Custom Query (642 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 642)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19694 Add a leekspin mode to chutney new enhancement Medium
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#19989 Tor fails to bootstrap with an Exit as EntryNode new defect Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20036 Chutney should allow single onion and tor2web modes on any HS / client new enhancement Medium
#20046 Test hidden services with different consensuses new defect Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20061 When unit testing in Tor2web mode, set the config correctly new defect Medium Tor: unspecified
#20067 Chutney should verify IPv6 SOCKSPorts new enhancement Medium
#20068 Chutney tests for IPv6-only bridge clients new defect Medium
#20071 Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4 new defect Low Tor: unspecified
#20091 Add a required version setting to chutney (or to chutney networks) new enhancement Medium
#20142 chutney IPv6 HiddenServicePort tests new enhancement Medium
#20150 Tor Browser's Update window initially shows "NaN/sec" new tbb-team defect Medium
#20153 VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" new defect Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20344 Do chutney releases with semantic versioning new enhancement Medium
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20403 Make it easier for relay operators to find their observed bandwidth new tom enhancement Medium
#20452 macOS and BSD don't support readlink -f in bwauth setup.sh new defect Medium
#20455 bwauth cron scripts need to be run in the BwAuthority directory new defect Medium
#20466 Replacing python path sometimes breaks bwauths new defect Medium
#20475 Setting bwscanner min_exits to 1 causes no exits to be selected new defect Medium
#20504 When there is only one slice and one scanner, a bwauth runs a second empty slice new defect Medium
#20505 make min_bw configurable in bwauths new defect Medium
#20513 Use public tor network directory authority options in chutney new enhancement Medium
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#20535 A 304 "Not Modified" should update the time to when we next expect a modification new defect Medium Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20619 bwauths don't handle NEWCONSENSUS event correctly needs_review tom defect Medium
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20796 TorFlow's ScanHandler can divide by zero when there are no unmeasured nodes new defect Medium
#20797 Exclude authorities from bandwidth scanning new defect Medium
#20883 Ignore relays without contact info when emailing potential fallback operators new defect Very Low
#20934 Use standard python multiset implementation in fallback script new enhancement Medium
#20939 Add average for each flag and uptime to the fallback summary new enhancement Medium
#21000 Make chutney select different options depending on the tor version new enhancement Medium
#21043 Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses new defect Medium Tor: unspecified
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit needs_information defect Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#21413 Exits can get the Exit flag without having any ports in their microdescriptor port summary new defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent assigned defect Low Tor: unspecified
#21463 Chutney creates keys directory for clients new defect Very Low
#21465 Tor relays fix data directory permissions, but tor clients do not new defect Medium Tor: unspecified
#21466 Get chutney's scripts working with standard shell script checking options new enhancement Medium
#21474 Fix make test-fuzz-corpora warnings assigned defect Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21494 Fix scan-build warnings about assigning to char** new defect Low Tor: unspecified
#21497 Fix scan-build warnings: memory accesses new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#21509 Fuzz v3 hidden services assigned task High Tor: unspecified
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#21543 Make chutney use a different base port new enhancement Medium
#21544 Make chutney use sockets rather than ports new enhancement Medium
#21573 Fix tor warnings that chutney is currently ignoring new defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#21701 Make it clearer that graphs showing bridge users by country and by country and transport are not the same new metrics-team enhancement Medium
#21780 macOS Sierra Finder complains that 'tor' isn't signed new tbb-team defect Medium
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21809 Tor sometimes waits much longer than ShutdownWaitLength new defect Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#21902 evdns adds default DNS servers, but chutney wants a consistent environment new defect Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21990 Use a sensible default set of bandwidth servers new enhancement Medium
#21991 Allow bandwidth scanners to use non-Exits to access onion addresses new enhancement Medium
#21993 Consensus Health: are an authority's measurements higher or lower than others? reopened tom enhancement Low
#21994 Consensus Health: what is the distribution of a bandwidth authority's measurements? new tom enhancement Very Low
#21995 Set PreferIPv6 on Bandwidth Scanner SOCKSPorts new enhancement Medium
#22029 Allow ed25519 keys to be banned in the approved-routers file needs_revision neel enhancement Medium Tor: 0.4.3.x-final
#22031 Write a bandwidth server file creator and file checker new enhancement Medium
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22133 When CHUTNEY_DEBUG is set, make tor log a debug log new enhancement Medium
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22260 Schleuder does not decrypt and re-encrypt attachments needs_information hiro defect Medium
#22323 Catch and handle socket errors in chutney new defect Low
#22330 Tor Browser crash in socket thread on macOS new tbb-team defect Medium
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22360 chutney's --quiet mode could be quieter new enhancement Medium
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22375 Can tor-prompt optionally wait for tor to start on a port, rather than failing straight away? new enhancement Medium
#22376 Make the chutney README less scary new defect Medium
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.