Custom Query (14167 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (2001 - 2100 of 14167)

Ticket Summary Owner Type Priority Milestone Component
#20961 prop224: Implement consensus params to adjust portion of the protocol dgoulet enhancement Very High Tor: unspecified Core Tor/Tor
#20991 hs: Move end_sig_fields field of ESTABLISH_INTRO v3 cell before sig_len dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21008 hs: Remove the introduction point private key material from hs_descriptor.h dgoulet enhancement Very High Tor: 0.3.1.x-final Core Tor/Tor
#21019 logging when onion backend fails dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21022 Add several syscalls to src/lib/syscall.c (Torsocks breaks seccomp) dgoulet defect High Core Tor/Torsocks
#21033 hs: HiddenServiceNumIntroductionPoints can't go below the default value of 3 dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21054 hs: BUG() is triggered with ephemeral service on config reload dgoulet defect High Tor: 0.3.0.x-final Core Tor/Tor
#21058 Manual Modifications: Correction and Improvement dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21062 get_options_mutable: Assertion global_options failed; aborting -- b/c LearnCircuitBuildTimeout 0 dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21088 Hide getcap error message in torsocks dgoulet enhancement Low Core Tor/Torsocks
#21150 HiddenServiceStatistics gets set to 0 in your torrc, and stays 0 when you become a relay dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21293 circuit_receive_relay_cell(): Bug: relay crypt failed. Dropping connection. dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#21294 Exits don't allow single-hop SOCKSPorts - update single onion man page dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21302 hs: Multiple service issues dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#21403 prop224: Implement HS descriptor fetching dgoulet enhancement Very High Tor: 0.3.2.x-final Core Tor/Tor
#21471 handle_get_hs_descriptor_v3() does strlen(NULL) when descriptor isn't found dgoulet defect Very High Tor: 0.3.0.x-final Core Tor/Tor
#21534 "Client asked me to extend back to the previous hop" in small networks dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#21715 Possible error in the Tor manual (section "NumEntryGuards NUM") dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#21888 prop224: Groundwork for service implementation dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#21889 hs: Circuitmap changes for prop224 dgoulet enhancement Medium Tor: 0.3.1.x-final Core Tor/Tor
#21891 hs: Refactoring of some part of the legacy code for prop224 usage dgoulet enhancement Medium Tor: 0.3.1.x-final Core Tor/Tor
#21919 hs: Change trunnel prop224 cell's namespace dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22034 GETINFO extra-info/digest/<digest> dgoulet defect High Tor: 0.2.9.x-final Core Tor/Tor
#22042 HSFETCH not followed by HS_DESC_CONTENT event dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22068 Make it explicit that Torsocks won't work correctly in certain scenarios in the README dgoulet defect Medium Core Tor/Torsocks
#22138 Crash on connecting to address dgoulet defect High Tor: 0.3.1.x-final Core Tor/Tor
#22159 Hidden service f3oap63t7u7hfnki exceeded launch limit with 11 intro points in the last 77 seconds dgoulet defect Medium Tor: 0.3.1.x-final Core Tor/Tor
#22447 hs: HSDir do not accept v3 descriptors properly dgoulet defect Very High Tor: 0.3.0.x-final Core Tor/Tor
#22605 sandbox_intern_string(): Bug: No interned sandbox parameter found for /etc/tor/torrc.d/ dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#22726 prop224: Ignore unparseable v3 introduction points dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#22979 prop224: Add an introduction point onion key in the descriptor dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#23023 test: some prop224 unit tests fail only sometimes dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23056 prop224: Intro point aren't transfered between services on HUP dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23159 Bug: Non-fatal assertion ei failed in launch_intro_point_circuits at src/or/hs_service.c:1784 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23303 hs: Explain why we reset the directory connection timestamp client side dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23308 prop224: Implement note_connection_attempt_succeeded() in the client code dgoulet enhancement High Tor: 0.3.2.x-final Core Tor/Tor
#23309 hs: We need to get rid of a descriptor when entering non-overlap mode dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23319 hs: Memory leak in test hs_descriptor/decode_bad_signature dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23329 sandbox: Double free when initializing the HSv3 config dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23360 prop224: Service has dead code which removed a feature dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23429 hs: assert on rend_data when pruning the v2 service list dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23455 hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider REND_JOINED purpose dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23461 test: Unit tests memleaks in nodelist/ed_id and hs_common/client_service_hsdir_set_sync dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23465 hs: Downgrade client log warn to info dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23539 We've defined "don't use kist" as a negative interval, so don't check for -1 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23558 sched: KIST schedule() bad cast on monotime_diff_msec() dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23580 doc: HiddenServiceVersion man page entry only lists version 2 as supported dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23610 handle_establish_intro() can mark circuits for close twice dgoulet defect Medium Tor: 0.3.0.x-final Core Tor/Tor
#23645 hs: Continue to improve logging in both HS and circuit subsystems dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23662 prop224: Service edge-case where it re-uploads descriptor with same rev counter dgoulet defect Medium Tor: unspecified Core Tor/Tor
#23667 Always send ATYP 0x03 (domain name) with a plain IP address dgoulet defect Medium Core Tor/Torsocks
#23672 hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23681 prop224: Clients mark intro circs as timed-out within seconds dgoulet defect High Tor: 0.2.9.x-final Core Tor/Tor
#23696 Bug: scheduler_kist.c:520: kist_scheduler_schedule: Non-fatal assertion !((diff < 0)) failed. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23709 channel: `outgoing_queue` and `incoming_queue` are always empty dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#23710 sched: channel_more_to_flush() is probably looking at the wrong queue dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#23715 Support `memfd_create(2)` dgoulet enhancement Medium Core Tor/Torsocks
#23751 [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc. dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23762 hs-v3: Client request with missing dirinfo will always timeout dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23790 rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when copying intro points dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#23861 Excessive I learned some more directory information. [...] log message at startup dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23876 Torsocks getpeername() is broken for .onion addresses dgoulet defect Medium Core Tor/Torsocks
#24002 Check for ed25519 key is inverted in pick_intro_point() dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24025 Log warning: Inconsistent ed25519 identities in the nodelist dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24053 Bug: shared_random.c:918: sr_generate_our_commit: Assertion my_rsa_cert failed; aborting. dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24081 Torsocks logging to a file can cause a crash or corrupt application files. dgoulet defect High Core Tor/Torsocks
#24118 spec: Update dir-spec.txt with HS v3 consensus param dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24127 Profile a 0.3.2.x fast relay dgoulet task Medium Tor: 0.3.4.x-final Core Tor/Tor
#24134 Make supported version timeline easier to find dgoulet enhancement Very Low Tor: 0.3.2.x-final Core Tor/Tor
#24161 Recalculating voting schedule should be called first when setting a new consensus dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24165 prop284: Changes needed on the proposal dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24201 spec: ADD_ONION syntax is not reflecting the code dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24230 control: HS_DESC event failed upload sends back the wrong Action dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24313 Crash: died: Caught signal 11 [crash from rend_consider_services_intro_points] dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24343 Remove dead code and doc regarding the old SocksSocket option dgoulet defect Low Tor: 0.3.3.x-final Core Tor/Tor
#24346 prop224: Service stops uploading one of its two descriptors dgoulet defect Medium Tor: unspecified Core Tor/Tor
#24425 Set the hsdir_spread_store parameter to 4 (or maybe even 5) dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#24469 Cannibalizing a circuit should check that first hop is in our guard state dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#24502 scheduler_release_channel: Non-fatal assertion dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24590 sched: Fix integer overflow for KIST dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24665 sched: In KIST, the extra_space kernel value needs to be allowed to be negative dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24671 sched: KISTLite should set an upper limit to write on the outbuf dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24700 sched: With KIST, a channel can be added more than once in the pending list dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24767 All relays are constantly connecting to down relays and failing over and over dgoulet enhancement Very High Tor: 0.3.3.x-final Core Tor/Tor
#24860 Bug: Assertion cmux failed in circuitmux_get_policy at src/or/circuitmux.c dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24902 Denial of Service mitigation subsystem dgoulet enhancement Very High Tor: 0.3.3.x-final Core Tor/Tor
#24962 Single hop onion service denial of service issues dgoulet enhancement Medium Tor: 0.4.2.x-final Core Tor/Tor
#24964 dos: Block single hop client at the HSDir dgoulet defect Medium Tor: 0.4.2.x-final Core Tor/Tor
#24975 sched: scheduler_notify_networkstatus_changed() calls select_scheduler() without the new consensus dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#24976 Bug: src/or/hs_cache.c:628: cache_store_as_client: Non-fatal assertion !(cache_entry->desc->plaintext_data.revision_counter > client_desc->desc->plaintext_data.revision_counter) failed dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25095 Update dir-spec.txt with recent consensus param additions dgoulet task Medium Tor: 0.3.3.x-final Core Tor/Tor
#25113 monotonic_time unit test fail, 0.3.3.1-alpha debian armel dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25116 hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit dgoulet defect Medium Tor: 0.2.9.x-final Core Tor/Tor
#25125 KIST: Bug: scheduler_release_channel: Non-fatal assertion !(smartlist_pos(channels_pending, chan) == -1) dgoulet defect High Tor: 0.3.3.x-final Core Tor/Tor
#25128 Bug: src/or/dos.c:312: cc_stats_refill_bucket: Non-fatal assertion new_circuit_bucket_count >= stats->circuit_bucket failed dgoulet defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#25148 Make geoip_client_cache_total_allocation() use geoip_client_history_cache_size dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25183 Implement a way to tell if an IP address is a known relay dgoulet defect Medium Tor: 0.3.3.x-final Core Tor/Tor
#25193 dos: Avoid blacklisting Exit relays dgoulet defect Very High Tor: 0.3.3.x-final Core Tor/Tor
#25202 Check the calculations in cc_stats_refill_bucket using non fatal assertions dgoulet defect Low Tor: 0.3.3.x-final Core Tor/Tor
Note: See TracQuery for help on using queries.