Custom Query (91 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#22893 prop224: Make intro point per-service and not per-descriptor new enhancement Very High Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t new enhancement Very High Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler new defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge new defect High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#27548 chutney: HS v3 client authorization network template/configuration new defect High Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket new enhancement Medium
#11727 Support shared onion pool for DNS resolution in separate process new enhancement Medium
#13184 Add an option to whitelist networks new enhancement Medium
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#14954 Chutney: add control socket to torrc templates new enhancement Medium
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#17520 Relax the rend cache failure cleanup timer needs_information enhancement Medium Tor: unspecified
#18098 prop224: Implement tor-genkey tool for offline HS key creation needs_revision haxxpop enhancement Medium Tor: unspecified
#18822 Add fallback dir schedule to chutney common template new enhancement Medium
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#19407 Support FD passing on Unix socket new enhancement Medium
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#20969 Detect relays that don't update their onion keys every 7 days. assigned gk enhancement Medium
#22363 Make our test network public new enhancement Medium Tor: unspecified
#23300 prop224: General client side issues new defect Medium Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion new defect Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose new defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack new defect Medium Tor: unspecified
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays new defect Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after new defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler new defect Medium Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes new defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler new defect Medium Tor: unspecified
#24162 Torsocks tarballs should not be on my people.tpo assigned hiro task Medium
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write new defect Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space new enhancement Medium Tor: unspecified
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25152 Try to call less circuitmux_find_map_entry() needs_information defect Medium Tor: unspecified
#25312 circ: We can pick an active circuit that is marked for close new defect Medium Tor: unspecified
#25500 Reduce client CPU usage when idle new task Medium Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: unspecified
#29427 kist: Poor performance with a small amount of sockets needs_revision dgoulet defect Medium Tor: 0.4.4.x-final
#30291 Optimize our path selection code new enhancement Medium Tor: unspecified
#30440 sendme: Service introduction circuit ignore flow control new defect Medium Tor: unspecified
#30466 hs: Do not allow more than one control cell on a circuit needs_information defect Medium Tor: unspecified
#30553 chutney: Bump the data size transmitted with the verify command new enhancement Medium
#30608 Have a SMTP out only server accepted anarcat enhancement Medium
#30742 sendme: Better logging overall new enhancement Medium Tor: unspecified
#31002 circpadding: Middle node did not accept our padding request assigned mikeperry defect Medium Tor: unspecified
#31004 Bad element "$C" while parsing a node family. new defect Medium Tor: unspecified
#31062 token bucket: Improve library to handle under/overflow and clock jump new defect Medium Tor: unspecified
#31608 circuit_state_publish() never triggers when a new origin circuit is created new defect Medium Tor: unspecified
#31609 Make CIRCUIT_IS_ORIGIN() look at the base magic number new defect Medium Tor: unspecified
#31632 hs-v3: Service doesn't re-upload descriptor on circuit failure needs_revision dgoulet defect Medium Tor: 0.4.4.x-final
#31683 md: Bad family line in cached-microdescs.new new defect Medium Tor: unspecified
#32349 hs-v2: Intro point circuit TIMEOUT failure is not reported assigned dgoulet defect Medium Tor: unspecified
#32388 sched: When OR connection opens, always indicate the channel is ready for cells assigned dgoulet defect Medium Tor: unspecified
#32614 hs-v3: Consider flagging an intro point as bad if rendezvous fails multiple times needs_review neel defect Medium Tor: 0.4.4.x-final
#32910 trace: Add tracepoints and userspace tracer support needs_revision dgoulet enhancement Medium Tor: 0.4.4.x-final
#33361 relay: Warn about the lack of ContactInfo and the consequence merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#33623 sendme: Change default emit cell version from 0 to 1 merge_ready dgoulet defect Medium Tor: 0.4.2.x-final
#33624 Static building tor with openssl does not work needs_revision defect Medium Tor: 0.4.4.x-final
#33763 Consider setting TCP_NOTSENT_LOWAT to 1 byte on our TCP connections new enhancement Medium Tor: unspecified
#33796 socks: Prefer IPv6 by default on SOCKS port broke torsocks assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33873 client: Send back SOCKS extended error F6 in case of bad hostname assigned dgoulet defect Medium Tor: 0.4.4.x-final
#34262 Add ahf as a committer to tor.git new tor-gitadm task Medium
#34400 control: HSFETCH command fails to validate v2 addresses new defect Medium Tor: 0.4.5.x-final
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#21910 Refactor connection_edge_process_relay_cell() assigned neel enhancement Low Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem new enhancement Low Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
#28279 control: Add a key to GETINFO to fetch the circuit onion handshake rephist values needs_review neel enhancement Low Tor: unspecified
#28280 control: Add a key to GETINFO to get the DoS subsystem stats needs_revision enhancement Low Tor: 0.4.4.x-final
Note: See TracQuery for help on using queries.