Custom Query (621 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 621)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#20071 Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4 new defect Low Tor: unspecified
#20091 Add a required version setting to chutney (or to chutney networks) new enhancement Medium
#20142 chutney IPv6 HiddenServicePort tests new enhancement Medium
#20153 VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" new defect Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20344 Do chutney releases with semantic versioning new enhancement Medium
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20452 macOS and BSD don't support readlink -f in bwauth setup.sh new defect Medium
#20455 bwauth cron scripts need to be run in the BwAuthority directory new defect Medium
#20466 Replacing python path sometimes breaks bwauths new defect Medium
#20475 Setting bwscanner min_exits to 1 causes no exits to be selected new defect Medium
#20504 When there is only one slice and one scanner, a bwauth runs a second empty slice new defect Medium
#20505 make min_bw configurable in bwauths new defect Medium
#20513 Use public tor network directory authority options in chutney new enhancement Medium
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#20535 A 304 "Not Modified" should update the time to when we next expect a modification new defect Medium Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20796 TorFlow's ScanHandler can divide by zero when there are no unmeasured nodes new defect Medium
#20797 Exclude authorities from bandwidth scanning new defect Medium
#20883 Ignore relays without contact info when emailing potential fallback operators new defect Very Low
#20934 Use standard python multiset implementation in fallback script new enhancement Medium
#20939 Add average for each flag and uptime to the fallback summary new enhancement Medium
#21000 Make chutney select different options depending on the tor version new enhancement Medium
#21003 extend_info_describe should list IPv6 address (if present) needs_revision defect Medium Tor: unspecified
#21043 Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses new defect Medium Tor: unspecified
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit needs_information defect Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#21413 Exits can get the Exit flag without having any ports in their microdescriptor port summary new defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent assigned defect Low Tor: unspecified
#21463 Chutney creates keys directory for clients new defect Very Low
#21465 Tor relays fix data directory permissions, but tor clients do not new defect Medium Tor: unspecified
#21466 Get chutney's scripts working with standard shell script checking options new enhancement Medium
#21474 Fix make test-fuzz-corpora warnings assigned defect Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21494 Fix scan-build warnings about assigning to char** new defect Low Tor: unspecified
#21497 Fix scan-build warnings: memory accesses new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#21509 Fuzz v3 hidden services assigned task High Tor: unspecified
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#21543 Make chutney use a different base port new enhancement Medium
#21544 Make chutney use sockets rather than ports new enhancement Medium
#21573 Fix tor warnings that chutney is currently ignoring new defect Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21809 Tor sometimes waits much longer than ShutdownWaitLength new defect Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#21902 evdns adds default DNS servers, but chutney wants a consistent environment new defect Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21990 Use a sensible default set of bandwidth servers new enhancement Medium
#21991 Allow bandwidth scanners to use non-Exits to access onion addresses new enhancement Medium
#21995 Set PreferIPv6 on Bandwidth Scanner SOCKSPorts new enhancement Medium
#22031 Write a bandwidth server file creator and file checker new enhancement Medium
#22133 When CHUTNEY_DEBUG is set, make tor log a debug log new enhancement Medium
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22323 Catch and handle socket errors in chutney new defect Low
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22360 chutney's --quiet mode could be quieter new enhancement Medium
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22375 Can tor-prompt optionally wait for tor to start on a port, rather than failing straight away? new enhancement Medium
#22376 Make the chutney README less scary new defect Medium
#22397 Add a (single) onion service for the new tor blog new enhancement Medium
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#22422 Add noise to PaddingStatistics assigned defect High Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22600 Make chutney work with large numbers of hidden services new defect Medium
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22663 Tor keeps using a very slow guard new defect Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned defect Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#22744 Remove the smaller bandwidth authority files new defect Medium
#22748 Show which bandwidth authority files are used for which percentiles new enhancement Medium
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22815 Chutney tests for IPv6 only bridges new enhancement Medium
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22878 Trunnel needs a debug mode assigned defect Medium
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.