Custom Query (90 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#22893 prop224: Make intro point per-service and not per-descriptor accepted dgoulet enhancement Very High Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t needs_revision dgoulet enhancement Very High Tor: unspecified
#27750 conn_close_if_marked: Non-fatal assertion !(connection_is_writing(conn)) needs_information dgoulet defect Very High Tor: 0.3.5.x-final
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#21915 Add a new directory authority: Nicholas Merrill new task High Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler accepted dgoulet defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge needs_revision dgoulet defect High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: 0.3.6.x-final
#26812 hs: Adding client authorization through control port on an existing service fails needs_review asn defect High Tor: 0.3.5.x-final
#27548 chutney: HS v3 client authorization netowkr template/configuration new defect High Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#11724 Check recvmmsg() FD passing on Unix socket for TCP socket accepted dgoulet enhancement Medium
#11727 Support shared onion pool for DNS resolution in separate process accepted dgoulet enhancement Medium
#13184 Add an option to whitelist networks accepted dgoulet enhancement Medium
#13739 Optimize the functions called in circuit_launch_by_extend_info() new defect Medium Tor: unspecified
#13792 HS statistics for private tor network to gather info on services, clients and relays new enhancement Medium Tor: unspecified
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#14954 Chutney: add control socket to torrc templates needs_revision dgoulet enhancement Medium
#16120 Detect if the network goes down new enhancement Medium Tor: unspecified
#16966 Better solution for an HS client descriptor cache entry to expire needs_information enhancement Medium Tor: unspecified
#17343 Add torrc option OnionService* alias for HiddenService* new enhancement Medium Tor: unspecified
#17520 Relax the rend cache failure cleanup timer needs_information neel enhancement Medium Tor: 0.3.5.x-final
#17735 Create a public repository of training/outreach material new Kelley task Medium
#18098 prop224: Implement tor-genkey tool for offline HS key creation new enhancement Medium Tor: unspecified
#18822 Add fallback dir schedule to chutney common template new enhancement Medium
#18823 Sanity check on the fallback dir torrc values new enhancement Medium Tor: unspecified
#19407 Support FD passing on Unix socket accepted dgoulet enhancement Medium
#19531 Major cleanup in our baseXX APIs new enhancement Medium Tor: unspecified
#19566 SR: Use BUG() instead of tor_assert() when we can assigned dgoulet enhancement Medium Tor: unspecified
#20969 Detect relays that don't update their onion keys every 7 days. new atagar enhancement Medium
#22363 Make our test network public new enhancement Medium Tor: unspecified
#22781 hs: Unify link specifier API/ABI needs_revision dgoulet enhancement Medium Tor: unspecified
#23300 prop224: General client side issues assigned dgoulet defect Medium Tor: unspecified
#23301 prop224: Refactor connection_ap_handle_onion assigned dgoulet defect Medium Tor: unspecified
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE new enhancement Medium Tor: unspecified
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose assigned dgoulet defect Medium Tor: unspecified
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack assigned dgoulet defect Medium Tor: unspecified
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays new dgoulet defect Medium Tor: unspecified
#23579 sched: Add accessors for channel_pending list accepted dgoulet enhancement Medium Tor: unspecified
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after accepted dgoulet defect Medium Tor: unspecified
#23712 sched: DESTROY cell on a circuit bypasses the scheduler accepted dgoulet defect Medium Tor: unspecified
#23988 connection_dir_client_request_failed() not handling HS purposes new dgoulet defect Medium Tor: unspecified
#23993 sched: Refactor and fix interactions between channel and scheduler assigned dgoulet defect Medium Tor: unspecified
#24162 Torsocks tarballs should not be on my people.tpo assigned hiro task Medium
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24339 (Sandbox) Caught a bad syscall attempt (syscall mprotect) (asan only) new enhancement Medium Tor: unspecified
#24340 (Sandbox) Caught a bad syscall attempt (syscall prctl) (asan only) new enhancement Medium Tor: unspecified
#24448 Channeltls adds the connection write event to main loop when writing a packed cell new defect Medium Tor: unspecified
#24449 sched: KIST scheduler should handle limited or failed connection write assigned dgoulet defect Medium Tor: unspecified
#24594 Protocol warning: Expiring stuck OR connection to fd... new defect Medium Tor: unspecified
#24667 OOM needs to consider the DESTROY queued cells new defect Medium Tor: unspecified
#24668 sched: scheduler_compare_channels() function will never pick a channel with no active circuits. new defect Medium Tor: unspecified
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space assigned dgoulet enhancement Medium Tor: unspecified
#24962 Tor2web denial of service issues new enhancement Medium Tor: unspecified
#24963 dos: Add an option to block tor2web requests at the intro point new enhancement Medium Tor: unspecified
#24964 dos: Add an option to block tor2web requests at the HSDir new defect Medium Tor: unspecified
#25116 hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit merge_ready dgoulet defect Medium Tor: 0.3.2.x-final
#25149 Hook rephist subsystem into the OOM handler new enhancement Medium Tor: unspecified
#25152 Try to call less circuitmux_find_map_entry() needs_information neel defect Medium Tor: 0.3.6.x-final
#25265 Set consensus parameter CircuitPriorityHalflife to enable the EWMA circuit policy new defect Medium
#25312 circ: We can pick an active circuit that is marked for close assigned dgoulet defect Medium Tor: unspecified
#25500 Reduce client CPU usage when idle assigned dgoulet task Medium Tor: unspecified
#25501 Ensure WTF-Pad padding comes from the expected hop assigned mikeperry task Medium Tor: 0.3.6.x-final
#25568 hs: Lookup failure cache when introducing to an intro point assigned dgoulet defect Medium Tor: unspecified
#25839 conn: Move connection bandwidth stuff into its own file new defect Medium Tor: unspecified
#25976 connection_dir_finished_flushing(): Bug: called in unexpected state 3 new defect Medium Tor: unspecified
#25989 module: Improve dirauth module by extracting more code new enhancement Medium Tor: unspecified
#26288 prop289: Implement authenticated SENDME assigned dgoulet enhancement Medium Tor: 0.3.6.x-final
#26414 Assertion onionkey failed in get_onion_key new defect Medium Tor: unspecified
#26839 prop289: Make a relay remember last cell digests before SENDME assigned dgoulet enhancement Medium Tor: 0.3.6.x-final
#26840 prop289: Modify SENDME cell to have a version and payload assigned dgoulet enhancement Medium Tor: 0.3.6.x-final
#26841 prop289: Have tor handle the new SENDME cell format and validate assigned dgoulet enhancement Medium Tor: 0.3.6.x-final
#26842 prop289: Add consensus parameters to control new SENDME behavior assigned dgoulet enhancement Medium Tor: 0.3.6.x-final
#26846 prop289: Leave unused random bytes in relay cell payload assigned dgoulet enhancement Medium Tor: 0.3.6.x-final
#27544 hs-v3: Client authorization fixes and improvements post-merge new task Medium Tor: unspecified
#27550 hs-v3: Don't warn so loudly when tor is unable to decode a descriptor merge_ready defect Medium Tor: 0.3.4.x-final
#27708 Heap use-after-free on git master dbb0abc9f1a174efdb65d581f5dbe46dbad2ebb5 merge_ready nickm defect Medium Tor: 0.3.3.x-final
#27797 node: Make node_supports_v3_rendezvous_point() also check for the onion_pk merge_ready defect Medium Tor: 0.3.4.x-final
#28027 Tor keeps opening circuits while waiting for bridge descriptors new defect Medium Tor: 0.3.5.x-final
#28090 Keepalive padding cell bypasses the cell scheduler new defect Medium Tor: 0.3.6.x-final
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#19565 SR: Use trunnel for the shared random value construction new enhancement Low Tor: unspecified
#21910 Refactor connection_edge_process_relay_cell() new enhancement Low Tor: unspecified
#22220 hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c new enhancement Low Tor: unspecified
#24844 Add HS v3 status to the SIGUSR1 dumpstats() new enhancement Low Tor: unspecified
#25328 cmux: Refactor, test and improve performance of the circuitmux subsystem assigned dgoulet enhancement Low Tor: unspecified
#25674 relay: Improve connect failure cache lifetime with a backoff algorithm new enhancement Low Tor: unspecified
Note: See TracQuery for help on using queries.