Custom Query (83 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Ticket Summary Status Owner Type Priority Milestone
#4581 Dir auths should defend themselves from too many begindir requests per address needs_revision defect High Tor: unspecified
#7478 Allow routersets to include/exclude nodes by IPv6 address needs_revision enhancement High Tor: unspecified
#11327 Dir auths should choose Fast and Guard flags by consensus weight if they don't measure needs_revision TvdW defect High Tor: unspecified
#16255 Guardfraction on dirauths screws up bandwidth weights needs_revision asn defect High Tor: unspecified
#16824 Emit a warning message about side channel leaks when using relays as clients needs_revision defect High Tor: unspecified
#16849 clear_status_flags_on_sybil might want to clear more flags needs_revision ffmancera defect High Tor: unspecified
#17605 Tell caches to remove X-Your-Address-Is from Tor Directory documents needs_revision jryans defect High Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#3711 Application support for optimistic data: Torsocks needs_revision sysrqb task Medium
#4233 Exact addition/summation and memory allocation needs_revision enhancement Medium Tor: unspecified
#4692 If only a working static OpenSSL is available, ./configure fails needs_revision defect Medium Tor: unspecified
#5392 Write proposal for n23 patch behavior needs_revision task Medium Tor: unspecified
#7216 networkstatus_check_consensus_signature() shouldn't warn because of missing certs needs_revision defect Medium Tor: unspecified
#7482 Discard nonsense in address.c about v4-mapped addresses needs_revision defect Medium Tor: unspecified
#7590 [PATCH] New option LocalOutboundBindAddress needs_revision enhancement Medium Tor: unspecified
#7729 Reading pending TLS bytes can take us over at_most needs_revision defect Medium Tor: unspecified
#7886 Implement a network-layer test harness for HTTPS Everywhere corectness needs_revision schoen task Medium
#7986 Lengthen the consensus validity interval needs_revision enhancement Medium Tor: unspecified
#8351 Refactor our controller-command/torrc-option processing logic into a data-driven function needs_revision enhancement Medium Tor: unspecified
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments needs_revision defect Medium Tor: unspecified
#11010 add ClientConnectPolicy config option needs_revision enhancement Medium Tor: unspecified
#11374 fix tor lockfile checking bug needs_revision dave2008 defect Medium
#12377 get_interface_address6() behaviour iff all interface addresses are internal needs_revision defect Medium Tor: unspecified
#13059 Create bad-relays file needs_revision defect Medium Tor: unspecified
#15000 bring some sanity to quoted strings in the controller api needs_revision defect Medium Tor: unspecified
#15607 Tor log dates imprecise needs_revision defect Medium Tor: unspecified
#17020 Add test for Config options_act function needs_revision tcz001 enhancement Medium Tor: unspecified
#17081 Improve coverage on src/common/sandbox.c needs_revision enhancement Medium Tor: unspecified
#17101 Tests for connection_ap_handshake_rewrite_and_attach needs_revision ipazmino defect Medium Tor: unspecified
#18757 Memunit config defaults say "KB" rather than "KBytes" needs_revision defect Medium Tor: unspecified
#18988 log error level messages if relay (self) is not in consensus needs_revision enhancement Medium Tor: unspecified
#19045 Keep trying to form a new shared random value during the next commit phase needs_revision enhancement Medium Tor: unspecified
#19174 libscrypt check fails when libscrypt requires libm needs_revision defect Medium Tor: unspecified
#19522 HS intro circuit retry logic fails when network interface is down needs_revision defect Medium Tor: unspecified
#19661 tor refuses to use /dev/null as a config file needs_revision cypherpunks enhancement Medium Tor: unspecified
#20006 HSFETCH fails for hidden services which use client authentication needs_revision rl1987 enhancement Medium Tor: unspecified
#20284 consensus weight case 2b3 does not follow dir-spec needs_revision pastly defect Medium Tor: unspecified
#20319 set HPKP headers on onionoo needs_revision tpa defect Medium
#20528 Make sure bridge clients update bridges when options are updated needs_revision defect Medium Tor: unspecified
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file needs_revision enhancement Medium Tor: unspecified
#20957 Get DieHarder working with Tor Browser needs_revision tbb-team defect Medium
#21039 Refactor and simplify guard code of circuit_send_next_onion_skin() needs_revision asn defect Medium Tor: unspecified
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname needs_revision defect Medium Tor: unspecified
#21816 Add support for Pluggable Transports 2.0 needs_revision dasyatid1 enhancement Medium Tor: unspecified
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors needs_revision enhancement Medium Tor: unspecified
#22947 Possible Security Issue (Information Disclosure) with Drupal on blog.torproject.org needs_revision hiro defect Medium
#23168 Guard sample calls relay descriptors a "consensus" needs_revision defect Medium Tor: unspecified
#23357 Build with non-Cross-DSO CFI needs_revision enhancement Medium Tor: unspecified
#23819 Support IPv6 link-local interface addresses needs_revision enhancement Medium Tor: unspecified
#24219 Avoid aggregate.py error when no nodes are measured needs_revision defect Medium
#24384 Decode percent-encoded characters in qualified search terms needs_revision metrics-team defect Medium Onionoo 2.0.0
#24732 Remove unused IPv6 DirPort code needs_revision enhancement Medium Tor: unspecified
#24735 Always check for the null address when calling address functions needs_revision defect Medium Tor: unspecified
#24774 Edit prop279 to support alternative name representations and non-English languages needs_revision enhancement Medium Tor: unspecified
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? needs_revision defect Medium Tor: unspecified
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT needs_revision defect Medium Tor: unspecified
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() needs_revision defect Medium Tor: unspecified
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels needs_revision defect Medium Tor: unspecified
#24911 Remove the known digest check from channel_check_for_duplicates() needs_revision defect Medium Tor: unspecified
#25247 mochitest failures for #23104 patch needs_revision tbb-team defect Medium
#25355 Add option to set the facility of the syslog log backend dynamically needs_revision enhancement Medium Tor: unspecified
#25403 Create jsp with bgp documentation needs_revision metrics-team enhancement Medium
#26754 stop using BUFFERS_PRIVATE needs_revision enhancement Medium Tor: unspecified
#27189 cleanup rust code needs_revision task Medium Tor: unspecified
#27343 Dockerfile for sbws basic install needs_revision enhancement Medium sbws: unspecified
#27417 refactor conn_close_if_marked() in main.c needs_revision enhancement Medium Tor: unspecified
#27507 DuckDuckGo can't be used without JS in Tor Browser 8 anymore needs_revision tbb-team defect Medium
#27662 refactor networkstatus_parse_vote_from_string() needs_revision defect Medium Tor: unspecified
#6505 GETINFO dir/status-vote/current/consensus returns "Unrecognized key" if no consensus available needs_revision zwol defect Low Tor: unspecified
#7869 ntor-onion-key is padded with an equal sign needs_revision Jigsaw52 defect Low Tor: unspecified
#8298 Do not start write to connection if blocked on bw needs_revision defect Low Tor: unspecified
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport needs_revision enhancement Low Tor: unspecified
#13078 Add a ROUTERSET_ML config type, accept spaces in fingerprints? needs_revision enhancement Low Tor: unspecified
#18402 Reduce duplicate code in parse_*_time functions needs_revision enhancement Low Tor: unspecified
#23500 check-spaces.pl should check spaces after a comma when in functions. needs_revision enhancement Low Tor: unspecified
#26265 A proposal and demo for a fuzzing system that works with Rust through C code needs_revision enhancement Low Tor: unspecified
#8908 Tor systemd socket activation support needs_revision intgr enhancement Very Low Tor: unspecified
#9860 junk log messages every time SETCONF changes the set of ORPorts needs_revision defect Very Low Tor: unspecified
#14828 Multiple hidden services can share a pk_digest/service_id. needs_revision twim defect Very Low Tor: unspecified
#17903 router_pick_trusteddirserver_impl should distinguish between fallbacks and authorities needs_revision attila enhancement Very Low Tor: unspecified
Note: See TracQuery for help on using queries.