Custom Query (642 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (501 - 600 of 642)

1 2 3 4 5 6 7
Ticket Summary Status Owner Type Priority Milestone
#20883 Ignore relays without contact info when emailing potential fallback operators new defect Very Low
#20797 Exclude authorities from bandwidth scanning new defect Medium
#20796 TorFlow's ScanHandler can divide by zero when there are no unmeasured nodes new defect Medium
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20619 bwauths don't handle NEWCONSENSUS event correctly needs_review tom defect Medium
#20617 Write a unit test abstraction for tests that need to be repeated multiple times to prove failure new enhancement Medium Tor: unspecified
#20601 Clients should reject outdated consensuses as soon as they parse them new enhancement Medium Tor: unspecified
#20535 A 304 "Not Modified" should update the time to when we next expect a modification new defect Medium Tor: unspecified
#20531 rewrite_node_address_for_bridge and networkstatus_set_current_consensus can conflict new defect Medium Tor: unspecified
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20513 Use public tor network directory authority options in chutney new enhancement Medium
#20505 make min_bw configurable in bwauths new defect Medium
#20504 When there is only one slice and one scanner, a bwauth runs a second empty slice new defect Medium
#20475 Setting bwscanner min_exits to 1 causes no exits to be selected new defect Medium
#20466 Replacing python path sometimes breaks bwauths new defect Medium
#20455 bwauth cron scripts need to be run in the BwAuthority directory new defect Medium
#20452 macOS and BSD don't support readlink -f in bwauth setup.sh new defect Medium
#20403 Make it easier for relay operators to find their observed bandwidth new tom enhancement Medium
#20346 Do we need Tor unstable binary releases for Windows, OS X, BSD? new enhancement Medium Tor: unspecified
#20344 Do chutney releases with semantic versioning new enhancement Medium
#20194 Add "update fallbacks" to "Preliminaries" in Tor's doc/HACKING/ReleasingTor.md new enhancement Medium Tor: unspecified
#20165 When a relay advertises a new, unreachable address, OR reachability can succeed via the old address new defect Medium Tor: unspecified
#20164 Warn relay operators when we guess an address from several equally valid alternatives new enhancement Medium Tor: unspecified
#20153 VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" new defect Medium Tor: unspecified
#20150 Tor Browser's Update window initially shows "NaN/sec" new tbb-team defect Medium
#20142 chutney IPv6 HiddenServicePort tests new enhancement Medium
#20091 Add a required version setting to chutney (or to chutney networks) new enhancement Medium
#20071 Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4 new defect Low Tor: unspecified
#20068 Chutney tests for IPv6-only bridge clients new defect Medium
#20067 Chutney should verify IPv6 SOCKSPorts new enhancement Medium
#20061 When unit testing in Tor2web mode, set the config correctly new defect Medium Tor: unspecified
#20055 Remove relays that fail to rotate onion keys from the consensus new enhancement Medium Tor: unspecified
#20046 Test hidden services with different consensuses new defect Medium Tor: unspecified
#20036 Chutney should allow single onion and tor2web modes on any HS / client new enhancement Medium
#20035 Identify client-specific options that work with hidden services new enhancement Medium Tor: unspecified
#19989 Tor fails to bootstrap with an Exit as EntryNode new defect Medium Tor: unspecified
#19988 Warn when Port addresses have no effect new defect Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#19919 If ORPort address is publicly routable, use it to guess Address new defect Medium Tor: unspecified
#19853 ServerDNSAllowNonRFC953Hostnames affects clients, and AllowNonRFC953Hostnames affects servers new defect Low Tor: unspecified
#19694 Add a leekspin mode to chutney new enhancement Medium
#19665 Should *Port_set count sockets? new defect Medium Tor: unspecified
#19656 Shared random state doesn't expire when clock changes? new defect Medium Tor: unspecified
#19647 HS Descriptors should only contain UTF-8 new enhancement Medium Tor: unspecified
#19573 Use fixedresolver.py from dnslib in chutney new enhancement Medium
#19570 Shared random round gets out of sync reopened enhancement High Tor: unspecified
#19138 Received extra server info (size 0) new defect Low Tor: unspecified
#19129 Allow Fallback Directories with no DirPort new enhancement Low
#19074 Mark fallback directories down when their key is wrong new defect Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19034 Declaring authorities with matching relay keys should fail new defect Medium Tor: unspecified
#19033 Fuzz out of bounds reads during nodelist processing new enhancement Medium Tor: unspecified
#19019 When chutney fails because of ports, tell the user new defect Medium
#19013 Authorities should log a more accurate message when reachability checks fail new defect Low Tor: unspecified
#18932 Re-launching chutney with cached descriptors sometimes fails new defect Medium
#18852 Directory mirrors should check accounting usage more frequently new defect Medium Tor: unspecified
#18721 Define accessors for connection_t's address fields new enhancement Medium Tor: unspecified
#18611 Improve semantics for pluggable transports with dummy addresses new defect Medium Tor: unspecified
#18605 Consider including fallback directory mirrors with multiple IP addresses new enhancement Medium
#18583 Tor Browser doesn't show the circuit for downloads new tbb-team enhancement Medium
#18481 Allow the fallback directory schedules to be changed outside a test network new defect Very Low Tor: unspecified
#18480 Some tor time functions have undefined behavior with dates after 2037 and 32-bit time_t new defect Medium Tor: unspecified
#18345 Fix all doxygen "X is not documented" warnings assigned aomamemaki defect Medium Tor: unspecified
#18321 Exclude our own vote from the consensus if we think our own vote is invalid assigned defect Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file new enhancement Medium Tor: unspecified
#18306 Avoid using tor_assert before the logging system is fully initialised new defect Medium Tor: unspecified
#18295 Make shared random rounds configurable in test networks assigned enhancement Low Tor: unspecified
#18284 Add RSOSIntroductionPoints feature new enhancement Medium Tor: unspecified
#18276 directory_send_command doesn't check string operation return values new defect Low Tor: unspecified
#18124 We never use interface names on Windows, avoid retrieving them new enhancement Very Low Tor: unspecified
#18117 When stem calls controller.close_circuit(circuit_id), circuits don't really close new defect Medium Tor: unspecified
#18114 Warn when ReachableAddresses restricts connections to relays chosen by others new defect Medium Tor: unspecified
#18106 Rename fascist_firewall_* functions to reachable_address_* new enhancement Low Tor: unspecified
#18084 Use the same fallback directory mirror to bootstrap new enhancement Low Tor: unspecified
#18082 Log separate HS extra-info stats for Single Onion Services new enhancement Medium Tor: unspecified
#17991 Handle non-127.0.0.1 IPv4 loopback addresses new enhancement Medium Tor: unspecified
#17953 Fallback to resolving localhost when interface searches fail new defect Medium Tor: unspecified
#17952 Make address family search via ioctl more accurate on obscure platforms new enhancement Very Low Tor: unspecified
#17949 Make loopback address search more accurate needs_revision rl1987 enhancement Medium Tor: unspecified
#17903 router_pick_trusteddirserver_impl should distinguish between fallbacks and authorities needs_revision attila enhancement Very Low Tor: unspecified
#17867 Remove addresses and ports from dir_server_t and just use the ones in fake_status new enhancement Low Tor: unspecified
#17848 Tor ignores tunneled connections when checking existing directory downloads new defect Medium Tor: unspecified
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl assigned enhancement Medium Tor: unspecified
#17845 Add unit tests for IPv6 relay descriptors new enhancement Medium Tor: unspecified
#17835 Make ClientPreferIPv6ORPort smarter assigned neel enhancement Medium Tor: unspecified
#17811 Tor Clients on IPv6 new task High Tor: unspecified
#17808 Tor doesn't produce a backtrace on gcc x86_64 on macOS needs_information defect Medium Tor: unspecified
#17800 Tor Unit Tests should TT_FORK before initialising global PRNG state new defect Low Tor: unspecified
#17787 Improve address detection on multihomed relays new defect Low Tor: unspecified
#17768 Measure Hidden Service Rendezvous Path Lengths new enhancement Medium Tor: unspecified
#17765 If tor gets different addresses via different methods, it flips between them new defect Low Tor: unspecified
#17740 Unit Tests for Recent Consensuses new enhancement Medium Tor: unspecified
#17728 Use NETINFO handshake rather than date header to check time with authorities new enhancement Medium Tor: unspecified
#17712 Add chutney support for FallbackDirs new enhancement Medium
#17692 Review every use of onehop_tunnel for assumptions that it's a directory connection new defect Medium Tor: unspecified
#17684 Simplify directory_get_from_dirserver so it can be unit tested new enhancement Medium Tor: unspecified
#17673 circuit_handle_first_hop assumes all one-hop circuits are directory circuits new defect Low Tor: unspecified
#17636 Can a single IPv6 bridge failure stop Tor connecting? new defect Medium Tor: unspecified
#17629 Create chutney templates that match public tor network timings new enhancement Medium
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents needs_revision jryans defect High Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.