Custom Query (622 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 622)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#15419 chutney: on failure, explain which connection failed new enhancement Medium
#16949 Make Chutney Easier to Use & More Functional, Write Guide new task Medium
#16954 Refactor chutney networks: increase configurability, reduce code duplication new enhancement Medium
#17011 chutney doesn't verify using IPv6 addresses new defect High
#17013 Does chutney need to test various rare IPv6/IPv4 combinations? new enhancement Medium
#17014 chutney: automate discovery and use of different tor versions new enhancement Medium
#17015 chutney should try harder to find a stable/different version of tor new enhancement Medium
#17066 Avoid assuming relays have a single IPv4/IPv6 address new task Medium Tor: unspecified
#17629 Create chutney templates that match public tor network timings new enhancement Medium
#17712 Add chutney support for FallbackDirs new enhancement Medium
#17740 Unit Tests for Recent Consensuses new enhancement Medium Tor: unspecified
#17953 Fallback to resolving localhost when interface searches fail new defect Medium Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#18932 Re-launching chutney with cached descriptors sometimes fails new defect Medium
#19019 When chutney fails because of ports, tell the user new defect Medium
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#13815 Attempt to port tor to Google's BoringSSL new enhancement Medium Tor: unspecified
#13817 Untange kludgey library detection, particularly for SSL forks new defect High Tor: unspecified
#13912 Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE registers) new defect Medium Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#13977 Evaluate alternate SSL/TLS libraries: CyaSSL, GnuTLS, ... new task Medium Tor: unspecified
#13978 Get tor working with ns-3 new task Medium Tor: very long term
#14034 Make TestingDirAuthVoteGuard/Exit/HSDir and AssumeReachable less essential in test networks new defect Medium Tor: unspecified
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#15938 HS descriptor cache leaks timing information to local users new defect Medium Tor: unspecified
#15940 Make a standard transition plan for killing off a client version assigned task High Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever assigned task High Tor: unspecified
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline new defect Low Tor: unspecified
#16458 torspec references UTC, but tor uses unix time (leap second handling) new task Medium Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client new task Medium Tor: unspecified
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms new defect Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17359 __DisablePredictedCircuits causes bootstrap to hang at "Connecting to Tor Network" new defect Low Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#17800 Tor Unit Tests should TT_FORK before initialising global PRNG state new defect Low Tor: unspecified
#17808 Tor doesn't produce a backtrace on gcc x86_64 on macOS needs_information defect Medium Tor: unspecified
#17811 Tor Clients on IPv6 new task High Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl assigned enhancement Medium Tor: unspecified
#17848 Tor ignores tunneled connections when checking existing directory downloads new defect Medium Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#18321 Exclude our own vote from the consensus if we think our own vote is invalid assigned defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#18605 Consider including fallback directory mirrors with multiple IP addresses new enhancement Medium
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19129 Allow Fallback Directories with no DirPort new enhancement Low
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19573 Use fixedresolver.py from dnslib in chutney new enhancement Medium
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19694 Add a leekspin mode to chutney new enhancement Medium
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#19989 Tor fails to bootstrap with an Exit as EntryNode new defect Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20036 Chutney should allow single onion and tor2web modes on any HS / client new enhancement Medium
#20046 Test hidden services with different consensuses new defect Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20061 When unit testing in Tor2web mode, set the config correctly new defect Medium Tor: unspecified
#20067 Chutney should verify IPv6 SOCKSPorts new enhancement Medium
#20068 Chutney tests for IPv6-only bridge clients new defect Medium
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.