Tor: Tickets needing keywords (644 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 644)

1 2 3 4 5 6 7
Ticket Summary Component Status Type Priority Milestone
#24145 Tor Browser crash on Windows 7 Core Tor/Tor new defect Very High Tor: unspecified
#24554 sched: Have per-scheduler type data in a channel_t Core Tor/Tor needs_revision enhancement Very High Tor: unspecified
#24738 Abort trap: 6 after installation Mac OS 10.13.1 Core Tor/Tor needs_information defect Very High Tor: unspecified
#26181 Apparmor + systemd failures when loading included service files + DisableAllSwap Fix Core Tor/Tor new defect Very High Tor: 0.3.5.x-final
#2665 Create a dirauth DoS response procedure Core Tor/Tor new task High Tor: unspecified
#4581 Dir auths should defend themselves from too many begindir requests per address Core Tor/Tor needs_revision defect High Tor: unspecified
#7148 Even better parameter voting protocol Core Tor/Tor new defect High Tor: unspecified
#10059 capture tor log messages before control connection is opened Core Tor/Tor new enhancement High Tor: 0.3.5.x-final
#10221 Implement BGP malicious route checks before publishing descriptor in consensus Core Tor/Tor new enhancement High Tor: unspecified
#11207 Sybil selection should be trickier to game Core Tor/Tor new enhancement High Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure Core Tor/Tor needs_revision defect High Tor: unspecified
#13444 "GhostNode" - support relays that cannot accept incoming connections. Core Tor/Tor new project High Tor: unspecified
#13817 Untange kludgey library detection, particularly for SSL forks Core Tor/Tor new defect High Tor: unspecified
#14354 Improve torflow engineering quality and deployment procedure Core Tor/Tor new defect High Tor: unspecified
#15940 Make a standard transition plan for killing off a client version Core Tor/Tor accepted task High Tor: unspecified
#15941 Form a plan for killing off client versions which assume they'll live forever Core Tor/Tor accepted task High Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights Core Tor/Tor needs_revision defect High Tor: unspecified
#16696 BWauth no-consensus fallback logic may need revision Core Tor/Tor new defect High Tor: unspecified
#16764 Simplify Tor's control flow graph to the extent we can. Core Tor/Tor new enhancement High Tor: unspecified
#16791 All modules in src/common should have 90-95%+ unit test coverage Core Tor/Tor new project High Tor: unspecified
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or Core Tor/Tor new defect High Tor: unspecified
#16809 High coverage on node/path selection functions Core Tor/Tor new defect High Tor: unspecified
#16810 Unit tests on circuit/relay functions Core Tor/Tor new defect High Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags Core Tor/Tor needs_revision defect High Tor: unspecified
#17275 Package directory authority scripts for debian in compliant packages Core Tor/Tor new task High Tor: unspecified
#17284 Implement multiple new testing-focused controller features Core Tor/Tor assigned defect High Tor: unspecified
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents Core Tor/Tor needs_revision defect High Tor: unspecified
#17901 Tor would bind ControlPort to public ip address if it has no localhost interface Core Tor/Tor new defect High Tor: unspecified
#18200 TrackHostExits forces circuits to same exit, regardless of SOCKSPort isolation flags Core Tor/Tor new defect High Tor: unspecified
#18346 Separate the various roles that directory authorities play, from a configuration POV Core Tor/Tor accepted enhancement High Tor: unspecified
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. Core Tor/Tor accepted project High Tor: unspecified
#18637 Have OOM handler look at all memory consumption, not just some Core Tor/Tor accepted enhancement High Tor: unspecified
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. Core Tor/Tor assigned enhancement High Tor: unspecified
#18788 Make the copyright license clear for torspec and proposals Core Tor/Tor accepted enhancement High Tor: unspecified
#19570 Shared random round gets out of sync Core Tor/Tor reopened enhancement High Tor: unspecified
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS Core Tor/Tor accepted defect High Tor: unspecified
#20423 Clock jumps on relay due to hostname lookup timeouts Core Tor/Tor reopened defect High Tor: unspecified
#20835 Refactor choose_good_entry_server so it is (almost) never used Core Tor/Tor accepted task High Tor: unspecified
#21253 Add link handshakes to benchmark program Core Tor/Tor needs_revision task High Tor: unspecified
#21377 DirAuths should expose bwauth votes Core Tor/Tor new enhancement High Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag Core Tor/Tor new defect High Tor: unspecified
#22266 fix the jump-to-80% issue Core Tor/Tor new defect High Tor: 0.3.5.x-final
#22422 Add noise to PaddingStatistics Core Tor/Tor needs_information defect High Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop Core Tor/Tor new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users Core Tor/Tor new enhancement High Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues Core Tor/Tor new defect High Tor: unspecified
#23605 BOOTSTRAP PROGRESS=80 is a lie Core Tor/Tor new defect High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler Core Tor/Tor accepted defect High Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc Core Tor/Tor new enhancement High Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics Core Tor/Tor assigned project High Tor: unspecified
#24264 Enable IPv6 reachability testing for the Bridge Authority Core Tor/Tor reopened task High
#24487 Reverse path selection (choose outer hops first) Core Tor/Tor assigned defect High Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows Core Tor/Tor new defect High Tor: unspecified
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism Core Tor/Tor new enhancement High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests Core Tor/Tor needs_revision defect High Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory Core Tor/Tor needs_revision task High Tor: 0.3.5.x-final
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption Core Tor/Tor new defect High Tor: unspecified
#25386 fix rust tests Core Tor/Tor needs_revision defect High Tor: 0.3.4.x-final
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x Core Tor/Tor new task High
#25895 Cross-compiling tor rust for Windows is broken Core Tor/Tor needs_review defect High Tor: 0.3.4.x-final
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus Core Tor/Tor new enhancement Medium Tor: unspecified
#2664 DoS and failure resistence improvements Core Tor/Tor new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method Core Tor/Tor new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? Core Tor/Tor new enhancement Medium Tor: unspecified
#3029 We should save received documents before parsing them Core Tor/Tor new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA Core Tor/Tor new defect Medium Tor: unspecified
#3723 Report version of bwscanners in votes Core Tor/Tor new enhancement Medium Tor: unspecified
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures Core Tor/Tor new enhancement Medium Tor: unspecified
#4539 Make dir auths write to disk digests that don't match Core Tor/Tor new enhancement Medium Tor: unspecified
#4631 Idea to make consensus voting more resistant Core Tor/Tor new enhancement Medium Tor: unspecified
#4826 Write proposal for improved consensus voting schedules Core Tor/Tor new enhancement Medium Tor: unspecified
#5992 META: Decentralize directory authorities as far as safely possible Core Tor/Tor new project Medium Tor: very long term
#6777 add config option to not rate limit authority dir conns Core Tor/Tor new defect Medium Tor: unspecified
#6790 Write proposal draft for directory mirrors to accept, aggregate and hand off descriptors to dirauths Core Tor/Tor new enhancement Medium Tor: unspecified
#7126 Multipath consensus integrity verification Core Tor/Tor new enhancement Medium Tor: unspecified
#7193 Tor's sybil protection doesn't consider IPv6 Core Tor/Tor new enhancement Medium Tor: unspecified
#8163 It is no longer deterministic which Sybils we omit Core Tor/Tor new defect Medium Tor: unspecified
#8415 Use event_set_mem_functions Core Tor/Tor new enhancement Medium Tor: unspecified
#9062 Authorities should describe their bwauth version in their votes Core Tor/Tor new enhancement Medium Tor: unspecified
#9689 Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery Core Tor/Tor new project Medium Tor: unspecified
#9775 Authorities should report when they don't vote Running but some addresses are still reachable Core Tor/Tor new enhancement Medium Tor: unspecified
#9954 Replace broadcast voting protocol with something more robust Core Tor/Tor new defect Medium Tor: unspecified
#9990 Internal error Core Tor/Tor new defect Medium Tor: unspecified
#10052 Tor Windows service should reload its configuration on SERVICE_CONTROL_PARAMCHANGE control code Core Tor/Tor new enhancement Medium Tor: unspecified
#10542 Bug when certificate expired: Generated a networkstatus consensus we couldn't parse. Core Tor/Tor new defect Medium Tor: unspecified
#10968 Authorities should use past consensuses to decide how to vote on relay flags Core Tor/Tor new task Medium Tor: unspecified
#11121 Revocation process for authority keys Core Tor/Tor new defect Medium Tor: unspecified
#11158 Write a proposal for a "couldn't reach consensus" statement Core Tor/Tor new enhancement Medium Tor: unspecified
#11328 Dir auths should compute Guard WFU using the consensus, not private history Core Tor/Tor new defect Medium Tor: unspecified
#13059 Create bad-relays file Core Tor/Tor needs_revision defect Medium Tor: unspecified
#13155 I can use an extend cell to remotely determine whether two relays have a connection open Core Tor/Tor new defect Medium Tor: unspecified
#13234 Consensus Algorithm Causes Flip-Flopping Core Tor/Tor new defect Medium Tor: unspecified
#13297 compute_weighted_bandwidths() broken for dirauths Core Tor/Tor new defect Medium Tor: unspecified
#13508 Add messaging protocol that is resistant to traffic analysis Core Tor/Tor new enhancement Medium Tor: unspecified
#13694 Ship with native build instructions for windows Core Tor/Tor assigned enhancement Medium Tor: unspecified
#13928 Tor Authorities reachability testing is predictable and sequential Core Tor/Tor new defect Medium Tor: unspecified
#13929 Increase Authority reachability testing rate with low TestingAuthDirTimeToLearnReachability Core Tor/Tor new defect Medium Tor: unspecified
#13978 Get tor working with ns-3 Core Tor/Tor new task Medium Tor: very long term
#13987 Apply laplace noise to other statistics Core Tor/Tor new enhancement Medium Tor: unspecified
#14034 Make TestingDirAuthVoteGuard/Exit/HSDir and AssumeReachable less essential in test networks Core Tor/Tor new defect Medium Tor: unspecified
1 2 3 4 5 6 7
Note: See TracQuery for help on using queries.