Custom Query (379 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 379)

1 2 3 4
Ticket Summary Status Owner Type Priority Milestone
#20356 prop220: unit tests for all new/changed circuit extension functions assigned defect Medium Tor: unspecified
#20655 Run the chutney "mixed" network tests in multiple ways new enhancement Medium Tor: unspecified
#20719 prop271 -- make parameters configurable assigned enhancement Medium Tor: unspecified
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used assigned task High Tor: unspecified
#20919 Extract prop271 state-parsing code into a generic thing new defect Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events assigned enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21119 Deprecate and replace type_getarray_val() assigned enhancement Medium
#21205 Instrument clients to measure directory usage assigned project Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned defect Medium Tor: unspecified
#21207 Test scenarios for clients that are idle for large periods of time new task Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned enhancement Medium Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#22135 chutney should use python's loggging module new defect Medium
#22233 Reconsider behavior on .z URLs with Accept-Encoding header accepted Hello71 defect Medium Tor: unspecified
#22264 Remove old cached_dir_t code assigned defect Medium Tor: unspecified
#22339 META: Implement some form of jurisdiction/geography/topology-aware routing reopened defect Medium Tor: very long term
#22340 META: allow exits to restrict on something more sophisticated than IPs new defect Medium Tor: very long term
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#22382 Fix fd leak-on-close from tor-fw-helper pipe new defect Very Low Tor: unspecified
#22408 Refactor functions over 300 lines long. new defect Medium Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() new defect Low Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#25507 Write a guide for groups planning to submit big patches to Tor. new task Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells assigned enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. assigned defect Medium Tor: unspecified
#25987 Allow controller to receive log messages from outside main thread assigned defect Medium Tor: unspecified
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned defect Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#26330 We could use an IRC bot to interact with our "/me status:" messages new defect Medium
#26333 Write trac templates for bug reports / other tickets, and link them from somewhere useful new task Medium Tor: unspecified
#26334 Investigate how much our CI performance would improve (if at all) with paid builders new task Medium Tor: unspecified
#26335 Use fewer travis builders for typical commits? new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#26737 File-level documentation for src/core/*/*.[ch] new defect Medium Tor: unspecified
#26738 File-level documentation for src/feature/*/*.[ch] new defect Medium Tor: unspecified
#26743 Further refactoring follow-on tasks: split files that don't fit well within their directory assigned defect Medium Tor: unspecified
#26745 extract resolver functions into a new library new defect Medium Tor: unspecified
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26748 Make core/proto depend only on lib/*, and not used by core/mainloop new defect Medium Tor: unspecified
#26749 Divide router.c into logical pieces new defect Medium Tor: unspecified
#26997 tor_api: Do we want an easier way to set options? new defect Medium Tor: unspecified
#26999 tor_api: Some way to capture stdout/stderr new enhancement Medium Tor: unspecified
#27241 Extract information from more kinds of wedged directory connections. needs_information enhancement Medium Tor: unspecified
#27243 Keep much less directory info in RAM on clients new defect Medium Tor: unspecified
#27245 Don't store (micro)descriptor text on the heap so much. assigned defect Medium Tor: unspecified
#27248 Can we make our node-related structures more efficient? new defect Medium Tor: unspecified
#27419 When building with clang 6, use a more reasonable libFuzzer API new enhancement Medium Tor: unspecified
1 2 3 4
Note: See TracQuery for help on using queries.