Custom Query (14246 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (2501 - 2600 of 14246)

Ticket Summary Owner Type Priority Milestone Component
#23372 test: stack-use-after-scope in hs_service/build_update_descriptors defect High Tor: 0.3.2.x-final Core Tor/Tor
#23387 prop224: HSdir index desynch between client and service defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23429 hs: assert on rend_data when pruning the v2 service list dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23445 dir-spec: "protocols" line has been remove (past not future) defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23455 hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider REND_JOINED purpose dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23457 prop224: Service descriptor uploads race condition defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23461 test: Unit tests memleaks in nodelist/ed_id and hs_common/client_service_hsdir_set_sync dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23465 hs: Downgrade client log warn to info dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23466 hs: v3 client descriptor cache entry should be indexed by blinded key defect High Tor: 0.3.2.x-final Core Tor/Tor
#23478 v3 single onion services appear to be broken defect Medium Tor: 0.3.2.x-final Core Tor/Chutney
#23479 Bug: ../src/or/config.c:785: get_options_mutable: Non-fatal assertion ! in_option_validation failed nickm defect High Tor: 0.3.2.x-final Core Tor/Tor
#23480 hs: Rate limit some logs in hs-v3 subsystem defect Low Tor: 0.3.2.x-final Core Tor/Tor
#23487 Incorrect output on bad directory ownership nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23488 key-expiration check always returns exitcode 0 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23492 Fix some typos in prop 280 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23499 dir server responses should include a Date: header even when not responding 200 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23525 Add a missing call to download_status_get_next_attempt_at() defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23532 NETINFO clock skew detection doesn't work on clients catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23537 Allow the new sched to respond to a new conensus, not the old one. pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23539 We've defined "don't use kist" as a negative interval, so don't check for -1 dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23558 sched: KIST schedule() bad cast on monotime_diff_msec() dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23560 Fix typo(s) in comment(s) in the scheduling system. pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23563 document changes files release-readiness requirement in doc/HACKING nickm task Medium Tor: 0.3.2.x-final Core Tor/Tor
#23566 options/validate__transproxy fails on FreeBSD (thanks to the new scheduler) pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23572 Clarify what the client timestamp actually does teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23575 Avoid printf warning in scheduler_ev_add teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23580 doc: HiddenServiceVersion man page entry only lists version 2 as supported dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23581 Die more helpfully if Schedulers option isn't compatible with platform pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23583 ext/timeouts/timeout-bitops.c:234: bad shift nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23589 Stop assuming that every extend_info contains an IPv4 address in get_lspecs_from_extend_info() teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23602 Detect homebrew OpenSSL on OSX (was:Fix compilation on macOS) defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23603 hs: Cleanup race between circuit close and free with the HS circuitmap dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23606 incorrect clock skew sign convention in or_state_load() catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23607 Avoid assertion failure for state file clock skew catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23611 misspelled reference "UseEntryGuardsAsDirectoryGuards" to obsolete config parameter in manual page catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23637 Make exit flag depend on ports 80 and 443, not 6667 enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#23645 hs: Continue to improve logging in both HS and circuit subsystems dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23672 hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23676 kist on 0.3.2.1-alpha-dev beats its head against a wall trying to flush a conn that's closed defect High Tor: 0.3.2.x-final Core Tor/Tor
#23678 Tor kinda _is_ an http proxy now... nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23691 leak in test_util_decompress_dos_impl() catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23696 Bug: scheduler_kist.c:520: kist_scheduler_schedule: Non-fatal assertion !((diff < 0)) failed. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23700 Tor tells me "Scheduler type KIST has been enabled" multiple times defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23722 Somebody should profile a Tor 0.3.1.7 relay enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#23741 scripts/test/coverage tries to mv .gcov files to / catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23748 inconsistent/redundant handling of hs_ed25519_public_key file defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23751 [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc. dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#23755 don't unconditionally mirror in .gitlab-ci.yml defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23757 tor's .gitlab-ci.yml doesn't have the same behaviour as our .travis.yml catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23758 test config/include_no_permission fails when run as root catalyst defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23762 hs-v3: Client request with missing dirinfo will always timeout dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#23774 sched: KIST doesn't free the socket info hashtable on free_all() nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23783 Can't build Tor 0.3.2.2-alpha with mingw32 on Windows 7 defect High Tor: 0.3.2.x-final Core Tor/Tor
#23816 Use exponential backoff with jitter and/or tune its parameters nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23820 Make sure v3 single onion services and v3 onion service clients only send IPv4 addresses teor defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23861 Excessive I learned some more directory information. [...] log message at startup dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23952 LOG_PROTOCOL_WARN can call get_options() during an options transition. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#23977 control-spec.txt should document which "signals" don't actually exist as Unix signals defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24002 Check for ed25519 key is inverted in pick_intro_point() dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24007 Say "At most once" for exit policy summaries in microdescriptors defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24025 Log warning: Inconsistent ed25519 identities in the nodelist dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24050 We still do client-side caching. We just don't use the cache. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24097 evdns_callback(): Bug: eventdns returned no addresses or error nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24115 man: Mention that HS v3 num intro points is 0 to 20, not 0 to 10. defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24118 spec: Update dir-spec.txt with HS v3 consensus param dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24134 Make supported version timeline easier to find dgoulet enhancement Very Low Tor: 0.3.2.x-final Core Tor/Tor
#24150 Memory leak in v3 hsdesc parsing with empty encrypted data. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24158 I get this error "Looks like our kernel doesn't have the support for KIST anymore." on my relay pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24161 Recalculating voting schedule should be called first when setting a new consensus dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24170 Log the actual bandwidth total when logging "Generated weighted bandwidths" defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24186 vote: Voting schedule is not updated before voting defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24201 spec: ADD_ONION syntax is not reflecting the code dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24230 control: HS_DESC event failed upload sends back the wrong Action dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24247 Fuzzing: check_signature mock can be fooled by a really short key. nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24254 There needs to be documentation on what kernel versions the KIST Scheduler will run on pastly defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24262 hs-v3: Change "hsdir-interval" to "hsdir_interval" to match the spec defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24279 configure libevent leaks Hello71 defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24313 Crash: died: Caught signal 11 [crash from rend_consider_services_intro_points] dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24345 Memory leak in config/check_bridge_distribution_setting_not_a_bridge nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24424 fails to build with libseccomp-dev installed on arm64 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24425 Set the hsdir_spread_store parameter to 4 (or maybe even 5) dgoulet enhancement Medium Tor: 0.3.2.x-final Core Tor/Tor
#24502 scheduler_release_channel: Non-fatal assertion dgoulet defect Low Tor: 0.3.2.x-final Core Tor/Tor
#24511 TorBrowser 7.5 a8 takes multiple minutes to connect defect High Tor: 0.3.2.x-final Core Tor/Tor
#24590 sched: Fix integer overflow for KIST dgoulet defect High Tor: 0.3.2.x-final Core Tor/Tor
#24595 hs_service_intro_circ_has_closed: Assertion desc failed defect High Tor: 0.3.2.x-final Core Tor/Tor
#24630 Stop initialising rust git submodules, travis does this automatically defect Very Low Tor: 0.3.2.x-final Core Tor/Tor
#24634 test_hs_common.c:974:33: warning: declaration of 'time' shadows a global declaration nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24652 Rust builds fail on macOS with linker error nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24665 sched: In KIST, the extra_space kernel value needs to be allowed to be negative dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24666 sched: Store the circuit ID instead of the full DESTROY cell in the destroy queue nickm defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24671 sched: KISTLite should set an upper limit to write on the outbuf dgoulet defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#24849 Added -1 signatures to consensus nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24863 Travis CI environment change breaks clang builds defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#24976 Bug: src/or/hs_cache.c:628: cache_store_as_client: Non-fatal assertion !(cache_entry->desc->plaintext_data.revision_counter > client_desc->desc->plaintext_data.revision_counter) failed dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25005 memory leak in test-scheduler unit tests nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25105 Look at PRT_HSREND, not PRT_HSDIR, for supports_v3_rendezvous_point nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25306 tor_assertion_failed_(): Bug: ../src/or/hs_service.c:1985: rotate_all_descriptors: Assertion service->desc_current failed; aborting. dgoulet defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#25450 Intermittent test failures for hs_service/service_intro_point isis defect Very High Tor: 0.3.2.x-final Core Tor/Tor
#25474 configure test for libevent fails with c99 nickm defect Medium Tor: 0.3.2.x-final Core Tor/Tor
#26026 ValueError: "blue" isn't a valid color - color_interface is not working atagar defect Medium Tor: 0.3.2.x-final Archived/Nyx
Note: See TracQuery for help on using queries.