Tor: Active Tickets by Milestone (1296 matches)

This report shows how to color results by priority, while grouping results by milestone.

Last modification time, description and reporter are included as hidden fields for useful RSS export.

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1296)

1 2 3 4 5 6 7 8 9 10 11

Milestone: Tor: 0.2.8.x-final (1 match)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#22801 Warnings from isnan, isinfinite, signbit on mingw Core Tor/Tor needs_review defect Medium Tor: 0.2.8.x-final 028-backport, 029-backport, 030-backport, 031-backport

Milestone: Tor: 0.3.0.x-final (5 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#21561 CRYPTO_THREADID_set_callback Core Tor/Tor needs_information defect High Tor: 0.3.0.x-final Tor: 0.3.0.1-alpha openssl
#22255 Frequent OOM kills of tor process Core Tor/Tor new defect High Tor: 0.3.0.x-final
#23233 Unexpected BUG violation in hsv3 decriptor decoding Core Tor/Tor needs_review defect High Tor: 0.3.0.x-final prop224, easy, tor-hs, 031-backport
#21470 Write unit tests for security regressions Core Tor/Tor needs_review task Medium Tor: 0.3.0.x-final test, 030-backport, 029-backport
#23291 unintentional undefined behaviore in test-memwipe.c Core Tor/Tor needs_review defect Medium Tor: 0.3.0.x-final 028-backport 029-backport 030-backport

Milestone: Tor: 0.3.1.x-final (15 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#22921 Tor 0.3.0.9 and 0.3.1.4-alpha on FreeBSD: Failed to find node for hop 0 of our path. Discarding this circuit. Core Tor/Tor needs_information defect Very High Tor: 0.3.1.x-final Tor: 0.3.0.9 030-backport
#20532 Make sure directory_initiate_request handles pluggable transports correctly Core Tor/Tor accepted defect High Tor: 0.3.1.x-final bridge-client, bridge-bypass
#21969 We're missing descriptors for some of our primary entry guards Core Tor/Tor assigned defect High Tor: 0.3.1.x-final Tor: 0.3.0.6 tor-guard, tor-bridge, tor-client
#22422 Add noise to PaddingStatistics Core Tor/Tor needs_information defect High Tor: 0.3.1.x-final Tor: 0.3.1.1-alpha privcount, guard-discovery
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ Core Tor/Tor needs_review defect High Tor: 0.3.1.x-final Tor: 0.3.1.3-alpha sandbox, regression, review-group-23
#22653 upgrading Tor-0.2.9.10 to Tor-0.3.0.8 or Tor-0.3.1.3_alpha fails to build circuits Core Tor/Tor needs_information defect High Tor: 0.3.1.x-final Tor: 0.3.0.8 tor-guard tor-client
#23551 src/common/compress.c:576: tor_compress_process: Non-fatal assertion Core Tor/Tor new defect High Tor: 0.3.1.x-final Tor: 0.3.1.5-alpha
#21206 Measure client up/down bandwidth for directory requests, split by type Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final sponsor4
#21208 Measure overall client bandwidth usage and circuit counts Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final sponsor4
#22212 [warn] channelpadding_compute_time_until_pad_for_netflow(): Bug: Channel padding timeout scheduled 164729ms in the past. Did the monotonic clock just jump? Core Tor/Tor reopened defect Medium Tor: 0.3.1.x-final Tor: 0.3.1.1-alpha
#22233 Reconsider behavior on .z URLs with Accept-Encoding header Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final
#22275 Update dir-spec.txt to reflect prop278. Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. Core Tor/Tor needs_information defect Medium Tor: 0.3.1.x-final Tor: 0.3.1.2-alpha tor-client tor-bridge 030-backport
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final Tor: 0.3.1.1-alpha technical-debt, disaster-waiting-to-happen, 031-deferrable
#22926 The Tor compression code can call functions that are NULL Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final Tor: 0.3.1.1-alpha

Milestone: Tor: 0.3.2.x-final (61 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#12424 Implement improved hidden service protocol (prop224) Core Tor/Tor accepted enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224, term-project-ideas
#21394 connection timeouts are affecting Tor Browser usability Core Tor/Tor new defect Very High Tor: 0.3.2.x-final tbb-performance, tbb-usability, performance
#21509 Fuzz v3 hidden services Core Tor/Tor needs_revision task Very High Tor: 0.3.2.x-final fuzz, prop224, tor-hs
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed Core Tor/Tor new defect High Tor: 0.3.2.x-final Tor: 0.2.2.37 tor-relay crash assertion 029-backport 030-backport 031-backport needs-insight
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 Core Tor/Tor needs_revision defect High Tor: 0.3.2.x-final Tor: 0.2.4.19 tor-client, 025-backport, nickm-should-review
#12600 Save retrieved bridge information in our state file Core Tor/Tor assigned task High Tor: 0.3.2.x-final tor-bridge, tails-wants, tor-pt
#18614 tor uses full cpu when unplugged Core Tor/Tor needs_information defect High Tor: 0.3.2.x-final tor, cpu, hang tor-client sponsor8-maybe resource-management
#23105 Bug: outgoing relay cell sent from src/or/relay.c:836 has n_chan==NULL. Core Tor/Tor new defect High Tor: 0.3.2.x-final Tor: 0.3.1.5-alpha 031-backport harmless? annoyance
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap Core Tor/Tor new defect High Tor: 0.3.2.x-final tor-hs
#3733 Tor should abandon rendezvous circuits that cause a client request to time out Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final tor-hs, prop224, tor-client
#5190 Collect Rob's patch for throttling flows at guards Core Tor/Tor assigned task Medium Tor: 0.3.2.x-final performance, scheduling, SponsorZ, tor-relay, review-group-18
#7707 Impose a minimum write size for TLS writes Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final tor-relay, performance, bwbug, bandwidth sponsor8-maybe tls nagle
#8185 circuit_package_relay_cell(): Bug: outgoing relay cell has n_chan==NULL. Dropping. Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.4.9-alpha tor-relay logging needs-analysis
#12062 Audit DisableNetwork, we_are_hibernating usage Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final tor-client technical-debt quiet-mode sponsor8-maybe
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final tor-bridge
#19711 circuit_package_relay_cell(): Bug: outgoing relay cell sent from src/or/relay.c:701 has n_chan==NULL. Dropping. (on Tor 0.2.8.5-rc ) Core Tor/Tor new defect Medium Tor: 0.3.2.x-final log annoyance tor-relay tor-client
#20963 [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20. Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final Tor: 0.2.8.9 029-backport, 031-deferred-20170425
#21205 Instrument clients to measure directory usage Core Tor/Tor assigned project Medium Tor: 0.3.2.x-final sponsor4
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final ipv6, 031-deferred-20170425
#21358 Tor fails to reconnect after computer resumes from sleep Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.9.8 sleep wakeup power-management online-detection tor-client sponsor8-maybe
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final Tor: 0.2.3.9-alpha tor-hs, 031-deferred-20170425
#21534 "Client asked me to extend back to the previous hop" in small networks Core Tor/Tor new defect Medium Tor: 0.3.2.x-final regression?, guard-selection
#21573 Fix tor warnings that chutney is currently ignoring Core Tor/Tor new defect Medium Tor: 0.3.2.x-final
#21800 test suite triggers Bug: Result does not fit in tor_timegm but does not fail Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.9.10 029-backport, 030-backport, 031-deferred-20170425
#22090 Rename channel client functions for clarity Core Tor/Tor assigned enhancement Medium Tor: 0.3.2.x-final easy refactor
#22109 Test that own version passes directory authority checks Core Tor/Tor needs_review enhancement Medium Tor: 0.3.2.x-final
#22110 Defining TOR_BUILD_TAG and tor_git_revision violates the version spec Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final easy, tor-spec, spec
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour Core Tor/Tor new defect Medium Tor: 0.3.2.x-final tor-spec, spec
#22461 Tor emits inaccurate safesocks warning event whenever you visit a naked IP address Core Tor/Tor reopened defect Medium Tor: 0.3.2.x-final Tor: 0.2.6.2-alpha
#22730 Restricting exit nodes in torrc fails silently Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final
#22745 Establish policy for writing regression tests Core Tor/Tor new task Medium Tor: 0.3.2.x-final policy, docs
#22771 Determine Rust support levels for our targeted platforms Core Tor/Tor needs_information task Medium Tor: 0.3.2.x-final rust, SponsorZ
#22805 Remove or_circuit_t.is_first_hop, because it's not accurate any more Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final technical-debt, security-review, review-group-23
#22962 Clarify the security severity of issues that make denial of service easier Core Tor/Tor new task Medium Tor: 0.3.2.x-final docs policy
#23092 CircuitIdleTimeout man entry should document IDLE_TIMEOUT_WHILE_LEARNING Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final Tor: 0.2.2.2-alpha doc easy
#23100 Circuit Build Timeout needs to count hidden service circuits Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final Tor: 0.2.7 tor-hs, path-bias, guard-discovery, needs-proposal, mike-can, prop247, tor-guard
#23159 Bug: Non-fatal assertion ei failed in launch_intro_point_circuits at src/or/hs_service.c:1784 Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final tor-hs, prop224
#23234 Possible problem with bootstrapping logic (Problem bootstrapping. Stuck at 53%: Loading relay descriptors. (No route to host; NOROUTE; count 7; recommendation warn) Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: unspecified bootstrap dirguard bridge needs-insight 031-backport
#23253 BridgeAuth goes offline when it has an expired ed25519_signing_cert Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final tor-bridgeauth, tor-dirauth, tor-ed25519-keys
#23303 hs: Explain why we reset the directory connection timestamp client side Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final tor-hs, prop224
#23318 compute_weighted_bandwidths: do not add 0.5 to final_weight Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.4.3-alpha path-selection
#23323 sample_laplace_distribution should produce a valid result on 0.0 Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final Tor: 0.2.6.3-alpha security-low, tor-relay, 031-backport, 030-backport, 029-backport, 028-backport-maybe, 026-backport-maybe
#23406 Sampled guards are not re-weighted when a new consensus arrives Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.3.0.1-alpha path-selection, tor-guard
#23414 rep_hist_format_hs_stats() should add noise, then round Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final Tor: 0.2.6.2-alpha tor-relay, security-low, privcount, 031-backport, 030-backport, 029-backport, 028-backport
#23415 sample_laplace_distribution() should take multiple random inputs Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final Tor: 0.2.8.1-alpha tor-relay, security-low, privcount, 031-backport, 030-backport, 029-backport, 028-backport-maybe, 026-backport-maybe
#23416 Document the precision and limits of sample_laplace_distribution() Core Tor/Tor assigned enhancement Medium Tor: 0.3.2.x-final tor-relay, privcount
#23420 prop224: Pad RENDEZVOUS1 cell to match legacy cell length Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final prop224, prop224-extra, tor-hs
#23441 make test: fgets_eagain FAILED Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.3.0.10 portability tor-tests
#23493 IPv6 v3 Single Onion Services fail with a bug warning Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final prop224, tor-hs, single-onion, ipv6
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final prop224, tor-relay, tor-hs
#23507 Add single onion unreachable address algorithm to prop224 Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final doc, tor-spec, prop224, tor-hs, single-onion, ipv6
#23538 Allow KISTSchedRunInterval to be negative Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final tor-sched, easy
#23539 We've defined "don't use kist" as a negative interval, so don't check for -1 Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final tor-sched, easy
#23552 We don't need to log our scheduler type so often Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final tor-sched
#23562 keep changes files on master release-ready Core Tor/Tor new task Medium Tor: 0.3.2.x-final ci tor-doc tor-releng
#23563 document changes files release-readiness requirement in doc/HACKING Core Tor/Tor new task Medium Tor: 0.3.2.x-final tor-doc tor-releng
#23564 run make check-changes in CI Core Tor/Tor needs_review task Medium Tor: 0.3.2.x-final ci tor-doc tor-releng
#23581 Die more helpfully if Schedulers option isn't compatible with platform Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final tor-sched
#23592 Update longclaw's IPv4 address (after it moves) Core Tor/Tor needs_information defect Medium Tor: 0.3.2.x-final Tor: 0.2.6.2-alpha tor-dir-auth
#20895 Split node_supports_ed25519_link_authentication into two or three separate functions Core Tor/Tor needs_revision task Low Tor: 0.3.2.x-final refactor
#23374 Circuit dirtiness is inconsistant with MaxCircuitDirtiness Core Tor/Tor new defect Low Tor: 0.3.2.x-final

Milestone: Tor: 0.3.3.x-final (18 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#2149 new 'extra dormant' mode for people who never use their tor Core Tor/Tor new enhancement Very High Tor: 0.3.3.x-final Tor: 0.2.7 performance, scaling, tor-client, SponsorU-deferred, sponsor4, sponsor8-maybe
#20700 prop224: Implement client authorization Core Tor/Tor assigned enhancement Very High Tor: 0.3.3.x-final prop224, tor-hs
#22810 prop224: Make the client/service extend properly to the IP/RP Core Tor/Tor needs_revision enhancement Very High Tor: 0.3.3.x-final tor-hs, prop224-extra
#14039 Many unnecessary CPU wakeups per second Core Tor/Tor accepted defect High Tor: 0.3.3.x-final Tor: 0.2.5.10 tor-client sponsor8-maybe
#15421 Relay crash when reloading and resolv.conf is empty Core Tor/Tor new defect High Tor: 0.3.3.x-final Tor: 0.2.7.1-alpha tor-relay resolv.conf dns dos-maybe
#15940 Make a standard transition plan for killing off a client version Core Tor/Tor accepted task High Tor: 0.3.3.x-final SponsorS, tor-dos-designs
#15941 Form a plan for killing off client versions which assume they'll live forever Core Tor/Tor accepted task High Tor: 0.3.3.x-final Tor: 0.2.4.1-alpha SponsorS, needs-proposal, tor-dos-designs
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents Core Tor/Tor needs_revision defect High Tor: 0.3.3.x-final tor-dirauth
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. Core Tor/Tor accepted project High Tor: 0.3.3.x-final dirauth, needs-proposal, tor-dos, tor-dos-designs, term-project research-program
#19566 SR: Use BUG() instead of tor_assert() when we can Core Tor/Tor needs_revision enhancement High Tor: 0.3.3.x-final tor-sr, dirauth, easy, disaster-waiting-to-happen
#22266 fix the jump-to-80% issue Core Tor/Tor new defect High Tor: 0.3.3.x-final usability, ux, ux-team, bootstrap
#22893 prop224: Make intro point per-service and not per-descriptor Core Tor/Tor accepted enhancement High Tor: 0.3.3.x-final tor-hs, prop224-extra
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop Core Tor/Tor new defect High Tor: 0.3.3.x-final Tor: 0.3.0.9 needs-insight needs-analysis
#23289 Improving HS reachability for Orbot/Android users Core Tor/Tor new enhancement High Tor: 0.3.3.x-final orbot, mobile, android
#23300 prop224: General client side issues Core Tor/Tor assigned defect High Tor: 0.3.3.x-final tor-hs, prop224
#23605 BOOTSTRAP PROGRESS=80 is a lie Core Tor/Tor new defect High Tor: 0.3.3.x-final bootstrap clock-skew tor-guard usability ux
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely Core Tor/Tor new enhancement Medium Tor: 0.3.3.x-final prop212, tor-client, small-feature, tor-dos-dirauth, low-bandwidth, sponsor4, sponsor8-maybe
#7176 Adapt and update AccessLabs' patches for reduced TOR memory consumption for embedded devices Core Tor/Tor accepted enhancement Medium Tor: 0.3.3.x-final Tor: unspecified tor-client, embedded, low-memory, sponsor8-maybe
(more results for this group on next page)
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.