Custom Query (391 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 391)

1 2 3 4
Ticket Summary Status Owner Type Priority Milestone
#31912 Port miscellaneous scripts to Python 3. new task Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#32814 Possibly, move V3AuthUseLegacyKey into dirauth module new defect Medium Tor: unspecified
#9664 Precompute ephemeral keypairs for ntor needs_revision enhancement Medium Tor: unspecified
#21339 Prefer Chacha on servers that lack AES hardware support? new defect Medium Tor: unspecified
#20191 Prevent a recurrence of #20103 new defect Medium Tor: unspecified
#26637 Privcount noise generation implemented and deployed new defect Medium Tor: unspecified
#25669 Privcount: blinding and encryption should be finished up new enhancement Medium Tor: unspecified
#25652 Prop249: set RELAY_EARLY bit correctly on fragmented EXTEND cells; enforce it correctly. new enhancement Medium Tor: unspecified
#21642 Prop275: Eliminate "published" times from microdescriptor consensus new enhancement Medium Tor: unspecified
#21659 Prop275: When 0.2.9 is the oldest remaining supported series, make 'published' times uniform new enhancement Medium Tor: unspecified
#15231 Prototype implementation for the main ideas for chutney2 new enhancement Medium
#26636 Published final draft of proposal 295 [ADL-GCM for relay cryptography] new task Medium Tor: unspecified
#1784 RELAY_TRUNCATE should give cell queues a chance to flush new defect Low Tor: unspecified
#16798 Raise compat_* testing to over 80% new enhancement Medium Tor: unspecified
#16799 Raise utility testing over 95% new enhancement Medium Tor: unspecified
#11462 Re-promote "We stalled too much while trying to write" warning if it happens too much new enhancement Medium Tor: unspecified
#7729 Reading pending TLS bytes can take us over at_most needs_revision defect Medium Tor: unspecified
#22233 Reconsider behavior on .z URLs with Accept-Encoding header accepted Hello71 defect Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#29209 Reduce visibility of more data type internals new task Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used new task High Tor: unspecified
#22408 Refactor functions over 300 lines long. new defect Medium Tor: unspecified
#28424 Refactor hs_service_callback() to no longer need to run once per second? new defect Medium Tor: unspecified
#8111 Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags assigned MrSquanchee enhancement High Tor: unspecified
#8351 Refactor our controller-command/torrc-option processing logic into a data-driven function needs_revision enhancement Medium Tor: unspecified
#32447 Refactor our initialization sequence into a logical order new defect Medium Tor: unspecified
#34357 Reject relays running 0.4.1 new task Medium Tor: unspecified
#32474 Remove CodeStructure.md once I'm sure that it is subsumed by intro.html assigned nickm defect Medium Tor: unspecified
#19378 Remove completely irrelevant warnings from the clang list new defect Low Tor: unspecified
#33398 Remove documentation for `--dump-config non-builtin` and deprecate it assigned nickm task Medium Tor: unspecified
#31180 Remove easy deprecated options in 0.4.4 needs_revision nickm task Medium Tor: unspecified
#22264 Remove old cached_dir_t code new defect Medium Tor: unspecified
#32071 Remove perl scripts from development process? new defect Medium Tor: unspecified
#23423 Remove redundant calls to connection_or_digest_is_known_relay() new defect Low Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() new defect Low Tor: unspecified
#31699 Remove unused configure.ac checks needs_revision defect Medium Tor: 0.4.4.x-final
#28977 Remove workaround from ticket #28973 once OpenSSL 1.1.1a is long-gone new task Medium Tor: unspecified
#32195 Rename net_is_disabled, net_is_completely_disabled, and PERIODIC_EVENT_FLAG_NEED_NET new defect High Tor: unspecified
#9954 Replace broadcast voting protocol with something more robust new defect Medium Tor: unspecified
#34433 Replace clang-format.sh with a faster, better version needs_review nickm enhancement Medium Tor: 0.4.4.x-final
#7479 Replace more linked lists with queue.h implementations new defect Low Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated new task Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#24033 Require all directory documents to be UTF-8 new enhancement Medium Tor: unspecified
#33119 Resolve TROVE-2020-001 needs_review ahf defect High Tor: 0.4.4.x-final
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#31502 Revise authority and fallback code so that they use the same "defaults" logic as other code new defect Medium Tor: unspecified
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals new defect Medium Tor: unspecified
#11121 Revocation process for authority keys new defect Medium Tor: unspecified
#17295 Route-selection and guard-selection logic completely replaced new enhancement Medium Tor: unspecified
#25950 Run "accounting_run_housekeeping" with a periodic event. new defect Medium Tor: unspecified
#31869 Run doctest on all of our python files new task Medium Tor: 0.4.5.x-final
#20655 Run the chutney "mixed" network tests in multiple ways new enhancement Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#25007 See if we can allocate less for HMAC in Tor relays new enhancement Medium Tor: unspecified
#25649 Send a series of extend2/extended2 cells as needed to encode a wide create/created pair (prop249) new enhancement Medium Tor: unspecified
#25648 Send create2v cells as needed; send created2v cells as needed (Prop249) new enhancement Medium Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV new enhancement High Tor: unspecified
#30301 Set bridge running status on a timer? new enhancement Medium Tor: unspecified
#31530 Shall we require STMT_BEGIN/STMT_END everywhere? new enhancement Medium Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#31654 Should --list-torrc-options and GETINFO config/names have more in common? new defect Medium Tor: unspecified
#31647 Should OBSOLETE and ___invisible configuration obtions be available to GETCONF? new defect Medium Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#31560 Should we CI-build with --disable-module-dirauth and -O0? new task Medium Tor: unspecified
#16546 Should we move anonbib to the Tor website? assigned cypherpunks defect Medium WebsiteV3
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#17202 Shut down SVN and decomission the host (gayi) assigned gaba defect Medium
#16764 Simplify Tor's control flow graph to the extent we can. new enhancement High Tor: unspecified
#24650 Simplify bridge code: do we need separate addr and addport_configured? new defect Medium Tor: unspecified
#24649 Simplify bridge code: do we still need mark-unmark-and-sweep logic? new defect Medium Tor: unspecified
#3876 Simplify format_win_commandline_argument() implementation. new sjmurdoch defect Very Low Tor: unspecified
#17274 Some kind of append-only log for consensus documents and votes new ln5 enhancement Medium Tor: unspecified
#15232 Specify a potential TLS-replacing protocol for future use in Tor. new defect Medium Tor: unspecified
#34445 Split assumereachable into self and authority components assigned nickm enhancement Medium Tor: 0.4.5.x-final
#26746 Split connection.c and connection_or.c into mainloop and "or" portions new defect Medium Tor: unspecified
#26493 Split crypto_ops library from a higher level library new defect Medium Tor: unspecified
#1749 Split relay and link crypto across multiple CPU cores assigned chelseakomlo project High Tor: unspecified
#33414 Split router.c, and disable it (mostly) when building without relay support. needs_revision nickm defect Medium Tor: 0.4.4.x-final
#17579 Split tor-gencert into "make cert" and "sign" portions new enhancement Medium Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#15061 Support Ed25519 identities in controller interface new defect Low Tor: unspecified
#33086 Support brotli compression for directory requests accepted rl1987 enhancement Medium Tor: unspecified
#15062 Support identifying nodes by ed25519 keys in state file, other misc files new defect Low Tor: unspecified
#11207 Sybil selection should be trickier to game new enhancement High Tor: unspecified
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. new enhancement High Tor: unspecified
#21207 Test scenarios for clients that are idle for large periods of time new task Medium Tor: unspecified
#18896 Test supposedly constant-time crypto primitives to verify that they are in fact constant-time new enhancement Medium Tor: unspecified
#20050 Testing: add a controller feature to generate paths without building circuits needs_revision defect Medium Tor: unspecified
#34446 TestingTorNetwork should not set AssumeReachable 1 assigned nickm defect Medium Tor: 0.4.5.x-final
#30526 Tests should not load system geoip files. new defect Low Tor: unspecified
#2259 The "new ticket" page should contain good advice on how to write good tickets. new erinn enhancement Medium
#30578 The circuitpadding_circuitsetup_machine test: Re-enable, remove, re-document, or ___? needs_revision asn defect Medium Tor: unspecified
#5902 The whole "choose a doomed exit at random" business is busted new defect Medium Tor: unspecified
#34449 There are too many networks in the chutney networks directory. assigned nickm defect Medium Tor: 0.4.5.x-final
1 2 3 4
Note: See TracQuery for help on using queries.