Custom Query (615 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 615)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#22962 Clarify the security severity of issues that make denial of service easier assigned task Medium Tor: unspecified
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#22994 Use consistently named constants for relay command specifications new defect Medium Tor: unspecified
#23010 prop224: make sure the protocol handshakes are extensible new enhancement Medium Tor: unspecified
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int assigned defect Medium Tor: unspecified
#23066 Test granularity, distribution, and inner range of crypto_rand* functions new defect Medium Tor: unspecified
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23323 sample_laplace_distribution should produce a valid result on 0.0 assigned defect Medium Tor: unspecified
#23414 rep_hist_format_hs_stats() should add noise, then round assigned defect Medium Tor: unspecified
#23415 sample_laplace_distribution() should take multiple random inputs assigned defect Medium Tor: unspecified
#23416 Document the precision and limits of sample_laplace_distribution() assigned enhancement Medium Tor: unspecified
#23472 Add support for ed25519 authorities and bridges to chutney new enhancement Medium
#23474 Avoid constant initial download delays in download schedules new enhancement Medium Tor: unspecified
#23493 IPv6 v3 Onion Services support new defect Medium Tor: unspecified
#23494 Add chutney tests for hidden and single onion services through bridges new defect Medium
#23498 Teach chutney not to send HSv3 hostnames to 0.3.1 and earlier clients new defect Medium
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#23507 Handle unreachable addresses on v3 single onion services by using a 3 hop path assigned defect Medium Tor: unspecified
#23523 Handle extreme values better in add_laplace_noise() assigned defect Medium Tor: unspecified
#23570 Tor sometimes loses the last few log lines on shutdown on macOS new defect Medium Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23620 Tor lies about "Optimistically trying directory fetches again" new defect Medium Tor: unspecified
#23815 routerstatus download status fields should be explicitly set new defect Medium Tor: unspecified
#23818 Make v3 single onion services retry failed connections with a 3-hop path new defect Medium Tor: 0.4.2.x-final
#23824 Make IPv6-only bridges work new enhancement Medium Tor: unspecified
#23858 Create a local tool that provides detailed statistics for relay operators new enhancement Medium Tor: unspecified
#23863 When our directory guards don't have each others' microdescs, we should try an authority or fallback new enhancement Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order assigned defect Medium Tor: unspecified
#24000 circuit_send_intermediate_onion_skin() and extend_cell_format() should check for IPv6 needs_revision defect Medium Tor: unspecified
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info assigned defect Medium Tor: unspecified
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#24047 Add new stats for v2 and v3 onion service traffic new defect Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24169 When all consensus bandwidths are zero, should Tor still respect bandwidth weights? new enhancement Medium Tor: unspecified
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells assigned defect Medium Tor: unspecified
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned defect Medium Tor: unspecified
#24210 Avoid division by zero and excessive ranks in pytorctl's ScanHandler.rank_to_percent needs_review defect Medium
#24219 Avoid aggregate.py error when no nodes are measured needs_revision defect Medium
#24265 Fuzz all rust functions that are used by authorities to make sure they match C new enhancement Medium Tor: unspecified
#24368 Tune zstd parameters to decrease memory usage during streaming assigned defect Medium Tor: unspecified
#24377 Warn about networkstatus_compute_consensus() breakage in all the functions it calls new defect Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#24483 Make bridges work when the authorities are blocked new defect Medium Tor: unspecified
#24509 circuit_can_use_tap() should only allow TAP for v2 onion services assigned defect Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses needs_revision defect Medium Tor: unspecified
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_information defect Medium Tor: unspecified
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24611 Add a chutney network that does reachability tests new enhancement Medium
#24680 If the fallback list has 200-300 entries, make the tor binary smaller by reducing the size of the fallback list strings new enhancement Medium
#24719 Make sure fallback whitelist entries are unique new enhancement Medium
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24741 Consider redacting usernames in notice level logs new defect Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
#24768 Increase nf_conntimeout_clients to 5 hours needs_information defect Medium
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#24779 Investigate Windows 11(?) AF_UNIX support new enhancement Medium Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#24839 Add a torrc option and descriptor line to opt-in as a FallbackDir assigned task Medium Tor: unspecified
#24851 create a script that generates the authority format from the authorities in the current consensus new enhancement Medium
#24852 update the fallback script to generate the new format new enhancement Medium Tor: unspecified
#24853 backport the new authority and fallback file formats new enhancement Medium Tor: unspecified
#24867 Do relays keep more than one canonical connection when they extend over IPv6? new defect Medium Tor: unspecified
#24876 Directory Authorities should test reachability of relays in their family new defect Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#24940 Make authorities post authority_certificate to other authorities new enhancement Medium Tor: unspecified
#25068 Make HSIntro consistent with rend_service_descriptor_t.protocols new defect Medium Tor: unspecified
#25069 Improve supported protocols unit test by exposing supported protocols in headers new enhancement Medium Tor: unspecified
#25131 Add a security.txt file to torproject.org needs_review enhancement Medium website redesign
#25153 Specify how PrivCount in Tor statistics are configured and interpreted assigned task Medium Tor: unspecified
#25157 Chutney should set the same consensus parameters as the public network new enhancement Medium
#25208 Relays can upload a new descriptor every 2 minutes new defect Medium Tor: unspecified
#25224 Create a new consensus method that ignores guardfraction votes new defect Medium Tor: unspecified
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25263 Fix the hidden service statistics noise (and the privcount noise by extension) assigned task Medium Tor: unspecified
#25381 Add crypto_rand_double_sign() in C and Rust needs_revision enhancement Medium Tor: unspecified
#25506 Tor's make clean and distclean should not depend on the exact automake version new defect Medium Tor: unspecified
#25676 When a client asks for a gzip-encoded consensus, the server sends zlib new defect Low Tor: unspecified
#25922 Add an alias mechanism for controller commands and events, and use it for Onion Services new defect Medium Tor: unspecified
#25963 Clarify the bandwidth part of dir-spec new defect Medium Tor: unspecified
#25964 Remove hs_index_t fetch, and use one of the stores instead new enhancement Medium Tor: unspecified
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#26161 Design and implement a Rust dirauth module new enhancement Medium Tor: unspecified
#26246 Add a chutney network without relay DirPorts new enhancement Medium
#26300 Attempt by … to open a stream on first hop of circuit. Closing. assigned defect Medium Tor: unspecified
#26436 Check uses of CMP_SEMANTIC for IP addresses new defect Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.