Custom Query (252 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 252)

1 2 3

Resolution: fixed (100 matches)

Ticket Summary Owner Type Priority Component Version
#21266 test: Improve hs intropoints unit test with expected msg log. ahf enhancement Medium Core Tor/Tor
#20269 bridge users ignore their cached consensus file on startup arma defect Medium Core Tor/Tor
#12595 Finalize design for improved guard-node behavior asn task High Core Tor/Tor Tor: 0.2.7
#20852 prop224: Update prop224 HSDir code to understand latest descriptor format asn defect Medium Core Tor/Tor
#21052 Bad prop271 behavior when exhausting all guards asn defect High Core Tor/Tor
#21059 shared-rand-current-value violates spec asn defect High Core Tor/Tor
#21142 prop271: circuits_pending_other_guards not properly maintained asn defect High Core Tor/Tor Tor: 0.3.0.1-alpha
#20717 Hashing api should return negative values for errors chelseakomlo defect Medium Core Tor/Tor
#21193 Prop271 spec: High level circuit creation and guard selection overview chelseakomlo enhancement Low Core Tor/Tor Tor: unspecified
#21096 Check for the tor- prefix in changes files cypherpunks enhancement Medium Core Tor/Tor
#17238 prop224: Implement HSDir support dgoulet enhancement High Core Tor/Tor
#17241 prop224: Implement relay side support dgoulet enhancement High Core Tor/Tor
#18515 Refactoring routerparse.c/.h, hidden services parser in a seperate file dgoulet enhancement Very Low Core Tor/Tor
#18571 prop224: Encode/Decode descriptor implementation dgoulet enhancement High Core Tor/Tor
#18572 prop224: HSDir descriptor cache implementation dgoulet enhancement High Core Tor/Tor
#19024 prop224: Refactor rend_data_t so be able to use multiple HS version dgoulet enhancement Medium Core Tor/Tor
#19133 Clarify how INT_N truncates values dgoulet defect Medium Core Tor/Tor
#19205 prop224: HSDir fetch/store implementation dgoulet enhancement Medium Core Tor/Tor
#19953 DataDirectoryGroupReadable does not take effect when relay enabled dgoulet defect Medium Core Tor Tor: 0.2.8.6
#20029 prop224: Implementation of INTRODUCE1 and INTRODUCE_ACK cells dgoulet enhancement High Core Tor/Tor
#20481 Section 3.8.1 of dir-spec is out of date again dgoulet defect Medium Core Tor/Tor
#20569 hs: Use AES256 prop224 descriptors dgoulet defect High Core Tor/Tor
#20629 hs: Fix issues found by coverity dgoulet defect Medium Core Tor/Tor
#20656 prop224: Tell protover about relay and hsdir support dgoulet enhancement Medium Core Tor/Tor
#20684 DIRCACHE_MIN_MB_BANDWIDTH is actually used for RAM dgoulet defect Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#20991 hs: Move end_sig_fields field of ESTABLISH_INTRO v3 cell before sig_len dgoulet defect Medium Core Tor/Tor
#21019 logging when onion backend fails dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.7-rc
#21033 hs: HiddenServiceNumIntroductionPoints can't go below the default value of 3 dgoulet defect Medium Core Tor/Tor
#21054 hs: BUG() is triggered with ephemeral service on config reload dgoulet defect High Core Tor/Tor Tor: 0.3.0.1-alpha
#21058 Manual Modifications: Correction and Improvement dgoulet defect Medium Core Tor/Tor
#21062 get_options_mutable: Assertion global_options failed; aborting -- b/c LearnCircuitBuildTimeout 0 dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.7-rc
#21150 HiddenServiceStatistics gets set to 0 in your torrc, and stays 0 when you become a relay dgoulet defect Medium Core Tor/Tor
#21294 Exits don't allow single-hop SOCKSPorts - update single onion man page dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#21302 hs: Multiple service issues dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.8
#21471 handle_get_hs_descriptor_v3() does strlen(NULL) when descriptor isn't found dgoulet defect Very High Core Tor/Tor
#22447 hs: HSDir do not accept v3 descriptors properly dgoulet defect Very High Core Tor/Tor Tor: 0.3.0.1-alpha
#23610 handle_establish_intro() can mark circuits for close twice dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#17070 ".local" is mDNS for the local network, but tor assumes localhost jryans defect Medium Core Tor/Tor
#18145 Avoid using "people" when we mean relays in tor's comments jryans defect Low Core Tor/Tor
#18146 Tor's control protocol misspells "Dependent" jryans defect Medium Core Tor/Tor Tor: unspecified
#19965 Log torrc option can't handle tab after severity jryans defect Medium Core Tor/Tor Tor: 0.2.1.10-alpha
#20014 GETINFO version in torspec is inconsistent with the implementation jryans defect Medium Core Tor/Tor
#20492 Tor git version is not generated in git worktrees jryans defect Medium Core Tor/Tor Tor: 0.2.3.9-alpha
#20572 hs: Remove the private key material from hs_descriptor.h jryans defect High Core Tor/Tor
#20853 rend_config_services should use service_is_ephemeral rather than old/new->directory jryans defect Medium Core Tor/Tor Tor: 0.2.9.5-alpha
#20885 Portions of the tor.1 man page and html doc formatted incorrectly jryans defect Medium Core Tor/Tor
#20932 Coding Standards: No changes file for bug fix on unreleased code jryans enhancement Medium Core Tor/Tor
#20502 Setting UseBridges=1 UseEntryGuards=0 means you bypass your bridges neel defect Medium Core Tor/Tor
#16852 update dir-spec.txt to match our requirements for Guard flag nickm defect Medium Core Tor/Tor
#19301 Accept Ed25519 identities in EXTEND2 cells nickm enhancement Medium Core Tor/Tor
#19877 Implement new guard selection algorithm of prop 271 nickm task Medium Core Tor/Tor Tor: unspecified
#20270 "Descriptor is missing an ntor curve25519 onion key" message too noisy? nickm defect Low Core Tor/Tor Tor: 0.2.9.3-alpha
#20718 Prop271 -- Resolve all 'XXXX prop271' items nickm task Medium Core Tor/Tor
#20823 [controller, prop271] GETINFO support for new guard selection logic nickm defect High Core Tor/Tor
#20824 [prop271, controller] DROPGUARDS support for new guard backend nickm defect High Core Tor/Tor
#20831 Support existing guard torrc options better with new guard code, or deprecate them. nickm defect High Core Tor/Tor
#20834 Write patches for all spec-deviations in prop271 nickm defect Medium Core Tor/Tor
#20862 Unittest fail on master: FAIL src/test/test_options.c:662: expected log to contain "Could not resolve local Address " nickm defect Medium Core Tor/Tor
#20894 Resolve read-off-end-of-buffer on atoi in fetch_from_buf_http (TROVE-2016-10-001) nickm defect High Core Tor/Tor Tor: unspecified
#20974 Call no directory guard happy until its directory headers are received nickm defect Medium Core Tor/Tor
#20987 Memory leak in rend_config_services() nickm defect Medium Core Tor/Tor
#21007 guard: circuit_send_next_onion_skin(): Bug: 3-hop circuit <ptr> with purpose 18 has no guard state nickm defect High Core Tor/Tor Tor: 0.3.0.3-alpha
#21027 tor_bug_occurred_(): Bug: src/or/entrynodes.c:816: entry_guard_add_to_sample_impl: Non-fatal assertion !(have_sampled_guard_with_id(gs, rsa_id_digest)) failed. (on Tor 0.3.0.0-alpha-dev 8b75261b6dc341de) nickm defect High Core Tor/Tor
#21107 0.3.0.x dir auths enforcing ED identity keys: intended? nickm defect Very High Core Tor/Tor Tor: 0.3.0.1-alpha
#21118 circuit_get_global_origin_circuit_list() returns the wrong list nickm defect Medium Core Tor/Tor
#21128 Bug: src/or/entrynodes.c:2266: entry_guard_failed: Non-fatal assertion !(*guard_state_p == NULL) failed. (on Tor 0.3.0.0-alpha-dev 5a97a46e60c95b6f) nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#21129 Bug: src/or/entrynodes.c:1204: remove_guard_from_confirmed_and_primary_lists: Non-fatal assertion !(guard != found_guard) failed. nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#21242 Start-up error [onion_extend_cpath: Assertion info || client failed; aborting] nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#21278 Avoid signed integer underflow when comparing versions (Fix TROVE-2017-001) nickm defect Medium Core Tor/Tor
#21300 Recent changes broke GETCONF *Port nickm defect Very High Core Tor/Tor
#21356 [0.2.9.9] Bug: compat_time.c: monotime_coarse_absolute_nsec() called before monotime_init() on windows service nickm defect Medium Core Tor/Tor
#21369 Tor crashes with tor_assertion_failed_() [Assertion buf->datalen < INT_MAX failed in write_to_buf at ../src/or/buffers.c:832] nickm defect Very High Core Tor/Tor Tor: 0.2.9.9
#21372 Don't crash when we fail to find extend info for a middle node nickm defect Medium Core Tor/Tor
#21415 tor_bug_occurred_: Bug: src/or/entrynodes.c:1845: select_entry_guard_for_circuit: Non-fatal assertion !(!guard_has_descriptor(guard)) failed. nickm defect Medium Core Tor/Tor Tor: 0.3.0.3-alpha
#21420 Link certificate start date in the future nickm defect Medium Core Tor/Tor
#21447 Rename 'make fuzz' nickm defect Medium Core Tor/Tor
#21472 doc/HACKING/FUZZING.md uses outdated make target fuzz nickm defect Medium Core Tor/Tor
#21492 options_transition_affects_guards lists UseEntryGuards twice nickm defect Medium Core Tor/Tor
#21682 memory leak at shutdown nickm defect Medium Core Tor/Tor Tor: unspecified
#21894 Base32_encode: *actually* allow inputs of odd sizes nickm defect High Core Tor/Tor
#22252 get_options_mutable: Assertion global_options failed; SIGABRT nickm defect Medium Core Tor Tor: unspecified
#22753 Resolve TROVE-2017-006: Regression in guard family avoidance in 0.3.0 series nickm defect High Core Tor/Tor
#22838 Backport mingw warning fix from 0.3.1. nickm defect Medium Core Tor/Tor
#14881 incorrect defaults when producing bandwidth-weights line in directory footer pastly defect Medium Core Tor/Tor Tor: 0.2.7
#20650 confusing "I need to load the permanent master identity key" line s7r defect Medium Core Tor/Tor Tor: 0.2.7.3-rc
#18828 Regenerate fallback list for 0.2.9 teor enhancement Medium Core Tor/Tor
#20070 Make address choice failure log message more informative teor enhancement Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#20484 HiddenServiceDir must already exist when making a Single Onion Service teor defect Medium Core Tor/Tor Tor: 0.2.9.3-alpha
#22797 macOS should use ULIMIT_BUFFER for open files teor defect Medium Core Tor/Tor
#23524 Avoid crashing when we ask for running bridges, but UseBridges is 0 teor defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#5462 Clients should alert the user if many guards are unreachable defect Medium Core Tor/Tor Tor: 0.2.7
#17849 Warn if single-stack IPv4/IPv6 clients have very restricted guard choices enhancement Medium Core Tor/Tor
#19025 Exit relays always return DNS TTL 60 to tor clients defect Very High Core Tor/Tor Tor: 0.2.8.2-alpha
#19222 base64_decode() unreachable heap corruption on 32-bit systems defect Medium Core Tor/Tor Tor: unspecified
#19699 Remove almost all functionality from Tor's test-network.sh defect Medium Core Tor/Tor
#20077 Make is_sensitive_dir_purpose and purpose_needs_anonymity consistent defect Medium Core Tor/Tor
#20273 consensus weight inaccuracies: 1 --> weight_scale defect Low Core Tor/Tor
#20389 Say 'Invalid argument' instead of unclear 'Unrecognized' in HSFETCH defect Medium Core Tor/Tor
#20410 Tor master breaks bridge clients defect High Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#20435 Update tor man page with AuthDirGuardBWGuarantee of 2 MBytes defect Medium Core Tor/Tor Tor: 0.2.5.6-alpha
(more results for this group on next page)
1 2 3
Note: See TracQuery for help on using queries.