Custom Query (1976 matches)

Filters
 
Or
 
  
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 1976)

1 2 3 4 5 6 7 8 9 10 11

Milestone: Tor: unspecified (100 matches)

Ticket Summary Component Owner Type Priority Version
#7349 Obfsbridges should be able to "disable" their ORPort Core Tor/Tor project Very High
#9498 Allow bridge descriptors to contain no address if they are not being published Core Tor/Tor enhancement Very High Tor: unspecified
#10186 Backtrace support for windows Core Tor/Tor tom enhancement Very High
#20742 prop224: Implement stealth client authorization Core Tor/Tor asn enhancement Very High
#24554 sched: Have per-scheduler type data in a channel_t Core Tor/Tor enhancement Very High
#24738 Abort trap: 6 after installation Mac OS 10.13.1 Core Tor/Tor defect Very High Tor: unspecified
#26181 Apparmor + systemd failures when loading included service files + DisableAllSwap Fix Core Tor/Tor defect Very High Tor: 0.3.3.6
#26787 Core file left on travis hardened rust builld Core Tor/Tor defect Very High
#1247 bootstrap hickups when network is down Core Tor/Tor enhancement High 0.2.1.22
#1354 Configuring Tor with --with*dir gives wrong directories Core Tor/Tor defect High 0.2.1.25
#1749 Split relay and link crypto across multiple CPU cores Core Tor/Tor chelseakomlo project High
#2665 Create a dirauth DoS response procedure Core Tor/Tor task High Tor: 0.2.7
#3021 Make the microdesc format a little more flexible, with optional TAP key Core Tor/Tor defect High
#3511 Automatically chosen published ports should be stable Core Tor/Tor blackpaw enhancement High
#3652 Export clock skew opinion as getinfo command Core Tor/Tor enhancement High
#4229 smartlist_len returns a (signed) int Core Tor/Tor defect High
#4260 [PATCH] Update TOR build instructions for mingw Core Tor/Tor erinn enhancement High Tor: 0.2.2.32
#4320 Audit functions called during options_act_reversible() Core Tor/Tor defect High
#4580 Some Tor clients go nuts requesting the consensus if there is no recent enough consensus Core Tor/Tor defect High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address Core Tor/Tor defect High Tor: 0.2.7
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy Core Tor/Tor enhancement High
#5211 Discuss other ways for the bridge authority to run bridge reachability tests Core Tor/Tor task High
#5219 Intelligently use capabilities/privileges and drop what we don't need for all possible platforms Core Tor/Tor enhancement High Tor: unspecified
#5221 Intelligently use capabilities/privileges and drop what we don't need for Windows Core Tor/Tor project High Tor: unspecified
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X Core Tor/Tor enhancement High Tor: unspecified
#5456 Defend against path bias and tagging attacks Core Tor/Tor project High
#5685 Publish node best practices doc and scripts Core Tor/Tor task High
#5968 Improve onion key and TLS management Core Tor/Tor enhancement High
#6311 Migrate TOR_SEARCH_LIBRARY to use pkg-config Core Tor/Tor enhancement High
#6622 Tor link against static zlib broken by -pie switch Core Tor/Tor defect High Tor: 0.2.3.20-rc
#6837 More fine-grained modular decomposition Core Tor/Tor enhancement High Tor: 0.2.7
#6877 Finally replace all char[] buffers with uint8_t[] buffers Core Tor/Tor defect High
#6939 Missing IPv6 ORPort reachability check Core Tor/Tor defect High Tor: 0.2.4.2-alpha
#7003 Wipe relay key material from memory on common crash conditions Core Tor/Tor enhancement High
#7027 Defend against Website Traffic Fingerprinting Core Tor/Tor enhancement High
#7144 Implement Bridge Guards and other anti-enumeration defenses Core Tor/Tor project High
#7148 Even better parameter voting protocol Core Tor/Tor defect High
#7478 Allow routersets to include/exclude nodes by IPv6 address Core Tor/Tor enhancement High
#7572 Make relay crypto run on multiple CPU cores Core Tor/Tor yawning defect High
#7678 Check if a stream could send a cell but the circuit hasn't asked it to Core Tor/Tor defect High Tor: 0.2.3.25
#7829 Support all kinds of DNS over Tor Core Tor/Tor task High Tor: unspecified
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% Core Tor/Tor tbb-team defect High Tor: unspecified
#8111 Refactor our checking of whether we should be reading/writing on a connection to use a set of reason-flags Core Tor/Tor enhancement High
#8387 Unbuilt one-hop circuits sometimes hang around forever Core Tor/Tor defect High
#8593 Circuit build timeout not respected? Core Tor/Tor defect High Tor: 0.2.4.9-alpha
#8742 Byte history leaks information about local usage/hidden services Core Tor/Tor defect High Tor: unspecified
#9001 Slow Guard Discovery of Hidden Services and Clients Core Tor/Tor defect High Tor: 0.2.7
#10059 capture tor log messages before control connection is opened Core Tor/Tor enhancement High Tor: unspecified
#10221 Implement BGP malicious route checks before publishing descriptor in consensus Core Tor/Tor enhancement High
#10476 Reattach non open streams if circuit destroyed Core Tor/Tor enhancement High
#10478 Use prepend_policy or similar in preference to mark_circuit_unusable_for_new_conns Core Tor/Tor defect High
#10969 Set of guard nodes can act as a linkability fingerprint Core Tor/Tor defect High
#11207 Sybil selection should be trickier to game Core Tor/Tor enhancement High
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure Core Tor/Tor TvdW defect High Tor: 0.2.7
#11743 nodelist_add_microdesc: assign md to all appropriate nodes properly Core Tor/Tor defect High
#12184 Circuit on detached list which I had no reason to mark Core Tor/Tor defect High Tor: 0.2.5.10
#12389 Should we warn when exit nodes are using opendns or google dns? Core Tor/Tor defect High
#12401 Document EntryGuardPathBias in doc/state-contents.txt Core Tor/Tor defect High
#12600 Save retrieved bridge information in our state file Core Tor/Tor task High
#13444 "GhostNode" - support relays that cannot accept incoming connections. Core Tor/Tor project High Tor: unspecified
#13737 Move circuit building crypto to worker Core Tor/Tor yawning enhancement High Tor: 0.2.7
#13753 Validate is_canonical more thoroughly Core Tor/Tor enhancement High Tor: 0.2.7
#13817 Untange kludgey library detection, particularly for SSL forks Core Tor/Tor defect High Tor: 0.2.6.1-alpha
#14354 Improve torflow engineering quality and deployment procedure Core Tor/Tor defect High Tor: 0.2.7
#14581 Looking up bridge by ID may choose the wrong bridge Core Tor/Tor defect High
#15272 Think of more research questions that we can answer with statistics Core Tor/Tor task High Tor: 0.2.7
#15469 Remove data structure containing unique IP address sets Core Tor/Tor enhancement High
#15940 Make a standard transition plan for killing off a client version Core Tor/Tor task High
#15941 Form a plan for killing off client versions which assume they'll live forever Core Tor/Tor task High Tor: 0.2.4.1-alpha
#16255 Guardfraction on dirauths screws up bandwidth weights Core Tor/Tor asn defect High
#16564 WIP: Reject bridge descriptors posted to non-bridge authorities Core Tor/Tor teor enhancement High
#16696 BWauth no-consensus fallback logic may need revision Core Tor/Tor defect High
#16764 Simplify Tor's control flow graph to the extent we can. Core Tor/Tor enhancement High
#16791 All modules in src/common should have 90-95%+ unit test coverage Core Tor/Tor project High
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or Core Tor/Tor defect High
#16809 High coverage on node/path selection functions Core Tor/Tor defect High
#16810 Unit tests on circuit/relay functions Core Tor/Tor defect High
#16824 Emit a warning message about side channel leaks when using relays as clients Core Tor/Tor defect High Tor: 0.2.6.10
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop Core Tor/Tor defect High
#16849 clear_status_flags_on_sybil might want to clear more flags Core Tor/Tor ffmancera defect High
#17275 Package directory authority scripts for debian in compliant packages Core Tor/Tor task High
#17278 Fix malleable relay crypto Core Tor/Tor defect High
#17279 Implement large/split create cells (proposal 249) Core Tor/Tor defect High
#17284 Implement multiple new testing-focused controller features Core Tor/Tor yawning defect High
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents Core Tor/Tor jryans defect High
#17811 Tor Clients on IPv6 Core Tor/Tor task High
#17901 Tor would bind ControlPort to public ip address if it has no localhost interface Core Tor/Tor defect High Tor: 0.2.6.10
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags Core Tor/Tor defect High Tor: 0.2.7.6
#18346 Separate the various roles that directory authorities play, from a configuration POV Core Tor/Tor enhancement High
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. Core Tor/Tor project High
#18637 Have OOM handler look at all memory consumption, not just some Core Tor/Tor enhancement High
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. Core Tor/Tor enhancement High
#18788 Make the copyright license clear for torspec and proposals Core Tor/Tor nickm enhancement High
#19570 Shared random round gets out of sync Core Tor/Tor enhancement High
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS Core Tor/Tor defect High
#20423 Clock jumps on relay due to hostname lookup timeouts Core Tor/Tor defect High Tor: 0.2.9.10
#20594 hs: Make HSDir produce HS statistics for prop224 Core Tor/Tor enhancement High
#20835 Refactor choose_good_entry_server so it is (almost) never used Core Tor/Tor task High
#21253 Add link handshakes to benchmark program Core Tor/Tor task High
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions Core Tor/Tor enhancement High
(more results for this group on next page)
1 2 3 4 5 6 7 8 9 10 11
Note: See TracQuery for help on using queries.