Custom Query (755 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 755)

1 2 3 4 5 6 7 8
Ticket Summary Owner Type Priority Milestone Component
#20053 Plan refactoring of metrics-web modules metrics-team enhancement Medium Metrics 1.0.0 Metrics/Statistics
#393 hidden services resolve hosts only once rransom defect Low Tor: unspecified Core Tor/Tor
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline mikeperry defect Medium Tor: unspecified Core Tor/Tor
#1354 Configuring Tor with --with*dir gives wrong directories nickm defect High Tor: unspecified Core Tor/Tor
#1749 Split relay and link crypto across multiple CPU cores chelseakomlo project High Tor: unspecified Core Tor/Tor
#2003 Hibernation Soft and Hard Limits Reached Simultaneously Sebastian enhancement Medium Tor: unspecified Core Tor/Tor
#2395 Break Wed and Wee weights into two classes each mikeperry enhancement Medium Tor: unspecified Core Tor/Tor
#2506 Design and implement a more compact GeoIP file format endian7000 enhancement Medium Tor: unspecified Core Tor/Tor
#2743 safelogging should cover hidden service name and intro-points too rransom defect Medium Tor: unspecified Core Tor/Tor
#3021 Make the microdesc format a little more flexible, with optional TAP key nickm defect High Tor: unspecified Core Tor/Tor
#3511 Automatically chosen published ports should be stable blackpaw enhancement High Tor: unspecified Core Tor/Tor
#3698 Multi-line torrc options conflict with Windows paths Jigsaw52 defect Low Tor: unspecified Core Tor/Tor
#4260 [PATCH] Update TOR build instructions for mingw erinn enhancement High Tor: unspecified Core Tor/Tor
#4565 Enable relays to talk to other relays via IPv6 ln5 project Medium Tor: unspecified Core Tor/Tor
#4682 Deal with 'double door' effects because our read and write rate limiting are independent arma project Medium Tor: unspecified Core Tor/Tor
#4847 Fix IPv6 bridges with a private/dynamic IPv4 address ln5 defect Medium Tor: unspecified Core Tor/Tor
#5211 Discuss other ways for the bridge authority to run bridge reachability tests task High Tor: unspecified Core Tor/Tor
#5409 Warn if we're on Windows, and the user ends a line accepting a directory path with a backslash? Jigsaw52 defect Medium Tor: unspecified Core Tor/Tor
#5707 Use end to end stream timing data to further prune circuits mikeperry enhancement Medium Tor: unspecified Core Tor/Tor
#7572 Make relay crypto run on multiple CPU cores yawning defect High Tor: unspecified Core Tor/Tor
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% tbb-team defect High Tor: unspecified Core Tor/Tor
#8001 obfsproxy makes tor warn when one bridge is down isis defect Low Tor: unspecified Core Tor/Tor
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() isis defect Very Low Tor: unspecified Core Tor/Tor
#9662 Make ntor handshake faster yawning defect Medium Tor: unspecified Core Tor/Tor
#10186 Backtrace support for windows tom enhancement Very High Tor: unspecified Core Tor/Tor
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges joelanders enhancement Medium Tor: unspecified Core Tor/Tor
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. nickm enhancement Medium Tor: unspecified Core Tor/Tor
#11542 Add a new logging domain for transport proxies yawning defect Low Tor: unspecified Core Tor/Tor
#12401 Document EntryGuardPathBias in doc/state-contents.txt mikeperry defect High Tor: unspecified Core Tor/Tor
#12600 Save retrieved bridge information in our state file isis task High Tor: unspecified Core Tor/Tor
#12898 Remove naming support from Tor Sebastian enhancement Low Tor: unspecified Core Tor/Tor
#12900 Remove config related naming stuff Sebastian defect Low Tor: unspecified Core Tor/Tor
#12901 Remove client-related naming stuff Sebastian defect Low Tor: unspecified Core Tor/Tor
#13694 Ship with native build instructions for windows gk enhancement Medium Tor: unspecified Core Tor/Tor
#13737 Move circuit building crypto to worker yawning enhancement High Tor: unspecified Core Tor/Tor
#15054 Complete implementation of prop220 (ed25519 identity keys) nickm defect Low Tor: unspecified Core Tor/Tor
#15059 Allow UI to identify servers by Ed25519 keys nickm enhancement Low Tor: unspecified Core Tor/Tor
#15061 Support Ed25519 identities in controller interface nickm defect Low Tor: unspecified Core Tor/Tor
#15062 Support identifying nodes by ed25519 keys in state file, other misc files nickm defect Low Tor: unspecified Core Tor/Tor
#15516 Consider rate-limiting INTRODUCE2 cells when under load dgoulet enhancement Medium Tor: unspecified Core Tor/Tor
#15621 Kill the pre-version 3 intro protocol code with fire. enhancement Medium Tor: unspecified Core Tor/Tor
#16564 Add a line to bridge descriptors specifying they're bridges? enhancement High Tor: unspecified Core Tor/Tor
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages isis defect Medium Tor: unspecified Core Tor/Tor
#17217 Change clients to automatically use IPv6 if they can bootstrap over it neel enhancement Low Tor: unspecified Core Tor/Tor
#17272 Finalize a proposal for postquantum circuit-extension yawning task Medium Tor: unspecified Core Tor/Tor
#17284 Implement multiple new testing-focused controller features yawning defect High Tor: unspecified Core Tor/Tor
#17521 Support capsicum(4) on FreeBSD shawn.webb enhancement Medium Tor: unspecified Core Tor/Tor
#17607 Clean up section 2 in control-spec gk enhancement Very Low Tor: unspecified Core Tor/Tor
#17640 Handle CREATE/CREATED cell processing gracefully under load. yawning enhancement Medium Tor: unspecified Core Tor/Tor
#17835 Make ClientPreferIPv6ORPort smarter neel enhancement Medium Tor: unspecified Core Tor/Tor
#18224 Tor control spec doesn't properly specify reply format gk defect Medium Tor: unspecified Core Tor/Tor
#18345 Fix all doxygen "X is not documented" warnings aomamemaki defect Medium Tor: unspecified Core Tor/Tor
#18638 Write a proposal for PK handshake that uses more client resources than server. yawning task Medium Tor: unspecified Core Tor/Tor
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. nickm enhancement High Tor: unspecified Core Tor/Tor
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size nickm enhancement Medium Tor: unspecified Core Tor/Tor
#19009 bandwidth testing circuits should be allowed to use our guards juga defect Medium Tor: unspecified Core Tor/Tor
#19288 Document circuitpathbias in detail nickm defect Medium Tor: unspecified Core Tor/Tor
#19293 Document connection-attachment and addressmapping in detail nickm defect Medium Tor: unspecified Core Tor/Tor
#19318 controller: expose cache details. yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19319 controller: GETINFO stats to expose OOM details yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19325 controller: getinfo to get status of cpuworker queues yawning enhancement Medium Tor: unspecified Core Tor/Tor
#20232 Relays get stuck on resolve_my_address() if unable to guess address defect Very Low Tor: unspecified Core Tor/Tor
#20742 prop224: Implement stealth client authorization asn enhancement Very High Tor: unspecified Core Tor/Tor
#20822 Follow-up tasks for prop271 (new guard API) implementation nickm project Medium Tor: unspecified Core Tor/Tor
#20832 Design proposals to further improve guard security nickm enhancement Medium Tor: unspecified Core Tor/Tor
#21117 can't migrate onion services to single-hop onion services dgoulet defect Medium Tor: unspecified Core Tor/Tor
#21205 Instrument clients to measure directory usage ahf project Medium Tor: unspecified Core Tor/Tor
#21206 Measure client up/down bandwidth for directory requests, split by type ahf defect Medium Tor: unspecified Core Tor/Tor
#21208 Measure overall client bandwidth usage and circuit counts ahf enhancement Medium Tor: unspecified Core Tor/Tor
#21642 Prop275: Eliminate "published" times from microdescriptor consensus nickm enhancement Medium Tor: unspecified Core Tor/Tor
#22090 Rename channel client functions for clarity toby enhancement Medium Tor: unspecified Core Tor/Tor
#22123 baseXX API strictness catalyst enhancement Medium Tor: unspecified Core Tor/Tor
#22359 Community team and network team are constructing glossaries in parallel emmapeel enhancement Medium Tor: unspecified Core Tor/Tor
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion mikeperry defect Medium Tor: unspecified Core Tor/Tor
#22826 Write a spec for unsanitised bridge descriptor formats isis enhancement Low Tor: unspecified Core Tor/Tor
#22948 Padding, Keepalive and Drop cells should have random payloads defect Medium Tor: unspecified Core Tor/Tor
#23300 prop224: General client side issues dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23301 prop224: Refactor connection_ap_handle_onion dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23323 sample_laplace_distribution should produce a valid result on 0.0 defect Medium Tor: unspecified Core Tor/Tor
#23414 rep_hist_format_hs_stats() should add noise, then round defect Medium Tor: unspecified Core Tor/Tor
#23415 sample_laplace_distribution() should take multiple random inputs defect Medium Tor: unspecified Core Tor/Tor
#23416 Document the precision and limits of sample_laplace_distribution() enhancement Medium Tor: unspecified Core Tor/Tor
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised defect Medium Tor: unspecified Core Tor/Tor
#23523 Handle extreme values better in add_laplace_noise() defect Medium Tor: unspecified Core Tor/Tor
#23565 document signs of client clock skew to ease troubleshooting catalyst task Medium Tor: unspecified Community/Tor Support
#23653 When accessing onion service with no fetchable descriptor, Tor sits around until timeout rather than hanging up asn defect Medium Tor: unspecified Core Tor/Tor
#23975 Make node_get_pref_ipv6_orport() check addresses in the right order defect Medium Tor: unspecified Core Tor/Tor
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. mikeperry enhancement Medium Tor: unspecified Core Tor/Tor
#23993 sched: Refactor and fix interactions between channel and scheduler dgoulet defect Medium Tor: unspecified Core Tor/Tor
#24061 Collect Baseline Measurements for Different Android Performance Metrics ahf project High Tor: unspecified Core Tor/Tor
#24062 CPU profiling of Tor on Android device ahf task Medium Tor: unspecified Core Tor/Tor
#24063 Look into battery usage for Tor on Android devices ahf task Medium Tor: unspecified Core Tor/Tor
#24182 Pad INTRODUCE cells to hide the number of link specifiers dgoulet defect Medium Tor: unspecified Core Tor/Tor
#24264 Enable IPv6 reachability testing for the Bridge Authority task High Tor: unspecified Core Tor/DirAuth
#24366 compare_vote_rs() could check more fields for better SHA1 collision resistance neel enhancement Medium Tor: unspecified Core Tor/Tor
#24368 Tune zstd parameters to decrease memory usage during streaming ahf defect Medium Tor: unspecified Core Tor/Tor
#24403 Propose and implement IPv6 ORPort reachability checks on relays task Medium Tor: unspecified Core Tor/Tor
1 2 3 4 5 6 7 8
Note: See TracQuery for help on using queries.