Custom Query (4454 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (701 - 800 of 4454)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Ticket Summary Owner Type Priority Milestone Component
#22312 Refactor/Simplify to clarify "we cache dir info" vs "we invite clients to use us as a directory guard" enhancement Medium Tor: unspecified Core Tor/Tor
#22331 Tor needs to stop trying to read directories before it changes users defect High Tor: unspecified Core Tor/Tor
#22351 Should bridge lines in the state file use unlisted_since? defect Medium Tor: unspecified Core Tor/Tor
#22355 Update dir-spec with client fallback directory mirror attempt and timeout behaviour defect Medium Tor: unspecified Core Tor/Tor
#22358 should dir auths count it as a downtime if descriptor uptime resets? enhancement Medium Tor: unspecified Core Tor/Tor
#22363 Make our test network public enhancement Medium Tor: unspecified Core Tor/Tor
#22372 Refactor dirserv_add_descriptor so we always free routerinfos and send events enhancement Medium Tor: unspecified Core Tor/Tor
#22380 Make windows log_from_handle() handle partial lines defect Medium Tor: unspecified Core Tor/Tor
#22382 Fix fd leak-on-close from tor-fw-helper pipe defect Very Low Tor: unspecified Core Tor/Tor
#22403 Reset downloads more consistently defect Medium Tor: unspecified Core Tor/Tor
#22408 Refactor functions over 300 lines long. defect Medium Tor: unspecified Core Tor/Tor
#22422 Add noise to PaddingStatistics defect High Tor: unspecified Core Tor/Tor
#22448 Move circuit_t.timestamp_dirty into origin_circuit_t defect Medium Tor: unspecified Core Tor/Tor
#22449 Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() defect Low Tor: unspecified Core Tor/Tor
#22455 Enumerate cases where we want to retry circuits, and correctly balance retry robustness with guard discovery task Medium Tor: unspecified Core Tor/Tor
#22463 Reduce REACHABLE_TIMEOUT in test networks enhancement Medium Tor: unspecified Core Tor/Tor
#22469 tor should probably reject "0x00" in port range specifications defect Medium Tor: unspecified Core Tor/Tor
#22473 Do any controllers still use getinfo network-status? defect Medium Tor: unspecified Core Tor/Tor
#22477 Add -Wl,--large-address-aware to tor-for-Windows build chain defect Low Tor: unspecified Core Tor/Tor
#22491 DownloadExtraInfo doesn't download bridge extra infos defect Medium Tor: unspecified Core Tor/Tor
#22492 DownloadExtraInfo doesn't fetch any extra infos on bridge clients defect Medium Tor: unspecified Core Tor/Tor
#22495 Partial write in key-pinning-journal results in corrupted line defect Low Tor: unspecified Core Tor/Tor
#22534 Stop parsing rend protocol versions greater than 7 in legacy hidden service descriptors defect Very Low Tor: unspecified Core Tor/Tor
#22571 AssumeReachable 1 on a relay doesn't make it publish quickly defect Medium Tor: unspecified Core Tor/Tor
#22572 please don't kill WarnUnsafeSocks option defect Medium Tor: unspecified Core Tor/Tor
#22589 Tor circuit is too slow! defect Medium Tor: unspecified Core Tor/Tor
#22641 If you setconf socksport=1000, it returns 553 error but then it sets it anyway, and getconf socksport still returns 9050 even though that's closed defect Medium Tor: unspecified Core Tor/Tor
#22662 Reload the state file on HUP enhancement Medium Tor: unspecified Core Tor/Tor
#22663 Tor keeps using a very slow guard defect Medium Tor: unspecified Core Tor/Tor
#22668 Add ed25519 public key to format_node_description and callers enhancement Medium Tor: unspecified Core Tor/Tor
#22697 Tor should mandatory require brackets around ipv6 address enhancement Medium Tor: unspecified Core Tor/Tor
#22700 Stop relays using the Client*IPv6* options defect Medium Tor: unspecified Core Tor/Tor
#22704 Use mmaps to handle journalled microdesc/routerdesc files. enhancement Medium Tor: unspecified Core Tor/Tor
#22705 When disk space is low, rebuild main cached-* files more aggressively enhancement Medium Tor: unspecified Core Tor/Tor
#22706 Compress cached descriptors and consensus enhancement Low Tor: unspecified Core Tor/Tor
#22707 Lower descriptor lifetime when disk space is low enhancement Medium Tor: unspecified Core Tor/Tor
#22717 Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion defect Medium Tor: unspecified Core Tor/Tor
#22723 Avoid double-quoting esc_for_log output defect Medium Tor: unspecified Core Tor/Tor
#22728 Long-lived onion service circuits can enable guard discovery defect Medium Tor: unspecified Core Tor/Tor
#22729 Revisit relay read/write history resolution (for onion services) defect Medium Tor: unspecified Core Tor/Tor
#22745 Establish policy for writing regression tests task Medium Tor: unspecified Core Tor/Tor
#22758 When starting with no authority certificates, launch certificate downloads in parallel with consensus download defect Medium Tor: unspecified Core Tor/Tor
#22760 Fix extra-info flags on fallbacks defect Low Tor: unspecified Core Tor/Tor
#22769 Investigate the reproducibility of Rust binaries task Medium Tor: unspecified Core Tor/Tor
#22816 Run tests for single Rust module enhancement Low Tor: unspecified Core Tor/Tor
#22825 test: Add unit tests for circuit_send_next_onion_skin() enhancement High Tor: unspecified Core Tor/Tor
#22826 Write a spec for unsanitised bridge descriptor formats enhancement Low Tor: unspecified Core Tor/Tor
#22848 Increase default Tor buffer sizes on Windows defect Medium Tor: unspecified Core Tor/Tor
#22881 Unreachable relays launch multiple testing circuits per second defect Medium Tor: unspecified Core Tor/Tor
#22889 Add "no peer authentication" to the list of client identification methods in tor-spec defect Medium Tor: unspecified Core Tor/Tor
#22893 prop224: Make intro point per-service and not per-descriptor enhancement Very High Tor: unspecified Core Tor/Tor
#22898 Help get privcount standardized and merged task Medium Tor: unspecified Core Tor/Tor
#22908 Establish guidelines for contributing large bodies of code task Medium Tor: unspecified Core Tor/Tor
#22911 Move some style guidelines out of torguts into tor/doc/HACKING defect Medium Tor: unspecified Core Tor/Tor
#22926 The Tor compression code can call functions that are NULL defect Medium Tor: unspecified Core Tor/Tor
#22936 Apply Windows Tor build patch for VS2015 defect Medium Tor: unspecified Core Tor/Tor
#22948 Padding, Keepalive and Drop cells should have random payloads defect Medium Tor: unspecified Core Tor/Tor
#22962 Clarify the security severity of issues that make denial of service easier task Medium Tor: unspecified Core Tor/Tor
#22963 Make relay integrity digests harder to guess by padding cells with random bytes enhancement Medium Tor: unspecified Core Tor/Tor
#22972 tor expert bundle only read the first letter from config erinn defect Medium Tor: unspecified Core Tor/Tor
#22994 Use consistently named constants for relay command specifications defect Medium Tor: unspecified Core Tor/Tor
#23006 Test connection speed enhancement Medium Tor: unspecified Core Tor/Tor
#23010 prop224: make sure the protocol handshakes are extensible enhancement Medium Tor: unspecified Core Tor/Tor
#23013 Tor 0.3.0.9 tarball was missing ReleaseNotes entry defect Low Tor: unspecified Core Tor/Tor
#23061 crypto_rand_double() should produce all possible outputs on platforms with 32-bit int defect Medium Tor: unspecified Core Tor/Tor
#23066 Test granularity, distribution, and inner range of crypto_rand* functions defect Medium Tor: unspecified Core Tor/Tor
#23076 Should HSes use Stable nodes for services on long lived ports? defect Medium Tor: unspecified Core Tor/Tor
#23108 prop224: Don't rotate all service descriptors at once defect Medium Tor: unspecified Core Tor/Tor
#23113 Manage DNS state better when "All nameservers have failed" defect Medium Tor: unspecified Core Tor/Tor
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop defect High Tor: unspecified Core Tor/Tor
#23119 Make Tors no longer warn if they're running a newer-than-recommended version? enhancement Medium Tor: unspecified Core Tor/Tor
#23126 HSDirs should publish some count about new-style onion addresses enhancement Medium Tor: unspecified Core Tor/Tor
#23221 Implement download resumption if needed. enhancement Medium Tor: unspecified Core Tor/Tor
#23277 ApplicationControlSocket: the way for apps to control Tor enhancement Medium Tor: unspecified Core Tor/Tor
#23280 Censorship resistant onion sites enhancement Medium Tor: unspecified Core Tor/Tor
#23288 refactor temporary file cleanup and make it more consistent defect Medium Tor: unspecified Core Tor/Tor
#23289 Improving HS reachability for Orbot/Android users n8fr8 enhancement High Tor: unspecified Core Tor/Tor
#23295 Detect AES-NI hw encryption also if no cpu flags for AES-NI is present enhancement Medium Tor: unspecified Core Tor/Tor
#23300 prop224: General client side issues defect Medium Tor: unspecified Core Tor/Tor
#23301 prop224: Refactor connection_ap_handle_onion defect Medium Tor: unspecified Core Tor/Tor
#23302 Refactor all connection_*_list_*() to use CONN_GET_ALL_TEMPLATE enhancement Medium Tor: unspecified Core Tor/Tor
#23306 hs: Use the state of a directory connection instead of the HAS_FETCHED purpose defect Medium Tor: unspecified Core Tor/Tor
#23307 hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack defect Medium Tor: unspecified Core Tor/Tor
#23323 sample_laplace_distribution should produce a valid result on 0.0 defect Medium Tor: unspecified Core Tor/Tor
#23351 Create a rustfmt.toml defining our whitespace/formatting standards enhancement Low Tor: unspecified Core Tor/Tor
#23378 Call "Sandbox 1" no longer an experimental feature? enhancement Medium Tor: unspecified Core Tor/Tor
#23414 rep_hist_format_hs_stats() should add noise, then round defect Medium Tor: unspecified Core Tor/Tor
#23415 sample_laplace_distribution() should take multiple random inputs defect Medium Tor: unspecified Core Tor/Tor
#23416 Document the precision and limits of sample_laplace_distribution() enhancement Medium Tor: unspecified Core Tor/Tor
#23423 Remove redundant calls to connection_or_digest_is_known_relay() defect Low Tor: unspecified Core Tor/Tor
#23433 Windows relay: 85% of CPU power is wasted inside select() call defect Medium Tor: unspecified Core Tor/Tor
#23438 Use better status codes for HTTP CONNECT proxy errors defect Medium Tor: unspecified Core Tor/Tor
#23440 Enhancement: Replace CookieAuthFileGroupReadable option with flag for CookieAuthFile enhancement Medium Tor: unspecified Core Tor/Tor
#23474 Avoid constant initial download delays in download schedules enhancement Medium Tor: unspecified Core Tor/Tor
#23501 Refactor rep_hist_format_hs_stats() to add noise when counters are initialised defect Medium Tor: unspecified Core Tor/Tor
#23502 v3 Onion Services: don't make IPv4 mandatory because one day we'll have IPv6 only relays defect Medium Tor: unspecified Core Tor/Tor
#23508 large clock skews cause numerous bootstrap UX issues defect High Tor: unspecified Core Tor/Tor
#23521 detect if clock skew is probably really time zone misconfiguration enhancement Medium Tor: unspecified Core Tor/Tor
#23523 Handle extreme values better in add_laplace_noise() defect Medium Tor: unspecified Core Tor/Tor
#23565 document signs of client clock skew to ease troubleshooting task Medium Tor: unspecified Community/Tor Support
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Note: See TracQuery for help on using queries.