Custom Query (5792 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 5792)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#9228 Create an SSH pluggable transport new task Medium
#9332 Implement whitelisting of (email_address, gpg_key_id) pairs for encrypted, automated email bridge distribution assigned task Low
#9575 Rename "New Identity" assigned defect Medium
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#9789 TorFlow BandwidthAuthority sleep schedule new defect Medium
#9825 -v returns 'unknown' for Obfsproxy.exe from '2.4.17-beta-2-pt3' new defect Low
#9902 need separate Obfsproxy Windows binary new defect Medium
#9957 Tor should consider stderr output of transport proxies new enhancement Very Low Tor: unspecified
#10059 capture tor log messages before control connection is opened assigned enhancement High Tor: unspecified
#10070 Clear recent history assigned enhancement Medium
#10134 Create bananaphone transport for obfsproxy new task Medium
#10434 Segmentation fault when Tor Browser 3.5 has a ton of state. assigned defect Medium
#10476 Reattach non open streams if circuit destroyed new enhancement High Tor: unspecified
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns new defect High Tor: unspecified
#10481 connection_mark_unattached_ap_: checking always true edge_has_sent_end new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#10519 tor uses default IP for dirport instead of the one defined in DirPort new defect Low Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. new defect Medium Tor: unspecified
#10566 tor relay hangs for 20 seconds periodically if domain from Address can not be resolved new defect Medium Tor: unspecified
#10609 aggregate.py should ignore empty scan-data files needs_review defect Medium
#10630 MacOS TBB 3.5 hang (due to popups?) assigned defect Medium
#10671 Pluggable Transports: Improve method of transferring parameters to client-side transports new enhancement Medium
#10747 Support alternate DNS such as Namecoin/OpenNIC/etc new enhancement Medium Tor: unspecified
#10782 Improve the spec of UniformDH new task Medium
#10791 Detect overtuned exit relays new enhancement Medium sbws: unspecified
#10802 Getting bridges only for port 80,443 assigned enhancement High
#10812 CryptReleaseContext missed for windows new defect Low Tor: unspecified
#10817 Write instructions for using valgrind with the debian tor new task Very Low Tor: unspecified
#10831 Captchas are not accessible for blind users assigned enhancement Medium
#10871 Download more microdescriptors with a shorter request new defect Medium Tor: unspecified
#10873 review liballium new task Medium
#10874 TorButton won't "blink" for update if using local Tor assigned defect Medium
#10915 Tool to find unused functions in Tor new defect Medium Tor: unspecified
#10922 tor connected to bwauth produces lots of pathbias_count_use_attempt BUG messages needs_information defect Medium Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#10963 Bypassing proxy settings? assigned defect Medium
#10968 Authorities should use past consensuses to decide how to vote on relay flags new task Medium Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint assigned defect High Tor: unspecified
#10982 How about adding a “blocked” state? new task Medium
#11010 add ClientConnectPolicy config option needs_revision enhancement Medium Tor: unspecified
#11050 pycrypto's AES implementation is not constant time new defect Medium
#11059 Nodes' country codes should be "definite" and "possible" new enhancement Medium Tor: unspecified
#11093 obfsproxy should use C implementation of UniformDH new defect Medium
#11101 Bridges should report implementation versions of their pluggable transports assigned enhancement Medium Tor: unspecified
#11119 Write a proposal for client-side key pinning needs_information defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#11134 obfsproxy's SOCKS server should send success response post handshake new defect Medium
#11145 coverage utility should merge multiple output files new defect Very Low Tor: unspecified
#11146 cov-diff utility should handle new source files new defect Very Low Tor: unspecified
#11151 Drop support for 0.2.2 clients new defect Medium Tor: unspecified
#11158 Write a proposal for a "couldn't reach consensus" statement new enhancement Medium Tor: unspecified
#11190 obfsproxy shebang should point to "python2", not "python" new defect Medium
#11197 obfsproxy should provide congestion feedback new defect Medium
#11203 ScrambleSuit CSPRNG for Probability Distributions new enhancement Medium
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. assigned enhancement Medium Tor: unspecified
#11251 Utilize unidirectional wireless broadcast distribution for Tor packages new enhancement Medium
#11325 RFE: Adhere to XDB base directory specification new defect Low Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#11330 Create a Hash Ring For Each Allowed Domain in the Email Distributor assigned enhancement High
#11354 Make obfsproxy more fork-friendly new task Medium
#11397 Keep using too-dirty circuits if no new circuit can be built? new enhancement Medium Tor: unspecified
#11444 Drop support for long-obsolete versions of Windows new defect Medium Tor: unspecified
#11445 Drop support for Windows XP new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#11458 A newer signing cert should innoculate us against older ones? new enhancement Medium Tor: unspecified
#11462 Re-promote "We stalled too much while trying to write" warning if it happens too much new enhancement Medium Tor: unspecified
#11501 Improve visual identity of Tor's PTs new enhancement Medium
#11579 Torsocks should support Java assigned enhancement Medium
#11595 Use smarter data structures for keeping track of circuit IDs per channel new enhancement Low Tor: unspecified
#11625 Tor DNSPORT returns NXDOMAIN for AAAA records? new defect Medium Tor: unspecified
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket assigned enhancement Medium
#11727 Support shared onion pool for DNS resolution in separate process assigned enhancement Medium
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#11751 Add documentation for using TBB with Windows Tor expert bundle assigned task Medium
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#11935 Strange fallback font behavior on Mac and Windows assigned defect Medium
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision defect Medium Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#12030 Create a DatabaseManager for interacting with BridgeDB's database backends assigned enhancement Medium
#12031 Create a Key-Value database system for simple/flat datatypes in BridgeDB assigned enhancement Medium
#12089 BridgedDB can be forced to email arbitrary email addresses assigned defect High
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#12190 Pyptlib does not join args or optargs correctly in ClientTransportPlugin.reportMethodSuccess new defect Low
#12220 Give a better warning on header/library mismatch for openssl new defect Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#12377 get_interface_address6() behaviour iff all interface addresses are internal needs_revision defect Medium Tor: unspecified
#12387 (Some) Pluggable Transport binaries are not stripped assigned defect Medium
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#12399 "Hash of session info was not as expected" should be log_protocol_warn merge_ready defect Medium Tor: 0.4.0.x-final
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned defect High Tor: unspecified
#12436 Mail archive lint new defect Medium
#12500 Add an option to upload hidden service descriptors some time after startup new enhancement Medium Tor: unspecified
#12505 Refactor BridgeDB's hashrings assigned defect High
#12506 Separate BridgeDB databases from distributors assigned enhancement Medium
#12507 Automate BridgeDB documentation builds assigned enhancement Low
#12572 Proposal for __OwningControllerTimeout option new enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned task High Tor: unspecified
#12612 Research ways to re-use existing instances of PTs new enhancement Low
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.