Custom Query (5712 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 5712)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Summary Status Owner Type Priority Milestone
#11328 Dir auths should compute Guard WFU using the consensus, not private history new defect Medium Tor: unspecified
#11360 Listen on IPv6 by default for SocksPort *:Port new enhancement Medium Tor: unspecified
#11397 Keep using too-dirty circuits if no new circuit can be built? new enhancement Medium Tor: unspecified
#11444 Drop support for long-obsolete versions of Windows new defect Medium Tor: unspecified
#11445 Drop support for Windows XP new defect Medium Tor: unspecified
#11448 Dirauths must support multiple relay identity keys at once new defect Low Tor: unspecified
#11458 A newer signing cert should innoculate us against older ones? new enhancement Medium Tor: unspecified
#11462 Re-promote "We stalled too much while trying to write" warning if it happens too much new enhancement Medium Tor: unspecified
#11625 Tor DNSPORT returns NXDOMAIN for AAAA records? new defect Medium Tor: unspecified
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly new defect High Tor: unspecified
#11922 Launching tor-fw-helper should untangle stderr for control, stdout for data? new defect Low Tor: unspecified
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision defect Medium Tor: unspecified
#11970 `[err] sandbox_getaddrinfo(): Bug: (Sandbox) failed to get address localhost!` reopened nickm defect Medium Tor: unspecified
#11973 Should relays stop making unencrypted directory connections? new defect Medium Tor: unspecified
#12138 No IPv6 support when suggesting a bindaddr to a PT new enhancement Medium Tor: unspecified
#12184 Circuit on detached list which I had no reason to mark new defect High Tor: unspecified
#12220 Give a better warning on header/library mismatch for openssl new defect Medium Tor: unspecified
#12254 Bridge authority should sign its bridge networkstatus doc? Or maybe change format to v3-style vote? new enhancement Medium Tor: unspecified
#12377 Prefer default route when checking local interface addresses needs_revision defect Medium Tor: unspecified
#12389 Should we warn when exit nodes are using opendns or google dns? needs_revision defect High Tor: unspecified
#12401 Document EntryGuardPathBias in doc/state-contents.txt new defect High Tor: unspecified
#12500 Add an option to upload hidden service descriptors some time after startup new enhancement Medium Tor: unspecified
#12572 Proposal for __OwningControllerTimeout option new enhancement Medium Tor: unspecified
#12600 Save retrieved bridge information in our state file new task High Tor: unspecified
#12799 fingerprints - descriptor Space removal, case normalization new defect Very Low Tor: unspecified
#12898 Remove naming support from Tor assigned Sebastian enhancement Low Tor: unspecified
#12900 Remove config related naming stuff assigned Sebastian defect Low Tor: unspecified
#12901 Remove client-related naming stuff assigned Sebastian defect Low Tor: unspecified
#13059 Create bad-relays file needs_revision defect Medium Tor: unspecified
#13078 Add a ROUTERSET_ML config type, accept spaces in fingerprints? needs_revision enhancement Low Tor: unspecified
#13081 Fix build with Visual Studio in Windows new defect Medium Tor: unspecified
#13082 Use a better default torrc new enhancement Medium Tor: unspecified
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision defect Medium Tor: unspecified
#13147 Curious debian hurd unit test failure new defect Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open new defect Medium Tor: unspecified
#13167 Export dirauth files via directory protocol new defect Medium Tor: unspecified
#13194 Track time between ESTABLISH_RENDEZVOUS and RENDEZVOUS1 cell new enhancement Very Low Tor: unspecified
#13195 Collect aggregate stats around hidden service descriptor publishes and fetches new enhancement Medium Tor: unspecified
#13230 Make good use of unstable relays new enhancement Medium Tor: unspecified
#13231 Tor(Windows) don't close ports when killed from service control new defect Medium Tor: unspecified
#13234 Consensus Algorithm Causes Flip-Flopping new defect Medium Tor: unspecified
#13258 Keep stats on effectiveness of consensus diffs new enhancement Medium Tor: unspecified
#13260 Transform code to cleaner c99 style needs_information defect Low Tor: unspecified
#13297 compute_weighted_bandwidths() broken for dirauths new defect Medium Tor: unspecified
#13386 "opening new log file" line goes to err-logfile despite being at loglevel notice new defect Low Tor: unspecified
#13444 "GhostNode" - support relays that cannot accept incoming connections. new project High Tor: unspecified
#13461 Point to Tor.framework in contrib, for iOS and macOS new enhancement Medium Tor: unspecified
#13466 Collect aggregate stats of ntor-using hidden service interactions vs tap-using interactions new enhancement Medium Tor: unspecified
#13484 Do we have edge cases with rend_consider_descriptor_republication()? Can we refactor it to be cleaner? new task Low Tor: unspecified
#13494 Regression test about Hidden Service time synchronization new enhancement Low Tor: unspecified
#13603 Many channels closing with "IOERROR" reason given on control port. new defect Medium Tor: unspecified
#13694 Ship with native build instructions for windows assigned gk enhancement Medium Tor: unspecified
#13697 Carry entropy across invocations new enhancement Medium Tor: unspecified
#13703 Adding doc/HARDENING accepted Jaruga enhancement Medium Tor: unspecified
#13705 Allow relays to promise in their descriptor that their IP address won't change new enhancement Medium Tor: unspecified
#13737 Move circuit building crypto to worker assigned yawning enhancement High Tor: unspecified
#13738 Make worker handle introduction point crypto new enhancement Low Tor: unspecified
#13753 Validate is_canonical more thoroughly new enhancement High Tor: unspecified
#13755 Declare that Windows XP and earlier are not officially supported. new task Medium Tor: unspecified
#13800 circuit does not close after hidden service is shutdown via control port new defect Medium Tor: unspecified
#13815 Attempt to port tor to Google's BoringSSL new enhancement Medium Tor: unspecified
#13817 Untange kludgey library detection, particularly for SSL forks new defect High Tor: unspecified
#13908 Make it safe to set NumDirectoryGuards=1 new enhancement Medium Tor: unspecified
#13912 Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in SSE registers) new defect Medium Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability new defect Medium Tor: unspecified
#13932 Some way for multiple Tor processes to share directory information new enhancement Medium Tor: unspecified
#13976 Simplify adjustment of consensus speed in testing tor networks new defect Medium Tor: unspecified
#13977 Evaluate alternate SSL/TLS libraries: CyaSSL, GnuTLS, ... new task Medium Tor: unspecified
#13987 Apply laplace noise to other statistics new enhancement Medium Tor: unspecified
#14006 Hidden service error: "We'd like to launch a circuit to handle a connection, but we already have 32 general-purpose client circuits..." needs_information defect Medium Tor: unspecified
#14034 Make TestingDirAuthVoteGuard/Exit/HSDir and AssumeReachable less essential in test networks new defect Medium Tor: unspecified
#14056 IPredator complains that we call time() too much when running over 500Mbps new defect Medium Tor: unspecified
#14066 SIGHUP: Reloading config and does not reset internal state of accounting new defect Very Low Tor: unspecified
#14150 Dirauths should expose the value of `MinUptimeHidServDirectoryV2` as a vote flag-threshold new enhancement Medium Tor: unspecified
#14164 Controller method to get our own descriptor new enhancement Medium Tor: unspecified
#14186 Try to use fchmod() first when changing permissions on an AF_UNIX socket new defect Medium Tor: unspecified
#14197 Reverse lookup on automapped addresses doesn't work new defect Low Tor: unspecified
#14209 Implement SOCKSPort windows:path for named pipes new enhancement Medium Tor: unspecified
#14223 END_STREAM_REASON_TIMEOUT blurs together two very different error cases new defect Medium Tor: unspecified
#14266 Make address mapping conditional on having the particular address mapping types enabled. new defect Low Tor: unspecified
#14267 We should be smarter about fetching all missing votes new defect Medium Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure new defect High Tor: unspecified
#14556 Add basic I/O syscall wrappers new enhancement Medium Tor: unspecified
#14579 Clients cannot use multiple transports with a single bridge new defect Medium Tor: unspecified
#14581 Looking up bridge by ID may choose the wrong bridge new defect High Tor: unspecified
#14709 Should the hash tables in circuitmux_t have channel ID in them? new task Medium Tor: unspecified
#14715 Change the default for automaphostsonresolve to be on-by-default? new defect Medium Tor: unspecified
#14763 Stochastic Guard Flag new defect Medium Tor: unspecified
#14799 Make failure to create extrainfo an error? reopened defect Low Tor: unspecified
#14827 Tor controller command to write its file to disk new defect Medium Tor: unspecified
#14854 Document the hardlimit of HiddenServiceAuthorizeClient basic new defect Medium Tor: unspecified
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED new enhancement Medium Tor: unspecified
#14899 Enable Tor to work without using filesystem for cached files new enhancement Medium Tor: unspecified
#14900 To link connections only if they ready reopened defect Medium Tor: unspecified
#14921 Investigate whether we sometimes remove all predicted ports at startup new defect Medium Tor: unspecified
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value new defect Medium Tor: unspecified
#14987 Settle on a name for descriptors new defect Low Tor: unspecified
#14999 Most/all esc_for_log instances in control.c should change. new defect Medium Tor: unspecified
#15000 bring some sanity to quoted strings in the controller api needs_revision defect Medium Tor: unspecified
#15008 Design an opt-in Hidden Service Public Directory Submission system new defect Low Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.