Custom Query (296 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1 - 100 of 296)

1 2 3

Status: accepted (32 matches)

Ticket Summary Owner Type Priority Component Version
#22893 prop224: Make intro point per-service and not per-descriptor dgoulet enhancement Very High Core Tor/Tor
#6767 tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed nickm defect High Core Tor/Tor Tor: 0.2.2.37
#14039 Many unnecessary CPU wakeups per second nickm defect High Core Tor/Tor Tor: 0.2.5.10
#15940 Make a standard transition plan for killing off a client version nickm task High Core Tor/Tor
#15941 Form a plan for killing off client versions which assume they'll live forever nickm task High Core Tor/Tor Tor: 0.2.4.1-alpha
#18636 Write sub-proposals for each part of prop257: Refactoring authorities. Implement as appropriate. nickm project High Core Tor/Tor
#19984 Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS nickm defect High Core Tor/Tor
#21509 Fuzz v3 hidden services nickm task High Core Tor/Tor
#3733 Tor should abandon rendezvous circuits that cause a client request to time out dgoulet defect Medium Core Tor/Tor
#7176 Adapt and update AccessLabs' patches for reduced Tor memory consumption for embedded devices nickm enhancement Medium Core Tor/Tor Tor: unspecified
#19926 BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#22739 Make routerinfo_t and routerstatus_t addresses immutable; store overrides in node_t nickm defect Medium Core Tor/Tor
#22948 Padding, Keepalive and Drop cells should have random payloads isis defect Medium Core Tor/Tor
#22955 Specify how PrivCount will work with Tor nickm task Medium Core Tor/Tor
#22962 Clarify the security severity of issues that make denial of service easier nickm task Medium Core Tor/Tor
#23108 prop224: Don't rotate all service descriptors at once dgoulet defect Medium Core Tor/Tor
#23146 prop280: Finish privcount-in-Tor proposal (280) nickm defect Medium Core Tor/Tor
#23406 Sampled guards are not re-weighted when a new consensus arrives nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#23507 Add single onion unreachable address algorithm to prop224 dgoulet defect Medium Core Tor/Tor
#23579 sched: Add accessors for channel_pending list dgoulet enhancement Medium Core Tor/Tor
#23711 sched: KIST writes to kernel and get a "wants to write" notification right after dgoulet defect Medium Core Tor/Tor
#23756 tor's .gitlab-ci.yml is doing mirroring? why? catalyst defect Medium Core Tor/Tor Tor: 0.3.2.2-alpha
#23989 entry_guards_update_all() will pretend to update primaries even if sampled set is empty nickm defect Medium Core Tor/Tor Tor: 0.3.0.1-alpha
#24008 service_intro_point_new() should return NULL when passed a NULL extend_info dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#24181 Put IPv6 and unrecognised link specifiers in onion service EXTEND cells dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.1-alpha
#24193 Make v3 single onion services parse and use IPv6 introduce link specifiers dgoulet enhancement Medium Core Tor/Tor
#24346 prop224: Service stops uploading one of its two descriptors dgoulet defect Medium Core Tor/Tor Tor: 0.3.2.4-alpha
#24451 Put IPv6 link specifiers in client EXTEND cells dgoulet enhancement Medium Core Tor/Tor
#24454 sandbox failure on arm64 nickm defect Medium Core Tor/Tor Tor: 0.3.2.5-alpha
#24469 Cannibalizing a circuit should check that first hop is in our guard state dgoulet defect Medium Core Tor/Tor
#21454 tor_version_compare and version spec comparison order are inconsistent nickm defect Low Core Tor/Tor
#21678 Unify Windows and Unix API for tor_read_all_handle() in util.c ahf enhancement Low Core Tor/Tor

Status: assigned (45 matches)

Ticket Summary Owner Type Priority Component Version
#20700 prop224: Implement client authorization asn enhancement Very High Core Tor/Tor
#12600 Save retrieved bridge information in our state file isis task High Core Tor/Tor
#24487 Reverse path selection (choose outer hops first) mikeperry defect High Core Tor/Tor
#24868 Check a consensus parameter before activating onion service IPv6 features teor defect High Core Tor/Tor
#24975 sched: scheduler_notify_networkstatus_changed() calls select_scheduler() without the new consensus dgoulet defect High Core Tor/Tor
#17521 Support capsicum(4) on FreeBSD shawn.webb enhancement Medium Core Tor/Tor Tor: unspecified
#19566 SR: Use BUG() instead of tor_assert() when we can dgoulet enhancement Medium Core Tor/Tor
#20832 Design proposals to further improve guard security nickm enhancement Medium Core Tor/Tor
#21117 can't migrate onion services to single-hop onion services dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.8
#21205 Instrument clients to measure directory usage ahf project Medium Core Tor/Tor
#21600 Hidden service introduction point retries occur at 1 second intervals teor defect Medium Core Tor/Tor Tor: 0.2.7.2-alpha
#22233 Reconsider behavior on .z URLs with Accept-Encoding header ahf defect Medium Core Tor/Tor
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion mikeperry defect Medium Core Tor/Tor Tor: 0.3.1.1-alpha
#22926 The Tor compression code can call functions that are NULL ahf defect Medium Core Tor/Tor Tor: 0.3.1.1-alpha
#23300 prop224: General client side issues dgoulet defect Medium Core Tor/Tor
#23301 prop224: Refactor connection_ap_handle_onion dgoulet defect Medium Core Tor/Tor
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose dgoulet defect Medium Core Tor/Tor
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack dgoulet defect Medium Core Tor/Tor
#23323 sample_laplace_distribution should produce a valid result on 0.0 teor defect Medium Core Tor/Tor Tor: 0.2.6.3-alpha
#23415 sample_laplace_distribution() should take multiple random inputs teor defect Medium Core Tor/Tor Tor: 0.2.8.1-alpha
#23416 Document the precision and limits of sample_laplace_distribution() teor enhancement Medium Core Tor/Tor
#23576 Make service_intro_point_new() take a node instead of an extend_info dgoulet defect Medium Core Tor/Tor
#23750 Isolate libevent usage to a few locations nickm enhancement Medium Core Tor/Tor
#23759 Refactor common code out of setup_introduce1_data and intro point functions dgoulet defect Medium Core Tor/Tor
#23883 document how to get Travis or GitLab CI running on your fork of tor catalyst task Medium Core Tor/Tor
#23954 Race condition in LOG_PROTOCOL_WARN nickm defect Medium Core Tor/Tor
#23980 Provide torrc option to kill hidden service circuits after $TIMEOUT, $NUM_BYTES, or guard changes. mikeperry enhancement Medium Core Tor/Tor
#23988 connection_dir_request_failed() not handling HS purposes dgoulet defect Medium Core Tor/Tor
#24029 Test all rust functions' behavior when called from C with bad UTF8 chelseakomlo defect Medium Core Tor/Tor
#24062 CPU profiling of Tor on Android device ahf task Medium Core Tor/Tor
#24182 Pad INTRODUCE cells to hide the number of link specifiers dgoulet defect Medium Core Tor/Tor
#24342 Various spec fixes to dir-spec, rend-spec-v3 asn defect Medium Core Tor
#24403 Propose and implement IPv6 ORPort reachability checks on relays teor task Medium Core Tor/Tor
#24423 Fix STACK warnings in Tor catalyst defect Medium Core Tor/Tor
#24449 sched: KIST scheduler should handle limited or failed connection write dgoulet defect Medium Core Tor/Tor
#24468 Measure HSDir usage to guide parameter choices teor task Medium Core Tor/Tor
#24544 Fix more prop224 spec inconsistencies asn defect Medium Core Tor/Tor
#24587 Reset bootstrapping state on shutdown nickm defect Medium Core Tor/Tor
#24661 accept a reasonably live consensus for guard selection catalyst defect Medium Core Tor/Tor
#24688 timing wheels should use 32-bit math on 32-bit platforms nickm defect Medium Core Tor/Tor
#24694 sched: Use the socket RTT in KIST to compute a more accurate extra space dgoulet enhancement Medium Core Tor/Tor
#24815 Validate shared random state dates before each voting period dgoulet defect Medium Core Tor/Tor Tor: 0.2.9.1-alpha
#15059 Allow UI to identify servers by Ed25519 keys nickm enhancement Low Core Tor/Tor Tor: 0.2.7
#24343 Remove dead code and doc regarding the old SocksSocket option dgoulet defect Low Core Tor/Tor
#24847 Merge HS v3 prop284 into control-spec.txt dgoulet enhancement Low Core Tor/Tor

Status: needs_information (10 matches)

Ticket Summary Owner Type Priority Component Version
#21969 We're missing descriptors for some of our primary entry guards asn defect Immediate Core Tor/Tor Tor: 0.3.0.6
#21311 Exits should resolve IPv6 addresses, regardless of IPv6Exit defect Medium Core Tor/Tor
#21446 Number of Introduction Points for a (SingleOnion?) HS seems variable, or degrades with time defect Medium Core Tor/Tor Tor: 0.2.3.9-alpha
#21621 Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO teor defect Medium Core Tor/Tor Tor: 0.2.7.2-alpha
#22400 We bootstrap from different primary guards when we start with a non-live consensus and not enough guards in the state file nickm defect Medium Core Tor/Tor Tor: 0.3.0.7
#23502 prop224: Don't make IPv4 mandatory because one day we'll have IPv6 only relays dgoulet defect Medium Core Tor/Tor
#23633 Why does roflcopter have an empty protocol line in the consensus? defect Medium Core Tor/Tor
#23785 [HELP!] 7.5a5's(IIRC) Tor cause DNS disruption! task Medium Core Tor/Tor
#24303 Tor fails to start if %include defect Medium Core Tor/Tor Tor: 0.3.2.4-alpha
#24426 Reliability: Make sure onion services don't publish until they have (nearly) all hsdirs' descriptors defect Medium Core Tor/Tor

Status: needs_review (4 matches)

Ticket Summary Owner Type Priority Component Version
#24902 Denial of Service mitigation subsystem dgoulet enhancement Very High Core Tor/Tor
#24946 connection_ap_expire_beginning(): Bug: circuit->purpose == CIRCUIT_PURPOSE_C_GENERAL failed mikeperry defect Medium Core Tor/Tor
#24952 channel: channel_tls_get_remote_addr_method() should return the "real_addr" of the connection defect Medium Core Tor/Tor
#24978 Tor doesn't work when built with (unreleased) OpenSSL 1.1.1 built with enable-tls1_3 nickm defect Medium Core Tor/Tor

Status: needs_revision (9 matches)

Ticket Summary Owner Type Priority Component Version
#22781 hs: Unify link specifier API/ABI dgoulet enhancement Very High Core Tor/Tor
#24554 sched: Have per-scheduler type data in a channel_t dgoulet enhancement Very High Core Tor/Tor
#7164 microdesc.c:378: Bug: microdesc_free() called, but md was still referenced 1 node(s); held_by_nodes == 1 nickm defect High Core Tor/Tor Tor: 0.2.4.19
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents jryans defect High Core Tor/Tor
#23764 hs-v3: No live consensus on client with a bridge dgoulet defect High Core Tor/Tor
#23881 Implement a way to utilise tor's logging system from Rust code chelseakomlo enhancement High Core Tor/Tor
#7590 [PATCH] New option LocalOutboundBindAddress enhancement Medium Core Tor/Tor
#9390 Warn if you're being a public relay but have too-low file descriptor limit enhancement Medium Core Tor/Tor
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users isis defect Medium Core Tor/Tor
(more results for this group on next page)
1 2 3
Note: See TracQuery for help on using queries.