Custom Query (106 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 106)

1 2
Ticket Summary Status Owner Type Priority Milestone
#7349 Obfsbridges should be able to "disable" their ORPort new project Very High Tor: unspecified
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint reopened mikeperry defect High Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned mikeperry defect High Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned isis task High Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#15272 Think of more research questions that we can answer with statistics new task High Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#23681 prop224: Clients mark intro circs as timed-out within seconds merge_ready dgoulet defect High Tor: 0.2.9.x-final
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3591 We must implement the whole pluggable transports thing new asn project Medium
#7193 Tor's sybil protection doesn't consider IPv6 new enhancement Medium Tor: unspecified
#7320 Write blog post to educate users about pluggable transports new asn task Medium
#7362 Don't kill the managed proxy if a transport failed to launch new defect Medium Tor: unspecified
#7532 Count unique IPs in an anonymous way new asn defect Medium Tor: unspecified
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
#7903 Research ways of adding Extended ORPort support to pyptlib new asn task Medium
#7961 Publish transports that bind on IPv6 addresses needs_information defect Medium Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#8548 Put pyobfsproxy/pyptlib releases in dist new task Medium
#8676 Research an HTTP pluggable transport that actually uses a browser and a web server new asn defect Medium
#8951 Get information about HS from within browser new tbb-team defect Medium
#9022 Create an XMPP pluggable transport accepted feynman task Medium
#9192 Create a git pluggable transport new asn task Medium
#9228 Create an SSH pluggable transport new asn task Medium
#9316 BridgeDB should export statistics needs_revision isis task Medium
#9332 Implement whitelisting of (email_address, gpg_key_id) pairs for encrypted, automated email bridge distribution needs_revision isis task Medium
#10134 Create bananaphone transport for obfsproxy new asn task Medium
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#10314 Think of strategy for deprecating pluggable transports (e.g. obfs2) new task Medium
#10671 Pluggable Transports: Improve method of transferring parameters to client-side transports new asn enhancement Medium
#10782 Improve the spec of UniformDH new asn task Medium
#10968 Authorities should use past consensuses to decide how to vote on relay flags new task Medium Tor: unspecified
#11093 obfsproxy should use C implementation of UniformDH new asn defect Medium
#11354 Make obfsproxy more fork-friendly new asn task Medium
#11355 Provide obfsproxy nightlies in our debian repositories accepted lunar task Medium
#11501 Improve visual identity of Tor's PTs new asn enhancement Medium
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#12836 scramblesuit: 'State' object has no attribute 'closingThreshold' new asn defect Medium
#13040 Get bananaphone merged in obfsproxy new asn task Medium
#13297 compute_weighted_bandwidths() broken for dirauths new defect Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." needs_information defect Medium Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#14389 Improve TBB UI of hidden service client authorization needs_revision tbb-team defect Medium
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#15618 Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending) needs_information dgoulet defect Medium Tor: unspecified
#16386 Chutney generates network with no bandwidth weights needs_information defect Medium
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#19162 Make it even harder to become HSDir accepted arma defect Medium Tor: unspecified
#19179 Refactor functions that handle 'packages' in consensus/votes new defect Medium Tor: unspecified
#19460 Improve consensus handling of clients with skewed clocks new enhancement Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#20332 Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS new defect Medium Tor: unspecified
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: 0.4.0.x-final
#21967 obfs4proxy not killed when unused new defect Medium Tor: unspecified
#21969 We're missing descriptors for some of our primary entry guards new asn defect Medium Tor: unspecified
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once accepted dgoulet defect Medium Tor: unspecified
#23512 Bandwidth stats info leak upon close of circuits with queued cells merge_ready defect Medium Tor: 0.3.4.x-final
#23545 UX improvement: Tor Browser should handle bogus HSv3 addresses new tbb-team defect Medium Tor: unspecified
#24298 Better handling of DoS attacks on onion services new defect Medium Tor: unspecified
#24310 Consider encrypted bookmarks addon for storing onions on the browser new tbb-team enhancement Medium
#24456 Figure out what to do with the guardfraction feature new defect Medium Tor: unspecified
#24712 Client builds and timeouts tons of circs to connect to HS new defect Medium Tor: unspecified
#24973 Tor should be more gentle when launching dozens of circuits at once needs_information defect Medium Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: unspecified
#25609 Investigate Tor client retry behavior on failing onions new defect Medium Tor: unspecified
#25678 Clarify how ed25519 extended private keys are used in rend-spec-v3.txt new defect Medium Tor: unspecified
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: unspecified
#26164 Create HS network in chutney with client-auth enabled new enhancement Medium
#26262 Create unittests for circuit timeout tracking new enhancement Medium Tor: unspecified
#26768 Support onionbalance in HSv3 new defect Medium Tor: unspecified
#26769 We should make HSv3 desc upload less frequent needs_information neel defect Medium Tor: 0.4.0.x-final
#26933 Minor memleak in HSv3 configuration needs_information nickm defect Medium Tor: unspecified
#27299 hsv3: Clarify timing sources around hsv3 code new defect Medium Tor: unspecified
#27841 Close intro circuit after introduction has been completed merge_ready neel defect Medium Tor: 0.3.4.x-final
#27842 Consider end-to-end introduction ACKs new defect Medium Tor: unspecified
#28005 Officially support onions in HTTPS-Everywhere new legind defect Medium
#28142 Merge original WTF-PAD branch needs_review mikeperry enhancement Medium Tor: 0.4.0.x-final
#28631 Release a useful WTF-PAD to the world (master ticket) new defect Medium Tor: unspecified
#28632 Make the original WTF-PAD branch actually useful for us (submaster ticket) new defect Medium Tor: 0.4.0.x-final
#28634 Design a useful padding machine that we can enable new defect Medium Tor: 0.4.0.x-final
#28635 Clean up PADDING_TODO.txt new defect Medium Tor: 0.4.0.x-final
#28636 Address WTF-PAD comments by Nick (2018-11-27 over IRC) new defect Medium Tor: 0.4.0.x-final
#28637 Improve general WTF-PAD code quality and maintainability new defect Medium Tor: unspecified
#28638 Serialize state machines in the torrc and consensus new defect Medium Tor: unspecified
#28777 Split circuitpadding.c code into multiple modules new defect Medium Tor: unspecified
#28778 Rename some circuitpadding structs new defect Medium Tor: unspecified
#28780 circpadding: Add machine flag for not closing circuit if machine is active new defect Medium Tor: 0.4.0.x-final
#28804 Improve quality of prop254 spec new defect Medium Tor: unspecified
#28821 Introduce timer_is_scheduled() method and replace padding_scheduled_at_us new defect Medium Tor: unspecified
#28841 Write tool for onion service health assesment new defect Medium Tor: unspecified
#28878 WTF-PAD: Improve deterministic randomness in tests new defect Medium Tor: unspecified
#28895 "Your guard" log messages are causing confusion new defect Medium Tor: unspecified
#7457 Add client-side log indicator that an obfsbridge works new enhancement Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
1 2
Note: See TracQuery for help on using queries.