Custom Query (188 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 188 of 188)

1 2
Ticket Summary Owner Type Priority Milestone Component
#28091 Port GetTor to python3 traumschule task Medium Applications/GetTor
#14828 Multiple hidden services can share a pk_digest/service_id. twim defect Very Low Tor: unspecified Core Tor/Tor
#20082 Lower initial descriptor upload delay for hidden services twim enhancement Medium Tor: unspecified Core Tor/Tor
#6505 GETINFO dir/status-vote/current/consensus returns "Unrecognized key" if no consensus available zwol defect Low Tor: unspecified Core Tor/Tor
#2455 Log IP of wrongly replying DNS-Server(s) enhancement Medium Tor: unspecified Core Tor/Tor
#2914 Tor should truncate log file if loglevel < notice defect Medium Tor: unspecified Core Tor/Tor
#4233 Exact addition/summation and memory allocation enhancement Medium Tor: unspecified Core Tor/Tor
#4363 Dirauths should save a copy of a consensus that didn't get enough signatures enhancement Medium Tor: unspecified Core Tor/Tor
#4692 If only a working static OpenSSL is available, ./configure fails defect Medium Tor: unspecified Core Tor/Tor
#4806 Detect and warn when running IPv6-using client without IPv6 address privacy enhancement High Tor: unspecified Core Tor/Tor
#5392 Write proposal for n23 patch behavior task Medium Tor: unspecified Core Tor/Tor
#6623 --enable-static-tor cannot succeed defect Medium Tor: unspecified Core Tor/Tor
#6939 Missing IPv6 ORPort reachability check defect High Tor: unspecified Core Tor/Tor
#7216 networkstatus_check_consensus_signature() shouldn't warn because of missing certs defect Medium Tor: unspecified Core Tor/Tor
#7478 Allow routersets to include/exclude nodes by IPv6 address enhancement High Tor: unspecified Core Tor/Tor
#7482 Discard nonsense in address.c about v4-mapped addresses defect Medium Tor: unspecified Core Tor/Tor
#7590 [PATCH] New option LocalOutboundBindAddress enhancement Medium Tor: unspecified Core Tor/Tor
#7729 Reading pending TLS bytes can take us over at_most defect Medium Tor: unspecified Core Tor/Tor
#7870 Retry on a new circuit for more reasons. defect Medium Tor: unspecified Core Tor/Tor
#7986 Lengthen the consensus validity interval enhancement Medium Tor: unspecified Core Tor/Tor
#8298 Do not start write to connection if blocked on bw defect Low Tor: unspecified Core Tor/Tor
#8351 Refactor our controller-command/torrc-option processing logic into a data-driven function enhancement Medium Tor: unspecified Core Tor/Tor
#9390 Warn if you're being a public relay but have too-low file descriptor limit enhancement Medium Tor: unspecified Core Tor/Tor
#9729 Make bridges publish additional ORPort addresses in their descriptor enhancement Medium Tor: unspecified Core Tor/Tor
#9860 junk log messages every time SETCONF changes the set of ORPorts defect Very Low Tor: unspecified Core Tor/Tor
#9925 Directory Authorities can crash client/relay by scrambling microdesc assignments defect Medium Tor: unspecified Core Tor/Tor
#469 please limit connections by client defect Low Tor: unspecified Core Tor/Tor
#4581 Dir auths should defend themselves from too many begindir requests per address defect High Tor: unspecified Core Tor/Tor
#8786 Add extra-info line that tracks the number of consensus downloads over each pluggable transport enhancement Low Tor: unspecified Core Tor/Tor
#11010 add ClientConnectPolicy config option enhancement Medium Tor: unspecified Core Tor/Tor
#11966 "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for bridge users defect Medium Tor: unspecified Core Tor/Tor
#12377 get_interface_address6() behaviour iff all interface addresses are internal defect Medium Tor: unspecified Core Tor/Tor
#13059 Create bad-relays file defect Medium Tor: unspecified Core Tor/Tor
#13078 Add a ROUTERSET_ML config type, accept spaces in fingerprints? enhancement Low Tor: unspecified Core Tor/Tor
#14332 Use new string formatting interface defect Medium Core Tor/Chutney
#15000 bring some sanity to quoted strings in the controller api defect Medium Tor: unspecified Core Tor/Tor
#15607 Tor log dates imprecise defect Medium Tor: unspecified Core Tor/Tor
#16824 Emit a warning message about side channel leaks when using relays as clients defect High Tor: unspecified Core Tor/Tor
#17081 Improve coverage on src/common/sandbox.c enhancement Medium Tor: unspecified Core Tor/Tor
#18402 Reduce duplicate code in parse_*_time functions enhancement Low Tor: unspecified Core Tor/Tor
#18757 Memunit config defaults say "KB" rather than "KBytes" defect Medium Tor: unspecified Core Tor/Tor
#18988 log error level messages if relay (self) is not in consensus enhancement Medium Tor: unspecified Core Tor/Tor
#19045 Keep trying to form a new shared random value during the next commit phase enhancement Medium Tor: unspecified Core Tor/Tor
#19174 libscrypt check fails when libscrypt requires libm defect Medium Tor: unspecified Core Tor/Tor
#19522 HS intro circuit retry logic fails when network interface is down defect Medium Tor: unspecified Core Tor/Tor
#20218 Fix and refactor and redocument routerstatus_has_changed defect Medium Tor: unspecified Core Tor/Tor
#20528 Make sure bridge clients update bridges when options are updated defect Medium Tor: unspecified Core Tor/Tor
#20625 When a consensus doesn't have enough signatures, write it (and sigs) to a file enhancement Medium Tor: unspecified Core Tor/Tor
#21310 Exits should tell clients when they are connecting to an IPv6-only hostname defect Medium Tor: unspecified Core Tor/Tor
#22688 hs: stop HSDirs being used as single-hop "proxies" defect Medium Tor: unspecified Core Tor/Tor
#22817 SAFECOOKIE description in control spec does not have verifiable test vectors enhancement Medium Tor: unspecified Core Tor/Tor
#23168 Guard sample calls relay descriptors a "consensus" defect Medium Tor: unspecified Core Tor/Tor
#23357 Build with non-Cross-DSO CFI enhancement Medium Tor: unspecified Core Tor/Tor
#23500 check-spaces.pl should check spaces after a comma when in functions. enhancement Low Tor: unspecified Core Tor/Tor
#23573 Do we want to close all connections when tor closes? enhancement High Tor: unspecified Core Tor/Tor
#23819 Support IPv6 link-local interface addresses enhancement Medium Tor: unspecified Core Tor/Tor
#24219 Avoid aggregate.py error when no nodes are measured defect Medium Core Tor/Torflow
#24732 Remove unused IPv6 DirPort code enhancement Medium Tor: unspecified Core Tor/Tor
#24735 Always check for the null address when calling address functions defect Medium Tor: unspecified Core Tor/Tor
#24774 Edit prop279 to support alternative name representations and non-English languages enhancement Medium Tor: unspecified Core Tor/Tor
#24818 Make the hard-coded authorities into a separate include file with a standard format enhancement Medium Tor: unspecified Core Tor/Tor
#24841 Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? defect Medium Tor: unspecified Core Tor/Tor
#24857 Tor uses 100% CPU when accessing the cache directory on Windows defect Medium Tor: unspecified Core Tor/Tor
#24905 Remove redundant connection_or_digest_is_known_relay() from CHANNEL_IS_CLIENT defect Medium Tor: unspecified Core Tor/Tor
#24906 Make channelpadding_update_padding_for_channel() use !channel_is_client() defect Medium Tor: unspecified Core Tor/Tor
#24907 Stop ignoring should_refuse_unknown_exits() for unauthenticated channels defect Medium Tor: unspecified Core Tor/Tor
#24911 Remove the known digest check from channel_check_for_duplicates() defect Medium Tor: unspecified Core Tor/Tor
#25118 We need circuit launch and cannibalization unit tests defect High Tor: unspecified Core Tor/Tor
#25355 Add option to set the facility of the syslog log backend dynamically enhancement Medium Tor: unspecified Core Tor/Tor
#25381 Add crypto_rand_double_sign() in C and Rust enhancement Medium Tor: unspecified Core Tor/Tor
#25985 Snowflake rendezvous using AMP cache project Medium Obfuscation/Snowflake
#26265 A proposal and demo for a fuzzing system that works with Rust through C code enhancement Low Tor: unspecified Core Tor/Tor
#26368 Consider circuit isolation when closing redundant intro points defect Low Tor: 0.4.0.x-final Core Tor/Tor
#26754 stop using BUFFERS_PRIVATE enhancement Medium Tor: unspecified Core Tor/Tor
#26958 Privcount blinding and encryption: run clippy on travis rust nightly defect Medium Tor: unspecified Core Tor/Tor
#27189 cleanup rust code task Medium Tor: unspecified Core Tor/Tor
#27190 disparate duplicate subproto handling in protover defect Medium Tor: unspecified Core Tor/Tor
#27191 handling double spaces in protover defect Medium Tor: unspecified Core Tor/Tor
#27194 Reject protover extra commas in protover defect Medium Tor: unspecified Core Tor/Tor
#27343 Dockerfile for sbws basic install enhancement Medium sbws: unspecified Core Tor/sbws
#27417 refactor conn_close_if_marked() in main.c enhancement Medium Tor: unspecified Core Tor/Tor
#27514 Add instructions how to verify signatures on Android task Medium Community/Tor Support
#27662 refactor networkstatus_parse_vote_from_string() defect Medium Tor: unspecified Core Tor/Tor
#28081 rust protover discards all votes if one is not UTF-8 defect Medium Tor: unspecified Core Tor/Tor
#28452 3. implement rounding gap smoothing as in proposal 276 enhancement Medium sbws: unspecified Core Tor/sbws
#28582 Document the load-balancing goal for sbws task Medium sbws: unspecified Core Tor/sbws
#28780 circpadding: Add machine flag for not closing circuit if machine is active defect Very High Tor: unspecified Core Tor/Tor
#29280 Use Chutney for CI task High Tor: 0.4.1.x-final Core Tor/Tor
1 2
Note: See TracQuery for help on using queries.