Custom Query (642 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 642)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#21043 Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses new defect Medium Tor: unspecified
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit needs_information defect Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#21413 Exits can get the Exit flag without having any ports in their microdescriptor port summary new defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent assigned defect Low Tor: unspecified
#21465 Tor relays fix data directory permissions, but tor clients do not new defect Medium Tor: unspecified
#21474 Fix make test-fuzz-corpora warnings assigned defect Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21494 Fix scan-build warnings about assigning to char** new defect Low Tor: unspecified
#21497 Fix scan-build warnings: memory accesses new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#21509 Fuzz v3 hidden services assigned task High Tor: unspecified
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#21573 Fix tor warnings that chutney is currently ignoring new defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21809 Tor sometimes waits much longer than ShutdownWaitLength new defect Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#21902 evdns adds default DNS servers, but chutney wants a consistent environment new defect Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#22422 Add noise to PaddingStatistics assigned defect High Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22663 Tor keeps using a very slow guard new defect Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned defect Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24181 v3 Onion Services: Put IPv6 and unrecognised link specifiers in onion service EXTEND cells assigned defect Medium Tor: unspecified
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24368 Tune zstd parameters to decrease memory usage during streaming assigned defect Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.