Custom Query (379 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 379)

1 2 3 4
Ticket Summary Status Owner Type Priority Milestone
#16810 Unit tests on circuit/relay functions new defect High Tor: unspecified
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions new defect Medium Tor: unspecified
#17127 Fix and re-enable --master-key option, possibly --out (for keys) and possibly --nopass for non-interactive key generation new enhancement Medium Tor: unspecified
#17134 Add a way to say "Use this option only if supported" in torrc new enhancement Medium Tor: unspecified
#17146 "Sandbox 1" in chutney makes coverage underreported new defect Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages new task High Tor: unspecified
#17276 Make at least one authority script integrated with Chutney new defect Medium
#17279 Implement large/split create cells (proposal 249) new defect High Tor: unspecified
#17286 Implement a circuit-extension algorithm that can resist quantum computers new defect Medium Tor: unspecified
#17288 High-priority areas of Tor have test coverage > 80% new defect Medium Tor: unspecified
#17290 Include network tests with ill-behaved clients and servers new enhancement Medium
#17291 Module isolation in-use in Tor new defect Medium Tor: unspecified
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: unspecified
#17807 Use OpenSSL 1.1.0 ASYNC engine support new enhancement Medium Tor: unspecified
#17927 Use SRWLock for non-recursive locks on vista and later new enhancement Medium Tor: unspecified
#18562 Do we need to chown AF_UNIX sockets? new defect Medium Tor: unspecified
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
#18665 Make test_util_time pieces pass on windows new defect Medium Tor: unspecified
#18888 we should log an unmistakeable warning when --disable-asserts-in-tests is enabled new defect Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#18897 Narrow scan-build checkers to those that have an acceptably low false positive rate. new enhancement Medium Tor: unspecified
#19000 Please let me set Owner without changing Status new qbi defect Medium
#19011 Use of maxunmeasuredbw and bwweightscale is broken in consensus new defect Medium Tor: unspecified
#19070 Batch-modify notifications don't seem very useful new qbi defect Medium
#19286 Document circuit abstraction, completely new defect Medium Tor: unspecified
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19308 Group C files into module-groups for module callgraph purposes new enhancement Medium Tor: unspecified
#19309 Make target to count and list module callgraph violations new enhancement Medium Tor: unspecified
#19310 Make code-movement functionality of module tool easier to preview new enhancement Medium Tor: unspecified
#19311 Create error vs warning distinction for module callgraph tool. new enhancement Medium Tor: unspecified
#19320 controller: expose and adjust timer values new enhancement Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19324 controller: events for hidden service intro point changes, descriptor changes, uploads, etc new enhancement Medium Tor: unspecified
#19326 Examine fine-grained connection detail; expose via control API new enhancement Medium Tor: unspecified
#19333 Make node-selection functions testable and tested new defect Medium Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#19379 Consider adding even more compiler warnings, even when they require code changes. new enhancement Medium Tor: unspecified
#19380 Hand-audit compiler warning results which we wouldn't want to have on-by-default. new defect Medium Tor: unspecified
#19431 ratelimit message is incorrect. new defect Low Tor: unspecified
#19980 Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) new enhancement Medium Tor: unspecified
#19983 Is openssl 1.1.0's "secure heap" feature useful for us? new enhancement Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#20353 evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails new defect Very Low Tor: unspecified
#20655 Run the chutney "mixed" network tests in multiple ways new enhancement Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20919 Extract prop271 state-parsing code into a generic thing new defect Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21207 Test scenarios for clients that are idle for large periods of time new task Medium Tor: unspecified
#21338 Have client ciphers match Chrome instead of Firefox? new defect Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#21735 Add support for unsigned time_t, to support QNX new enhancement Low Tor: unspecified
#21758 Improve compression estimators for directory spooling new enhancement Low Tor: unspecified
#22135 chutney should use python's loggging module new defect Medium
#22340 META: allow exits to restrict on something more sophisticated than IPs new defect Medium Tor: very long term
#22380 Make windows log_from_handle() handle partial lines new defect Medium Tor: unspecified
#22382 Fix fd leak-on-close from tor-fw-helper pipe new defect Very Low Tor: unspecified
#22408 Refactor functions over 300 lines long. new defect Medium Tor: unspecified
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t new defect Medium Tor: unspecified
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() new defect Low Tor: unspecified
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#22898 Help get privcount standardized and merged new task Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#23438 Use better status codes for HTTP CONNECT proxy errors new defect Medium Tor: unspecified
#24020 Can authorities use multihop circuits rather than direct connections to detect running routers? new defect Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#24586 Audit all state for stuff we need to reset on exit to make tor restartable. new enhancement Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25324 Create a tor-releases.git repository. new defect Medium Tor: unspecified
#25507 Write a guide for groups planning to submit big patches to Tor. new task Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25650 Handle incoming create2v / created2v cells (wide create cells) new enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#25653 prop249: advertise support correctly in protover subsystem; only use when protover support advertised new enhancement Medium Tor: unspecified
#25655 Integration testing of prop249 new enhancement Medium Tor: unspecified
#25656 Fuzzing code for prop249 (wide creates) new enhancement Medium Tor: unspecified
1 2 3 4
Note: See TracQuery for help on using queries.