Custom Query (49 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#2149 new 'extra dormant' mode for people who never use their tor new angelo620 enhancement Very High Tor: unspecified
#26398 feature gate testing C code from Rust for now needs_information isis defect Very High Tor: 0.3.5.x-final
#2878 Don't bootstrap from an old consensus if we're about to replace it new enhancement High Tor: unspecified
#18614 tor uses full cpu when unplugged assigned ahf defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23605 BOOTSTRAP PROGRESS=80 is a lie new defect High Tor: 0.3.5.x-final
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision nickm defect Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision isis defect Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#21358 Tor fails to reconnect after computer resumes from sleep new defect Medium Tor: unspecified
#21814 Reduce binary size for client-only tor new task Medium Tor: 0.3.5.x-final
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: unspecified
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: unspecified
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: unspecified
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23565 document signs of client clock skew to ease troubleshooting assigned catalyst task Medium Tor: unspecified
#23677 Tor should log what it thinks the time is sometime(s) new defect Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#24152 refactor download_status code into its own file new enhancement Medium Tor: unspecified
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24367 Changing pluggable transports (during start-up) in Tor Browser is broken new defect Medium Tor: unspecified
#24453 Reduce log spam when child process creation failed new defect Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#24661 accept a reasonably live consensus for guard selection assigned catalyst defect Medium Tor: unspecified
#24680 Make tor binary smaller by reducing the size of the fallback list strings new enhancement Medium
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#25504 Find more generic ways to handle smartlist_t/Vec<T> between C and Rust new enhancement Medium Tor: unspecified
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls needs_revision isis defect Medium Tor: 0.3.5.x-final
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#26070 Remove remaining items from second_elapsed_callback and run_scheduled_events. new enhancement Medium Tor: unspecified
#26337 make rust error types use the failure crate new enhancement Medium Tor: unspecified
#26631 Allow Tor to build with NSS instead of OpenSSL accepted nickm defect Medium Tor: 0.3.5.x-final
#26815 Use NSS for our symmetric crypto, digests, and PRNG. needs_review nickm enhancement Medium Tor: 0.3.5.x-final
#26817 Use NSS for DH needs_review nickm enhancement Medium Tor: 0.3.5.x-final
#26818 Use NSS for RSA accepted nickm defect Medium Tor: 0.3.5.x-final
#26819 Minimal client-side support for TLS via NSS new enhancement Medium Tor: 0.3.5.x-final
#26820 Server-side support for non-obsolete TLS handshakes via NSS new defect Medium Tor: 0.3.5.x-final
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: unspecified
#24204 Improve the in-process Tor API: create owning control port accepted nickm defect Very Low Tor: unspecified
Note: See TracQuery for help on using queries.