Custom Query (87 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Status: accepted (2 matches)

Ticket Summary Owner Type Priority Component Version
#27471 HS intermittently fails: Non-fatal assertion failed in send_introduce1 dgoulet defect Very High Core Tor/Tor Tor: 0.3.4.7-rc
#26806 Check if Tor clients sometimes send duplicate cells on rendezvous circuits: Possible replay detected! An INTRODUCE2 cell with thesame ENCRYPTED section was seen dgoulet defect Medium Core Tor/Tor

Status: assigned (17 matches)

Ticket Summary Owner Type Priority Component Version
#22266 fix the jump-to-80% issue catalyst defect High Core Tor/Tor
#23605 BOOTSTRAP PROGRESS=80 is a lie catalyst defect High Core Tor/Tor
#24064 Memory profiling of Tor on Android device ahf task Medium Core Tor/Tor
#24804 Run an opt-in process for relay operators to become fallbacks phoul task Medium Core Tor/Fallback Scripts
#27100 report connection to PT SOCKS proxy separately from OR connection catalyst enhancement Medium Core Tor/Tor
#27102 decouple bootstrap progress numbers from BOOTSTRAP_STATUS enum values catalyst defect Medium Core Tor/Tor
#27103 report initial OR_CONN as the earliest boostrap phases catalyst defect Medium Core Tor/Tor
#27104 report intermediate status when building application circuits catalyst defect Medium Core Tor/Tor
#27296 macOS x86_64 fails test-timers teor defect Medium Core Tor/Tor Tor: 0.3.4.6-rc
#27308 add completion milestones to bootstrap catalyst enhancement Medium Core Tor/Tor
#27366 Ask Travis CI to reduce the number of erroring builds teor task Medium Core Tor/Tor
#27381 Bad consensus diffs on 0.3.4 and later teor defect Medium Core Tor/Tor
#27402 stop reporting "internal paths" during bootstrap enhancement Medium Core Tor/Tor
#27468 CI: add builds with the latest clang and gcc teor enhancement Medium Core Tor/Tor
#27737 Manually remove 64.113.32.29 from the generated fallback list teor defect Medium Core Tor/Fallback Scripts
#27751 Travis: add CI with --enable-nss teor enhancement Medium Core Tor/Tor
#27765 Appveyor: only install packages for the current target teor enhancement Medium Core Tor/Tor

Status: merge_ready (1 match)

Ticket Summary Owner Type Priority Component Version
#27550 hs-v3: Don't warn so loudly when tor is unable to decode a descriptor defect Medium Core Tor/Tor

Status: needs_information (10 matches)

Ticket Summary Owner Type Priority Component Version
#27808 tor 0.3.5.early-alpha: Raw assertion failed at smartlist_core.c::191191 : idx>=0 rl1987 defect High Core Tor/Tor Tor: 0.3.5.1-alpha
#17520 Relax the rend cache failure cleanup timer neel enhancement Medium Core Tor/Tor
#25152 Try to call less circuitmux_find_map_entry() neel defect Medium Core Tor/Tor
#26464 Static cross-compiling for Windows is broken Hello71 defect Medium Core Tor/Tor
#27066 circuit_build_times_update_alpha(): Bug: Could not determine largest build time defect Medium Core Tor/Tor Tor: 0.3.3.9
#27130 rust dependency updating instructions don't work defect Medium Core Tor/Tor Tor: 0.3.3.9
#27198 protover doesn't forbid version zero defect Medium Core Tor/Tor Tor: 0.2.9.4-alpha
#27199 panic inside rust extern "C" function is undefined behavior defect Medium Core Tor/Tor
#27241 Extract information from more kinds of wedged directory connections. nickm enhancement Medium Core Tor/Tor
#27818 0.3.5.2-alpha undefined reference to `get_uint32' on ARM device. defect Medium Core Tor/Tor

Status: needs_review (13 matches)

Ticket Summary Owner Type Priority Component Version
#27709 The compiler doesn't warn about tor_assert(a = b) nickm defect High Core Tor/Tor
#6623 --enable-static-tor cannot succeed defect Medium Core Tor/Tor Tor: 0.2.3.20-rc
#26744 Split common/client/cache/authority parts of directory.c and dirserv.c nickm defect Medium Core Tor/Tor
#26913 DataDirectoryGroupReadable enabled does not have effect nickm defect Medium Core Tor/Tor Tor: 0.3.3.9
#27194 handling extra commas in protover defect Medium Core Tor/Tor Tor: 0.2.9.4-alpha
#27197 rust protover accepts excess commas in version strings defect Medium Core Tor/Tor Tor: 0.3.3.3-alpha
#27201 rust/protover doesn't forbid version zero defect Medium Core Tor/Tor Tor: 0.3.3.1-alpha
#27417 refactor conn_close_if_marked() in main.c enhancement Medium Core Tor/Tor
#27728 Signature mismatch for crypto_strongest_rand() in ed-donna code breaks -flto compilation nickm defect Medium Core Tor/Tor Tor: unspecified
#27738 Travis: use the homebrew addon to reliably install dependencies teor enhancement Medium Core Tor/Tor
#27741 too many arguments in rust protover_compute_vote() nickm defect Medium Core Tor/Tor Tor: 0.3.3.6
#27772 Compile without warnings on GCC 8.2.0 with LTO enabled nickm defect Medium Core Tor/Tor
#27781 FTBFS on older arm defect Medium Core Tor/Tor Tor: 0.3.5.1-alpha

Status: needs_revision (13 matches)

Ticket Summary Owner Type Priority Component Version
#25245 Crash in assert_connection_ok when changing Exit options ahf defect Very High Core Tor/Tor Tor: 0.3.3.2-alpha
#23573 Do we want to close all connections when tor closes? enhancement Medium Core Tor/Tor
#24805 Update fallback whitelist in late 2018 phoul enhancement Medium Core Tor/Fallback Scripts
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? defect Medium Core Tor/Tor Tor: 0.3.2.8-rc
#25605 Add tests for Rust protover::compute_for_old_tor() and C functions it calls isis defect Medium Core Tor/Tor Tor: 0.3.3.1-alpha
#26094 manpage: increase minimal bandwidth requirements to be consistent with the relay guide and FAQ dgoulet enhancement Medium Core Tor/Tor
#26368 Consider circuit isolation when closing redundant intro points neel defect Medium Core Tor/Tor
#26376 add cross compiling docs Hello71 enhancement Medium Core Tor/Tor Tor: unspecified
#27049 "No circuits are opened" messages with onion services mikeperry defect Medium Core Tor/Tor
#27189 cleanup rust code task Medium Core Tor/Tor
#27190 disparate duplicate subproto handling in protover defect Medium Core Tor/Tor
#27191 handling double spaces in protover defect Medium Core Tor/Tor Tor: 0.2.9.4-alpha
#27761 check-changes: check that bugfixes aren't on future versions teor enhancement Medium Core Tor/Tor

Status: new (30 matches)

Ticket Summary Owner Type Priority Component Version
#27800 Non-fatal assertion !(old) failed in node_add_to_ed25519_map defect High Core Tor/Tor Tor: 0.3.4.8
#27813 Tor 0.3.4.8 is leaking memory defect High Core Tor/Tor Tor: 0.3.4.8
#21600 Hidden service introduction point retries occur at 1 second intervals defect Medium Core Tor/Tor Tor: 0.2.7.2-alpha
#24786 Rebuild the fallback list in 2018 task Medium Core Tor/Fallback Scripts
#24803 Generate a new fallback list in 2018 and backport it to all supported versions enhancement Medium Core Tor/Fallback Scripts
#24838 Ignore addresses in the fallback whitelist enhancement Medium Core Tor/Fallback Scripts
#26812 hs: Adding client authorization through control port on an existing service fails defect Medium Core Tor/Tor
#26931 Wrong service-side HSv3 hash ring for HSv3 once a day (low impact) defect Medium Core Tor/Tor
#27052 document rust/protover and rust/crypto enhancement Medium Core Tor/Tor
#27086 Write unit tests for fascist_firewall_choose_address_ls() and hs_get_extend_info_from_lspecs() defect Medium Core Tor/Tor
#27146 Mismatched digest in 0.3.3.9 and master mixed chutney network defect Medium Core Tor/Tor
#27167 track "first" OR_CONN task Medium Core Tor/Tor
#27207 Examples in CodingStandardsRust.md are wrong defect Medium Core Tor/Tor
#27239 TB team feedback on jump-to-80% work tbb-team task Medium Applications/Tor Browser
#27272 ASan is incompatible with Rust's jemalloc on Travis defect Medium Core Tor/Tor
#27273 ASan fails to link on Travis due to rustc and linker arguments defect Medium Core Tor/Tor
#27274 ASan on OSX Travis is incompatible with Rust's santiziers defect Medium Core Tor/Tor
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 defect Medium Core Tor/Tor Tor: 0.3.4.7-rc
#27544 hs-v3: Client authorization fixes and improvements post-merge task Medium Core Tor/Tor
#27645 Add unit tests for UTF-8 and invalid ContactInfo lines enhancement Medium Core Tor/Tor
#27691 reset bootstrap progress when enough things change defect Medium Core Tor/Tor
#27722 rust protover doesn't canonicalize adjacent and overlapping ranges defect Medium Core Tor/Tor
#27735 Tors with cached consensuses can't upgrade to a version that stops supporting a required protocol defect Medium Core Tor/Tor
#27740 rust protover_all_supported() returns rust-allocated string in *missing_out defect Medium Core Tor/Tor Tor: 0.3.3.1-alpha
#27750 conn_close_if_marked: Non-fatal assertion !(connection_is_writing(conn)) defect Medium Core Tor/Tor Tor: 0.3.4.8
#27802 OpenSSL 1.1.0 issue during static link defect Medium Core Tor/Tor
#27804 rust protover_all_supported() NULL pointer dereference defect Medium Core Tor/Tor Tor: 0.3.3.1-alpha
#27805 Update CodingStandardsRust.md with allocate_and_copy_string() defect Medium Core Tor/Tor Tor: 0.3.3.1-alpha
#27810 hs_service/helper_functions test seems unreliable on slow systems defect Medium Core Tor/Tor
#27812 memwipe + arm, error: implicit declaration, error: nested extern defect Medium Core Tor/Tor Tor: 0.3.4.8

Status: reopened (1 match)

Ticket Summary Owner Type Priority Component Version
#26908 make it more clear that bridge torrc files should not contain any MyFamily lines enhancement Medium Core Tor/Tor
Note: See TracQuery for help on using queries.