Custom Query (374 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 374)

1 2 3 4
Ticket Summary Status Owner Type Priority Milestone
#15229 Design document for chutney2 new defect Medium
#15231 Prototype implementation for the main ideas for chutney2 new enhancement Medium
#15232 Specify a potential TLS-replacing protocol for future use in Tor. new defect Medium Tor: unspecified
#15237 Improve tooling and usability for approved-routers file and its allies new defect Medium Tor: unspecified
#16546 Should we move anonbib to the Tor website? assigned cypherpunks defect Medium WebsiteV3
#16562 Harmonize curve25519-signature format with what others are doing new defect Medium Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#16803 Unit tests for sandbox failures new enhancement Medium Tor: unspecified
#16806 Chutney/integration tests for DNS server/client functionality new defect Medium
#16807 Framework for Clients And Relays that Do Bad Things new enhancement Medium
#16808 High coverage on connection_edge, addressmap new enhancement Medium Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#17127 Fix and re-enable --master-key option, possibly --out (for keys) and possibly --nopass for non-interactive key generation new enhancement Medium Tor: unspecified
#17134 Add a way to say "Use this option only if supported" in torrc new enhancement Medium Tor: unspecified
#17146 "Sandbox 1" in chutney makes coverage underreported new defect Medium Tor: unspecified
#17202 Shut down SVN and decomission the host (gayi) assigned defect Medium
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#17272 Finalize a proposal for postquantum circuit-extension assigned yawning task Medium Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#17276 Make at least one authority script integrated with Chutney new defect Medium
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#17290 Include network tests with ill-behaved clients and servers new enhancement Medium
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced assigned enhancement Medium Tor: unspecified
#17467 Add proposals to spec.torproject.org? assigned tpa enhancement Medium
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: unspecified
#17807 Use OpenSSL 1.1.0 ASYNC engine support new enhancement Medium Tor: unspecified
#17927 Use SRWLock for non-recursive locks on vista and later new enhancement Medium Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18638 Write a proposal for PK handshake that uses more client resources than server. assigned yawning task Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: unspecified
#18665 Make test_util_time pieces pass on windows new defect Medium Tor: unspecified
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size assigned enhancement Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#19000 Please let me set Owner without changing Status new qbi defect Medium
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#19070 Batch-modify notifications don't seem very useful new qbi defect Medium
#19174 libscrypt check fails when libscrypt requires libm needs_revision defect Medium Tor: unspecified
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19288 Document circuitpathbias in detail assigned defect Medium Tor: unspecified
#19293 Document connection-attachment and addressmapping in detail assigned defect Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#19318 controller: expose cache details. assigned yawning enhancement Medium Tor: unspecified
#19319 controller: GETINFO stats to expose OOM details assigned yawning enhancement Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" assigned yawning enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19325 controller: getinfo to get status of cpuworker queues assigned yawning enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. needs_review enhancement Medium Tor: 0.4.3.x-final
#19329 Integrate callgraph complexity measures into our regular process assigned defect Medium Tor: unspecified
#19333 Make node-selection functions testable and tested new defect Medium Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: unspecified
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#20218 Fix and refactor and redocument routerstatus_has_changed needs_revision defect Medium Tor: 0.4.3.x-final
#20356 prop220: unit tests for all new/changed circuit extension functions assigned defect Medium Tor: unspecified
#20655 Run the chutney "mixed" network tests in multiple ways new enhancement Medium Tor: unspecified
#20719 prop271 -- make parameters configurable assigned enhancement Medium Tor: unspecified
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified
#20919 Extract prop271 state-parsing code into a generic thing new defect Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events assigned enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21119 Deprecate and replace type_getarray_val() assigned enhancement Medium
#21205 Instrument clients to measure directory usage assigned project Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned defect Medium Tor: unspecified
#21207 Test scenarios for clients that are idle for large periods of time new task Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned enhancement Medium Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
1 2 3 4
Note: See TracQuery for help on using queries.