Tor: Active Tickets by Milestone (1476 matches)

This report shows how to color results by priority, while grouping results by milestone.

Last modification time, description and reporter are included as hidden fields for useful RSS export.

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1476)

1 2 3 4 5 6 7 8 9 10 11

Milestone: Tor: 0.2.7.x-final (1 match)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#20512 Make a Tor 0.2.7.7 release, with the patch for #20384 Core Tor/Tor new task Medium Tor: 0.2.7.x-final TorCoreTeam201702 TorCoreTeam201703

Milestone: Tor: 0.2.9.x-final (5 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#20059 Bug: Duplicate call to circuit_mark_for_close Core Tor/Tor needs_review defect Medium Tor: 0.2.9.x-final 030-backport, 029-backport
#20509 Directory authorities should take away Guard flag from relays with #20499 bug Core Tor/Tor needs_revision defect Medium Tor: 0.2.9.x-final Tor: 0.2.8.9 028-backport, easy, TorCoreTeam201612, review-group-15
#20615 Your Guard is failing an extremely large amounts of circuits. Core Tor/Tor new defect Medium Tor: 0.2.9.x-final Tor: 0.2.8.9
#21109 apparent inconsistency in prop264 Core Tor/Tor new defect Medium Tor: 0.2.9.x-final torspec
#21117 can't migrate onion services to single-hop onion services Core Tor/Tor assigned defect Medium Tor: 0.2.9.x-final Tor: 0.2.9.8 tor-hs, single-onion

Milestone: Tor: 0.3.0.x-final (14 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#20423 Clock jumps on relay due to hostname lookup timeouts Core Tor/Tor reopened defect High Tor: 0.3.0.x-final Tor: 0.2.9.10 regression, 029-backport
#21554 Inventory proposals that need merging into specs ; merge them. Core Tor/Tor accepted task High Tor: 0.3.0.x-final TorCoreTeam201703
#21561 CRYPTO_THREADID_set_callback Core Tor/Tor new defect High Tor: 0.3.0.x-final Tor: 0.3.0.1-alpha openssl
#19699 Remove almost all functionality from Tor's test-network.sh Core Tor/Tor needs_review defect Medium Tor: 0.3.0.x-final 029-proposed, tor-03-unspecified-201612
#20956 optionally do not write command line config to torrc Core Tor/Tor reopened defect Medium Tor: 0.3.0.x-final Tor: 0.3.0.3-alpha tbb-wants
#21283 Remove broken fallback directory mirrors Core Tor/Tor needs_revision defect Medium Tor: 0.3.0.x-final fallback, 028-backport, 029-backport, TorCoreTeam201703
#21415 tor_bug_occurred_: Bug: src/or/entrynodes.c:1845: select_entry_guard_for_circuit: Non-fatal assertion !(!guard_has_descriptor(guard)) failed. Core Tor/Tor needs_review defect Medium Tor: 0.3.0.x-final Tor: 0.3.0.3-alpha 030-backport
#21470 Write unit tests for security regressions Core Tor/Tor needs_review task Medium Tor: 0.3.0.x-final test 030-backport 029-backport
#21534 "Client asked me to extend back to the previous hop" in small networks Core Tor/Tor new defect Medium Tor: 0.3.0.x-final regression?, guard-selection, TorCoreTeam201703
#21596 When hidden services stop creating new intro points, they also stop checking existing ones Core Tor/Tor needs_review defect Medium Tor: 0.3.0.x-final Tor: 0.2.7.2-alpha tor-hs, 030-backport
#21809 Tor sometimes waits much longer than ShutdownWaitLength Core Tor/Tor new defect Medium Tor: 0.3.0.x-final Tor: 0.2.9.10 regression, 029-backport?
#21810 Port rebind should not be performed after soft accounting limit reached Core Tor/Tor new defect Medium Tor: 0.3.0.x-final Tor: 0.2.9.10 regression?, easy, 029-backport?
#21825 no symbol warning for hs_service.c Core Tor/Tor new defect Medium Tor: 0.3.0.x-final tor-hs
#21540 Warning "Failure from drain_fd" Core Tor/Tor needs_review defect Low Tor: 0.3.0.x-final Tor: 0.2.9.9 supressed 029-backport 030-backport

Milestone: Tor: 0.3.1.x-final (80 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#12424 Implement improved hidden service protocol (prop224) Core Tor/Tor assigned enhancement Very High Tor: 0.3.1.x-final tor-hs, prop224, term-project-ideas
#17242 prop224: Implement client support Core Tor/Tor new enhancement Very High Tor: 0.3.1.x-final tor-hs, prop224
#17690 prop224: Control the number of HSDirs using a consensus parameter Core Tor/Tor assigned enhancement Very High Tor: 0.3.1.x-final prop224, tor-hs
#20524 Revise initial descriptor upload behavior for onion services Core Tor/Tor assigned enhancement Very High Tor: 0.3.1.x-final tor-hs, research, tor-spec, prop224
#20657 prop224: Implement service support. Core Tor/Tor assigned enhancement Very High Tor: 0.3.1.x-final tor-hs, prop224
#20700 prop224: Implement client authorization Core Tor/Tor assigned enhancement Very High Tor: 0.3.1.x-final prop224, tor-hs, triage-out-030-201612
#20961 prop224: Implement consensus params to adjust portion of the protocol Core Tor/Tor assigned enhancement Very High Tor: 0.3.1.x-final tor-hs, prop224
#21403 prop224: Implement HS descriptor fetching Core Tor/Tor accepted enhancement Very High Tor: 0.3.1.x-final tor-hs, prop224
#21509 Fuzz v3 hidden services Core Tor/Tor new enhancement Very High Tor: 0.3.1.x-final fuzz, prop224, tor-hs
#12600 Save retrieved bridge information in our state file Core Tor/Tor assigned task High Tor: 0.3.1.x-final tor-bridge, tails-wants, 028-triage, tor-pt, TorCoreTeam201612, triage-out-030-201612
#13339 Prop140: Complete Consensus diffs / Merge GSoC project Core Tor/Tor assigned enhancement High Tor: 0.3.1.x-final Tor: 0.2.7 gsoc, merge, tor-client, prop140, 027-triaged-1-in, 028-triaged, pre028-patch, tor-dos, low-bandwidth, nickm-deferred-20160905, tor-03-unspecified-201612, sponsor4, TorCoreTeam201703
#16861 Pad Tor connections to collapse netflow records Core Tor/Tor needs_review enhancement High Tor: 0.3.1.x-final 028-triage, 028-triaged, pre028-patch, 201511-deferred, 201512-deferred, tor-guard, TorCoreTeam-postponed-201604, nickm-deferred-20160905, review-group-9, nickm-deferred-20161005
#17592 Clean up connection timeout logic Core Tor/Tor needs_review defect High Tor: 0.3.1.x-final TorCoreTeam-postponed-201604, nickm-deferred-20160905, review-group-9, nickm-deferred-20161005, sponsor2
#17604 Try to use only one canonical connection Core Tor/Tor needs_review defect High Tor: 0.3.1.x-final TorCoreTeam-postponed-201604, nickm-deferred-20160905, review-group-9, nickm-deferred-20161005, sponsor2
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents Core Tor/Tor needs_revision defect High Tor: 0.3.1.x-final tor-auth, isaremoved, tor-03-unspecified-201612, review-group-15
#20532 Make sure directory_initiate_command_rend handles pluggable transports correctly Core Tor/Tor new defect High Tor: 0.3.1.x-final bridge-client, bridge-bypass, triage-out-030-201612
#20575 Delete HTTPProxy from Tor config manual, and Tor itself Core Tor/Tor new task High Tor: 0.3.1.x-final triage-out-030-201612
#21120 evdns_get_orig_address Core Tor/Tor new defect High Tor: 0.3.1.x-final
#8453 Alter flag-weight balancing equations Core Tor/Tor new enhancement Medium Tor: 0.3.1.x-final performance, SponsorZ, needs-proposal, tor-client, mike-0.2.5, 028-triage, 201511-deferred, tor-sponsorU-orphan, nickm-deferred-20161005, triage-out-030-201612
#11101 Bridges should report implementation versions of their pluggable transports Core Tor/Tor new enhancement Medium Tor: 0.3.1.x-final bridgedb, needs-proposal, needs-spec, pt, 028-triage, tor-bridge, tor-pt, triage-out-030-201612
#13802 Add general trace-event logging instrumentation to Tor Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final tor-03-unspecified-201612, review-group-15
#16706 Too many connection_edge_process_relay_cell warnings Core Tor/Tor accepted defect Medium Tor: 0.3.1.x-final Tor: 0.2.6.10 tor-hs, nickm-deferred-20161017, triage-out-030-201612
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final tor-bridge, 028-triage, TorCoreTeam201608
#17598 Trace cell queue times in Tor to measure Tor application "congestion" Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final kist, tor-03-unspecified-201612
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl Core Tor/Tor new enhancement Medium Tor: 0.3.1.x-final easy, refactor, triaged-out-20170124
#17868 base64_decode_nopad() destination buffer length problem Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final review-group-12
#18320 Clear old entries from the key-pinning journal file Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final tor-dos, TorCoreTeam201607, review-group-3, nickm-deferred-20161005
#18329 Let bridges indicate when they don't want BridgeDB to distribute their address Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final tor-bridge, stem
#18757 Memunit config defaults say "KB" rather than "KBytes" Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final easy
#18988 log error level messages if relay (self) is not in consensus Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final easy, nickm-deferred-20161017
#19487 Meek and ReachableAddresses Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: 0.2.8.2-alpha ipv6, bridges, pluggable-transports, regression, CoreTorTeam201609, nickm-deferred-20161005
#19661 tor refuses to use /dev/null as a config file Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final Tor: 0.2.8.5-rc easy, lorax, integration, review-group-15
#20191 Prevent a recurrence of #20103 Core Tor/Tor new defect Medium Tor: 0.3.1.x-final triage-out-030-201612
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.1.x-final easy, tor-dirauth
#20822 Follow-up tasks for prop271 (new guard API) implementation Core Tor/Tor assigned project Medium Tor: 0.3.1.x-final tor-guard, triaged-out-20170124
#20832 Design proposals to further improve guard security Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final tor-guard, TorCoreTeam201703
#20916 Inconsistent IPv6 address between consensus and microdescriptor Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final needs-proposal, ipv6, regression, triage-out-030-201612
#20963 [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20. Core Tor/Tor needs_information defect Medium Tor: 0.3.1.x-final Tor: 0.2.8.9 028-backport 029-backport
#21031 Please don't remove ClientDNSRejectInternalAddresses Core Tor/Tor new defect Medium Tor: 0.3.1.x-final
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final tor-guard, refactor
#21084 sometimes we call circuit has_opened() more than 2 times on client side Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: 0.3.0.1-alpha tor-hs
#21133 Add ed25519 relay key expire date Core Tor/Tor new defect Medium Tor: 0.3.1.x-final torspec, dirauth
#21155 Similar to #14917: Client's choice of rend point can leak info about guard(s) of misconfigured hidden services with EntryNodes option Core Tor/Tor needs_information defect Medium Tor: 0.3.1.x-final tor-hs, tor-guard
#21205 Instrument clients to measure directory usage Core Tor/Tor assigned project Medium Tor: 0.3.1.x-final sponsor4, TorCoreTeam201703
#21206 Measure client up/down bandwidth for directory requests, split by type Core Tor/Tor new defect Medium Tor: 0.3.1.x-final sponsor4 TorCoreTeam201702
#21207 Test scenarios for clients that are idle for large periods of time Core Tor/Tor new task Medium Tor: 0.3.1.x-final sponsor4
#21208 Measure overall client bandwidth usage and circuit counts Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final sponsor4, TorCoreTeam201703
#21209 Write, revise, analyze proposals for ways to use less directory bandwidth Core Tor/Tor accepted project Medium Tor: 0.3.1.x-final sponsor4, TorCoreTeam201703
#21212 Write and analyze proposals for transmitting microdescriptors with less bandwidth Core Tor/Tor new defect Medium Tor: 0.3.1.x-final sponsor4, TorCoreTeam201703
#21213 Write and analyze proposals for fetching consensuses/microdescriptors less frequently? Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final sponsor4, TorCoreTeam201703
#21214 Based on measurement of #21205, write/analyze additional proposals and tickets for lowering bw usage for directory stuff Core Tor/Tor new task Medium Tor: 0.3.1.x-final sponsor4, TorCoreTeam201703
#21215 Lower the directory overhead for low-bandwidth clients Core Tor/Tor new project Medium Tor: 0.3.1.x-final sponsor4
#21293 circuit_receive_relay_cell(): Bug: relay crypt failed. Dropping connection. Core Tor/Tor accepted defect Medium Tor: 0.3.1.x-final Tor: 0.3.0.1-alpha tor-client
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: 0.2.4.7-alpha ipv6
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit Core Tor/Tor needs_information defect Medium Tor: 0.3.1.x-final ipv6
#21346 Clients with NoIPv4Traffic should only choose IPv6-supporting Exits Core Tor/Tor new defect Medium Tor: 0.3.1.x-final ipv6
#21406 The channel is_client flag is inaccurate Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: 0.2.4.23
#21425 entry_list_is_constrained() should look at the guard_selection_t object Core Tor/Tor new defect Medium Tor: 0.3.1.x-final guards
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time Core Tor/Tor needs_information defect Medium Tor: 0.3.1.x-final Tor: 0.2.3.9-alpha tor-hs
#21522 ClientDNSRejectInternalAddresses should not be deprecated in test networks. Core Tor/Tor new defect Medium Tor: 0.3.1.x-final
#21600 Hidden service introduction point retries occur at 1 second intervals Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final Tor: 0.2.7.2-alpha tor-hs, single-onion
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: 0.2.7.2-alpha tor-hs
#21642 Prop275: Eliminate "published" times from microdescriptor consensus Core Tor/Tor needs_review enhancement Medium Tor: 0.3.1.x-final TorCoreTeam201703, review-group-17
#21646 prop140/compression: Refactor "directory request" code Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop140
#21647 Prop140: directory caches cache multiple past diffs or consensuses Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final prop140
#21648 prop140: Caches generate diffs as appropriate Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final prop140
#21649 prop140: Caches serve diffs on request Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final prop140
#21650 prop140: Clients request diffs and handle diffs in replies Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final prop140
#21662 prop278: Add support for LZMA2 and/or Zstandard Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21663 prop278: Refactor the torgzip module to support additional compression schemes Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21664 prop278: Make the current 'torgzip' module a submodule of a new 'compression' module Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21665 Prop278: Establish an upper-bound for LZMA2 memory usage Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21666 Prop278: Code to decide whether we want to request and/or provide CPU-intensive compression methods Core Tor/Tor new task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21667 Prop278: Handle new headers in directory.c Core Tor/Tor accepted task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21668 Prop278: Update cached_dir_t and related types to no longer assume single compresison method Core Tor/Tor new task Medium Tor: 0.3.1.x-final TorCoreTeam201703, prop278
#21673 prop140: Handle signatures correctly Core Tor/Tor accepted defect Medium Tor: 0.3.1.x-final prop140
#21693 prop224: HS descriptors do wasteful double-base64 encoding Core Tor/Tor assigned task Medium Tor: 0.3.1.x-final tor-hs, prop224
#21715 Possible error in the Tor manual (section "NumEntryGuards NUM") Core Tor/Tor new defect Medium Tor: 0.3.1.x-final easy doc
#21750 prop224: ntor handshake implementation Core Tor/Tor needs_review task Medium Tor: 0.3.1.x-final tor-hs, prop224, review-group-17
#21757 Using Pluggable Transports on tor master is broken Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final
(more results for this group on next page)
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.