Custom Query (691 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 691)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#28204 Make chutney log the verify progress for each circuit new defect Medium
#21000 Make chutney select different options depending on the tor version new enhancement Medium
#21543 Make chutney use a different base port new enhancement Medium
#21544 Make chutney use sockets rather than ports new enhancement Medium
#22600 Make chutney work with large numbers of hidden services new defect Medium
#33819 Make clients and bridges send IPv6 extends by default in Tor 0.4.5 new task Medium Tor: 0.4.5.x-final
#24014 Make exits check DNS periodically, and disable exit traffic if it fails new enhancement Medium Tor: unspecified
#33196 Make flake8 test Python 3 syntax new defect Medium Tor: unspecified
#21701 Make it clearer that graphs showing bridge users by country and by country and transport are not the same new metrics-team enhancement Medium
#20403 Make it easier for relay operators to find their observed bandwidth new tom enhancement Medium
#17949 Make loopback address search more accurate needs_revision rl1987 enhancement Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order new defect Medium Tor: unspecified
#24216 Make p global in the sigterm handler reopened tom defect Medium
#22963 Make relay integrity digests harder to guess by padding cells with random bytes new enhancement Medium Tor: unspecified
#29019 Make relays report bandwidth usage more often in test networks needs_revision enhancement Medium Tor: unspecified
#24777 Make relays try IPv6 ORPorts for directory uploads and downloads new defect Low Tor: unspecified
#32162 Make router.c relay-only new enhancement Medium Tor: unspecified
#34065 Make routerset_contains_router() support IPv6 needs_review neel enhancement Medium Tor: 0.4.4.x-final
#18295 Make shared random rounds configurable in test networks new enhancement Low Tor: unspecified
#34232 Make summarize_protover_flags() handle NULL and empty string the same new defect Medium Tor: unspecified
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#24719 Make sure fallback whitelist entries are unique new enhancement Medium
#34137 Make sure inform_testing_reachability() reports the correct ports new defect Medium Tor: unspecified
#29115 Make sure state file data types match the struct datatypes new enhancement Medium Tor: unspecified
#27736 Make sure that Tor doesn't build an IPv4 and an IPv6 connection to the same relay new defect Medium Tor: unspecified
#34249 Make sure the C and Rust protovers can't get out of sync assigned nickm defect Medium Tor: 0.4.4.x-final
#31011 Make the bridge authority reject private PT addresses when DirAllowPrivateAddresses is 0 needs_revision cjb defect Medium Tor: 0.4.4.x-final
#22376 Make the chutney README less scary new defect Medium
#24818 Make the hard-coded authorities into a separate include file with a standard format needs_revision enhancement Medium Tor: unspecified
#30034 Make the pre-push hook check for fixups on both sides of a merge new defect Medium Tor: unspecified
#27363 Make the sbws node cap a proportion of the capped bandwidth new defect Medium sbws: 1.2.x-final
#32722 Make the seccomp sandbox work with Ubuntu Xenial and Bionic new defect Medium Tor: unspecified
#21449 Make tor version parsing and version spec consistent new defect Medium Tor: unspecified
#33408 Make tor versions sortable, by adding the commit number to EXTRA_INFO new enhancement Medium Tor: unspecified
#33768 Make tor_inet_pton() handle bad addresses consistently on Windows assigned dgoulet defect Medium Tor: 0.4.4.x-final
#23113 Manage DNS state better when "All nameservers have failed" new defect Medium Tor: unspecified
#24834 Map consensus weight vs bandwidth for each bandwidth authority's votes new metrics-team enhancement Medium
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices new task Medium Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#24045 Measure and map overloaded or over-weighted relays reopened metrics-team defect Medium
#28463 Measure exits as non-exits with 50% probability new defect Medium sbws: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#32815 Move all directory authority options into the dirauth man page section new task Medium Tor: 0.4.4.x-final
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#24506 Move some bandwidth authority servers to a CDN needs_information tom task High
#32816 Move the relay options into the correct man page sections new defect Medium Tor: 0.4.4.x-final
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated new defect Medium Tor: unspecified
#28589 Open trac tickets for every open sbws GitHub issue assigned juga defect Medium sbws: unspecified
#26687 Output ed25519 IDs in the authority and fallback lists new enhancement Medium
#22788 PDF.js overloads CPU when opening large PDFs on higher security slider levels new tbb-team defect Medium
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads new defect Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#32490 Phase 1: Stop compiling "Listening for OR and Dir connections " in --disable-module-relay new enhancement Medium Tor: unspecified
#32489 Phase 1: Stop compiling "Responding to BEGIN cells" in --disable-module-relay new enhancement Medium Tor: unspecified
#32488 Phase 1: Stop compiling "Responding to CREATE and EXTEND cells" in --disable-module-relay new enhancement Medium Tor: unspecified
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification new defect Low Tor: unspecified
#27908 PrivCount proof of concept with existing statistics new task Medium Tor: unspecified
#29265 PrivCount proof of concept: Re-implement the C code in Rust new enhancement Medium Tor: unspecified
#29268 PrivCount proof of concept: Use the subsystems API for PrivCount new enhancement Medium Tor: unspecified
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol new enhancement Low Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters new enhancement Low Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: unspecified
#29004 PrivCount proof of concept: implement check counters new enhancement Medium Tor: unspecified
#29005 PrivCount proof of concept: implement consumed bandwidth counters new enhancement Medium Tor: unspecified
#29007 PrivCount proof of concept: implement debugging for PrivCount new enhancement Low Tor: unspecified
#29027 PrivCount proof of concept: put the PrivCount statistics in a stats/ file new enhancement Medium Tor: unspecified
#29266 PrivCount proof of concept: round results to hide usage over time new enhancement Medium Tor: unspecified
#29009 PrivCount proof of concept: use blinding and Shamir secret sharing new enhancement Medium Tor: unspecified
#29271 PrivCount proof of concept: use pubsub for events that PrivCount cares about new enhancement Medium Tor: unspecified
#29010 PrivCount proof of concept: work out how to do CI for PrivCount using chutney new enhancement Medium Tor: unspecified
#26944 Privcount blinding and encryption: Add tests new defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible new defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 new defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies new defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26970 Privcount: plan the modules and components new task Low Tor: unspecified
#33043 Prop 306: Keep bridge IPv6 behaviour in sync with client behaviour new task Medium Tor: unspecified
#33220 Prop 311: 3. Allow Relay IPv6 Extends assigned teor enhancement Medium
#33221 Prop 311: 4. Ensure Relay and Bridge IPv6 ORPorts are Reachable assigned teor task Medium
#33223 Prop 311: 4.3.1. Don't Publish Descriptor if IPv6 ORPort is Unreachable assigned enhancement Medium
#33224 Prop 311: 4.3.2. Add AssumeReachableIPv6 Option and Consensus Parameter assigned enhancement Medium
#33225 Prop 311: 4.4.1. Extend IPv6 From All Supported Second-Last Hops new enhancement Medium Tor: 0.4.5.x-final
#33230 Prop 311: 6.1. Ask Relay Operators to Test IPv6 Reachability assigned task Medium Tor: unspecified
#33229 Prop 311: 6.1. Test IPv6 ORPort Reachability on the Tor Network assigned task Medium Tor: unspecified
#33231 Prop 311: 6.3. Test Legacy Relays Accept IPv6 Extends using Chutney assigned task Medium Tor: unspecified
#33234 Prop 312: 3.2.1. Make the Address torrc Option Resolve IPv6 Hostnames assigned enhancement Medium
#33233 Prop 312: 3.2.1. Make the Address torrc Option Support IPv6 Literals assigned enhancement Medium
#33235 Prop 312: 3.2.1. Test Address torrc Option Configurations assigned task Medium
#33237 Prop 312: 3.2.2. Stop Directory Authorities Resolving *Port Hostnames new defect Medium Tor: 0.4.5.x-final
#33236 Prop 312: 3.2.2. Use Advertised ORPort IPv4 Address in Descriptors assigned enhancement Medium
#33239 Prop 312: 3.2.3 Limit Directory Authority Addresses to Address and ORPort assigned enhancement Medium
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.