Custom Query (5859 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1101 - 1200 of 5859)

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Ticket Summary Status Owner Type Priority Milestone
#24454 sandbox failure on arm64 needs_information defect Medium Tor: unspecified
#24455 messages out of order in the tor log due to stored logs new defect Medium Tor: unspecified
#24456 Figure out what to do with the guardfraction feature new defect Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned defect High Tor: unspecified
#24498 add configurables for eventdns settings new enhancement Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t assigned enhancement Very High Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_information defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24609 consdiff implementation in Rust new defect Medium Tor: unspecified
#24617 Feature flags for new controller-accessible Tor features new enhancement Medium Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows new defect High Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned enhancement Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24737 Recommend a MaxMemInQueues value in the Tor man page new defect Medium Tor: unspecified
#24738 Abort trap: 6 after installation Mac OS 10.13.1 needs_information defect Very High Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24806 LTS branch leaks memory continuously under stress/attack, requires back-port of 0.3.2.8-rc fixes to remain viable new defect Medium Tor: unspecified
#24815 Validate shared random state dates before each voting period assigned asn defect Medium Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24833 DNS not reliably returning AAAA records new enhancement Medium Tor: unspecified
#24839 Add a torrc option and descriptor line to opt-in as a FallbackDir assigned task Medium Tor: unspecified
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? needs_revision defect Medium Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#24850 tor2web option without the corresponding tag in torrc causes tor to fail with confusing console output new defect Medium Tor: unspecified
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24857 Tor uses 100% CPU when accessing the cache directory on Windows needs_revision defect Medium Tor: unspecified
#24864 directory authorities take a while to update relays' Tor versions because they use old descriptors for votes new defect Low Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#24888 tor 0.2.5.16: src/or/rendservice.c build error: comparison between signed and unsigned new defect Low Tor: unspecified
#24897 Tor seems to malfunction on FreeBSD needs_information defect Medium Tor: unspecified
#24899 [feature request] Increase the limit on pending client circuits with the number of onion services new enhancement Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#24937 tor failing to resolve some dns records new defect Medium Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#24955 exit selection biases appear to result when very-long ExcludeExitNodes list is in effect new defect Medium Tor: unspecified
#24966 Silence warnings for circuits created from controller new defect Medium Tor: unspecified
#24973 Tor should be more gentle when launching dozens of circuits at once needs_information defect Medium Tor: unspecified
#24985 Preserve circuit-layer confidentiality against a quantum-capable adversary new project Medium Tor: unspecified
#24986 Implement prop#249 "Large Create Cells" new enhancement Medium Tor: unspecified
#24987 Implement prop#269 "Hybrid Handshakes" (composition module) new enhancement Medium Tor: unspecified
#24988 Implement prop#269 "Hybrid Handshakes" (ntor2 module) new enhancement Medium Tor: unspecified
#24990 Write a proposal for a post-quantum lattice KEX new task Medium Tor: unspecified
#24992 SingleOnion (and Tor2web?) connections may need better expiry, lots left open new defect Medium Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25061 Relays consider it a bootstrapping failure if they can't extend for somebody else's circuit new defect Medium Tor: unspecified
#25066 Rendezvous points should return signed proof of the established rend point new enhancement Medium Tor: unspecified
#25068 Make HSIntro consistent with rend_service_descriptor_t.protocols new defect Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25139 Link protocol negotiation without common version new defect Low Tor: unspecified
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25152 Try to call less circuitmux_find_map_entry() needs_information defect Medium Tor: unspecified
#25153 Specify how PrivCount in Tor statistics are configured and interpreted assigned task Medium Tor: unspecified
#25173 No Control Socket when DisableNetwork and User options are set new defect Medium Tor: unspecified
#25203 document max. value of SigningKeyLifetime new enhancement Medium Tor: unspecified
#25208 Relays can upload a new descriptor every 2 minutes new defect Medium Tor: unspecified
#25224 Create a new consensus method that ignores guardfraction votes new defect Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25263 Fix the hidden service statistics noise (and the privcount noise by extension) assigned task Medium Tor: unspecified
#25269 Set codegen-units to 1 in src/rust/Cargo.toml to eke out every last drop of performance needs_information Backxwash enhancement Medium Tor: unspecified
#25299 recent update to 7.5 on portable version breaks browser new defect Medium Tor: unspecified
#25308 Onion service node pinning by default reopened enhancement Medium Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close assigned defect Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned enhancement Low Tor: unspecified
#25335 Tor relay node CPUWORKER failed error mssage new defect Medium Tor: unspecified
#25347 Tor keeps on trying the same overloaded guard over and over needs_revision asn defect Medium Tor: unspecified
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) assigned defect High Tor: unspecified
#25412 TrackHostExits option in torrc file not working as documented new defect Medium Tor: unspecified
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Note: See TracQuery for help on using queries.