accepted defect Medium Tor: unspecified Core Tor/Tor
#18321 Exclude our own vote from the consensus if we think our own vote is invalid accepted defect Medium Tor: unspecified Core Tor/Tor
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size assigned enhancement Medium Tor: unspecified Core Tor/Tor
#19171 Update all relevant online-services addresses and phone numbers to new office needs_review defect Medium Internal Services
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19329 Integrate callgraph complexity measures into our regular process accepted defect Medium Tor: unspecified Core Tor/Tor
#19418 i2d_RSAPublicKey retval ignored in multiple callsites needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified Core Tor/Tor
#20522 Enable DISABLE_DISABLING_ED25519 accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#20719 prop271 -- make parameters configurable accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: 0.3.2.x-final Core Tor/Tor
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#20918 Switch onion.c to use TRUNNEL_OPAQUE merge_ready defect Medium Tor: unspecified Core Tor/Tor
#20931 [prop271] Generate GUARD controller events accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20956 optionally do not write command line config to torrc reopened defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#21031 Please don't remove ClientDNSRejectInternalAddresses accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#21074 setrlimit fails OSX Sierra accepted defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#21119 Deprecate and replace type_getarray_val() new enhancement Medium Core Tor/Trunnel
#21215 Lower the directory overhead for low-bandwidth clients accepted project Medium Tor: 0.3.2.x-final Core Tor/Tor
#21454 tor_version_compare and version spec comparison order are inconsistent accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#21474 Fix make test-fuzz-corpora warnings accepted defect Medium Tor: unspecified Core Tor/Tor
#21522 ClientDNSRejectInternalAddresses should not be deprecated in test networks. accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22264 Remove old cached_dir_t code accepted defect Medium Tor: unspecified Core Tor/Tor
#22278 Is anything undocumented from proposals 158, 162? accepted defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22342 Add a nice append-only stringbuffer, and refactor code to use it accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22348 16 relays have mismatched rsa/ed keys currently needs_review defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22349 dir auth attempts to fetch a descriptor every minute for every relay with mismatched rsa/ed key merge_ready defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#22351 Should bridge lines in the state file use unlisted_since? accepted defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file accepted defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22589 Tor circuit is too slow! new defect Medium Tor: unspecified Core Tor/Tor
#22660 Guard against stack smashing attacks in tor needs_revision defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22677 Document that Sandbox 1 requires linux and seccomp2. needs_review enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#22779 choose_good_entry_server() is no longer used to choose entry guards needs_review defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22801 Warnings from isnan, isinfinite, signbit on mingw needs_review defect Medium Tor: 0.2.8.x-final Core Tor/Tor
#22802 Avoid use of "0" with tor_parse_foo() needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22861 Update tor-spec for ed25519 link authentication keys accepted defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22878 Trunnel needs a debug mode new defect Medium Core Tor/Trunnel
#22976 disallow tor exec'ing needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23053 Memory leak of unix_socket_path when validating multiple unix sockets accepted task Medium Tor: 0.3.0.x-final Core Tor/Tor
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23149 Refactor buffer.c: split and rename functions. needs_review defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23170 Include ed25519 relay id keys in the consensus accepted task Medium Tor: 0.3.2.x-final Core Tor/Tor
#6 Confused server clocks can screw up timing assigned defect Low Mixminion-Server
#30 multiple client processes colliding assigned defect Low Mixminion-Other
#39 Certificate rotation sometimes does not happen. assigned defect Low Mixminion-Server
1 2
Note: See TracQuery for help on using queries.