Custom Query (111 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 111)

1 2
Ticket Summary Status Type Priority Milestone Component
#27741 too many arguments in rust protover_compute_vote() needs_revision defect Very High Tor: 0.3.5.x-final Core Tor/Tor
#1354 Configuring Tor with --with*dir gives wrong directories assigned defect High Tor: unspecified Core Tor/Tor
#3021 Make the microdesc format a little more flexible, with optional TAP key assigned defect High Tor: unspecified Core Tor/Tor
#3652 Export clock skew opinion as getinfo command needs_revision enhancement High Tor: unspecified Core Tor/Tor
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X new enhancement High Tor: unspecified Core Tor/Tor
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 needs_revision defect High Tor: unspecified Core Tor/Tor
#8387 Unbuilt one-hop circuits sometimes hang around forever new defect High Tor: unspecified Core Tor/Tor
#10059 capture tor log messages before control connection is opened new enhancement High Tor: unspecified Core Tor/Tor
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified Core Tor/Tor
#15421 Relay crash when reloading and resolv.conf is empty accepted defect High Tor: unspecified Core Tor/Tor
#15940 Make a standard transition plan for killing off a client version accepted task High Tor: unspecified Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever accepted task High Tor: unspecified Core Tor/Tor
#17278 Fix malleable relay crypto accepted defect High Tor: unspecified Core Tor/Tor
#17282 Chutney could use a HOWTO for writing new test cases, network tests, etc assigned enhancement High Core Tor/Chutney
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted enhancement High Tor: unspecified Core Tor/Tor
#18537 Resist keyboard and mouse biometrics and tracking assigned enhancement High Applications/Tor Browser
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted project High Tor: unspecified Core Tor/Tor
#18637 Have OOM handler look at all memory consumption, not just some accepted enhancement High Tor: unspecified Core Tor/Tor
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned enhancement High Tor: unspecified Core Tor/Tor
#18788 Make the copyright license clear for torspec and proposals accepted enhancement High Tor: unspecified Core Tor/Tor
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS accepted defect High Tor: unspecified Core Tor/Tor
#20835 Refactor choose_good_entry_server so it is (almost) never used accepted task High Tor: unspecified Core Tor/Tor
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified Core Tor/Tor
#21509 Fuzz v3 hidden services accepted task High Tor: unspecified Core Tor/Tor
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag new defect High Tor: unspecified Core Tor/Tor
#24903 Bug: Line unexpectedly reached at pathbias_should_count at src/or/circpathbias.c:372 merge_ready defect High Tor: 0.3.2.x-final Core Tor/Tor
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) accepted defect High Tor: unspecified Core Tor/Tor
#27735 Tors with cached consensuses can't upgrade to a version that stops supporting a required protocol accepted defect High Tor: 0.3.6.x-final Core Tor/Tor
#27963 Undefined symbol: "timeradd", first referenced in src/lib/libtor-thread.a needs_review defect High Tor: 0.3.5.x-final Core Tor/Tor
#27971 Still supports 1024 bit keys needs_revision defect High Tor: 0.3.5.x-final Core Tor/Tor
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified Core Tor/Tor
#2671 Better communication for authority operators, core developers in emergency situations assigned task Medium Company
#5489 Write up a "how to report bugs and security issues, and what happens then" post or FAQ assigned task Medium WebsiteV3 Webpages/Website
#5532 Reconstruct and merge 4561 leftover code that adds wrappers for address-access functions needs_revision task Medium Tor: unspecified Core Tor/Tor
#7743 Avoid needless wasted space in cells needs_revision defect Medium Tor: unspecified Core Tor/Tor
#8897 Faster curve25519 implementation for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified Core Tor/Tor
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified Core Tor/Tor
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened defect Medium Tor: unspecified Core Tor/Tor
#16579 (Sandbox) Caught a bad syscall attempt (syscall socket) accepted defect Medium Tor: unspecified Core Tor/Tor
#17028 silently ignore a bad/missing --defaults-torrc needs_revision defect Medium Tor: unspecified Core Tor/Tor
#17201 Migrate everything from internal SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17202 Shut down SVN assigned defect Medium Internal Services/Tor Sysadmin Team
#17295 Route-selection and guard-selection logic completely replaced accepted enhancement Medium Tor: unspecified Core Tor/Tor
#18308 Use a better pattern for "create mutex if not already initialized" accepted defect Medium Tor: unspecified Core Tor/Tor
#18321 Exclude our own vote from the consensus if we think our own vote is invalid accepted defect Medium Tor: unspecified Core Tor/Tor
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size assigned enhancement Medium Tor: unspecified Core Tor/Tor
#19171 Update all relevant online-services addresses and phone numbers to new office needs_review defect Medium Internal Services
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified Core Tor/Tor
#19329 Integrate callgraph complexity measures into our regular process accepted defect Medium Tor: unspecified Core Tor/Tor
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: unspecified Core Tor/Tor
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified Core Tor/Tor
#20356 prop220: unit tests for all new/changed circuit extension functions new defect Medium Tor: unspecified Core Tor/Tor
#20719 prop271 -- make parameters configurable accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: unspecified Core Tor/Tor
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified Core Tor/Tor
#20918 Switch onion.c to use TRUNNEL_OPAQUE merge_ready defect Medium Tor: unspecified Core Tor/Tor
#20931 [prop271] Generate GUARD controller events accepted enhancement Medium Tor: unspecified Core Tor/Tor
#20956 optionally do not write command line config to torrc reopened defect Medium Tor: unspecified Core Tor/Tor
#21119 Deprecate and replace type_getarray_val() new enhancement Medium Core Tor/Trunnel
#21474 Fix make test-fuzz-corpora warnings accepted defect Medium Tor: unspecified Core Tor/Tor
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified Core Tor/Tor
#22264 Remove old cached_dir_t code accepted defect Medium Tor: unspecified Core Tor/Tor
#22351 Should bridge lines in the state file use unlisted_since? accepted defect Medium Tor: unspecified Core Tor/Tor
#22589 Tor circuit is too slow! new defect Medium Tor: unspecified Core Tor/Tor
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified Core Tor/Tor
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified Core Tor/Tor
#22878 Trunnel needs a debug mode new defect Medium Core Tor/Trunnel
#22962 Clarify the security severity of issues that make denial of service easier accepted task Medium Tor: unspecified Core Tor/Tor
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 merge_ready defect Medium Tor: 0.3.6.x-final Core Tor/Tor
#24454 sandbox failure on arm64 needs_information defect Medium Tor: unspecified Core Tor/Tor
#24849 Added -1 signatures to consensus merge_ready defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: 0.3.6.x-final Core Tor/Tor
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: 0.3.6.x-final Core Tor/Tor
#25686 Mystery bug causes relays to attempt many many descriptor publishes, with no X-Desc-Gen-Reason header needs_information defect Medium Tor: unspecified Core Tor/Tor
#25913 If our win32 monotonic timers are not monotonic, make them so. assigned defect Medium Tor: unspecified Core Tor/Tor
#25950 Run "accounting_run_housekeeping" with a periodic event. assigned defect Medium Tor: unspecified Core Tor/Tor
#25987 Allow controller to receive log messages from outside main thread assigned defect Medium Tor: unspecified Core Tor/Tor
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned defect Medium Tor: unspecified Core Tor/Tor
#26395 tor_bug_occurred_(): Bug: ../src/or/consdiffmgr.c:261: cdm_diff_ht_check_and_note_pending: Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed. accepted defect Medium Tor: unspecified Core Tor/Tor
#26470 WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n" WARN: connection_mark_unattached_ap_(): Bug: stream (marked at src/or/connection_edge.c:2551) sending two socks replies? (on Tor 0.3.3.5-rc 81d71f0d41adf0d8) merge_ready defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26743 Further refactoring follow-on tasks: split files that don't fit well within their directory assigned defect Medium Tor: unspecified Core Tor/Tor
#26896 Duplicate call to connection_mark_for_close merge_ready defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26913 DataDirectoryGroupReadable enabled does not have effect merge_ready defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26933 Minor memleak in HSv3 configuration needs_information defect Medium Tor: unspecified Core Tor/Tor
#26941 Privcount blinding and encryption: review dependencies assigned defect Medium Tor: 0.3.6.x-final Core Tor/Tor
#27073 conditionvar_timeout intermittently fails on maint-0.3.3 merge_ready defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27241 Extract information from more kinds of wedged directory connections. needs_information enhancement Medium Tor: 0.3.6.x-final Core Tor/Tor
#27245 Don't store (micro)descriptor text on the heap so much. accepted defect Medium Tor: unspecified Core Tor/Tor
#27686 OOM code should count space used in a circuit's half-closed list merge_ready defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#27708 Heap use-after-free on git master dbb0abc9f1a174efdb65d581f5dbe46dbad2ebb5 merge_ready defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#6 Confused server clocks can screw up timing assigned defect Low Mixminion-Server
#30 multiple client processes colliding assigned defect Low Mixminion-Other
#39 Certificate rotation sometimes does not happen. assigned defect Low Mixminion-Server
#54 log format lacks year assigned defect Low 0.0.8 final Mixminion-Other
#139 decoded binary file differs from the file sent. assigned defect Low Mixminion-Other
#206 Failure to create user data on single-users win32 systems assigned defect Low Mixminion-Client
#214 IOError when flushing log assigned defect Low Mixminion-Server
#449 dns failures prevent legitimate options being set accepted defect Low Tor: unspecified Core Tor/Tor
1 2
Note: See TracQuery for help on using queries.