Custom Query (650 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (201 - 300 of 650)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22878 Trunnel needs a debug mode assigned defect Medium
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23020 "Prevent this page from creating additional dialogs" doesn't work needs_information tbb-team defect Medium
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23065 Tor Browser UI hang on macOS when closing window new tbb-team defect Medium
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23115 If "Tor is not working in this browser", don't download an update needs_information tbb-team defect Medium
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23367 Onion address counts ignore descriptor upload overlap new metrics-team defect Medium
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23472 Add support for ed25519 authorities and bridges to chutney new enhancement Medium
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23494 Add chutney tests for hidden and single onion services through bridges new defect Medium
#23498 Teach chutney not to send HSv3 hostnames to 0.3.1 and earlier clients new defect Medium
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23798 Tor Browser crash on update new tbb-team defect Medium
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23963 Tor Browser can use a Tor that's running under another user new tbb-team defect Medium
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24045 Measure and map overloaded or over-weighted relays reopened metrics-team defect Medium
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24176 Bandwidth authority complains that SETEVENTS EXTENDED is deprecated needs_review teor defect Medium
#24181 v3 Onion Services: Put IPv6 and unrecognised link specifiers in onion service EXTEND cells assigned defect Medium Tor: unspecified
#24210 Avoid division by zero and excessive ranks in pytorctl's ScanHandler.rank_to_percent needs_review defect Medium
#24216 Make p global in the sigterm handler reopened tom defect Medium
#24219 Avoid aggregate.py error when no nodes are measured needs_revision defect Medium
#24223 bwauths can output percentile ranges greater than 100 new tom defect Medium
#24224 When a bwauthority circuit fails, it is very noisy new tom defect Medium
#24225 Update torflow's TorCtl submodule to latest pytorctl version new tom task Medium
#24242 Resolve warnings on NEWCONSENSUS / NEWDESC events new tom defect Medium
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24344 Add an "UnreachableIPv6" flag to relays in consensus health new tom enhancement Medium
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance new enhancement Medium Tor: unspecified
#24368 Tune zstd parameters to decrease memory usage during streaming assigned defect Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_information defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24611 Add a chutney network that does reachability tests new enhancement Medium
#24674 Bandwidth authorities should use geographically distributed bandwidth servers new tom task Medium
#24680 If the fallback list has 200-300 entries, make the tor binary smaller by reducing the size of the fallback list strings new enhancement Medium
#24719 Make sure fallback whitelist entries are unique new enhancement Medium
#24730 Clarify the bandwidth authority spec to include client and server/service paths new tom enhancement Medium
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#24768 Increase nf_conntimeout_clients to 5 hours needs_information defect Medium
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24797 Add an option that makes Tor use fewer connections needs_revision neel enhancement Medium Tor: unspecified
#24815 Validate shared random state dates before each voting period assigned asn defect Medium Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24834 Map consensus weight vs bandwidth for each bandwidth authority's votes new metrics-team enhancement Medium
#24837 Allow Relay Searches for Additional Flags new metrics-team enhancement Medium
#24839 Add a torrc option and descriptor line to opt-in as a FallbackDir assigned task Medium Tor: unspecified
#24851 create a script that generates the authority format from the authorities in the current consensus new enhancement Medium
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#25068 Make HSIntro consistent with rend_service_descriptor_t.protocols new defect Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.