Custom Query (357 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 357)

1 2 3 4

Resolution: fixed (100 matches)

Ticket Summary Owner Type Priority Component Version
#12424 Implement improved hidden service protocol (prop224) dgoulet enhancement Very High Core Tor/Tor
#17242 prop224: Implement client support enhancement Very High Core Tor/Tor
#17690 prop224: Control the number of HSDirs using a consensus parameter dgoulet enhancement Very High Core Tor/Tor
#20524 Revise initial descriptor upload behavior for onion services dgoulet enhancement Very High Core Tor/Tor
#20657 prop224: Implement service support. dgoulet enhancement Very High Core Tor/Tor
#21403 prop224: Implement HS descriptor fetching dgoulet enhancement Very High Core Tor/Tor
#21534 "Client asked me to extend back to the previous hop" in small networks dgoulet defect Very High Core Tor/Tor
#22918 Add link protocol 5 throughout torspec nickm defect Very High Core Tor/Tor Tor: 0.3.1.1-alpha
#23097 The circuit timeout prediction is not working properly defect Very High Core Tor/Tor
#23347 Using bridges or switching to bridges sometimes does not work with tor 0.3.2 teor defect Very High Core Tor/Tor
#23387 prop224: HSdir index desynch between client and service defect Very High Core Tor/Tor
#23429 hs: assert on rend_data when pruning the v2 service list dgoulet defect Very High Core Tor/Tor
#23558 sched: KIST schedule() bad cast on monotime_diff_msec() dgoulet defect Very High Core Tor/Tor
#23751 [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc. dgoulet defect Very High Core Tor/Tor
#24186 vote: Voting schedule is not updated before voting defect Very High Core Tor/Tor
#24665 sched: In KIST, the extra_space kernel value needs to be allowed to be negative dgoulet defect Very High Core Tor/Tor Tor: 0.3.2.1-alpha
#24666 sched: Store the circuit ID instead of the full DESTROY cell in the destroy queue nickm defect Very High Core Tor/Tor
#24671 sched: KISTLite should set an upper limit to write on the outbuf dgoulet defect Very High Core Tor/Tor
#25450 Intermittent test failures for hs_service/service_intro_point isis defect Very High Core Tor/Tor Tor: 0.3.1.3-alpha
#17639 provide an option to display the expiry date of a given ed25519 signing key isis enhancement High Core Tor/Tor Tor: 0.2.7.2-alpha
#19281 Potential heap corruption via `write_escaped_data` in control.c nickm defect High Core Tor/Tor Tor: unspecified
#20532 Make sure directory_initiate_request handles pluggable transports correctly catalyst defect High Core Tor/Tor
#22644 Assert crash with HSPOST and POSTDESCRIPTOR control port commands nickm defect High Core Tor/Tor
#23056 prop224: Intro point aren't transfered between services on HUP dgoulet defect High Core Tor/Tor
#23308 prop224: Implement note_connection_attempt_succeeded() in the client code dgoulet enhancement High Core Tor/Tor
#23309 hs: We need to get rid of a descriptor when entering non-overlap mode dgoulet defect High Core Tor/Tor
#23360 prop224: Service has dead code which removed a feature dgoulet defect High Core Tor/Tor
#23361 prop224: client can pick super old rendezvous points defect High Core Tor/Tor
#23372 test: stack-use-after-scope in hs_service/build_update_descriptors defect High Core Tor/Tor
#23455 hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider REND_JOINED purpose dgoulet defect High Core Tor/Tor
#23466 hs: v3 client descriptor cache entry should be indexed by blinded key defect High Core Tor/Tor
#23479 Bug: ../src/or/config.c:785: get_options_mutable: Non-fatal assertion ! in_option_validation failed nickm defect High Core Tor/Tor
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap dgoulet defect High Core Tor/Tor
#23676 kist on 0.3.2.1-alpha-dev beats its head against a wall trying to flush a conn that's closed defect High Core Tor/Tor
#23762 hs-v3: Client request with missing dirinfo will always timeout dgoulet defect High Core Tor/Tor
#23783 Can't build Tor 0.3.2.2-alpha with mingw32 on Windows 7 defect High Core Tor/Tor Tor: 0.3.2.2-alpha
#24313 Crash: died: Caught signal 11 [crash from rend_consider_services_intro_points] dgoulet defect High Core Tor/Tor Tor: 0.3.2.4-alpha
#24511 TorBrowser 7.5 a8 takes multiple minutes to connect defect High Core Tor/Tor Tor: 0.3.2.7-rc
#24590 sched: Fix integer overflow for KIST dgoulet defect High Core Tor/Tor
#24595 hs_service_intro_circ_has_closed: Assertion desc failed defect High Core Tor/Tor
#5190 Collect Rob's patch for throttling flows at guards robgjansen task Medium Core Tor/Tor
#7890 meaningless error message displayed by tor at start up nickm defect Medium Core Tor/Tor Tor: 0.2.4.6-alpha
#12890 Design and implement optimizations for socket write limits enhancement Medium Core Tor/Tor
#14312 tor-spec says additional fields in exitpolicy response are "optional" when they're not nickm defect Medium Core Tor/Tor
#14948 Clarify in control-spec which relays have ns and md entries and which don't nickm defect Medium Core Tor/Tor
#15582 compile warning in test_util.c: In function 'test_util_sscanf' nickm defect Medium Core Tor/Tor Tor: 0.2.6.6
#15645 Document PublishServerDescriptor better defect Medium Core Tor/Tor Tor: 0.2.6.7
#17750 Make bootstrapping clients wait before trying an authority teor enhancement Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#18307 Update RSOS Proposal (260) task Medium Core Tor/Tor
#18736 [Manual] Add some information about sub-domain rules nickm task Medium Core Tor/Tor
#18891 Make it clear that Address only works for IPv4 nickm defect Medium Core Tor/Tor
#18892 Add IP versions to man page enhancement Medium Core Tor/Tor
#20119 Tor should exit if it fails to write its PidFile, under principle of least confusion. Also, maybe Tor should create the directory that the PidFile points to nickm enhancement Medium Core Tor/Tor Tor: 0.2.8.7
#20152 Update DirAuthority man entry for client begindir, no IPv6 DirPort nickm defect Medium Core Tor/Tor
#20488 Nickname registration message is confusing nickm defect Medium Core Tor/Tor
#20963 [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20. nickm defect Medium Core Tor/Tor Tor: 0.2.8.9
#21031 Please don't remove ClientDNSRejectInternalAddresses Sebastian defect Medium Core Tor/Tor
#21283 Remove broken fallback directory mirrors defect Medium Core Tor/Tor
#21800 test suite triggers Bug: Result does not fit in tor_timegm but does not fail nickm defect Medium Core Tor/Tor Tor: 0.2.9.10
#21820 Update release checklist to add step about highlighting certain changes for operators enhancement Medium Core Tor/Tor
#21856 prop224: Client introduction point failure cache enhancement Medium Core Tor/Tor
#21857 prop224: Client introduction point establishment enhancement Medium Core Tor/Tor
#21858 prop224: Client rendezvous point establishment enhancement Medium Core Tor/Tor
#21888 prop224: Groundwork for service implementation dgoulet enhancement Medium Core Tor/Tor
#22006 prop224: Validate ed25519 pubkeys to remove torsion component asn defect Medium Core Tor/Tor
#22106 Initial Rust support enhancement Medium Core Tor/Tor
#22110 Defining TOR_BUILD_TAG and tor_git_revision violates the version spec nickm defect Medium Core Tor/Tor
#22301 make test-stem doesn't work atagar defect Medium Core Tor/Stem
#22420 Mysterious "XXXX RD This is a bug, right?" comment from Nick arma defect Medium Core Tor/Tor
#22461 Tor emits inaccurate safesocks warning event whenever you visit a naked IP address defect Medium Core Tor/Tor Tor: 0.2.6.2-alpha
#22532 ServerDNSAllowBrokenConfig defaults to 1, but TestingTorNetwork overrides it to...1. defect Medium Core Tor/Tor
#22677 Document that Sandbox 1 requires linux and seccomp2. nickm enhancement Medium Core Tor/Tor
#22694 prop224: Disable netflow padding if v3 single onion services are enabled defect Medium Core Tor/Tor
#22722 tor-spec still says "For a public-key cipher, we use RSA with 1024-bit keys" defect Medium Core Tor/Tor
#22726 prop224: Ignore unparseable v3 introduction points dgoulet defect Medium Core Tor/Tor
#22736 prop224: Update spec wrt overlap behavior of HSes asn defect Medium Core Tor/Tor
#22750 Incorrect syscall in some sandbox error messages defect Medium Core Tor/Tor Tor: 0.2.5.1-alpha
#22795 torrc has an optional final newline defect Medium Core Tor/Tor
#22802 Avoid use of "0" with tor_parse_foo() nickm defect Medium Core Tor/Tor
#22803 Memory leak in link-handshake/certs_ok_ed25519 nickm defect Medium Core Tor/Tor
#22862 tor-spec doesn't say how clients authenticate authorities or fallback directories teor defect Medium Core Tor/Tor Tor: unspecified
#22880 NETINFO cells are used for clock skew checks nickm defect Medium Core Tor/Tor
#22882 The v4 link protocol requires the initiator to set the most significant bit defect Medium Core Tor/Tor
#22885 When uploading the first descriptor of a session, call it dirty because "Tor just started" nickm defect Medium Core Tor/Tor
#22890 Recent tor relays do use canonical connections defect Medium Core Tor/Tor
#22915 clang 4.0 double promotion warnings in clamp_double_to_int64() nickm defect Medium Core Tor/Tor
#22924 signed integer overflow in unit tests crashes hardened build on 32-bit trusty nickm defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#22929 What cells can be sent before a VERSIONS cell, and what is their CIRCID_LEN? defect Medium Core Tor/Tor
#22937 Clarify how resolved values are encoded in cells defect Medium Core Tor/Tor
#22940 prop224: HS revision counter should persist after service reboot defect Medium Core Tor/Tor
#22951 NETINFO cells are mandatory, but tor-spec says "may" defect Medium Core Tor/Tor
#22961 Should tor-spec say that nodes MUST NOT use TLS compression? defect Medium Core Tor/Tor
#22964 Clarify comment about all tor data being encrypted teor defect Medium Core Tor/Tor
#22979 prop224: Add an introduction point onion key in the descriptor dgoulet enhancement Medium Core Tor/Tor
#22987 TAP Hybrid Encryption case 1 is used when the payload is equal to the maximum length teor defect Medium Core Tor/Tor
#22993 prop224 has two section 0.5s defect Medium Core Tor/Tor
#22996 The router protocol versions section in dir-spec is out of date nickm defect Medium Core Tor/Tor
#23009 Make it clear that RELAY_SENDME cells don't have a payload defect Medium Core Tor/Tor
#23019 prop224: Validate received onion addresses on the client side defect Medium Core Tor/Tor
#23023 test: some prop224 unit tests fail only sometimes dgoulet defect Medium Core Tor/Tor
(more results for this group on next page)
1 2 3 4
Note: See TracQuery for help on using queries.