Custom Query (252 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 252)

1 2 3

Resolution: fixed (59 matches)

Ticket Summary Owner Type Priority Component Version
#21026 Remove the abort handler in the backtrace generator defect Medium Core Tor/Tor Tor: 0.2.5.2-alpha
#21033 hs: HiddenServiceNumIntroductionPoints can't go below the default value of 3 dgoulet defect Medium Core Tor/Tor
#21058 Manual Modifications: Correction and Improvement dgoulet defect Medium Core Tor/Tor
#21062 get_options_mutable: Assertion global_options failed; aborting -- b/c LearnCircuitBuildTimeout 0 dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.7-rc
#21096 Check for the tor- prefix in changes files cypherpunks enhancement Medium Core Tor/Tor
#21116 fix building on raspbian wheezy defect Medium Core Tor/Tor
#21118 circuit_get_global_origin_circuit_list() returns the wrong list nickm defect Medium Core Tor/Tor
#21122 Document all options that can't be changed while tor is running defect Medium Core Tor/Tor
#21123 Remove redundant code in options_transition_allowed defect Medium Core Tor/Tor Tor: 0.2.5.4-alpha
#21124 ChangeLog: reference to 18625 actually corresponds to 18626 defect Medium Core Tor/Tor Tor: 0.2.8.2-alpha
#21128 Bug: src/or/entrynodes.c:2266: entry_guard_failed: Non-fatal assertion !(*guard_state_p == NULL) failed. (on Tor 0.3.0.0-alpha-dev 5a97a46e60c95b6f) nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#21129 Bug: src/or/entrynodes.c:1204: remove_guard_from_confirmed_and_primary_lists: Non-fatal assertion !(guard != found_guard) failed. nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#21134 Fail if file is too large to mmap. defect Medium Core Tor/Tor Tor: 0.2.9.8
#21150 HiddenServiceStatistics gets set to 0 in your torrc, and stays 0 when you become a relay dgoulet defect Medium Core Tor/Tor
#21226 Torspec: Proposal 224 has a wrong/unclear time period example defect Medium Core Tor/Tor
#21229 Lack of KEYID explanation in tor-spec.txt defect Medium Core Tor/Tor
#21242 Start-up error [onion_extend_cpath: Assertion info || client failed; aborting] nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#21266 test: Improve hs intropoints unit test with expected msg log. ahf enhancement Medium Core Tor/Tor
#21278 Avoid signed integer underflow when comparing versions (Fix TROVE-2017-001) nickm defect Medium Core Tor/Tor
#21294 Exits don't allow single-hop SOCKSPorts - update single onion man page dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#21302 hs: Multiple service issues dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.8
#21356 [0.2.9.9] Bug: compat_time.c: monotime_coarse_absolute_nsec() called before monotime_init() on windows service nickm defect Medium Core Tor/Tor
#21359 Build with opaque LibreSSL defect Medium Core Tor/Tor
#21372 Don't crash when we fail to find extend info for a middle node nickm defect Medium Core Tor/Tor
#21415 tor_bug_occurred_: Bug: src/or/entrynodes.c:1845: select_entry_guard_for_circuit: Non-fatal assertion !(!guard_has_descriptor(guard)) failed. nickm defect Medium Core Tor/Tor Tor: 0.3.0.3-alpha
#21420 Link certificate start date in the future nickm defect Medium Core Tor/Tor
#21447 Rename 'make fuzz' nickm defect Medium Core Tor/Tor
#21450 Consistently parse tor versions regardless of word size defect Medium Core Tor/Tor
#21472 doc/HACKING/FUZZING.md uses outdated make target fuzz nickm defect Medium Core Tor/Tor
#21492 options_transition_affects_guards lists UseEntryGuards twice nickm defect Medium Core Tor/Tor
#21493 When reachable addresses change, mark connections using those addresses defect Medium Core Tor/Tor
#21498 dir-spec says extra-info-digest has one digest but the code has two defect Medium Core Tor/Tor
#21553 hs: bad use of sizeof() in encode_establish_intro_cell_legacy defect Medium Core Tor/Tor
#21562 Fix shell script errors in src/test/test-network.sh defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#21581 Make test-network.sh use sh (or bash when it's available) defect Medium Core Tor/Tor
#21594 Hidden Services with many intro points delay checking circuits on startup defect Medium Core Tor/Tor Tor: 0.2.3.9-alpha
#21596 When hidden services stop creating new intro points, they also stop checking existing ones defect Medium Core Tor/Tor Tor: 0.2.7.2-alpha
#21682 memory leak at shutdown nickm defect Medium Core Tor/Tor Tor: unspecified
#21720 Update Directory Server Options section for automatic DirCache defect Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#21825 no symbol warning for hs_service.c defect Medium Core Tor/Tor
#22252 get_options_mutable: Assertion global_options failed; SIGABRT nickm defect Medium Core Tor Tor: unspecified
#22325 "we're missing descriptors for some of our primary entry guards" while using bridges defect Medium Core Tor/Tor
#22466 "Crosscert is expired" warnings: RSA->Ed25519 identity crosscertifice apparently made in 1970? defect Medium Core Tor/Tor
#22797 macOS should use ULIMIT_BUFFER for open files teor defect Medium Core Tor/Tor
#22838 Backport mingw warning fix from 0.3.1. nickm defect Medium Core Tor/Tor
#23524 Avoid crashing when we ask for running bridges, but UseBridges is 0 teor defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#23610 handle_establish_intro() can mark circuits for close twice dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#18145 Avoid using "people" when we mean relays in tor's comments jryans defect Low Core Tor/Tor
#20270 "Descriptor is missing an ntor curve25519 onion key" message too noisy? nickm defect Low Core Tor/Tor Tor: 0.2.9.3-alpha
#20273 consensus weight inaccuracies: 1 --> weight_scale defect Low Core Tor/Tor
#20632 Fix error handling in rend_service_parse_port_config() defect Low Core Tor/Tor
#20803 recommended-client-protocols and related are not in dir-spec defect Low Core Tor/Tor
#20936 Test: fix memory leak in test_circuituse.c defect Low Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#21193 Prop271 spec: High level circuit creation and guard selection overview chelseakomlo enhancement Low Core Tor/Tor Tor: unspecified
#21259 Remove extra newline from proxy_prepare_for_restart definition defect Low Core Tor/Tor Tor: 0.2.4.1-alpha
#18515 Refactoring routerparse.c/.h, hidden services parser in a seperate file dgoulet enhancement Very Low Core Tor/Tor
#20581 warning: 'enc_b64_blob' may be used uninitialized in this function defect Very Low Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#20631 Fixup comment in rend_service_parse_port_config() defect Very Low Core Tor/Tor
#20729 Small typo in doc/HACKING/WritingTests.md defect Very Low Core Tor/Tor

Resolution: invalid (1 match)

Ticket Summary Owner Type Priority Component Version
#21038 configure step and "implicit-function-declaration" task Medium Core Tor/Tor Tor: 0.3.0.1-alpha

Resolution: wontfix (3 matches)

Ticket Summary Owner Type Priority Component Version
#20906 SocksPorts and ControlPorts should be stored in a set, not a list nickm enhancement High Core Tor/Tor
#20262 Onion services startup time always gets revealed twim defect Medium Core Tor/Tor
#20764 Duplicate memset call in tor_addr_from_sockaddr defect Very Low Core Tor/Tor

Resolution: duplicate (7 matches)

Ticket Summary Owner Type Priority Component Version
#20418 Assertion anonymized_connection rend_non_anonymous_mode_enabled(options) failed in directory_initiate_command_rend defect Medium Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#20573 The build_mac() function in hs_descriptor.c should be made generic for the entire code base dgoulet enhancement Medium Core Tor/Tor
#20578 protover_get_supported_protocols should have LinkAuth 3 for ed auth defect Medium Core Tor/Tor Tor: 0.3.0.0-alpha-dev
#20692 risky duplicate code in rend_config_services() defect Medium Core Tor/Tor
#21085 A bunch of these warnings in relay log: [warn] connection_edge_process_relay_cell (at origin) failed. defect Medium Core Tor/Tor
#21362 Intermittent crash when selected guard lacks a descriptor or routerstatus defect Medium Core Tor/Tor Tor: 0.3.0.2-alpha
#21826 clang warnings because of "empty" hs_service.c file in 0.3.0 defect Medium Core Tor/Tor

Resolution: worksforme (1 match)

Ticket Summary Owner Type Priority Component Version
#20828 Should we provide a migration method from the old guard logic to the new one? defect High Core Tor/Tor

Resolution: implemented (29 matches)

Ticket Summary Owner Type Priority Component Version
#20826 Restrict GUARDS set to EntryNodes when the set of guards is restrictive nickm defect Very High Core Tor/Tor
#15055 Implement ed25519 link handshake nickm enhancement High Core Tor/Tor Tor: 0.2.7
#15056 Support ed25519 identities for circuit extension nickm enhancement High Core Tor/Tor Tor: 0.2.7
#15426 Update ciphers.inc to match ciphers from current Firefox nickm enhancement High Core Tor/Tor
#18319 Exclude relays that don't match pinned RSA/Ed key pairs nickm defect High Core Tor/Tor
#19899 prop224: Add a consensus param to enable/disable next gen onion service dgoulet enhancement High Core Tor/Tor
#19999 Maybe test-cases should complete without BUG warnings? nickm defect High Core Tor/Tor
#20004 prop224: Add a trunnel subdirectory specifically for HS dgoulet enhancement High Core Tor/Tor
#20920 Lower MAX_SAMPLE_THRESHOLD by a lot nickm defect High Core Tor/Tor
#20966 Parts of deployed shared random protocol are specified only in the proposal asn task High Core Tor/Tor
#23078 hs: Forgotten log_warn for prop224 intro point dgoulet defect High Core Tor/Tor
#6769 Relays (and bridges) don't use microdescriptors defect Medium Core Tor/Tor
#8018 path-spec does not discuss guard rotation nickm enhancement Medium Core Tor/Tor
#13827 Cell handling code duplication in channel.c pingl defect Medium Core Tor/Tor
#19043 prop224: Implementation of ESTABLISH_INTRO cell asn enhancement Medium Core Tor/Tor
#19291 Document cell-scheduler and cell-queue stuff in detail nickm defect Medium Core Tor/Tor
#19292 Document main event loop actions in detail nickm defect Medium Core Tor/Tor
#19302 Send ed25519 IDs in EXTEND2 cells nickm enhancement Medium Core Tor/Tor
#19642 Add a descriptor line for Single Onion Services dgoulet enhancement Medium Core Tor/Tor
#19858 Move guard state out of globals per new guard plan andrea task Medium Core Tor/Tor Tor: unspecified
#19878 Sample SAMPLED_GUARDS from GUARDS per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19879 Derive FILTERED_GUARDS / USABLE_FILTERED_GUARDS from SAMPLED_GUARDS per new guard plan nickm task Medium Core Tor/Tor
#19880 Maintain set of PRIMARY_GUARDS per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19881 New guard plan - guard selection for circuits nickm defect Medium Core Tor/Tor Tor: unspecified
#19882 New guard plan - update guard state when a circuit fails/succeeds nickm task Medium Core Tor/Tor Tor: unspecified
#19883 Maintain CONFIRMED_GUARDS per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19884 Retry schedule for guards per new guard plan nickm task Medium Core Tor/Tor Tor: unspecified
#19885 New guard plan - update list of waiting circuits nickm task Medium Core Tor/Tor Tor: unspecified
#19886 New guard plan - update state whenever we get a new consensus nickm task Medium Core Tor/Tor Tor: unspecified
(more results for this group on next page)
1 2 3
Note: See TracQuery for help on using queries.