Custom Query (379 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 379)

1 2 3 4
Ticket Summary Status Owner Type Priority Milestone
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19327 controller: expose fine-grained circuit detail. needs_review enhancement Medium Tor: 0.4.3.x-final
#19329 Integrate callgraph complexity measures into our regular process assigned defect Medium Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#19859 Expose stream isolation information to controllers needs_revision enhancement Medium Tor: 0.4.3.x-final
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS assigned defect High Tor: unspecified
#20021 Require ntor-onion-key in microdescriptors, descriptors needs_revision defect Medium Tor: unspecified
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified
#20218 Fix and refactor and redocument routerstatus_has_changed needs_review defect Medium Tor: 0.4.3.x-final
#20353 evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails new defect Very Low Tor: unspecified
#20356 prop220: unit tests for all new/changed circuit extension functions assigned defect Medium Tor: unspecified
#20655 Run the chutney "mixed" network tests in multiple ways new enhancement Medium Tor: unspecified
#20719 prop271 -- make parameters configurable assigned enhancement Medium Tor: unspecified
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned project Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned enhancement Medium Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used assigned task High Tor: unspecified
#20919 Extract prop271 state-parsing code into a generic thing new defect Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events assigned enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21119 Deprecate and replace type_getarray_val() assigned enhancement Medium
#21205 Instrument clients to measure directory usage assigned project Medium Tor: unspecified
#21206 Measure client up/down bandwidth for directory requests, split by type assigned defect Medium Tor: unspecified
#21207 Test scenarios for clients that are idle for large periods of time new task Medium Tor: unspecified
#21208 Measure overall client bandwidth usage and circuit counts assigned enhancement Medium Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus assigned enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#22135 chutney should use python's loggging module new defect Medium
#22264 Remove old cached_dir_t code assigned defect Medium Tor: unspecified
#22339 META: Implement some form of jurisdiction/geography/topology-aware routing reopened defect Medium Tor: very long term
#22340 META: allow exits to restrict on something more sophisticated than IPs new defect Medium Tor: very long term
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#22382 Fix fd leak-on-close from tor-fw-helper pipe new defect Very Low Tor: unspecified
#22408 Refactor functions over 300 lines long. new defect Medium Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() new defect Low Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t needs_revision defect Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#25507 Write a guide for groups planning to submit big patches to Tor. new task Medium Tor: unspecified
#25510 Collect feedback on mobile embedding API; resolve issues. assigned project Medium Tor: unspecified
#25607 On restart-in-process, do the right thing with thread-local storage assigned defect Medium Tor: unspecified
#25647 Encoding/decoding logic for wide create(d) and extend(ed) cells assigned enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25651 Handle incoming extend2/extended2 fragmented requests/replies. (prop249) assigned enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25654 Create a testing-only handshake for shaking the bugs out of wide create cells (prop249) assigned enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
#25657 prop249: make sure that we incorporate fragmented extend[ed]2 cells in our OOM code new enhancement Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25788 Can Travis check 32-bit builds? new defect Medium Tor: unspecified
#25899 Only run retry_dns() and check_dns_honesty() on exits assigned enhancement Medium Tor: unspecified
#25913 If our win32 monotonic timers are not monotonic, make them so. needs_information defect Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. assigned defect Medium Tor: unspecified
#25987 Allow controller to receive log messages from outside main thread assigned defect Medium Tor: unspecified
#26034 LibreSSL 2.7.x supports some OpenSSL 1.1 APIs? assigned defect Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26105 Perhaps, make test coverage deterministic _within_ lines new defect Low Tor: unspecified
#26330 We could use an IRC bot to interact with our "/me status:" messages new defect Medium
1 2 3 4
Note: See TracQuery for help on using queries.