Custom Query (65 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#22781 hs: Unify link specifier API/ABI needs_revision dgoulet enhancement Very High Tor: 0.3.4.x-final
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision andrea defect High Tor: unspecified
#15940 Make a standard transition plan for killing off a client version accepted nickm task High Tor: 0.3.4.x-final
#18346 Separate the various roles that directory authorities play, from a configuration POV accepted nickm enhancement High Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. accepted nickm project High Tor: 0.3.4.x-final
#18637 Have OOM handler look at all memory consumption, not just some accepted nickm enhancement High Tor: unspecified
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. assigned nickm enhancement High Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS accepted nickm defect High Tor: 0.3.4.x-final
#24487 Reverse path selection (choose outer hops first) assigned mikeperry defect High Tor: 0.3.4.x-final
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#6772 Fall back to alternative OR or Dir port if the current fails new enhancement Medium Tor: unspecified
#8453 Alter flag-weight balancing equations new mikeperry enhancement Medium Tor: 0.3.4.x-final
#13112 Some things are probably broken when we advertise multiple ORPorts and only some are reachable needs_revision teor defect Medium Tor: 0.3.4.x-final
#15516 Consider dropping INTRODUCE2 cells when under load new enhancement Medium Tor: unspecified
#17773 Should clients avoid using guards that lost the Guard flag? accepted arma enhancement Medium Tor: unspecified
#17782 Relays may publish descriptors with incorrect IP address needs_revision teor defect Medium Tor: 0.3.4.x-final
#17806 Make onion queues rational, combine with workqueue logic. new enhancement Medium Tor: 0.3.4.x-final
#18320 Clear old entries from the key-pinning journal file needs_revision enhancement Medium Tor: 0.3.4.x-final
#18635 Make a design for circuit- migration in the event of DoS new project Medium Tor: unspecified
#18642 Teach the OOM handler about the DNS cache new enhancement Medium Tor: unspecified
#18643 Replace the most error-prone binary parsers with trunnel new enhancement Medium Tor: unspecified
#18644 Replace our routerparse.c core with something machine-generated assigned andrea task Medium Tor: unspecified
#18645 Replace our http parser with something machine-generated new task Medium Tor: unspecified
#18646 Generalize our OOM-handler to an OODisk handler new enhancement Medium Tor: 0.3.4.x-final
#19304 Write a proposal for having dirauths push to fallbacks, rather than pull. new task Medium Tor: unspecified
#19305 Write a proposal for separating "upload descriptors here" from the rest of what dirauths do. new task Medium Tor: unspecified
#19306 Write a proposal for removing liveness-testing from dirauths. new task Medium Tor: unspecified
#19321 controller: Ensure events exist for all guard state transitions new enhancement Medium Tor: unspecified
#19987 Unit Test Guard, Middle, Exit, Intro, and Rend node choices new enhancement Medium Tor: unspecified
#20719 prop271 -- make parameters configurable accepted nickm enhancement Medium Tor: unspecified
#20822 Follow-up tasks for prop271 (new guard API) implementation assigned nickm project Medium Tor: unspecified
#20825 User-named guard selections new enhancement Medium Tor: unspecified
#20827 Record guards' ed25519 identities new enhancement Medium Tor: unspecified
#20832 Design proposals to further improve guard security assigned nickm enhancement Medium Tor: 0.3.4.x-final
#20916 Proposal: Put Relay IPv6 Addresses in the microdesc consensus assigned teor task Medium Tor: 0.3.4.x-final
#20931 [prop271] Generate GUARD controller events accepted nickm enhancement Medium Tor: unspecified
#21006 Reduce NumDirectoryGuards to 1 new defect Medium Tor: unspecified
#21421 Maybe check for GUARD_WAIT circuit readiness whenever a guard fails new enhancement Medium Tor: unspecified
#21422 Possibly, learn more network data from GUARD_USABLE_NEVER circuits? new defect Medium Tor: unspecified
#21423 Refactor choose_good_entry_server based on different usecases new defect Medium Tor: unspecified
#21424 Treat directory guard success only as a partial success for the guard? new defect Medium Tor: unspecified
#21425 entry_list_is_constrained() should look at the guard_selection_t object needs_information defect Medium Tor: 0.3.3.x-final
#22351 Should bridge lines in the state file use unlisted_since? accepted nickm defect Medium Tor: unspecified
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order needs_revision teor defect Medium Tor: 0.3.4.x-final
#23978 Write simulator to evaluate security of Prop247 parameter choices new task Medium Tor: unspecified
#23979 Write performance simulator for Prop247 new task Medium Tor: unspecified
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. assigned mikeperry enhancement Medium Tor: 0.3.4.x-final
#24110 document control protocol router status format surprises when using microdescriptors new defect Medium Tor: 0.3.3.x-final
#24193 Make v3 single onion services parse and use IPv6 introduce link specifiers accepted dgoulet enhancement Medium Tor: 0.3.4.x-final
#24338 DirAuths that have IPv6 addresses don't include them in their vote on themself new defect Medium Tor: 0.3.4.x-final
#24403 Propose and implement IPv6 ORPort reachability checks on relays assigned teor task Medium Tor: 0.3.4.x-final
#24404 Propose a relay protover that allows IPv6 extends new enhancement Medium Tor: 0.3.4.x-final
#24405 Implement relay IPv6 extends with proposed protover new enhancement Medium Tor: 0.3.4.x-final
#24406 Implement IPv6 ORPort reachability fallback new enhancement Medium Tor: 0.3.4.x-final
#24451 Put IPv6 link specifiers in client EXTEND cells accepted dgoulet enhancement Medium Tor: 0.3.4.x-final
#24535 Document which address functions we should use, and when new defect Medium Tor: 0.3.4.x-final
#24546 Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 addresses new defect Medium Tor: 0.3.3.x-final
#24603 Update control spec to allow decorated IPv6 addresses in reachability events needs_revision teor defect Medium Tor: 0.3.4.x-final
#24604 Decorate IPv6 addresses in connection_t->address to avoid ambiguity new defect Medium Tor: 0.3.4.x-final
#24611 Add a chutney network that does reachability tests new enhancement Medium
#24731 Stop checking routerinfos for addresses when we use microdescs for circuits new defect Medium Tor: 0.3.4.x-final
#24732 Remove unused IPv6 DirPort code new enhancement Medium Tor: 0.3.4.x-final
#24735 Always check for the null address when calling address functions new defect Medium Tor: 0.3.4.x-final
#469 please limit connections by client needs_revision defect Low Tor: unspecified
#18647 When low on BW, limit the total fraction used to answer directory requests new enhancement Low Tor: unspecified
Note: See TracQuery for help on using queries.