Custom Query (13684 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1901 - 2000 of 13684)

Ticket Summary Owner Type Priority Milestone Component
#21891 hs: Refactoring of some part of the legacy code for prop224 usage dgoulet enhancement Medium Tor: 0.3.1.x-final Core Tor/Tor
#21919 hs: Change trunnel prop224 cell's namespace dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22034 GETINFO extra-info/digest/<digest> dgoulet defect High Tor: 0.2.9.x-final Core Tor/Tor
#22042 HSFETCH not followed by HS_DESC_CONTENT event dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22068 Make it explicit that Torsocks won't work correctly in certain scenarios in the README dgoulet defect Medium Core Tor/Torsocks
#22138 Crash on connecting to address dgoulet defect High Tor: 0.3.1.x-final Core Tor/Tor
#22159 Hidden service f3oap63t7u7hfnki exceeded launch limit with 11 intro points in the last 77 seconds dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22447 hs: HSDir do not accept v3 descriptors properly dgoulet defect Very High Tor: 0.3.0.x-final Core Tor/Tor
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#22726 prop224: Ignore unparseable v3 introduction points dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22979 prop224: Add an introduction point onion key in the descriptor dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#23023 test: some prop224 unit tests fail only sometimes dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23056 prop224: Intro point aren't transfered between services on HUP dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23159 Bug: Non-fatal assertion ei failed in launch_intro_point_circuits at src/or/hs_service.c:1784 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23303 hs: Explain why we reset the directory connection timestamp client side dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23308 prop224: Implement note_connection_attempt_succeeded() in the client code dgoulet enhancement High Tor: 0.3.2.x-final Core Tor/Tor
#23309 hs: We need to get rid of a descriptor when entering non-overlap mode dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23319 hs: Memory leak in test hs_descriptor/decode_bad_signature dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23329 sandbox: Double free when initializing the HSv3 config dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23360 prop224: Service has dead code which removed a feature dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23429 hs: assert on rend_data when pruning the v2 service list dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23455 hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider REND_JOINED purpose dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23461 test: Unit tests memleaks in nodelist/ed_id and hs_common/client_service_hsdir_set_sync dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23465 hs: Downgrade client log warn to info dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23539 We've defined "don't use kist" as a negative interval, so don't check for -1 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23558 sched: KIST schedule() bad cast on monotime_diff_msec() dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23580 doc: HiddenServiceVersion man page entry only lists version 2 as supported dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23610 handle_establish_intro() can mark circuits for close twice dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#23645 hs: Continue to improve logging in both HS and circuit subsystems dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23662 prop224: Service edge-case where it re-uploads descriptor with same rev counter dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23667 Always send ATYP 0x03 (domain name) with a plain IP address dgoulet defect Medium Core Tor/Torsocks
#23672 hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23681 prop224: Clients mark intro circs as timed-out within seconds dgoulet defect High Tor: 0.2.9.x-final Core Tor/Tor
#23696 Bug: scheduler_kist.c:520: kist_scheduler_schedule: Non-fatal assertion !((diff < 0)) failed. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23709 channel: `outgoing_queue` and `incoming_queue` are always empty dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#23710 sched: channel_more_to_flush() is probably looking at the wrong queue dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#23715 Support `memfd_create(2)` dgoulet enhancement Medium Core Tor/Torsocks
#23751 [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc. dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23762 hs-v3: Client request with missing dirinfo will always timeout dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23790 rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when copying intro points dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23861 Excessive I learned some more directory information. [...] log message at startup dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23876 Torsocks getpeername() is broken for .onion addresses dgoulet defect Medium Core Tor/Torsocks
#24002 Check for ed25519 key is inverted in pick_intro_point() dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24025 Log warning: Inconsistent ed25519 identities in the nodelist dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24053 Bug: shared_random.c:918: sr_generate_our_commit: Assertion my_rsa_cert failed; aborting. dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24081 Torsocks logging to a file can cause a crash or corrupt application files. dgoulet defect High Core Tor/Torsocks
#24118 spec: Update dir-spec.txt with HS v3 consensus param dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24127 Profile a 0.3.2.x fast relay dgoulet task Medium Tor: 0.3.4.x-final Core Tor/Tor
#24134 Make supported version timeline easier to find dgoulet enhancement Very Low Tor: 0.3.2.x-final Core Tor/Tor
#24161 Recalculating voting schedule should be called first when setting a new consensus dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24165 prop284: Changes needed on the proposal dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24201 spec: ADD_ONION syntax is not reflecting the code dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24230 control: HS_DESC event failed upload sends back the wrong Action dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24313 Crash: died: Caught signal 11 [crash from rend_consider_services_intro_points] dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24343 Remove dead code and doc regarding the old SocksSocket option dgoulet defect Low Tor: 0.3.3.x-final Core Tor/Tor
#24346 prop224: Service stops uploading one of its two descriptors dgoulet defect Medium Tor: unspecified Core Tor/Tor
#24425 Set the hsdir_spread_store parameter to 4 (or maybe even 5) dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#24469 Cannibalizing a circuit should check that first hop is in our guard state dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24502 scheduler_release_channel: Non-fatal assertion dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24590 sched: Fix integer overflow for KIST dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24665 sched: In KIST, the extra_space kernel value needs to be allowed to be negative dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24671 sched: KISTLite should set an upper limit to write on the outbuf dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24700 sched: With KIST, a channel can be added more than once in the pending list dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24767 All relays are constantly connecting to down relays and failing over and over dgoulet enhancement Very High Tor: 0.3.3.x-final Core Tor/Tor
#24860 Bug: Assertion cmux failed in circuitmux_get_policy at src/or/circuitmux.c dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24902 Denial of Service mitigation subsystem dgoulet enhancement Very High Tor: 0.3.3.x-final Core Tor/Tor
#24962 Single hop onion service denial of service issues dgoulet enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#24964 dos: Block single hop client at the HSDir dgoulet defect Medium Tor: 0.4.2.x-final Core Tor/Tor
#24975 sched: scheduler_notify_networkstatus_changed() calls select_scheduler() without the new consensus dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24976 Bug: src/or/hs_cache.c:628: cache_store_as_client: Non-fatal assertion !(cache_entry->desc->plaintext_data.revision_counter > client_desc->desc->plaintext_data.revision_counter) failed dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25095 Update dir-spec.txt with recent consensus param additions dgoulet task Medium Tor: 0.3.3.x-final Core Tor/Tor
#25113 monotonic_time unit test fail, 0.3.3.1-alpha debian armel dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25116 hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25125 KIST: Bug: scheduler_release_channel: Non-fatal assertion !(smartlist_pos(channels_pending, chan) == -1) dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#25128 Bug: src/or/dos.c:312: cc_stats_refill_bucket: Non-fatal assertion new_circuit_bucket_count >= stats->circuit_bucket failed dgoulet defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#25148 Make geoip_client_cache_total_allocation() use geoip_client_history_cache_size dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25183 Implement a way to tell if an IP address is a known relay dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25193 dos: Avoid blacklisting Exit relays dgoulet defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#25202 Check the calculations in cc_stats_refill_bucket using non fatal assertions dgoulet defect Low Tor: 0.3.3.x-final Core Tor/Tor
#25223 dos: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#25236 dos: Document torrc default values in the man page when not in the consensus dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25306 tor_assertion_failed_(): Bug: ../src/or/hs_service.c:1985: rotate_all_descriptors: Assertion service->desc_current failed; aborting. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25494 Initial work on making modules conditionally compiled dgoulet task High Tor: 0.3.4.x-final Core Tor/Tor
#25498 module: Basic modularization preparation dgoulet task Medium Tor: 0.3.4.x-final Core Tor/Tor
#25552 prop224: Onion service rev counters are useless and actually harmful for scalability dgoulet defect Medium Tor: 0.3.5.x-final Core Tor/Tor
#25586 gethostbyaddr_r doesn't populate h_addrtype field of output hostent struct dgoulet defect Medium Core Tor/Torsocks
#25610 module: Modularized directory authority subsystem dgoulet enhancement Medium Tor: 0.3.4.x-final Core Tor/Tor
#25627 tsocks_gethostbyaddr_r scribbles garbage over data->hostname and then relies on it dgoulet defect Medium Core Tor/Torsocks
#25720 man: RephistTrackTime is not a dirauth only option dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25761 hs: Reload signal (HUP) doesn't remove a disabled service dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25901 hs-v3: Memleak on SIGHUP dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#25939 A Tor commit seems to have broken creation of V3 onion services with stem dgoulet defect High Tor: 0.3.4.x-final Core Tor/Tor
#25988 module: Post-merge tasks for dirauth modularization dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26062 client: ControlPort set doesn't mean you're a client dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26069 hs-v3: Descriptor signature parsing should have a trailing white-space dgoulet defect Medium Tor: 0.3.4.x-final Core Tor/Tor
#26082 control: ANY_EVENT_IS_INTERESTING() needs to mask the event before testing dgoulet defect Very High Tor: 0.3.4.x-final Core Tor/Tor
#26794 tsocks_gethostbyname_r does not assign result dgoulet defect High Core Tor/Torsocks
#26871 prop289: randomize the unused part of relay payloads dgoulet enhancement Medium Tor: 0.4.1.x-final Core Tor/Tor
#27471 HS intermittently fails: Non-fatal assertion failed in send_introduce1 dgoulet defect Very High Tor: 0.4.2.x-final Core Tor/Tor
Note: See TracQuery for help on using queries.