Custom Query (78 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#22781 hs: Unify link specifier API/ABI needs_revision dgoulet enhancement Very High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#15940 Make a standard transition plan for killing off a client version accepted nickm task High Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted nickm enhancement High Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted nickm project High Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some accepted nickm enhancement High Tor: unspecified
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned nickm enhancement High Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS accepted nickm defect High Tor: unspecified
#24487 Reverse path selection (choose outer hops first) assigned mikeperry defect High Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#6772 Fall back to alternative OR or Dir port if the current fails new enhancement Medium Tor: unspecified
#8453 Alter flag-weight balancing equations new mikeperry enhancement Medium Tor: unspecified
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision teor defect Medium Tor: unspecified
#15516 Consider dropping INTRODUCE2 cells when under load new enhancement Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#17782 Relays may publish descriptors with incorrect IP address needs_revision teor defect Medium Tor: unspecified
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: unspecified
#18320 Clear old entries from the key-pinning journal file needs_revision enhancement Medium Tor: unspecified
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18642 Teach the OOM handler about the DNS cache new enhancement Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated assigned task Medium Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: 0.3.5.x-final
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#20068 Chutney tests for IPv6-only bridge clients assigned defect Medium
#20142 chutney IPv6 HiddenServicePort tests assigned enhancement Medium
#20719 prop271 -- make parameters configurable accepted nickm enhancement Medium Tor: unspecified
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned nickm project Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned nickm enhancement Medium Tor: unspecified
#20916 Proposal: Put Relay IPv6 Addresses in the microdesc consensus needs_revision teor task Medium Tor: unspecified
#20931 [prop271] Generate GUARD controller events accepted nickm enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: unspecified
#22351 Should bridge lines in the state file use unlisted_since? accepted nickm defect Medium Tor: unspecified
#22815 Chutney tests for IPv6 only bridges assigned enhancement Medium
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order needs_revision teor defect Medium Tor: unspecified
#23978 Write simulator to evaluate security of Prop247 parameter choices new task Medium Tor: unspecified
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned mikeperry enhancement Medium Tor: unspecified
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: unspecified
#24193 Make v3 single onion services parse and use IPv6 introduce link specifiers accepted dgoulet enhancement Medium Tor: unspecified
#24338 DirAuths that have IPv6 addresses don't include them in their vote on themself new defect Medium Tor: unspecified
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned teor task Medium Tor: unspecified
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: unspecified
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: unspecified
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: unspecified
#24451 Put IPv6 link specifiers in client EXTEND cells accepted dgoulet enhancement Medium Tor: unspecified
#24535 Document which address functions we should use, and when new defect Medium Tor: unspecified
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses new defect Medium Tor: unspecified
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_information teor defect Medium Tor: 0.3.5.x-final
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: unspecified
#24611 Add a chutney network that does reachability tests new enhancement Medium
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: unspecified
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: 0.3.5.x-final
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#25546 Merge last vanguard-related tor patches new defect Medium Tor: 0.3.5.x-final
#25573 Create a RELAY_COMMAND_END_ACK cell type new defect Medium Tor: unspecified
#25574 Eliminate "silent-drop" side channels in Tor protocol new defect Medium
#25705 Refactor circuit_build_failed to separate build vs path failures merge_ready defect Medium Tor: 0.3.3.x-final
#25753 Check/enforce path restrictions for each path position assigned mikeperry defect Medium Tor: 0.3.5.x-final
#25754 Make Prop#291 choices new defect Medium Tor: 0.3.5.x-final
#25783 Circuit creation loop when primary guards are unreachable new defect Medium Tor: 0.3.5.x-final
#26214 Check stream SENDME against max merge_ready mikeperry defect Medium Tor: 0.3.4.x-final
#26291 find all instances of SHA-1 in our design and implementation and kill them with fire new project Medium Tor: unspecified
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
Note: See TracQuery for help on using queries.