Custom Query (891 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 891)

1 2 3 4 5 6 7 8 9
Ticket Summary Owner Type Priority Milestone Component
#20053 Plan refactoring of metrics-web modules metrics-team enhancement Medium Metrics 1.0.0 Metrics/Statistics
#393 hidden services resolve hosts only once rransom defect Low Tor: unspecified Core Tor/Tor
#449 dns failures prevent legitimate options being set defect Low Tor: unspecified Core Tor/Tor
#1354 Configuring Tor with --with*dir gives wrong directories defect High Tor: unspecified Core Tor/Tor
#1749 Split relay and link crypto across multiple CPU cores chelseakomlo project High Tor: unspecified Core Tor/Tor
#2003 Hibernation Soft and Hard Limits Reached Simultaneously Sebastian enhancement Medium Tor: unspecified Core Tor/Tor
#2395 Break Wed and Wee weights into two classes each enhancement Medium Tor: unspecified Core Tor/Tor
#2506 Design and implement a more compact GeoIP file format endian7000 enhancement Medium Tor: unspecified Core Tor/Tor
#2743 safelogging should cover hidden service name and intro-points too rransom defect Medium Tor: unspecified Core Tor/Tor
#3021 Make the microdesc format a little more flexible, with optional TAP key defect High Tor: unspecified Core Tor/Tor
#3511 Automatically chosen published ports should be stable blackpaw enhancement High Tor: unspecified Core Tor/Tor
#3698 Multi-line torrc options conflict with Windows paths Jigsaw52 defect Low Tor: unspecified Core Tor/Tor
#4260 [PATCH] Update TOR build instructions for mingw erinn enhancement High Tor: unspecified Core Tor/Tor
#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf defect Low Tor: unspecified Core Tor/Tor
#4565 Enable relays to talk to other relays via IPv6 ln5 project Medium Tor: unspecified Core Tor/Tor
#4682 Deal with 'double door' effects because our read and write rate limiting are independent arma project Medium Tor: unspecified Core Tor/Tor
#4847 Fix IPv6 bridges with a private/dynamic IPv4 address ln5 defect Medium Tor: unspecified Core Tor/Tor
#5211 Discuss other ways for the bridge authority to run bridge reachability tests task High Tor: unspecified Core Tor/Tor
#5222 Intelligently use capabilities/privileges and drop what we don't need for Mac OS X enhancement High Tor: unspecified Core Tor/Tor
#5409 Warn if we're on Windows, and the user ends a line accepting a directory path with a backslash? Jigsaw52 defect Medium Tor: unspecified Core Tor/Tor
#5685 Publish node best practices doc and scripts task High Tor: unspecified Core Tor/Tor
#5707 Use end to end stream timing data to further prune circuits enhancement Medium Tor: unspecified Core Tor/Tor
#7572 Make relay crypto run on multiple CPU cores yawning defect High Tor: unspecified Core Tor/Tor
#7757 Maybe revisit node flag weight calculations enhancement Medium Tor: unspecified Core Tor/Tor
#7956 Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% tbb-team defect High Tor: unspecified Core Tor/Tor
#8001 obfsproxy makes tor warn when one bridge is down defect Low Tor: unspecified Core Tor/Tor
#8051 Broken check for empty "bridge-ips" line in validate_bridge_stats() defect Very Low Tor: unspecified Core Tor/Tor
#8159 Consolidate thresholds for path build bias and use bias enhancement Medium Tor: unspecified Core Tor/Tor
#8160 Create separate pending counters during circuit construction enhancement Medium Tor: unspecified Core Tor/Tor
#8387 Unbuilt one-hop circuits sometimes hang around forever defect High Tor: unspecified Core Tor/Tor
#8453 Alter flag-weight balancing equations enhancement Medium Tor: unspecified Core Tor/Tor
#8593 Circuit build timeout not respected? defect High Tor: unspecified Core Tor/Tor
#9662 Make ntor handshake faster yawning defect Medium Tor: unspecified Core Tor/Tor
#10059 capture tor log messages before control connection is opened enhancement High Tor: unspecified Core Tor/Tor
#10186 Backtrace support for windows tom enhancement Very High Tor: unspecified Core Tor/Tor
#10218 Provide "users-per-transport-per-country" statistics for obfsbridges joelanders enhancement Medium Tor: unspecified Core Tor/Tor
#10969 Set of guard nodes can act as a linkability fingerprint defect High Tor: unspecified Core Tor/Tor
#11101 Bridges should report implementation versions of their pluggable transports enhancement Medium Tor: unspecified Core Tor/Tor
#11211 Multiple ServerTransportListenAddr entries should be allowed per transport. enhancement Medium Tor: unspecified Core Tor/Tor
#11542 Add a new logging domain for transport proxies yawning defect Low Tor: unspecified Core Tor/Tor
#12401 Document EntryGuardPathBias in doc/state-contents.txt defect High Tor: unspecified Core Tor/Tor
#12600 Save retrieved bridge information in our state file task High Tor: unspecified Core Tor/Tor
#12898 Remove naming support from Tor Sebastian enhancement Low Tor: unspecified Core Tor/Tor
#12900 Remove config related naming stuff Sebastian defect Low Tor: unspecified Core Tor/Tor
#12901 Remove client-related naming stuff Sebastian defect Low Tor: unspecified Core Tor/Tor
#13694 Ship with native build instructions for windows gk enhancement Medium Tor: unspecified Core Tor/Tor
#13737 Move circuit building crypto to worker yawning enhancement High Tor: unspecified Core Tor/Tor
#14987 Settle on a name for descriptors defect Low Tor: unspecified Core Tor/Tor
#15054 Complete implementation of prop220 (ed25519 identity keys) defect Low Tor: unspecified Core Tor/Tor
#15059 Allow UI to identify servers by Ed25519 keys enhancement Low Tor: unspecified Core Tor/Tor
#15061 Support Ed25519 identities in controller interface defect Low Tor: unspecified Core Tor/Tor
#15062 Support identifying nodes by ed25519 keys in state file, other misc files defect Low Tor: unspecified Core Tor/Tor
#15618 Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending) defect Medium Tor: unspecified Core Tor/Tor
#15621 Kill the pre-version 3 intro protocol code with fire. enhancement Medium Tor: unspecified Core Tor/Tor
#15940 Make a standard transition plan for killing off a client version task High Tor: unspecified Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever task High Tor: unspecified Core Tor/Tor
#16598 fsync ed25519 master key files before closing them. defect Very Low Tor: unspecified Core Tor/Tor
#17193 Don't print bridge IPs/fingerprints in WARN/NOTICE log messages defect Medium Tor: unspecified Core Tor/Tor
#17217 Change clients to automatically use IPv6 if they can bootstrap over it neel enhancement Low Tor: unspecified Core Tor/Tor
#17272 Finalize a proposal for postquantum circuit-extension yawning task Medium Tor: unspecified Core Tor/Tor
#17278 Fix malleable relay crypto defect High Tor: unspecified Core Tor/Tor
#17284 Implement multiple new testing-focused controller features yawning defect High Tor: unspecified Core Tor/Tor
#17295 Route-selection and guard-selection logic completely replaced enhancement Medium Tor: unspecified Core Tor/Tor
#17521 Support capsicum(4) on FreeBSD shawn.webb enhancement Medium Tor: unspecified Core Tor/Tor
#17591 Use channel padding to obscure circuit setup enhancement Medium Tor: unspecified Core Tor/Tor
#17607 Clean up section 2 in control-spec gk enhancement Very Low Tor: unspecified Core Tor/Tor
#17640 Handle CREATE/CREATED cell processing gracefully under load. yawning enhancement Medium Tor: unspecified Core Tor/Tor
#17835 Make ClientPreferIPv6ORPort smarter neel enhancement Medium Tor: unspecified Core Tor/Tor
#17847 Unify router_pick_directory_server_impl and router_pick_trusteddirserver_impl enhancement Medium Tor: unspecified Core Tor/Tor
#18224 Tor control spec doesn't properly specify reply format gk defect Medium Tor: unspecified Core Tor/Tor
#18295 Make shared random rounds configurable in test networks enhancement Low Tor: unspecified Core Tor/Tor
#18308 Use a better pattern for "create mutex if not already initialized" defect Medium Tor: unspecified Core Tor/Tor
#18321 Exclude our own vote from the consensus if we think our own vote is invalid defect Medium Tor: unspecified Core Tor/Tor
#18345 Fix all doxygen "X is not documented" warnings aomamemaki defect Medium Tor: unspecified Core Tor/Tor
#18346 Separate the various roles that directory authorities play, from a configuration POV enhancement High Tor: unspecified Core Tor/Tor
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. project High Tor: unspecified Core Tor/Tor
#18637 Have OOM handler look at all memory consumption, not just some enhancement High Tor: unspecified Core Tor/Tor
#18638 Write a proposal for PK handshake that uses more client resources than server. yawning task Medium Tor: unspecified Core Tor/Tor
#18641 Teach the OOM handler about uploaded descriptors on a dirauth. enhancement High Tor: unspecified Core Tor/Tor
#18803 Tools to manage Tor's intermodule callgraph, and help cut it down to size enhancement Medium Tor: unspecified Core Tor/Tor
#19009 bandwidth testing circuits should be allowed to use our guards juga defect Medium Tor: unspecified Core Tor/Tor
#19288 Document circuitpathbias in detail defect Medium Tor: unspecified Core Tor/Tor
#19293 Document connection-attachment and addressmapping in detail defect Medium Tor: unspecified Core Tor/Tor
#19318 controller: expose cache details. yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19319 controller: GETINFO stats to expose OOM details yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19322 colntroller: add events for "I uploaded my own descriptor" or "I regenerated my own descriptor" yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19325 controller: getinfo to get status of cpuworker queues yawning enhancement Medium Tor: unspecified Core Tor/Tor
#19329 Integrate callgraph complexity measures into our regular process defect Medium Tor: unspecified Core Tor/Tor
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* defect Low Tor: unspecified Core Tor/Tor
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS defect High Tor: unspecified Core Tor/Tor
#20232 Relays get stuck on resolve_my_address() if unable to guess address defect Very Low Tor: unspecified Core Tor/Tor
#20356 prop220: unit tests for all new/changed circuit extension functions defect Medium Tor: unspecified Core Tor/Tor
#20719 prop271 -- make parameters configurable enhancement Medium Tor: unspecified Core Tor/Tor
#20742 prop224: Implement stealth client authorization asn enhancement Very High Tor: unspecified Core Tor/Tor
#20822 Follow-up tasks for prop271 (new guard API) implementation project Medium Tor: unspecified Core Tor/Tor
#20832 Design proposals to further improve guard security enhancement Medium Tor: unspecified Core Tor/Tor
#20835 Refactor choose_good_entry_server so it is (almost) never used task High Tor: unspecified Core Tor/Tor
#20931 [prop271] Generate GUARD controller events enhancement Medium Tor: unspecified Core Tor/Tor
#20956 optionally do not write command line config to torrc defect Medium Tor: unspecified Core Tor/Tor
#21084 sometimes we call circuit has_opened() more than 2 times on client side defect Medium Tor: unspecified Core Tor/Tor
1 2 3 4 5 6 7 8 9
Note: See TracQuery for help on using queries.