Custom Query (266 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 266)

1 2 3

Resolution: fixed (100 matches)

Ticket Summary Owner Type Priority Component Version
#20699 prop224: Add control port events and commands dgoulet enhancement Very High Core Tor/Tor
#24031 Protover.rs could use a better algorithm isis defect Very High Core Tor/Tor Tor: 0.3.3.1-alpha
#24767 All relays are constantly connecting to down relays and failing over and over dgoulet enhancement Very High Core Tor/Tor
#24902 Denial of Service mitigation subsystem dgoulet enhancement Very High Core Tor/Tor
#25128 Bug: src/or/dos.c:312: cc_stats_refill_bucket: Non-fatal assertion new_circuit_bucket_count >= stats->circuit_bucket failed dgoulet defect Very High Core Tor/Tor
#25193 dos: Avoid blacklisting Exit relays dgoulet defect Very High Core Tor/Tor
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ dgoulet defect High Core Tor/Tor Tor: 0.3.1.3-alpha
#23709 channel: `outgoing_queue` and `incoming_queue` are always empty dgoulet defect High Core Tor/Tor
#23710 sched: channel_more_to_flush() is probably looking at the wrong queue dgoulet defect High Core Tor/Tor
#23881 Implement a way to utilise tor's logging system from Rust code isis enhancement High Core Tor/Tor
#24053 Bug: shared_random.c:918: sr_generate_our_commit: Assertion my_rsa_cert failed; aborting. dgoulet defect High Core Tor/Tor Tor: unspecified
#24608 Update our Cargo.lock file to remove the deprecated and removed [root] section defect High Core Tor/Tor Tor: 0.3.2.6-alpha
#24700 sched: With KIST, a channel can be added more than once in the pending list dgoulet defect High Core Tor/Tor Tor: 0.3.2.1-alpha
#24807 UAF after updating `master` to 1dab8bae21bc32e5d4e3ff954f4919d6506ad2e1 defect High Core Tor/Tor
#24860 Bug: Assertion cmux failed in circuitmux_get_policy at src/or/circuitmux.c dgoulet defect High Core Tor/Tor
#24861 Using %zu seems to break mingw :/ ffmancera defect High Core Tor/Tor
#24975 sched: scheduler_notify_networkstatus_changed() calls select_scheduler() without the new consensus dgoulet defect High Core Tor/Tor
#25036 Tor 0.3.2 rejects connections to raw ipv6 addresses tbb-team defect High Core Tor/Tor Tor: 0.3.2.1-alpha
#25117 Resolve TROVE-2018-002: bug 24700 KIST use-after-free can be remotely triggered nickm defect High Core Tor/Tor
#25125 KIST: Bug: scheduler_release_channel: Non-fatal assertion !(smartlist_pos(channels_pending, chan) == -1) dgoulet defect High Core Tor/Tor
#25223 dos: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed dgoulet defect High Core Tor/Tor
#25250 Infinite loop in Rust protover implementation (TROVE-2018-003) nickm defect High Core Tor/Tor
#25252 Rust implementation of protover code deviates from C in some cases nickm defect High Core Tor/Tor
#25415 moria1 seg faults on testing relay reachability nickm defect High Core Tor/Tor Tor: 0.3.3.2-alpha
#25560 test all rust crates for realsies defect High Core Tor/Tor Tor: 0.3.3.3-alpha
#25691 Bridges don't work: Non-fatal assertion !(exit_ei == NULL) failed in onion_pick_cpath_exit nickm defect High Core Tor/Tor
#25692 onion_extend_cpath: Non-fatal assertion info || client failed. nickm defect High Core Tor/Tor
#13043 torspec lies about accepting both IPv4 and IPv6 for ORAddress lines teor defect Medium Core Tor/Tor
#19610 IPv6-only clients fetch microdescriptors from a small number of IPv6 fallbacks teor defect Medium Core Tor/Tor Tor: 0.2.8.4-rc
#20942 Make consensus expiry tolerance for fallbacks lower when the stale consensus bug is fixed teor enhancement Medium Core Tor/Fallback Scripts
#20946 Make it easier to find contacts for a fallback list enhancement Medium Core Tor/Fallback Scripts
#22145 Document which interface is used for DNS requests in the context of OutboundBindAddressOR/Exit defect Medium Core Tor/Tor Tor: 0.3.0.6
#22271 Regenerate fallback list for 0.3.2 or 0.3.3 teor task Medium Core Tor/Fallback Scripts
#22321 Update fallback directory whitelist based on operator relay changes teor enhancement Medium Core Tor/Fallback Scripts
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file nickm defect Medium Core Tor/Tor Tor: 0.3.0.7
#22527 Add new operators to fallback directory whitelist pastly task Medium Core Tor/Fallback Scripts
#22759 Mark the fallbacks that have extra-info descriptors, so stem can use them teor enhancement Medium Core Tor/Fallback Scripts
#23100 Circuit Build Timeout needs to count hidden service circuits mikeperry enhancement Medium Core Tor/Tor Tor: 0.2.7
#23271 control_auth_cookie isn't deleted when tor stops defect Medium Core Tor/Tor Tor: 0.3.0.10
#23571 Stop closing channels out from under OR connections in hibernate_go_dormant() teor defect Medium Core Tor/Tor Tor: 0.2.4.7-alpha
#23635 improve AccountingStart manual entry enhancement Medium Core Tor/Tor
#23813 router_reset_descriptor_download_failures() doesn't actually reset descriptor downloads defect Medium Core Tor/Tor
#23814 Remove non-exponential backoff directory download implementation nickm defect Medium Core Tor/Tor
#23870 Authorities: document what happens when relays have misconfigured IPv6 teor defect Medium Core Tor/Tor Tor: 0.2.4.1-alpha
#23874 Clear the address when node_get_prim_orport() returns early defect Medium Core Tor/Tor Tor: 0.2.8.2-alpha
#23954 Race condition in LOG_PROTOCOL_WARN nickm defect Medium Core Tor/Tor
#23989 entry_guards_update_all() will pretend to update primaries even if sampled set is empty nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#24082 uninitialized value in networkstatus_parse_vote_from_string() via fuzz_consensus.c defect Medium Core Tor/Tor
#24117 Make a repository to hold our rust dependencies in a form Cargo can use task Medium Core Tor/Tor
#24119 channel_rsa_id_group_set_badness spends a lot of time in malloc/free Hello71 enhancement Medium Core Tor/Tor
#24135 fluxe4 (a fallback dir) has stable ipv6 pastly defect Medium Core Tor/Fallback Scripts
#24165 prop284: Changes needed on the proposal dgoulet defect Medium Core Tor/Tor
#24244 Fix TROVE-2017-009: Replay-cache ineffective for v2 hidden services. nickm defect Medium Core Tor/Tor
#24246 Fix TROVE-2017-011: An attacker can make tor ask for a password nickm defect Medium Core Tor/Tor
#24318 Clarify that the RelayBandwidth* options exclude directory fetches by relays defect Medium Core Tor/Tor
#24333 Fix TROVE-2017-012: Relays can pick themselves in a circuit path defect Medium Core Tor/Tor
#24342 Various spec fixes to dir-spec, rend-spec-v3 asn defect Medium Core Tor
#24363 Remove /usr/athena from search path in configure.ac defect Medium Core Tor/Tor
#24372 Fix a confusing comment about tie-breaking in compute_routerstatus_consensus() teor defect Medium Core Tor/Tor
#24426 Reliability: Make sure onion services don't publish until they have (nearly) all hsdirs' descriptors defect Medium Core Tor/Tor
#24430 Fix TROVE-2017-013: Use-after-free in onion service v2 when rotating intro points defect Medium Core Tor/Tor
#24469 Cannibalizing a circuit should check that first hop is in our guard state dgoulet defect Medium Core Tor/Tor
#24488 Make set_routerstatus_from_routerinfo() set IPv6 unspecified addresses teor defect Medium Core Tor/Tor Tor: 0.2.4.1-alpha
#24489 Add some consts to networkstatus_getinfo_by_purpose() teor enhancement Medium Core Tor/Tor
#24518 Remove the --quiet from our cargo build invocation nickm defect Medium Core Tor/Tor
#24526 Make it clear that multi-relay operators are expected to set a working ContactInfo and proper MyFamily nickm enhancement Medium Core Tor/Tor
#24531 sched: Add function to change scheduler state and always use it defect Medium Core Tor/Tor
#24543 Coverity CID 1425733: Calling "hs_parse_address" without checking return value ahf defect Medium Core Tor/Tor
#24555 Bug: tor_gmtime_r overflow - gmtime(9223372036854775807) failed with error No error defect Medium Core Tor/Tor Tor: unspecified
#24559 Move a comment to relay_send_end_cell_from_edge() defect Medium Core Tor/Tor
#24572 rewrite_node_address_for_bridge() doesn't set rs IPv6 addresses ffmancera defect Medium Core Tor/Tor Tor: 0.2.4.5-alpha
#24573 rewrite_node_address_for_bridge() should set IPv6 preferences even if there is no ri defect Medium Core Tor/Tor Tor: 0.2.4.5-alpha
#24575 options_transition_affects_guards() refers to an old function name in a comment defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#24596 FREE_AND_NULL documentation uses different names for the macro parameter defect Medium Core Tor/Tor
#24600 Add fallback nicknames to the file, so stem can use them teor enhancement Medium Core Tor/Fallback Scripts
#24613 Avoid monotime_coarse_absolute_msec in channelpadding code nickm enhancement Medium Core Tor/Tor
#24677 Use ping ::1 on Linux when ping6 ::1 fails defect Medium Core Tor/Tor Tor: 0.2.9.3-alpha
#24679 Remove custom weights from each fallback in the fallback list teor enhancement Medium Core Tor/Fallback Scripts
#24681 Make the default fallback weight in Tor 10.0 teor enhancement Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#24682 Make fallback script usage instructions create a log file teor enhancement Medium Core Tor/Fallback Scripts
#24695 Fallback blacklist removal for 1C90D3AEADFF3BCD079810632C8B85637924A58E teor defect Medium Core Tor/Fallback Scripts
#24706 Add a script that creates fallback directory whitelist entries teor enhancement Medium Core Tor/Fallback Scripts
#24708 Make the fallback script search harder for python teor defect Medium Core Tor/Fallback Scripts Tor: 0.2.8.1-alpha
#24711 Update dependency list for the fallback script teor enhancement Medium Core Tor/Fallback Scripts
#24725 Add a format version number to the fallback file teor enhancement Medium Core Tor/Fallback Scripts
#24726 Make sure a comma never appears anywhere in a fallback entry teor enhancement Medium Core Tor/Fallback Scripts
#24733 Loading ifc.ifc_buf using the new tor_free() causes undefined behaviour on x86_64 macOS teor defect Medium Core Tor/Tor
#24762 tor_remove_file() should ignore NULL filenames teor defect Medium Core Tor/Tor
#24778 Mark prop#283 as Accepted teor enhancement Medium Core Tor/Tor
#24782 Set a lower default MaxMemInQueues value ahf defect Medium Core Tor/Tor
#24785 Reduce the fallback stability and flag requirements due to extra network load teor enhancement Medium Core Tor/Fallback Scripts
#24791 Remove excessive address info from the fallback script log teor enhancement Medium Core Tor/Fallback Scripts
#24794 smartlist.rs: do not use i8 interchangeably with libc::c_char nickm defect Medium Core Tor/Tor
#24826 consensus diffs stall Tor Browser launch for at least 20s or break it entirely if compiled with --enable-expensive-hardening nickm defect Medium Core Tor/Tor
#24859 Bug: Non-fatal assertion !(ent == NULL) failed in store_multiple at src/or/consdiffmgr.c nickm defect Medium Core Tor/Tor
#24894 v3 onion services don't respect MAX_REND_FAILURES arma defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#24895 MAX_REND_FAILURES is 1, but we will try three times defect Medium Core Tor/Tor
#24927 if (n_chan_id) in circuit_build_failed() can't fail nickm defect Medium Core Tor/Tor Tor: 0.2.4.4-alpha
#24933 tor-gencert says [warn] event_base_free_: no base to free defect Medium Core Tor/Tor
#24946 connection_ap_expire_beginning(): Bug: circuit->purpose == CIRCUIT_PURPOSE_C_GENERAL failed mikeperry defect Medium Core Tor/Tor
(more results for this group on next page)
1 2 3
Note: See TracQuery for help on using queries.