Custom Query (93 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#7349 Obfsbridges should be able to "disable" their ORPort assigned isis project Very High Tor: unspecified
#20742 prop224: Implement stealth client authorization assigned asn enhancement Very High Tor: unspecified
#10969 Set of guard nodes can act as a linkability fingerprint reopened mikeperry defect High Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt assigned mikeperry defect High Tor: unspecified
#12600 Save retrieved bridge information in our state file assigned isis task High Tor: 0.3.2.x-final
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#15272 Think of more research questions that we can answer with statistics new task High Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#21969 We're missing descriptors for some of our primary entry guards assigned asn defect High Tor: 0.3.1.x-final
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3591 We must implement the whole pluggable transports thing new asn project Medium
#6236 Remove duplicate code between parse_{c,s}method_line new task Medium Tor: unspecified
#6349 Make OONI SSL fingerprint bisecting plugin new hellais defect Medium
#6434 Add pluggable transports support to Vidalia new chiiph defect Medium
#6435 Add client-side pluggable transports support to Vidalia new chiiph defect Medium
#6460 Devise metrics to measure the safety of the Tor network new task Medium
#6466 Analyze entropy graphs new task Medium
#6729 Comments on bridge-side transport configuration of Vidalia new chiiph defect Medium
#7193 Tor's sybil protection doesn't consider IPv6 new enhancement Medium Tor: unspecified
#7318 Bridge-side Vidalia: Add UI indicator about which pluggable transports are active new chiiph task Medium
#7320 Write blog post to educate users about pluggable transports new asn task Medium
#7362 Don't kill the managed proxy if a transport failed to launch new defect Medium Tor: unspecified
#7451 Vidalia should be able to turn on obfsproxy debug logging new chiiph enhancement Medium
#7532 Count unique IPs in an anonymous way new asn defect Medium Tor: unspecified
#7883 Consider and potentially implement the integration of pyptlib in flashproxy needs_review asn task Medium
#7899 We forget to set tls_error sometimes new defect Medium Tor: unspecified
#7903 Research ways of adding Extended ORPort support to pyptlib new asn task Medium
#7961 Publish transports that bind on IPv6 addresses new defect Medium Tor: unspecified
#7962 Which address should a multi-ORPort Tor put in its "transport" extra-info line? new defect Medium Tor: unspecified
#8548 Put pyobfsproxy/pyptlib releases in dist new task Medium
#8676 Research an HTTP pluggable transport that actually uses a browser and a web server new asn defect Medium
#8951 Get information about HS from within browser new tbb-team defect Medium
#9022 Create an XMPP pluggable transport accepted feynman task Medium
#9192 Create a git pluggable transport new asn task Medium
#9228 Create an SSH pluggable transport new asn task Medium
#9316 BridgeDB should export statistics needs_revision isis task Medium
#9332 Implement whitelisting of (email_address, gpg_key_id) pairs for encrypted, automated email bridge distribution needs_revision isis task Medium
#10134 Create bananaphone transport for obfsproxy new asn task Medium
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges assigned joelanders enhancement Medium Tor: unspecified
#10314 Think of strategy for deprecating pluggable transports (e.g. obfs2) new task Medium
#10538 Think of PTTBB's pluggable transport interface new tbb-team task Medium
#10671 Pluggable Transports: Improve method of transferring parameters to client-side transports new asn enhancement Medium
#10782 Improve the spec of UniformDH new asn task Medium
#10968 Authorities should use past consensuses to decide how to vote on relay flags new task Medium Tor: unspecified
#11093 obfsproxy should use C implementation of UniformDH new asn defect Medium
#11354 Make obfsproxy more fork-friendly new asn task Medium
#11355 Provide obfsproxy nightlies in our debian repositories accepted lunar task Medium
#11501 Improve visual identity of Tor's PTs new asn enhancement Medium
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#12201 Don't weight by bandwidth when selecting among bridges needs_information defect Medium Tor: unspecified
#12836 scramblesuit: 'State' object has no attribute 'closingThreshold' new asn defect Medium
#13040 Get bananaphone merged in obfsproxy new asn task Medium
#13297 compute_weighted_bandwidths() broken for dirauths new defect Medium Tor: unspecified
#13665 Update the obfsbridge setup instructions on the website assigned cypherpunks task Medium
#13837 Mitigate guard discovery by pinning middle node assigned mikeperry defect Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." new defect Medium Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#14389 Improve TBB UI of hidden service client authorization needs_revision tbb-team defect Medium
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#15618 Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending) needs_information dgoulet defect Medium Tor: unspecified
#16386 Chutney generates network with no bandwidth weights needs_information defect Medium
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: 0.3.3.x-final
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) new defect Medium Tor: unspecified
#19162 Make it even harder to become HSDir accepted arma defect Medium Tor: unspecified
#19179 Refactor functions that handle 'packages' in consensus/votes new defect Medium Tor: unspecified
#19460 Improve consensus handling of clients with skewed clocks new enhancement Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#20332 Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS new defect Medium Tor: unspecified
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: 0.3.3.x-final
#21693 prop224: HS descriptors do wasteful double-base64 encoding assigned asn task Medium Tor: 0.3.3.x-final
#21967 obfs4proxy not killed when unused new defect Medium Tor: 0.3.4.x-final
#22958 Update website FAQ about padding defenses new defect Medium
#23076 Should HSes use Stable nodes for services on long lived ports? new defect Medium Tor: unspecified
#23094 prop224: Optimize hsdir_index calculation new defect Medium Tor: unspecified
#23107 prop224: Optimize hs_circ_service_get_intro_circ() digest calculation new defect Medium Tor: unspecified
#23108 prop224: Don't rotate all service descriptors at once new defect Medium Tor: 0.3.3.x-final
#23159 Bug: Non-fatal assertion ei failed in launch_intro_point_circuits at src/or/hs_service.c:1784 needs_information dgoulet defect Medium Tor: 0.3.2.x-final
#23170 Include ed25519 relay id keys in the consensus accepted nickm task Medium Tor: 0.3.3.x-final
#23420 prop224: Pad RENDEZVOUS1 cell to match legacy cell length needs_revision dgoulet defect Medium Tor: 0.3.2.x-final
#23459 prop224: Specialize interface of hs_circuitmap_get_rend_circ_client_side() new defect Medium Tor: unspecified
#23512 Bandwidth stats watermark can be induced using OOM killer new defect Medium Tor: 0.3.3.x-final
#23543 prop224: Disconnects on long-lasting HS connections (possibly because of mds) needs_information asn defect Medium Tor: 0.3.3.x-final
#23545 UX improvement: Tor Browser should handle bogus HSv3 addresses new tbb-team defect Medium Tor: 0.3.3.x-final
#7457 Add client-side log indicator that an obfsbridge works new enhancement Low Tor: unspecified
#8727 ServerTransportListenAddr validation should validate that transport-name is well-formed new defect Low Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision karsten enhancement Low Tor: unspecified
#10957 Be more aggressive about enabling Extended ORPort new task Low Tor: unspecified
#13494 Regression test about Hidden Service time synchronization new enhancement Low Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
#15557 Improve relaunch logic for failed rendezvous circuits new defect Low Tor: unspecified
#22495 Partial write in key-pinning-journal results in corrupted line new defect Low Tor: unspecified
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() assigned isis defect Very Low Tor: unspecified
Note: See TracQuery for help on using queries.