Custom Query (647 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 647)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18321 Exclude our own vote from the consensus if we think our own vote is invalid assigned defect Medium Tor: unspecified
#18345 Fix all doxygen "X is not documented" warnings assigned aomamemaki defect Medium Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#19989 Tor fails to bootstrap with an Exit as EntryNode new defect Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20046 Test hidden services with different consensuses new defect Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20061 When unit testing in Tor2web mode, set the config correctly new defect Medium Tor: unspecified
#20071 Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4 new defect Low Tor: unspecified
#20153 VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" new defect Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#20535 A 304 "Not Modified" should update the time to when we next expect a modification new defect Medium Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#21043 Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses new defect Medium Tor: unspecified
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit needs_information defect Medium Tor: unspecified
#21355 Warn when IPv6Exits have no ipv6-policy line in their descriptor new defect Medium Tor: unspecified
#21413 Exits can get the Exit flag without having any ports in their microdescriptor port summary new defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#21454 tor_version_compare and version spec comparison order are inconsistent assigned defect Low Tor: unspecified
#21465 Tor relays fix data directory permissions, but tor clients do not new defect Medium Tor: unspecified
#21474 Fix make test-fuzz-corpora warnings assigned defect Medium Tor: unspecified
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21494 Fix scan-build warnings about assigning to char** new defect Low Tor: unspecified
#21497 Fix scan-build warnings: memory accesses new defect Medium Tor: unspecified
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#21509 Fuzz v3 hidden services assigned task High Tor: unspecified
#21524 private:* contains valid IPv6 addresses new defect Medium Tor: unspecified
#21525 Bootstrapping authorities sometimes expect a vote valid-after time of 0 new defect Medium Tor: unspecified
#21573 Fix tor warnings that chutney is currently ignoring new defect Medium Tor: unspecified
#21600 Hidden service introduction point retries occur at 1 second intervals assigned asn defect Medium Tor: unspecified
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO new defect Medium Tor: unspecified
#21676 Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH new defect Medium Tor: unspecified
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21809 Tor sometimes waits much longer than ShutdownWaitLength new defect Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#21902 evdns adds default DNS servers, but chutney wants a consistent environment new defect Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22214 When authority certificates expire, give a better error message new defect Medium Tor: unspecified
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour new defect Medium Tor: unspecified
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#22422 Add noise to PaddingStatistics assigned defect High Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#22491 DownloadExtraInfo doesn't download bridge extra infos new defect Medium Tor: unspecified
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients new defect Medium Tor: unspecified
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors new defect Very Low Tor: unspecified
#22660 Guard against stack smashing attacks in tor with additional compiler options. needs_revision defect Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#22663 Tor keeps using a very slow guard new defect Medium Tor: unspecified
#22668 Add ed25519 public key to format_node_description and callers new enhancement Medium Tor: unspecified
#22700 Stop relays using the Client*IPv6* options new defect Medium Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned defect Medium Tor: unspecified
#22723 Avoid double-quoting esc_for_log output new defect Medium Tor: unspecified
#22760 Fix extra-info flags on fallbacks new defect Low Tor: unspecified
#22848 Increase default Tor buffer sizes on Windows new defect Medium Tor: unspecified
#22881 Unreachable relays launch multiple testing circuits per second new defect Medium Tor: unspecified
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec new defect Medium Tor: unspecified
#22926 The Tor compression code can call functions that are NULL assigned defect Medium Tor: unspecified
#22936 Apply Windows Tor build patch for VS2015 new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.