Custom Query (615 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 615)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#24468 Measure HSDir usage to guide parameter choices assigned task Medium Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#24045 Measure and map overloaded or over-weighted relays reopened metrics-team defect Medium
#28463 Measure exits as non-exits with 50% probability new defect Medium sbws: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#21477 Minimise fuzzing corpora new defect Low Tor: unspecified
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network assigned defect High Tor: unspecified
#30726 Missing relay keys in bandwidth file spec new defect High sbws: 1.1.x-final
#31314 Modify git-merge-forward.sh so it can create test merge branches needs_review teor enhancement Medium Tor: 0.4.2.x-final
#26160 Move dirserv_read_measured_bandwidths() and related functions to dirauth module new enhancement Medium Tor: unspecified
#24506 Move some bandwidth authority servers to a CDN needs_information tom task High
#28643 New github team for manual and support new hiro task Medium
#22498 Offline directory authorities need a way to post their certificate to other authorities new defect Medium Tor: very long term
#23367 Onion address counts ignore descriptor upload overlap new metrics-team defect Medium
#24932 Onionoo should stop parsing untrusted descriptors new metrics-team defect Low
#28514 Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated assigned neel defect Medium Tor: unspecified
#28589 Open trac tickets for every open sbws GitHub issue assigned juga defect Medium sbws: unspecified
#26687 Output ed25519 IDs in the authority and fallback lists new enhancement Medium
#22788 PDF.js overloads CPU when opening large PDFs on higher security slider levels new tbb-team defect Medium
#21508 POSIX and Windows may interpret directory document whitespace differently new defect Medium Tor: unspecified
#24182 Pad INTRODUCE cells to hide the number of link specifiers assigned defect Medium Tor: unspecified
#22948 Padding, Keepalive and Drop cells should have random payloads assigned defect Medium Tor: unspecified
#26688 Parse ed25519 IDs in the authority and fallback lists new enhancement Medium Tor: unspecified
#31332 Please update the FallbackDir flags in relay search new metrics-team defect Medium
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#21810 Port rebind should not be performed after soft accounting limit reached new defect Medium Tor: unspecified
#28229 Possible race condition opening SOCKS Port in test_rebind.py new rl1987 defect Medium Tor: unspecified
#31338 Practracker --list-overbroad produces confusing output when there is an exception assigned nickm defect Medium Tor: 0.4.2.x-final
#27907 PrivCount config and version spec new enhancement Medium Tor: unspecified
#27906 PrivCount noise specification assigned defect Low Tor: unspecified
#27908 PrivCount proof of concept with existing statistics assigned task Medium Tor: 0.4.2.x-final
#29265 PrivCount proof of concept: Re-implement the C code in Rust new enhancement Medium Tor: 0.4.2.x-final
#29268 PrivCount proof of concept: Use the subsystems API for PrivCount new enhancement Medium Tor: 0.4.2.x-final
#29008 PrivCount proof of concept: add a PrivCount module, torrc option, and protocol assigned enhancement Low Tor: unspecified
#29006 PrivCount proof of concept: add noise to counters assigned enhancement Low Tor: unspecified
#29129 PrivCount proof of concept: decide if we want to remove bandwidth statistics new defect Medium Tor: 0.4.2.x-final
#29004 PrivCount proof of concept: implement check counters assigned enhancement Medium Tor: 0.4.2.x-final
#29005 PrivCount proof of concept: implement consumed bandwidth counters assigned enhancement Medium Tor: 0.4.2.x-final
#29007 PrivCount proof of concept: implement debugging for PrivCount assigned enhancement Low Tor: unspecified
#29027 PrivCount proof of concept: put the PrivCount statistics in a stats/ file assigned enhancement Medium Tor: unspecified
#29266 PrivCount proof of concept: round results to hide usage over time new defect Medium Tor: 0.4.2.x-final
#29009 PrivCount proof of concept: use blinding and Shamir secret sharing new enhancement Medium Tor: 0.4.2.x-final
#29271 PrivCount proof of concept: use pubsub for events that PrivCount cares about new enhancement Medium Tor: 0.4.2.x-final
#29010 PrivCount proof of concept: work out how to do CI for PrivCount using chutney assigned enhancement Medium Tor: 0.4.2.x-final
#26944 Privcount blinding and encryption: Add tests assigned defect Medium Tor: unspecified
#26957 Privcount blinding and encryption: Derive copy and debug where possible assigned defect Medium Tor: unspecified
#26945 Privcount blinding and encryption: always enable i128 assigned defect Medium Tor: unspecified
#26941 Privcount blinding and encryption: review dependencies assigned defect Medium Tor: unspecified
#26958 Privcount blinding and encryption: run clippy on travis rust nightly needs_revision defect Medium Tor: unspecified
#26970 Privcount: plan the modules and components assigned task Low Tor: unspecified
#30257 Propagate USR1 and ABRT signals from stem tests through to tor new atagar defect Medium Tor: 0.2.9.x-final
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned task Medium Tor: unspecified
#29317 Protect heartbeat logs using PrivCount new enhancement Medium Tor: unspecified
#26543 Provide a language switcher menu on BridgeDB assigned enhancement Medium
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells assigned defect Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells assigned enhancement Medium Tor: unspecified
#29777 Rate-limit "Problem bootstrapping" warnings to one every 5 seconds new defect Medium Tor: unspecified
#18932 Re-launching chutney with cached descriptors sometimes fails new defect Medium
#30971 Rebuild the fallback list in late 2019 or early 2020 new task Medium Tor: 0.4.2.x-final
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#24817 Recommend that tools ignore HSDir and Guard flags on bridges new defect Medium Tor: unspecified
#22463 Reduce REACHABLE_TIMEOUT in test networks new enhancement Medium Tor: unspecified
#30232 Reduce the number of downloads for each measurement new defect Medium sbws: 1.2.x-final
#28982 Refactor GETINFO dir/ so that new tor/ URLs automatically become GETINFOs accepted rl1987 enhancement Medium Tor: unspecified
#16954 Refactor chutney networks: increase configurability, reduce code duplication new enhancement Medium
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events new enhancement Medium Tor: unspecified
#29133 Refactor dirserv_read_measured_bandwidths assigned defect Medium Tor: unspecified
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised assigned defect Medium Tor: unspecified
#30968 Refactor unit test asserts so they log context new enhancement Medium Tor: unspecified
#28317 Relay Search flags are vertical on Tor Browser 8.0.2 on macOS new metrics-team defect Low
#25208 Relays can upload a new descriptor every 2 minutes new defect Medium Tor: unspecified
#27414 Relays should check that their descriptors are UTF-8 before uploading them new enhancement Medium Tor: unspecified
#22662 Reload the state file on HUP new enhancement Medium Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#25964 Remove hs_index_t fetch, and use one of the stores instead new enhancement Medium Tor: unspecified
#30816 Remove ping ::1 from tor's test-network-all and simplify the logic new enhancement Medium Tor: 0.4.2.x-final
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#22744 Remove the smaller bandwidth authority files new defect Medium
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#22090 Rename channel client functions for clarity assigned toby enhancement Medium Tor: unspecified
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion assigned defect Medium Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#29826 Rename router_status_t to avoid confusion with routerstatus_t assigned neel defect Medium Tor: unspecified
#26567 Replace ArgumentCharValue with ValueChar in dir-spec and bandwidth-file-spec new defect Very Low Tor: unspecified
#20466 Replacing python path sometimes breaks bwauths new defect Medium
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#30728 Report the time of the earliest eligible bandwidth measurement for each relay new defect Medium sbws: 1.2.x-final
#22403 Reset downloads more consistently new defect Medium Tor: unspecified
#24242 Resolve warnings on NEWCONSENSUS / NEWDESC events new tom defect Medium
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#31039 Review proposal 306: IPv6 "Happy Eyeballs" for Tor clients needs_revision task Medium Tor: 0.4.2.x-final
#28208 Run bridges+hs-v23 for make test-network in 0.4.2 and later assigned defect Medium Tor: unspecified
#30225 Run clang's scan-build in Tor's CI new defect Medium Tor: unspecified
#24745 Run fuzzing with floating point exceptions turned on new enhancement Low Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.