Custom Query (4024 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (301 - 400 of 4024)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Summary Owner Type Priority Milestone Component
#14709 Should the hash tables in circuitmux_t have channel ID in them? task Medium Tor: unspecified Core Tor/Tor
#14715 Change the default for automaphostsonresolve to be on-by-default? defect Medium Tor: unspecified Core Tor/Tor
#14763 Stochastic Guard Flag defect Medium Tor: unspecified Core Tor/Tor
#14827 Tor controller command to write its file to disk defect Medium Tor: unspecified Core Tor/Tor
#14854 Document the hardlimit of HiddenServiceAuthorizeClient basic defect Medium Tor: unspecified Core Tor/Tor
#14895 SENTCONNECT TCP RST/TIMEOUT print IP in FAILED/CLOSED enhancement Medium Tor: unspecified Core Tor/Tor
#14899 Enable Tor to work without using filesystem for cached files enhancement Medium Tor: unspecified Core Tor/Tor
#14921 Investigate whether we sometimes remove all predicted ports at startup defect Medium Tor: unspecified Core Tor/Tor
#14957 Clients wait for an extra consensus before learning the correct UseGuardFraction value defect Medium Tor: unspecified Core Tor/Tor
#14999 Most/all esc_for_log instances in control.c should change. defect Medium Tor: unspecified Core Tor/Tor
#15008 Design an opt-in Hidden Service Public Directory Submission system defect Low Tor: unspecified Core Tor/Tor
#15017 Experiment: does BIO_f_buffer help performance with read/write syscalls? enhancement Medium Tor: unspecified Core Tor/Tor
#15043 Use acx_pthread.m4 to find pthreads library defect Medium Tor: unspecified Core Tor/Tor
#15060 Decide the fate of MyFamily enhancement Medium Tor: unspecified Core Tor/Tor
#15186 Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? enhancement Low Tor: unspecified Core Tor/Tor
#15214 networkstatus_compute_consensus() is unreasonably large and should be refactored defect Medium Tor: unspecified Core Tor/Tor
#15232 Specify a potential TLS-replacing protocol for future use in Tor. defect Medium Tor: unspecified Core Tor/Tor
#15237 Improve tooling and usability for approved-routers file and its allies defect Medium Tor: unspecified Core Tor/Tor
#15272 Think of more research questions that we can answer with statistics task High Tor: unspecified Core Tor/Tor
#15380 log messages are doubled and unclear defect Very Low Tor: unspecified Core Tor/Tor
#15458 StrongSocksIsolation option (w/ virtual circuits?) enhancement Low Tor: unspecified Core Tor/Tor
#15469 Remove data structure containing unique IP address sets enhancement High Tor: unspecified Core Tor/Tor
#15540 Increase the capacity of a HS server by using bridges after we implement Prop 188 enhancement Medium Tor: unspecified Core Tor/Tor
#15557 Improve relaunch logic for failed rendezvous circuits defect Low Tor: unspecified Core Tor/Tor
#15660 [feature suggestion] Need signal to totally switch to the new set of circuits defect Medium Tor: unspecified Core Tor/Tor
#15661 Same "non-loopback address" notice is printed twice defect Very Low Tor: unspecified Core Tor/Tor
#15692 'GETINFO config-file' command on ControlPort returns the standard torrc file when it was overridden in the command line defect Medium Tor: unspecified Core Tor/Tor
#15729 Proposal: Hidden Service Revocation Nathaniel enhancement Medium Tor: unspecified Core Tor/Tor
#15765 Tor doesn't reconnect automatically when tun/tap device goes down. task Medium Tor: unspecified Core Tor/Tor
#15785 New proxy settings don't close old TLS connections defect Medium Tor: unspecified Core Tor/Tor
#15883 Redesign/Rewrite the BridgeAuthority enhancement Medium Tor: unspecified Core Tor/Tor
#15918 Investigate using the EVP interface for non-oneshot hash calls. enhancement Low Tor: unspecified Core Tor/Tor
#15938 HS descriptor cache leaks timing information to local users defect Medium Tor: unspecified Core Tor/Tor
#15961 tor fails to handle half-closed TCP connections: it should forward data back on sockets that were shutdown(SHUT_WR) by client enhancement Medium Tor: unspecified Core Tor/Tor
#15991 Option to skip authorization verification in INTRODUCE2 cell enhancement Medium Tor: unspecified Core Tor/Tor
#16004 Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints enhancement Medium Tor: unspecified Core Tor/Tor
#16016 extrainfo_insert(): Bug: No entry found in extrainfo map. defect Medium Tor: unspecified Core Tor/Tor
#16059 Add a "rendezvous approver" control API enhancement Medium Tor: unspecified Core Tor/Tor
#16070 Tor log doesn't have to be world readable defect Low Tor: unspecified Core Tor/Tor
#16120 Detect if the network goes down enhancement Medium Tor: unspecified Core Tor/Tor
#16134 The various stream lists tied to the circuit structures should use tor_queue.h yawning enhancement Medium Tor: unspecified Core Tor/Tor
#16182 Replacing an older pending vote from this directory (dannenberg.torauth.de) defect Medium Tor: unspecified Core Tor/Tor
#16294 Unable to bootstrap when no relays meet criteria; logging messages unhelpful defect Low Tor: unspecified Core Tor/Tor
#16301 Add a fuzzing harness for the torrc file enhancement Low Tor: unspecified Core Tor/Tor
#16350 tor.pid should be deleted on exit in every case possible, like assert termination, and catchable signals defect Medium Tor: unspecified Core Tor/Tor
#16366 tor hangs for 30 seconds when parsing torrc ending in backslash-newline defect Low Tor: unspecified Core Tor/Tor
#16387 Improve reachability of hidden services on mobile phones enhancement Medium Tor: unspecified Core Tor/Tor
#16420 Hide number of tor clients running on a shared network enhancement Medium Tor: unspecified Core Tor/Tor
#16458 torspec references UTC, but tor uses unix time (leap second handling) task Medium Tor: unspecified Core Tor/Tor
#16537 Allow onion services to publish voluntary usage stats enhancement Medium Tor: unspecified Core Tor/Tor
#16538 Limit the impact of a malicious HSDir project Medium Tor: unspecified Core Tor/Tor
#16558 Dir auths should vote about Invalid like they do about BadExit defect Medium Tor: unspecified Core Tor/Tor
#16562 Harmonize curve25519-signature format with what others are doing defect Medium Tor: unspecified Core Tor/Tor
#16585 Long-running activity in scheduler_run() blocks network, creating information leaks defect Medium Tor: unspecified Core Tor/Tor
#16608 "time published in the consensus network status" seems to be wrong defect Medium Tor: unspecified Core Tor/Tor
#16646 Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) defect Medium Tor: unspecified Core Tor/Tor
#16648 Libevent configuration doesn't use pkg-config defect Medium Tor: unspecified Core Tor/Tor
#16682 Deploy TCP Fast Open at exits (and maybe inter-node?) enhancement Medium Tor: unspecified Core Tor/Tor
#16696 BWauth no-consensus fallback logic may need revision defect High Tor: unspecified Core Tor/Tor
#16710 Graph or plot test coverage over time? enhancement Medium Tor: unspecified Core Tor/Tor
#16764 Simplify Tor's control flow graph to the extent we can. enhancement High Tor: unspecified Core Tor/Tor
#16782 systemd unit file is not compatible with the AppArmorProfile= directive defect Medium Tor: unspecified Core Tor/Tor
#16785 Only build/use ed25519-donna. yawning enhancement Medium Tor: unspecified Core Tor/Tor
#16791 All modules in src/common should have 90-95%+ unit test coverage project High Tor: unspecified Core Tor/Tor
#16798 Raise compat_* testing to over 80% enhancement Medium Tor: unspecified Core Tor/Tor
#16799 Raise utility testing over 95% enhancement Medium Tor: unspecified Core Tor/Tor
#16803 Unit tests for sandbox failures enhancement Medium Tor: unspecified Core Tor/Tor
#16805 Improve unit-test coverage on old and/or pure-ish functions/modules in src/or defect High Tor: unspecified Core Tor/Tor
#16808 High coverage on connection_edge, addressmap enhancement Medium Tor: unspecified Core Tor/Tor
#16809 High coverage on node/path selection functions defect High Tor: unspecified Core Tor/Tor
#16810 Unit tests on circuit/relay functions defect High Tor: unspecified Core Tor/Tor
#16811 Mark TestingTorNetwork PREDICT_UNLIKELY enhancement Very Low Tor: unspecified Core Tor/Tor
#16822 make certificate lifetime accessible through Tor's ControlPort enhancement Low Tor: unspecified Core Tor/Tor
#16826 Add a mechanism to allow callgraph generator to find vtbl-like constructions defect Medium Tor: unspecified Core Tor/Tor
#16831 Cover dns.c with unit tests enhancement Medium Tor: unspecified Core Tor/Tor
#16844 Slow clients can't bootstrap because they expire their consensus fetch but then receive all the bytes from it anyway, making them expire their next fetch, putting them in a terrible loop defect High Tor: unspecified Core Tor/Tor
#16894 Check all logging output is appropriately escaped / escaped_safe_str_client task Medium Tor: unspecified Core Tor/Tor
#16895 allow Tor to parse bridge information copied and pasted verbatim from bridges.torproject.org enhancement Low Tor: unspecified Circumvention/Pluggable transport
#16978 Minority of hostile dirauths can influence consensus in dangerous ways defect Medium Tor: unspecified Core Tor/Tor
#16997 Gather and report metrics for the number of channels a relay is servicing. enhancement Medium Tor: unspecified Core Tor/Tor
#17032 Threadpool doesn't get shutdown when changing from relay to client defect Low Tor: unspecified Core Tor/Tor
#17036 Report bandwidth more frequently in test networks enhancement Medium Tor: unspecified Core Tor/Tor
#17038 Provide scripts to set up transparent proxying, where supported enhancement Low Tor: unspecified Core Tor/Tor
#17056 Do we need ExitPolicy private[4|6]:... ? enhancement Very Low Tor: unspecified Core Tor/Tor
#17066 Avoid assuming relays have a single IPv4/IPv6 address task Medium Tor: unspecified Core Tor/Tor
#17120 Fire a circuit status control port event when circuit isolation changes. enhancement Low Tor: unspecified Core Tor/Tor
#17127 Fix and re-enable --master-key option, possibly --out (for keys) and possibly --nopass for non-interactive key generation enhancement Medium Tor: unspecified Core Tor/Tor
#17134 Add a way to say "Use this option only if supported" in torrc enhancement Medium Tor: unspecified Core Tor/Tor
#17145 <tor.exe --service install -options -f ...\torrc> returns Error 1064 on Windows defect Medium Tor: unspecified Core Tor/Tor
#17146 "Sandbox 1" in chutney makes coverage underreported defect Medium Tor: unspecified Core Tor/Tor
#17197 Use CRLF for all text files written on Windows, accept either CRLF or LF on all platforms defect Low Tor: unspecified Core Tor/Tor
#17224 Refactor common parts of parse_dir_authority_line and parse_dir_fallback_line enhancement Low Tor: unspecified Core Tor/Tor
#17225 Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME enhancement Low Tor: unspecified Core Tor/Tor
#17230 Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. defect Medium Tor: unspecified Core Tor/Tor
#17233 MinMeasuredBWsForAuthToIgnoreAdvertised should be lower for Testing networks? enhancement Medium Tor: unspecified Core Tor/Tor
#17253 Revise tests in test_tortls.c to not act intrusively on openssl internals defect Medium Tor: unspecified Core Tor/Tor
#17274 Some kind of append-only log for consensus documents and votes ln5 enhancement Medium Tor: unspecified Core Tor/Tor
#17275 Package directory authority scripts for debian in compliant packages task High Tor: unspecified Core Tor/Tor
#17279 Implement large/split create cells (proposal 249) defect High Tor: unspecified Core Tor/Tor
#17286 Implement a circuit-extension algorithm that can resist quantum computers defect Medium Tor: unspecified Core Tor/Tor
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.