Custom Query (704 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 704)

1 2 3 4 5 6 7 8
Ticket Summary Status Owner Type Priority Milestone
#26567 Replace ArgumentCharValue with ValueChar in dir-spec and bandwidth-file-spec new defect Very Low Tor: unspecified
#26639 Additional SSL Library Support and Fixes new task Medium Tor: unspecified
#26664 When an exit tells a client about an IPv6-only hostname, the client should choose another IPv6 exit new defect Medium Tor: unspecified
#26685 Add ed25519 id support for the hard-coded fallback and authority lists new enhancement Medium Tor: unspecified
#26686 Add ed25519 ids to the fallback whitelist new enhancement Medium
#26687 Output ed25519 IDs in the authority and fallback lists new enhancement Medium
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#26797 DirAuths should only read the V3BandwidthsFile once per vote new defect Medium Tor: unspecified
#26798 Write unit tests for reading measured bandwidths with non-NULL routerststuses new enhancement Medium Tor: unspecified
#26803 Add a bwfile test to tor's make test-network-all new enhancement Medium Tor: unspecified
#26804 Create a valid bwfile using a chutney script new enhancement Medium
#26805 Work out why Tor networks with all-zero bandwidths are unstable new defect Medium Tor: unspecified
#26886 prop295: revise proposal and determine feasability new task Medium Tor: unspecified
#26904 Work out if we need to round scanner measured bandwidths to protect individual client usage new task Medium Tor: unspecified
#26905 Work out if we need to round observed relay bandwidths to protect individual client usage new task Medium Tor: unspecified
#26928 Taint untrusted link authentication keys new defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies new defect Medium Tor: unspecified
#26944 Privcount blinding and encryption: Add tests new defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 new defect Medium Tor: unspecified
#26954 Appveyor: Add Rust builds on Windows new enhancement Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible new defect Medium Tor: unspecified
#26970 Privcount: plan the modules and components new task Low Tor: unspecified
#26971 Add rendezvous point unrecognised link specifiers to client introduce cells new defect Medium Tor: unspecified
#27047 Authorities should keep recent consensuses, votes, and bandwidth files new enhancement Medium Tor: unspecified
#27161 Add make check-rustfmt to make check new enhancement Low Tor: unspecified
#27162 Travis: consider running CI on beta, nightly, and tor's lowest supported rust new enhancement Medium Tor: unspecified
#27363 Make the sbws node cap a proportion of the capped bandwidth new defect Medium sbws: 1.2.x-final
#27368 Authorities should reject non-UTF-8 in votes and consensuses new defect Medium Tor: unspecified
#27369 All Tor roles should reject non-UTF-8 in all directory documents new defect Medium Tor: unspecified
#27374 Bridge clients should reject non-UTF-8 in descriptors new defect Medium Tor: unspecified
#27376 Travis: Actually use gcc on OS X new defect Medium Tor: unspecified
#27381 Bad consensus diffs on 0.3.4 and later [with chutney] new defect Medium Tor: unspecified
#27414 Relays should check that their descriptors are UTF-8 before uploading them new enhancement Medium Tor: unspecified
#27415 All Tor instances should attempt to parse directory documents before uploading them new defect Medium Tor: unspecified
#27450 Test "make install" in Travis CI new enhancement Medium Tor: unspecified
#27468 CI: add builds with the latest clang and gcc new enhancement High Tor: unspecified
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines new enhancement Medium Tor: unspecified
#27648 Stop setting the IPv6 preferred flag on nodes new enhancement Medium Tor: unspecified
#27736 Make sure that Tor doesn't build an IPv4 and an IPv6 connection to the same relay new defect Medium Tor: unspecified
#27778 Travis: add link-time optimisation to detect function signature mismatches new enhancement Medium Tor: unspecified
#27790 sbws: design and construct bias curves new enhancement Medium sbws: unspecified
#27791 sbws: compare relays against other similar relays new enhancement Medium sbws: unspecified
#27805 Update CodingStandardsRust.md with allocate_and_copy_string() new defect Medium Tor: unspecified
#27906 PrivCount noise specification new defect Low Tor: unspecified
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27908 PrivCount proof of concept with existing statistics new task Medium Tor: unspecified
#28036 Launch tests inside a single dirauth instance new defect Medium Tor: unspecified
#28037 Document how to fix or disable failing CI new enhancement Medium Tor: unspecified
#28079 Stop returning the empty string when the cstr! macro fails new enhancement Medium Tor: unspecified
#28097 Get the actual Windows version from Kernel32.dll new defect Medium Tor: unspecified
#28190 Hidden service v2 exceeded launch limit with 11 intro points in the last 37 seconds new defect Medium Tor: unspecified
#28204 Make chutney log the verify progress for each circuit new defect Medium
#28206 Add a chutney network where the HS connects via a bridge new defect Medium
#28207 Cleanup duplicate and near-duplicate chutney networks new enhancement Medium
#28220 Create a chutney network with a single authority, and make sure it bootstraps new enhancement Medium Tor: unspecified
#28228 In Chutney's debug mode, dump all tor warning logs to stderr as soon as they appear new enhancement Medium
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#28256 Add tests for UTF-8 encoded torrcs on Windows new defect Medium Tor: unspecified
#28309 Log the rust version when printing other library versions new enhancement Medium Tor: unspecified
#28311 Call expand_filename (e.g. for ~ expansion) on all FILENAME config options new enhancement Medium Tor: unspecified
#28344 Should we log \r\n on Windows? new defect Medium Tor: unspecified
#28345 Tor Browser hang on macOS when opening a new tab new tbb-team defect Medium
#28351 Test clock skewed clients using chutney new enhancement Medium
#28377 Add libnss to the travis apt and macOS packages new defect Medium Tor: unspecified
#28378 Add libsystemd-devel to the travis config, if available new defect Medium Tor: unspecified
#28438 Which macOS build image should we use on Travis? new enhancement Medium Tor: unspecified
#28439 Test static builds using Travis CI new enhancement Medium Tor: unspecified
#28455 Appveyor: add --enable-nss on Windows and macOS new enhancement Medium Tor: unspecified
#28457 Appveyor: make doesn't stop when the first child process fails new defect Medium Tor: unspecified
#28463 Measure exits as non-exits with 50% probability new defect Medium sbws: unspecified
#28509 Limit relay bandwidth self-tests based on RelayBandwidthRate, not BandwidthRate new defect Medium Tor: unspecified
#28510 When relays reset bandwidth tests, the test waits until the next directory document is received new defect Medium Tor: unspecified
#28511 Limit the number of open testing circuits, and the total number of testing circuits new defect Medium Tor: unspecified
#28512 Increase NUM_PARALLEL_TESTING_CIRCS to avoid circuit windows new defect Medium Tor: unspecified
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated new defect Medium Tor: unspecified
#28545 Use an 11 second download in sbws new defect Medium sbws: unspecified
#28597 Document SOCKSPolicy better new defect Medium Tor: unspecified
#28643 New github team for manual and support new hiro task Medium
#28694 When CircuitPadding is implemented in Tor, set it to 0 in sbws new enhancement Medium sbws: 1.1.x-final
#28714 "No circuits are opened" on controllers that DisablePredictedCircuits and build 2-hop circuits new defect Medium Tor: unspecified
#28734 CIRC_BW is only for origin circuits new defect Medium Tor: unspecified
#28742 When a PT listens on IPv4 and IPv6, tor logs [::]:PORT new defect Medium Tor: unspecified
#28985 Does sbws need Tor to report observed bandwidths more often? new defect Medium sbws: unspecified
#28987 Add a log level option to the fallback script new enhancement Medium
#29004 PrivCount proof of concept: implement check counters new enhancement Medium Tor: unspecified
#29005 PrivCount proof of concept: implement consumed bandwidth counters new enhancement Medium Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters new enhancement Low Tor: unspecified
#29007 PrivCount proof of concept: implement debugging for PrivCount new enhancement Low Tor: unspecified
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol new enhancement Low Tor: unspecified
#29009 PrivCount proof of concept: use blinding and Shamir secret sharing new enhancement Medium Tor: unspecified
#29010 PrivCount proof of concept: work out how to do CI for PrivCount using chutney new enhancement Medium Tor: unspecified
#29027 PrivCount proof of concept: put the PrivCount statistics in a stats/ file new enhancement Medium Tor: unspecified
#29053 Use descriptor structs to deterministically create descriptor dumps new enhancement Medium Tor: unspecified
#29113 Add IPv4/IPv6 connections to the heartbeat new enhancement Medium Tor: unspecified
#29115 Make sure state file data types match the struct datatypes new enhancement Medium Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: unspecified
#29130 Work out how to handle multiple reports from the same relay in PrivCount new defect Medium Tor: unspecified
#29131 Split rephist.c into modules for each type of statistic new enhancement Medium Tor: unspecified
#29132 Clean up dirserv_read_measured_bandwidths after #26223 new defect Medium Tor: unspecified
#29133 Refactor dirserv_read_measured_bandwidths new defect Medium Tor: unspecified
1 2 3 4 5 6 7 8
Note: See TracQuery for help on using queries.