Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'security'

  • #5221 project: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #5222 enhancement: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #7148 defect: Even better parameter voting protocol (new)
  • #7193 enhancement: Tor's sybil protection doesn't consider IPv6 (new)
  • #11458 enhancement: A newer signing cert should innoculate us against older ones? (new)
  • #12089 defect: BridgedDB can be forced to email arbitrary email addresses (reopened)
  • #12500 enhancement: Add an option to upload hidden service descriptors some time after startup (new)
  • #13155 defect: I can use an extend cell to remotely determine whether two relays have ... (new)
  • #13444 project: "GhostNode" - support relays that cannot accept incoming connections. (new)
  • #13697 enhancement: Carry entropy across invocations (new)
  • #13703 enhancement: Adding doc/HARDENING (accepted)
  • #13753 enhancement: Validate is_canonical more thoroughly (new)
  • #13873 enhancement: hard lock tails/torbrowser (new)
  • #13912 defect: Key Security: Zeroing Buffers Is Insufficient (AES-NI leaves keys in ... (new)
  • #15238 enhancement: Improve or replace TorFlow (new)
  • #15421 defect: Relay crash when reloading and resolv.conf is empty (closed: fixed)
  • #15660 defect: [feature suggestion] Need signal to totally switch to the new set of ... (new)
  • #15729 enhancement: Proposal: Hidden Service Revocation (new)
  • #16894 task: Check all logging output is appropriately escaped / escaped_safe_str_client (new)
  • #17521 enhancement: Support capsicum(4) on FreeBSD (assigned)
  • #17579 enhancement: Split tor-gencert into "make cert" and "sign" portions (new)
  • #17901 defect: Tor would bind ControlPort to public ip address if it has no localhost ... (new)
  • #18346 enhancement: Separate the various roles that directory authorities play, from a ... (accepted)
  • #18643 enhancement: Replace the most error-prone binary parsers with trunnel (new)
  • #18644 task: Replace our routerparse.c core with something machine-generated (new)
  • #18645 task: Replace our http parser with something machine-generated (new)
  • #19162 defect: Make it even harder to become HSDir (accepted)
  • #19983 enhancement: Is openssl 1.1.0's "secure heap" feature useful for us? (new)
  • #20055 enhancement: Remove relays that fail to rotate onion keys from the consensus (new)
  • #20212 enhancement: Tor can be forced to open too many circuits by embedding .onion resources (new)
  • #21230 enhancement: Work with a restrictive CSP policy (closed: wontfix)
  • #21478 enhancement: Extend HTTP fuzzer so it fuzzes the POST handler functions (new)
  • #22563 defect: Many memory pages in tor.exe for Windows violate WX (closed: fixed)
  • #22660 defect: Guard against stack smashing attacks in tor with additional compiler ... (needs_revision)
  • #22947 defect: Possible Security Issue (Information Disclosure) with Drupal on ... (needs_revision)
  • #22963 enhancement: Make relay integrity digests harder to guess by padding cells with ... (new)
  • #23357 enhancement: Build with non-Cross-DSO CFI (needs_revision)
  • #24031 defect: Protover.rs could use a better algorithm (closed: fixed)
  • #24351 enhancement: Block Global Active Adversary Cloudflare (reopened)
  • #24393 enhancement: Clients should check IPv4 and IPv6 subnets when choosing circuit paths (closed: implemented)
  • #24509 defect: circuit_can_use_tap() should only allow TAP for v2 onion services (needs_revision)
  • #24782 defect: Set a lower default MaxMemInQueues value (closed: fixed)
  • #25226 defect: Circuit cell queue can fill up memory (closed: implemented)
  • #25517 defect: TROVE-2018-005 (closed: fixed)
  • #25566 project: Include or add an option to close connection to Cloudflare. (closed: duplicate)
  • #25568 defect: hs: Lookup failure cache when introducing to an intro point (assigned)
  • #26167 enhancement: Make Torbutton security settings more customizable (closed: wontfix)
  • #27143 task: Look for parts of code that relies on non-trunnel code for binary wire ... (accepted)
  • #27324 enhancement: Rework AUTHENTICATE cell parsing and remaining generation with trunnel (accepted)
  • #27325 enhancement: Rework NETINFO cell parsing and generation with trunnel (merge_ready)
  • #27326 enhancement: Replace packed_cell_t and supporting code with stuff generated by trunnel (new)
  • #27327 enhancement: Parse and generate CREATE, CREATE_FAST and CREATED cell wire format ... (new)
  • #27328 enhancement: Rework EXTEND and EXTENDED cells with trunnel (new)
  • #27329 enhancement: Rework RELAY cell wire format handling with trunnel (new)
  • #27620 enhancement: Use trunnel to parse and generate SOCKS wire format in tor-resolve (closed: implemented)