Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '033-triage-20180320'

  • #3940 defect: Allow MapAddress .exit even if AllowDotExit is 0 (closed: worksforme)
  • #6767 defect: tor crashes with Assertion smartlist_get(rl->old_routers, idx) == sd failed (closed: worksforme)
  • #7164 defect: microdesc.c:378: Bug: microdesc_free() called, but md was still ... (needs_revision)
  • #9390 enhancement: Warn if you're being a public relay but have too-low file descriptor limit (needs_revision)
  • #11301 defect: Tor does not reconnect after network loss with guards used as bridges (closed: fixed)
  • #11966 defect: "Bootstrapped 20%: Asking for networkstatus consensus" is a lie for ... (needs_revision)
  • #14006 defect: Hidden service error: "We'd like to launch a circuit to handle a ... (needs_information)
  • #17145 defect: <tor.exe --service install -options -f ...\torrc> returns Error 1064 ... (new)
  • #18480 defect: Some tor time functions have undefined behavior with dates after 2037 ... (new)
  • #18580 defect: exit relay fails with 'unbound' DNS resolver when lots of requests time-out (new)
  • #21311 defect: Exits should resolve IPv6 addresses, regardless of IPv6Exit (needs_information)
  • #21358 defect: Tor fails to reconnect after computer resumes from sleep (new)
  • #21394 defect: connection timeouts are affecting Tor Browser usability (merge_ready)
  • #21425 defect: entry_list_is_constrained() should look at the guard_selection_t object (needs_information)
  • #21676 defect: Increase MIN_BW_TO_ADVERTISE_DIRSERVER above RELAY_REQUIRED_MIN_BANDWIDTH (new)
  • #22310 defect: Tor 0.3.x clients won't use Guard-flagged relays as Guards if they ... (closed: implemented)
  • #22355 defect: Update dir-spec with client fallback directory mirror attempt and ... (new)
  • #22689 defect: hs: Stop intro points being used as single hop proxies (needs_revision)
  • #22717 defect: Rename channelpadding.c's CHANNEL_IS_CLIENT to avoid confusion (assigned)
  • #22817 enhancement: SAFECOOKIE description in control spec does not have verifiable test ... (needs_revision)
  • #22926 defect: The Tor compression code can call functions that are NULL (needs_revision)
  • #23116 defect: tor stops responding to Ctrl-C and circuits while in infinite ... (new)
  • #23168 defect: Guard sample calls relay descriptors a "consensus" (needs_revision)
  • #23234 defect: Possible problem with bootstrapping logic (Problem bootstrapping. ... (closed: duplicate)
  • #23250 defect: tor-0.3.0.10: test failure on NetBSD (needs_information)
  • #23357 enhancement: Build with non-Cross-DSO CFI (needs_revision)
  • #23613 defect: some control protocol GETINFO downloads/networkstatus keys are lies (new)
  • #23620 defect: Tor lies about "Optimistically trying directory fetches again" (new)
  • #23756 defect: tor's .gitlab-ci.yml is doing mirroring? why? (accepted)
  • #23785 task: [HELP!] 7.5a5's(IIRC) Tor cause DNS disruption! (closed: user disappeared)
  • #23815 defect: routerstatus download status fields should be explicitly set (new)
  • #24029 defect: Test all rust functions' behavior when called from C with bad UTF8 (closed: not a bug)
  • #24044 defect: Resolved [scrubbed] which was already resolved; ignoring (closed: fixed)
  • #24110 defect: document control protocol router status format surprises when using ... (new)
  • #24238 defect: Bug: Generated a networkstatus vote we couldn't parse because of ... (new)
  • #24303 defect: Tor fails to start if %include (closed: user disappeared)
  • #24308 defect: MaxMemInCellQueues minimum of 256MB is still too large for low-RAM ... (new)
  • #24342 defect: Various spec fixes to dir-spec, rend-spec-v3 (closed: fixed)
  • #24367 defect: Changing pluggable transports (during start-up) in Tor Browser is broken (new)
  • #24377 defect: Warn about networkstatus_compute_consensus() breakage in all the ... (new)
  • #24423 defect: Fix STACK warnings in Tor (assigned)
  • #24453 defect: Reduce log spam when child process creation failed (new)
  • #24454 defect: sandbox failure on arm64 (needs_information)
  • #24455 defect: messages out of order in the tor log due to stored logs (new)
  • #24456 defect: Figure out what to do with the guardfraction feature (new)
  • #24544 defect: Fix more prop224 spec inconsistencies (closed: fixed)
  • #24546 defect: Use tor_addr_is_v4() rather than family, or reject all v6-mapped IPv4 ... (needs_revision)
  • #24658 enhancement: Split/refactor crypto.h into smaller separate modules (closed: fixed)
  • #24661 defect: accept a reasonably live consensus for guard selection (assigned)
  • #24759 defect: (Sandbox) Caught a bad syscall attempt (syscall socket) (closed: worksforme)
  • #24767 enhancement: All relays are constantly connecting to down relays and failing over ... (closed: fixed)
  • #24775 defect: Reduce "Channel padding timeout scheduled" NOTICE messages (closed: duplicate)
  • #24782 defect: Set a lower default MaxMemInQueues value (closed: fixed)
  • #24795 defect: test_rust fails on osx with "can't find crate for libc" (closed: worksforme)
  • #24821 defect: Relay publishing malformed dirreq-v3-tunneled-dl (new)
  • #24841 defect: Your relay has a very large number of connections to other relays. Is ... (new)
  • #24868 defect: Check a consensus parameter before activating onion service IPv6 features (assigned)
  • #24897 defect: Tor seems to malfunction on FreeBSD (needs_information)
  • #24903 defect: Bug: Line unexpectedly reached at pathbias_should_count at ... (merge_ready)
  • #24904 defect: Make geoip use channel_is_client so it ignores flapping relays (closed: implemented)
  • #24905 defect: Remove redundant connection_or_digest_is_known_relay() from ... (needs_revision)
  • #24910 defect: Make rep_hist_note_circuit_handshake_* use channel_is_client() (closed: fixed)
  • #24911 defect: Remove the known digest check from channel_check_for_duplicates() (needs_revision)
  • #24968 defect: Tor's DNSPort become unreliable after I upgraded to latest 0329 stable. (closed: user disappeared)
  • #25036 defect: Tor 0.3.2 rejects connections to raw ipv6 addresses (closed: fixed)
  • #25055 defect: string_is_valid_hostname() returns true for IPv4 addresses (closed: implemented)
  • #25061 defect: Relays consider it a bootstrapping failure if they can't extend for ... (assigned)
  • #25173 defect: No Control Socket when DisableNetwork and User options are set (new)
  • #25208 defect: Relays can upload a new descriptor every 2 minutes (assigned)
  • #25213 defect: 0.3.3.2-alpha - Non-fatal assertion ... (closed: implemented)
  • #25226 defect: Circuit cell queue can fill up memory (closed: implemented)
  • #25245 defect: Crash in assert_connection_ok when changing Exit options (needs_revision)
  • #25248 enhancement: DoS mitgation: improve documentation (closed: implemented)
  • #25306 defect: tor_assertion_failed_(): Bug: ../src/or/hs_service.c:1985: ... (merge_ready)
  • #25313 defect: Sandbox: Caught a bad syscall attempt (syscall poll) (closed: fixed)
  • #25316 defect: Assertion failure in scale_active_circuits (closed: duplicate)
  • #25347 defect: Tor keeps on trying the same overloaded guard over and over (needs_revision)
  • #25380 defect: Transparent proxy not working with linux kernel 4.15.6 (closed: wontfix)
  • #25507 task: Write a guide for groups planning to submit big patches to Tor. (assigned)
  • #25517 defect: TROVE-2018-005 (closed: fixed)
  • #25678 defect: Clarify how ed25519 extended private keys are used in rend-spec-v3.txt (new)
  • #26436 defect: Check uses of CMP_SEMANTIC for IP addresses (new)