Tor: Active Tickets by Milestone (1290 matches)

This report shows how to color results by priority, while grouping results by milestone.

Last modification time, description and reporter are included as hidden fields for useful RSS export.

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1290)

1 2 3 4 5 6 7 8 9 10 11

Milestone: Tor: 0.3.0.x-final (3 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#21561 CRYPTO_THREADID_set_callback Core Tor/Tor needs_information defect High Tor: 0.3.0.x-final Tor: 0.3.0.1-alpha openssl
#22255 Frequent OOM kills of tor process Core Tor/Tor new defect High Tor: 0.3.0.x-final
#21470 Write unit tests for security regressions Core Tor/Tor needs_review task Medium Tor: 0.3.0.x-final test, 030-backport, 029-backport

Milestone: Tor: 0.3.1.x-final (29 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#21509 Fuzz v3 hidden services Core Tor/Tor accepted task Very High Tor: 0.3.1.x-final fuzz, prop224, tor-hs
#20532 Make sure directory_initiate_request handles pluggable transports correctly Core Tor/Tor accepted defect High Tor: 0.3.1.x-final bridge-client, bridge-bypass
#21554 Inventory proposals that need merging into specs ; merge them. Core Tor/Tor accepted task High Tor: 0.3.1.x-final
#21969 We're missing descriptors for some of our primary entry guards Core Tor/Tor assigned defect High Tor: 0.3.1.x-final Tor: 0.3.0.6 tor-guard, tor-bridge, tor-client
#22209 Channelpadding tests fail on kevent-based systems Core Tor/Tor assigned defect High Tor: 0.3.1.x-final
#22276 Merge prop220/prop244 to tor-spec/dir-spec Core Tor/Tor accepted defect High Tor: 0.3.1.x-final
#22422 Add noise to PaddingStatistics Core Tor/Tor new defect High Tor: 0.3.1.x-final Tor: 0.3.1.1-alpha privcount
#22653 upgrading Tor-0.2.9.10 to Tor-0.3.0.8 or Tor-0.3.1.3_alpha fails to build circuits Core Tor/Tor new defect High Tor: 0.3.1.x-final Tor: 0.3.0.8 tor-guard tor-bridge obfs4proxy
#17857 Create a consensus param to disable (netflow) padding if RSOS is enabled Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final rsos, sos, tor-hs
#20615 Your Guard is failing an extremely large amounts of circuits. Core Tor/Tor new defect Medium Tor: 0.3.1.x-final Tor: 0.2.8.9 performance
#21205 Instrument clients to measure directory usage Core Tor/Tor assigned project Medium Tor: 0.3.1.x-final sponsor4
#21206 Measure client up/down bandwidth for directory requests, split by type Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final sponsor4
#21208 Measure overall client bandwidth usage and circuit counts Core Tor/Tor assigned enhancement Medium Tor: 0.3.1.x-final sponsor4
#21394 connection timeouts are affecting Tor Browser usability Core Tor/Tor new defect Medium Tor: 0.3.1.x-final tbb-performance, tbb-usability, performance
#22105 define a more generic LIBFUZZER = ... in Makefile.in Core Tor/Tor needs_review enhancement Medium Tor: 0.3.1.x-final Tor: 0.3.0.6
#22159 Hidden service f3oap63t7u7hfnki exceeded launch limit with 11 intro points in the last 77 seconds Core Tor/Tor accepted defect Medium Tor: 0.3.1.x-final tor-hs
#22212 [warn] channelpadding_compute_time_until_pad_for_netflow(): Bug: Channel padding timeout scheduled 164729ms in the past. Did the monotonic clock just jump? Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: 0.3.1.1-alpha
#22233 Reconsider behavior on .z URLs with Accept-Encoding header Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final
#22275 Update dir-spec.txt to reflect prop278. Core Tor/Tor assigned defect Medium Tor: 0.3.1.x-final
#22278 Is anything undocumented from proposals 158, 162? Core Tor/Tor accepted defect Medium Tor: 0.3.1.x-final
#22348 16 relays have mismatched rsa/ed keys currently Core Tor/Tor new defect Medium Tor: 0.3.1.x-final
#22349 dir auth attempts to fetch a descriptor every minute for every relay with mismatched rsa/ed key Core Tor/Tor new defect Medium Tor: 0.3.1.x-final Tor: 0.3.0.7 029-backport, 030-backport
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file Core Tor/Tor accepted defect Medium Tor: 0.3.1.x-final Tor: 0.3.0.7 tor-client tor-guard 030-backport
#22489 Bridge oftenly reports Failed to find node for hop 0 of our path. Discarding this circuit. Core Tor/Tor needs_information defect Medium Tor: 0.3.1.x-final Tor: 0.3.1.2-alpha tor-client tor-bridge 030-backport
#22663 Tor keeps using a very slow guard Core Tor/Tor new defect Medium Tor: 0.3.1.x-final Tor: 0.3.0.8
#22670 Clean up warning behavior of decompression code in connection_dir_client_reached_eof() Core Tor/Tor needs_review defect Medium Tor: 0.3.1.x-final
#22688 Make sure HSDir3s never know service, client, or bridge IP addresses Core Tor/Tor needs_revision defect Medium Tor: 0.3.1.x-final Tor: unspecified prop224, relay-safety, 031-backport, maybe-030-backport-with-21406
#22701 Missing makefile dependencies make parallel builds fail Core Tor/Tor new defect Medium Tor: 0.3.1.x-final Tor: 0.3.0.8
#22286 Add coverage markers to LZMA and Zstd compression backend Core Tor/Tor needs_revision enhancement Low Tor: 0.3.1.x-final Tor: unspecified

Milestone: Tor: 0.3.2.x-final (68 matches)

Ticket Summary Component Status Type Priority Milestone Version Keywords
#12424 Implement improved hidden service protocol (prop224) Core Tor/Tor new enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224, term-project-ideas
#17242 prop224: Implement client support Core Tor/Tor new enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224
#17690 prop224: Control the number of HSDirs using a consensus parameter Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final prop224, tor-hs
#18098 prop224: Implement tor-genkey tool for offline HS key creation Core Tor/Tor new enhancement Very High Tor: 0.3.2.x-final prop224, tor-hs, prop224-extra
#20524 Revise initial descriptor upload behavior for onion services Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final tor-hs, research, tor-spec, prop224
#20594 hs: Make HSDir produce HS statistics for prop224 Core Tor/Tor new enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224, tor-spec, prop224-extra
#20657 prop224: Implement service support. Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224
#20699 prop224: Add control port events and commands Core Tor/Tor new enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224, needs-proposal, prop224-extra
#20700 prop224: Implement client authorization Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final prop224, tor-hs
#20742 prop224: Implement stealth client authorization Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final prop224, needs-proposal, prop224-extra, tor-hs
#20961 prop224: Implement consensus params to adjust portion of the protocol Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224
#21403 prop224: Implement HS descriptor fetching Core Tor/Tor needs_review enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224, review-group-18
#21859 prop224: Rendezvous circuit e2e crypto Core Tor/Tor assigned enhancement Very High Tor: 0.3.2.x-final tor-hs, prop224
#3652 Export clock skew opinion as getinfo command Core Tor/Tor needs_revision enhancement High Tor: 0.3.2.x-final tbb-wants small-feature needs-proposal tor-client
#4187 A verified unverified-consensus should be renamed to cached-consensus Core Tor/Tor assigned defect High Tor: 0.3.2.x-final Tor: 0.2.2.33 tor-client directory rename fs easy
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed Core Tor/Tor new defect High Tor: 0.3.2.x-final Tor: 0.2.2.37 tor-relay crash assertion 029-backport 030-backport 031-backport needs-insight
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 Core Tor/Tor needs_revision defect High Tor: 0.3.2.x-final Tor: 0.2.4.19 tor-client, 025-backport, nickm-should-review
#9001 Slow Guard Discovery of Hidden Services and Clients Core Tor/Tor new defect High Tor: 0.3.2.x-final Tor: 0.2.7 tor-hs, path-bias, guard-discovery, needs-proposal, mike-can, prop247, tor-guard
#12600 Save retrieved bridge information in our state file Core Tor/Tor assigned task High Tor: 0.3.2.x-final tor-bridge, tails-wants, tor-pt
#15940 Make a standard transition plan for killing off a client version Core Tor/Tor accepted task High Tor: 0.3.2.x-final SponsorS, tor-dos-designs
#15941 Form a plan for killing off client versions which assume they'll live forever Core Tor/Tor accepted task High Tor: 0.3.2.x-final Tor: 0.2.4.1-alpha SponsorS, needs-proposal, tor-dos-designs
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop Core Tor/Tor new defect High Tor: 0.3.2.x-final tor-client, low-bandwidth, sponsor4, bootstrap
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents Core Tor/Tor needs_revision defect High Tor: 0.3.2.x-final tor-dirauth
#17639 provide an option to display the expiry date of a given ed25519 signing key Core Tor/Tor new enhancement High Tor: 0.3.2.x-final Tor: 0.3.0.7 tor-ed25519-proto
#20423 Clock jumps on relay due to hostname lookup timeouts Core Tor/Tor reopened defect High Tor: 0.3.2.x-final Tor: 0.2.9.10 regression, 029-backport
#22173 Support looking up node by ed25519 identity Core Tor/Tor new enhancement High Tor: 0.3.2.x-final
#22266 fix the jump-to-80% issue Core Tor/Tor new defect High Tor: 0.3.2.x-final usability, ux
#22644 Assert crash with HSPOST and POSTDESCRIPTOR control port commands Core Tor/Tor new defect High Tor: 0.3.2.x-final tor-control crash
#3056 surprising dns responses received from hosts that aren't our resolver Core Tor/Tor needs_review defect Medium Tor: 0.3.2.x-final Tor: 0.2.3.10-alpha libevent, eventdns, tor-relay, logging, review-group-18
#5190 Collect Rob's patch for throttling flows at guards Core Tor/Tor assigned task Medium Tor: 0.3.2.x-final performance, scheduling, SponsorZ, tor-relay, review-group-18
#7176 Reduced TOR memory consumption for embedded devices Core Tor/Tor needs_information enhancement Medium Tor: 0.3.2.x-final Tor: unspecified tor-client, embedded, low-memory, sponsor8-maybe, review-group-18
#7729 Reading pending TLS bytes can take us over at_most Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final tor-relay tls tls-api mainloop
#8185 circuit_package_relay_cell(): Bug: outgoing relay cell has n_chan==NULL. Dropping. Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.4.9-alpha tor-relay logging needs-analysis
#8453 Alter flag-weight balancing equations Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final performance, SponsorZ, needs-proposal, tor-client
#10059 capture tor log messages before control connection is opened Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final Tor: unspecified tbb-usability, extdev-interview, tbb-wants
#10871 Download more microdescriptors with a shorter request Core Tor/Tor new defect Medium Tor: 0.3.2.x-final tor-client, directory, microdesc, needs-proposal, low-bandwidth, sponsor4
#11101 Bridges should report implementation versions of their pluggable transports Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final bridgedb, needs-proposal, needs-spec, pt, tor-bridge, tor-pt
#13043 torspec lies about accepting both IPv4 and IPv6 for ORAddress lines Core Tor/Tor new defect Medium Tor: 0.3.2.x-final tor-spec
#13258 Keep stats on effectiveness of consensus diffs Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final tor-relay metrics bandwidth
#13605 Create a client/relay-side ReducedExitPolicy Core Tor/Tor needs_review enhancement Medium Tor: 0.3.2.x-final tor-relay, easy, review-group-18
#14312 tor-spec says additional fields in exitpolicy response are "optional" when they're not Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final tor-spec easy
#14948 Clarify in control-spec which relays have ns and md entries and which don't Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final tor-spec
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.7 tor-client, tor-guard, SponsorU-deferred
#15554 Put some actual hsdescs in the unit tests for parsing Core Tor/Tor needs_review enhancement Medium Tor: 0.3.2.x-final tor-hs, easy
#15582 compile warning in test_util.c: In function 'test_util_sscanf' Core Tor/Tor reopened defect Medium Tor: 0.3.2.x-final Tor: 0.2.6.6 compile, test, lorax, openbsd
#15645 Document PublishServerDescriptor better Core Tor/Tor new defect Medium Tor: 0.3.2.x-final Tor: 0.2.6.7 docs easy
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final tor-bridge
#17286 Implement a circuit-extension algorithm that can resist quantum computers Core Tor/Tor new defect Medium Tor: 0.3.2.x-final term-project-ideas
#17598 Trace cell queue times in Tor to measure Tor application "congestion" Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final kist
#17750 Make bootstrapping clients wait before trying an authority Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final Tor: 0.2.8.1-alpha tor-bootstrap 030-backport 029-backport
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final easy, refactor, triaged-out-20170124
#17848 Tor ignores tunneled connections when checking existing directory downloads Core Tor/Tor new defect Medium Tor: 0.3.2.x-final
#17945 Stop Tor2Web connecting to (Rendezvous) Single Onion Services Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final rsos, sos, tor2web, tor-hs, 029-proposed, 029-teor-no, needs-design, needs-proposal-maybe
#18320 Clear old entries from the key-pinning journal file Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final tor-dos
#18329 Let bridges indicate when they don't want BridgeDB to distribute their address Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final tor-bridge, stem
#18757 Memunit config defaults say "KB" rather than "KBytes" Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final easy
#18988 log error level messages if relay (self) is not in consensus Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final easy
#19487 Meek and ReachableAddresses Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final Tor: 0.2.8.2-alpha ipv6, bridges, pluggable-transports, regression
#19661 tor refuses to use /dev/null as a config file Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final Tor: 0.2.8.5-rc easy, lorax, integration
#19704 Deprecate ReachableDirAddresses and ClientPreferIPv6DirPort Core Tor/Tor new enhancement Medium Tor: 0.3.2.x-final 030-proposed
#19760 Update longclaw's hard-coded IPv6 address Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final dir-auth, ipv6, 029-proposed
#20021 Require ntor-onion-key in microdescriptors, descriptors Core Tor/Tor needs_revision defect Medium Tor: 0.3.2.x-final
#20456 Relative paths don't work for PidFile and control_auth_cookie Core Tor/Tor new defect Medium Tor: 0.3.2.x-final regression?, triaged-out-20170308
#20522 Enable DISABLE_DISABLING_ED25519 Core Tor/Tor accepted defect Medium Tor: 0.3.2.x-final tor-ed25519-proto
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file Core Tor/Tor needs_revision enhancement Medium Tor: 0.3.2.x-final easy, tor-dirauth
#20822 Follow-up tasks for prop271 (new guard API) implementation Core Tor/Tor assigned project Medium Tor: 0.3.2.x-final tor-guard, triaged-out-20170124, TorCoreTeam201705
#20832 Design proposals to further improve guard security Core Tor/Tor assigned enhancement Medium Tor: 0.3.2.x-final tor-guard, TorCoreTeam201705
#20916 Inconsistent IPv6 address between consensus and microdescriptor Core Tor/Tor assigned defect Medium Tor: 0.3.2.x-final needs-proposal, ipv6, regression
(more results for this group on next page)
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.