Custom Query (665 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 665)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18583 Tor Browser doesn't show the circuit for downloads new tbb-team enhancement Medium
#18605 Consider including fallback directory mirrors with multiple IP addresses new enhancement Medium
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19129 Allow Fallback Directories with no DirPort new enhancement Low
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19573 Use fixedresolver.py from dnslib in chutney new enhancement Medium
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19694 Add a leekspin mode to chutney new enhancement Medium
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20036 Chutney should allow single onion and tor2web modes on any HS / client new enhancement Medium
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20067 Chutney should verify IPv6 SOCKSPorts new enhancement Medium
#20091 Add a required version setting to chutney (or to chutney networks) new enhancement Medium
#20142 chutney IPv6 HiddenServicePort tests new enhancement Medium
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20344 Do chutney releases with semantic versioning new enhancement Medium
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20403 Make it easier for relay operators to find their observed bandwidth new tom enhancement Medium
#20513 Use public tor network directory authority options in chutney new enhancement Medium
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20934 Use standard python multiset implementation in fallback script new enhancement Medium
#20939 Add average for each flag and uptime to the fallback summary new enhancement Medium
#21000 Make chutney select different options depending on the tor version new enhancement Medium
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21466 Get chutney's scripts working with standard shell script checking options new enhancement Medium
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21543 Make chutney use a different base port new enhancement Medium
#21544 Make chutney use sockets rather than ports new enhancement Medium
#21701 Make it clearer that graphs showing bridge users by country and by country and transport are not the same new metrics-team enhancement Medium
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21990 Use a sensible default set of bandwidth servers new enhancement Medium
#21991 Allow bandwidth scanners to use non-Exits to access onion addresses new enhancement Medium
#21993 Consensus Health: are an authority's measurements higher or lower than others? reopened tom enhancement Low
#21994 Consensus Health: what is the distribution of a bandwidth authority's measurements? new tom enhancement Very Low
#21995 Set PreferIPv6 on Bandwidth Scanner SOCKSPorts new enhancement Medium
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#22031 Write a bandwidth server file creator and file checker new enhancement Medium
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22133 When CHUTNEY_DEBUG is set, make tor log a debug log new enhancement Medium
#22360 chutney's --quiet mode could be quieter new enhancement Medium
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22375 Can tor-prompt optionally wait for tor to start on a port, rather than failing straight away? new enhancement Medium
#22397 Add a (single) onion service for the new tor blog new enhancement Medium
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22748 Show which bandwidth authority files are used for which percentiles new enhancement Medium
#22815 Chutney tests for IPv6 only bridges new enhancement Medium
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23472 Add support for ed25519 authorities and bridges to chutney new enhancement Medium
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24344 Add an "UnreachableIPv6" flag to relays in consensus health new tom enhancement Medium
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24611 Add a chutney network that does reachability tests new enhancement Medium
#24680 If the fallback list has 200-300 entries, make the tor binary smaller by reducing the size of the fallback list strings new enhancement Medium
#24719 Make sure fallback whitelist entries are unique new enhancement Medium
#24730 Clarify the bandwidth authority spec to include client and server/service paths new tom enhancement Medium
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24834 Map consensus weight vs bandwidth for each bandwidth authority's votes new metrics-team enhancement Medium
#24837 Allow Relay Searches for Additional Flags new metrics-team enhancement Medium
#24851 create a script that generates the authority format from the authorities in the current consensus new enhancement Medium
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#25131 Add a security.txt file to torproject.org needs_review enhancement Medium website redesign
#25157 Chutney should set the same consensus parameters as the public network new enhancement Medium
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.