Custom Query (691 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 691)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#33243 Prop 312: 3.2.5. Handle IPv6 Directory Fetch Failures assigned defect Medium
#33350 Is sbws weighting some relays too high? new defect Medium sbws: 1.1.x-final
#33352 Warning: RELAY_COMMAND_INTRODUCE_ACK on padding circuit assigned asn defect Medium Tor: 0.4.4.x-final
#33375 Stop advertising an IPv6 exit policy when DNS is broken for IPv6 needs_information neel defect Medium Tor: 0.4.4.x-final
#33411 Make DirCache default to 0 on Windows relays, if we can't fix the mmap issues assigned ahf defect Medium Tor: 0.4.4.x-final
#33581 Restore bridge networkstatus checks in chutney new defect Medium
#33582 Make bridges wait until they have bootstrapped, before publishing their descriptor new defect Medium Tor: unspecified
#33598 chutney does not fail on some SOCKS errors assigned c defect Medium
#33607 Stop forcing IPv4 and IPv6 traffic on non-SOCKSPorts new defect Medium Tor: 0.4.5.x-final
#33757 Fix log message when multiple tors try the same data directory assigned asn defect Medium Tor: 0.4.4.x-final
#33768 Make tor_inet_pton() handle bad addresses consistently on Windows assigned dgoulet defect Medium Tor: 0.4.4.x-final
#33775 sbws measures some relays 100x lower than Torflow new defect High sbws: 1.1.x-final
#33825 Make Environ handle "in" and "get()" like a dict needs_revision defect Medium
#33836 Require Twisted 20.3.0 in gettor's requirements.txt new defect Medium
#33898 Stop modifying addr on connections, and delete real_addr assigned nickm defect High Tor: 0.4.5.x-final
#34068 Decide how to handle control port events for IPv6 reachability self-tests new defect Medium Tor: unspecified
#34137 Make sure inform_testing_reachability() reports the correct ports new defect Medium Tor: unspecified
#34232 Make summarize_protover_flags() handle NULL and empty string the same new defect Medium Tor: unspecified
#34249 Make sure the C and Rust protovers can't get out of sync assigned nickm defect Medium Tor: 0.4.4.x-final
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#13815 Attempt to port tor to Google's BoringSSL new enhancement Medium Tor: unspecified
#15419 chutney: on failure, explain which connection failed new enhancement Medium
#16301 Add a fuzzing harness for the torrc file new enhancement Low Tor: unspecified
#16636 Add AccountingSetBytesRead/Written needs_information enhancement Low Tor: unspecified
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY new enhancement Very Low Tor: unspecified
#16954 Refactor chutney networks: increase configurability, reduce code duplication new enhancement Medium
#17013 Does chutney need to test various rare IPv6/IPv4 combinations? new enhancement Medium
#17014 chutney: automate discovery and use of different tor versions new enhancement Medium
#17015 chutney should try harder to find a stable/different version of tor new enhancement Medium
#17036 Report bandwidth more frequently in test networks new enhancement Medium Tor: unspecified
#17056 Do we need ExitPolicy private[4|6]:... ? new enhancement Very Low Tor: unspecified
#17217 Change clients to automatically use IPv6 if they can bootstrap over it new enhancement Low Tor: unspecified
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line new enhancement Low Tor: unspecified
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME new enhancement Low Tor: unspecified
#17360 Hidden service option for the number of predicted circuits new enhancement Medium Tor: unspecified
#17629 Create chutney templates that match public tor network timings new enhancement Medium
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17712 Add chutney support for FallbackDirs new enhancement Medium
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17740 Unit Tests for Recent Consensuses new enhancement Medium Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#17835 Make ClientPreferIPv6ORPort smarter new enhancement Medium Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl new enhancement Medium Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17903 router_pick_trusteddirserver_impl should distinguish between fallbacks and authorities needs_revision attila enhancement Very Low Tor: unspecified
#17949 Make loopback address search more accurate needs_revision rl1987 enhancement Medium Tor: unspecified
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks new enhancement Low Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18583 Tor Browser doesn't show the circuit for downloads new tbb-team enhancement Medium
#18605 Consider including fallback directory mirrors with multiple IP addresses new enhancement Medium
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19129 Allow Fallback Directories with no DirPort new enhancement Low
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19573 Use fixedresolver.py from dnslib in chutney new enhancement Medium
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19694 Add a leekspin mode to chutney new enhancement Medium
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#20036 Chutney should allow single onion and tor2web modes on any HS / client new enhancement Medium
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20067 Chutney should verify IPv6 SOCKSPorts assigned MrSquanchee enhancement Medium
#20091 Add a required version setting to chutney (or to chutney networks) new enhancement Medium
#20142 chutney IPv6 HiddenServicePort tests assigned MrSquanchee enhancement Medium
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20344 Do chutney releases with semantic versioning new enhancement Medium
#20403 Make it easier for relay operators to find their observed bandwidth new tom enhancement Medium
#20513 Use public tor network directory authority options in chutney new enhancement Medium
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20934 Use standard python multiset implementation in fallback script new enhancement Medium
#20939 Add average for each flag and uptime to the fallback summary new enhancement Medium
#21000 Make chutney select different options depending on the tor version new enhancement Medium
#21179 Add a fuzzing harness for the tor OR protocol new enhancement Medium Tor: unspecified
#21181 Add a fuzzing harness for the tor control protocol new enhancement Medium Tor: unspecified
#21284 Add torrc option for non-anonymous SocksPort new enhancement Very Low Tor: unspecified
#21285 Add tor compilation to disable all non-anonymous services new enhancement Medium Tor: unspecified
#21466 Get chutney's scripts working with standard shell script checking options new enhancement Medium
#21476 Extend HTTP fuzzer so it fuzzes the GET handler functions new enhancement Medium Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21543 Make chutney use a different base port new enhancement Medium
#21544 Make chutney use sockets rather than ports new enhancement Medium
#21701 Make it clearer that graphs showing bridge users by country and by country and transport are not the same new metrics-team enhancement Medium
#21789 Use cached address values more often new enhancement Medium Tor: unspecified
#21989 Should we tell Exits to reject all traffic if DNS fails? new enhancement Medium Tor: unspecified
#21990 Use a sensible default set of bandwidth servers new enhancement Medium
#21991 Allow bandwidth scanners to use non-Exits to access onion addresses new enhancement Medium
#21993 Consensus Health: are an authority's measurements higher or lower than others? reopened tom enhancement Low
#21994 Consensus Health: what is the distribution of a bandwidth authority's measurements? new tom enhancement Very Low
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.