Custom Query (43 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#2149 new 'extra dormant' mode for people who never use their tor new angelo620 enhancement Very High Tor: 0.3.4.x-final
#2878 Don't bootstrap from an old consensus if we're about to replace it new enhancement High Tor: unspecified
#18614 tor uses full cpu when unplugged needs_information defect High Tor: 0.3.4.x-final
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23605 BOOTSTRAP PROGRESS=80 is a lie new defect High Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: 0.3.5.x-final
#7707 Impose a minimum write size for TLS writes needs_information defect Medium Tor: unspecified
#7743 Avoid needless wasted space in cells needs_revision nickm defect Medium Tor: unspecified
#7747 SENDME doesn't need to trigger packaging so aggressively new defect Medium Tor: unspecified
#10510 Getting a lot of system clock jumped messages new defect Medium Tor: unspecified
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users needs_revision isis defect Medium Tor: unspecified
#16387 Improve reachability of hidden services on mobile phones new enhancement Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#21358 Tor fails to reconnect after computer resumes from sleep new defect Medium Tor: unspecified
#21814 Reduce binary size for client-only tor new task Medium Tor: 0.3.5.x-final
#22704 Use mmaps to handle journalled microdesc/routerdesc files. new enhancement Medium Tor: 0.3.5.x-final
#22705 When disk space is low, rebuild main cached-* files more aggressively new enhancement Medium Tor: 0.3.5.x-final
#22707 Lower descriptor lifetime when disk space is low new enhancement Medium Tor: 0.3.5.x-final
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download new defect Medium Tor: unspecified
#23221 Implement download resumption if needed. new enhancement Medium Tor: unspecified
#23565 document signs of client clock skew to ease troubleshooting assigned catalyst task Medium Tor: unspecified
#23677 Tor should log what it thinks the time is sometime(s) new defect Medium Tor: unspecified
#23878 Attempt rewriting buffers.c in Rust new enhancement Medium Tor: unspecified
#24152 refactor download_status code into its own file new enhancement Medium Tor: unspecified
#24300 Failed to find node for hop #1 of our path. Discarding this circuit new defect Medium Tor: unspecified
#24367 Changing pluggable transports (during start-up) in Tor Browser is broken new defect Medium Tor: unspecified
#24453 Reduce log spam when child process creation failed new defect Medium Tor: unspecified
#24457 Integrate tor-android build files directly into tor.git new enhancement Medium Tor: unspecified
#24658 Split/refactor crypto.h into smaller separate modules merge_ready ffmancera enhancement Medium Tor: 0.3.4.x-final
#24661 accept a reasonably live consensus for guard selection assigned catalyst defect Medium Tor: 0.3.4.x-final
#24680 Make tor binary smaller by reducing the size of the fallback list strings new enhancement Medium
#25227 Avoid storing all Tor nodes in RAM new enhancement Medium Tor: unspecified
#25456 tor's systemd service should SIGHUP tor on resume/thaw after sleep/hibernate new enhancement Medium Tor: unspecified
#25504 Find more generic ways to handle smartlist_t/Vec<T> between C and Rust new enhancement Medium Tor: 0.3.5.x-final
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls needs_revision isis defect Medium Tor: 0.3.5.x-final
#25628 Document our Rust coding standards for error/failure types new enhancement Medium Tor: unspecified
#25752 Detangle our included headers and reduce reliance on or.h new enhancement Medium Tor: 0.3.5.x-final
#25756 EARLY_CONSENSUS_NOTICE_SKEW of 60 is too strict for some drifting dirauth clocks assigned catalyst defect Medium Tor: 0.3.4.x-final
#2915 Explore options to reduce binary size of Tor new enhancement Low Tor: unspecified
#22706 Compress cached descriptors and consensus new enhancement Low Tor: 0.3.5.x-final
#24204 Improve the in-process Tor API: create owning control port accepted nickm defect Very Low Tor: 0.3.4.x-final
Note: See TracQuery for help on using queries.