Timeline
May 24, 2016:
- 11:14 PM Ticket #19167 (torrc parsing b0rks on carriage-return) created by
- Windows still terminates text files with '\r\n' by default, this seems …
- 10:27 PM Ticket #19166 (HS connections randomly fail) created by
- For the sake of checking whether my bridges are running properly, a …
- 9:46 PM org/doc/ListOfServicesBlockingTor edited by
- www.ieeelcn.org (diff)
- 8:46 PM Ticket #18996 (Investigate server logging in ESR45) closed by
- fixed
- 7:08 PM Ticket #18950 (Disable or audit Reader View in ESR 45) closed by
- fixed: Okay, thanks. Taking this for now, though. I revised the commit …
- 7:03 PM Ticket #18912 (add automated tests for updater cert pinning) closed by
- fixed: Replying to mcs: > Kathy and I created a test: > …
- 6:03 PM Ticket #18811 (Our first-party isolation patch incorrectly rejects blobs retrieved in ...) closed by
- fixed: Jonas' mail seems to indicate we are not in a bad shape with this …
- 5:01 PM doc/GoodBadISPs edited by
- Added Ziggo (Dutch ISP) to table of good ISP experiences. (diff)
- 1:57 PM Ticket #17599 (Please add keyboard shortcuts for New Identity and New Tor Circuit for ...) closed by
- fixed: Thanks, this makes it into 6.0: commit …
- 1:39 AM Ticket #19165 (Broken link on https://www.torproject.org/about/contact.html.en) created by
- The link to the OFTC website at the contact page of the torproject.org …
May 23, 2016:
- 9:31 PM Ticket #19164 (Backport - Remove support for SHA-1 HPKP pins) created by
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233328
- 9:25 PM Ticket #19163 (Make sure clients almost always use ntor) created by
- Update: All clients should use ntor for almost everything The only …
- 7:31 PM Ticket #18960 (Tor Address Change) closed by
- fixed: Everything changed I think. Let me know if anything is still wrong.
- 6:27 PM Ticket #18597 (Enhance performance timing tests for esr45) closed by
- fixed: We are done here it seems.
- 6:27 PM Ticket #18083 (Implement all Vidalia functionality in Firefox addons) closed by
- The scope of this ticket is too broad. If an important feature is …
- 6:22 PM Ticket #18050 (Relay submitted a descriptor with 0 DirPort due to a self-test race ...) closed by
- fixed
- 6:22 PM Ticket #18050 (Relay submitted a descriptor with 0 DirPort due to a self-test race ...) reopened by
- 6:21 PM Ticket #19003 (Make sure small networks can bootstrap without exits) closed by
- fixed
- 6:21 PM Ticket #19003 (Make sure small networks can bootstrap without exits) reopened by
- 6:16 PM Ticket #19060 (Should SafeLogging hide bridge IP addresses in logs?) closed by
- wontfix: I say wontfix
- 6:08 PM org/teams/NetworkTeam/ReleaseGuidelines edited by
- (diff)
- 6:02 PM Ticket #1117 (bridge authorities mark every bridge stable+guard) closed by
- fixed
- 6:02 PM Ticket #1117 (bridge authorities mark every bridge stable+guard) reopened by
- 6:00 PM Ticket #19130 (Seg fault in round_int64_to_next_multiple_of()) closed by
- fixed
- 6:00 PM Ticket #19130 (Seg fault in round_int64_to_next_multiple_of()) reopened by
- 5:44 PM Ticket #18849 (Fix router_picked_poor_directory_log() before 0.2.8 release) closed by
- fixed: We think this is fixed in 0.2.8.3-alpha by fixing other bugs. If not, …
- 5:43 PM Ticket #19162 (Make it even harder to become HSDir) created by
-
In #8243 we started requiring
Stable
flag for becoming HSDirs, but … - 5:23 PM Ticket #18739 (Do not have git ignore files that are also tracked) closed by
- fixed
- 5:05 PM Ticket #19161 (test for libscrypt_scrypt() fails) created by
- On a Debian jessie system, possibly due libscrypt.so thinking that the …
- 4:10 PM Ticket #19160 ([prop220] Advertise support for Ed25519 link authentication) created by
- In order to (finally) have authentication happen with ed25519 on link …
- 4:06 PM Ticket #19159 ([prop220] Add ed25519-ID field to channel and/or or_connection) created by
- Once we support links authenticating by Ed25519, we'll need to store …
- 4:03 PM Ticket #19158 ([prop220] Understand and validate ed25519-signed AUTH0002 cells) created by
- When a server receives a connection from another server with an …
- 4:02 PM Ticket #19157 ([prop220] Check all new certificate types (incl cross-cert and ed25519)) created by
- If we're using ed25519 authentication, we should understand and check …
- 4:00 PM Ticket #19156 ([prop220] send AUTHENTICATE cells with correct ed25519 signatures) created by
- When we're using AuthType2, we send a new AUTH0002 cell, with a …
- 3:56 PM Ticket #19155 ([prop220] send CERTS cells correctly for Ed25519) created by
- Part of implementing proposal 220 is to make sure that severs …
- 3:45 PM Ticket #18639 (Perform a Severe Bug Retrospective for the last few years.) closed by
- implemented: FINALLY done: * …
- 2:59 PM Ticket #19066 (Wrong length used in networkstatus_parse_detached_signatures) closed by
- fixed: works for me. merged! Also, in b53a2059c44959 I simplified the code …
- 2:14 PM Ticket #19154 (Onionoo stopped to resolve ASN and country code for new relays) created by
- Since sometime between 17th and 18th of May Onionoo includes no …
- 1:53 PM Ticket #19153 (man page spells --enable-tor2web-mode --enable-tor2webmode) created by
- […] […]
- 1:31 PM org/teams/NetworkTeam edited by
- (diff)
- 12:46 PM Ticket #19152 (use-after-free on failing RSA_generate_key_ex()) created by
- Reported by Yuan Kang. When we generate a key, if openssl fails to …
- 11:55 AM Ticket #19151 (Looks like a memory leak?) created by
- Exit relay named Libero (64.113.32.29) running on CentOS Linux, …
- 10:27 AM Ticket #18904 (Mac OS: meek-http-helper profile not updated) closed by
- fixed: Replying to dcf: > Replying to gk: > > The …
- 10:17 AM Ticket #19115 (Make sure Tor Browser 6.0 is not falling back to Bing as its search engine) closed by
- fixed: Disconnect helped us getting 3) going without the need for any Tor …
- 9:55 AM Ticket #19023 (Improve prop224 quality (montreal hackfest)) closed by
-
fixed: These spec changes got merged to
torspec.git
during the montreal … - 9:03 AM Ticket #19150 (Pointer overflow in memarea_alloc()) created by
-
There is a pointer overflow in
memarea_alloc()
: […] It does not … - 3:08 AM org/doc/ListOfServicesBlockingTor edited by
- removed the open context as offtopic --op (diff)
May 22, 2016:
- 6:46 PM Ticket #19149 (NTRU Prime new publication from Bernstein) closed by
- not a bug: Replying to cypherpunks: > …
- 5:00 PM org/doc/ListOfServicesBlockingTor edited by
- Add a missing "last check" for www.taxact.com. (diff)
- 4:52 PM org/doc/ListOfServicesBlockingTor edited by
- ba.com britishairways.com (diff)
- 3:30 PM Ticket #19149 (NTRU Prime new publication from Bernstein) created by
- ntruprime.cr.yp.to/ntruprime-20160511.pdf mailing list wasnt working …
- 2:59 PM Ticket #19148 (Make some parts of Tor scriptable) created by
- Would you kindly make some parts of Tor scriptable? It will be useful …
- 12:17 PM doc/TorifyHOWTO edited by
- (diff)
- 12:15 PM doc/TorifyHOWTO edited by
- (diff)
- 7:52 AM doc/TorifyHOWTO edited by
- (diff)
- 5:53 AM doc/ISPCorrespondence edited by
- (diff)
- 5:50 AM doc/ISPCorrespondence edited by
- pair.com (diff)
- 1:44 AM Ticket #19061 (Tor event descriptions) closed by
- implemented: Thanks sambuddhabasu! …
May 21, 2016:
- 9:50 PM doc/TorifyHOWTO edited by
- (diff)
- 8:35 PM Ticket #19141 (Please create tor-meeting@ mailing list) closed by
- fixed
- 8:34 PM doc/emailLists edited by
- add tor-meeting (diff)
- 7:50 PM Ticket #19147 (Unable to verify TorMessenger) closed by
- not a bug: Well, the easy answer is because the Tor Browser developers don't …
- 2:38 PM Ticket #19147 (Unable to verify TorMessenger) created by
- >Signature made using RSA key ID B297B391 >Can't check signature: …
- 12:55 PM Ticket #19146 (arm/nyx doesn't install on systems with python3.x by default) created by
- ./install fails with this super-cryptic output: print "TorCtl …
- 8:03 AM Ticket #19143 (Change the BadContent rules) closed by
- fixed: The regex was catching in this case, but the spammer had enough …
- 7:52 AM BadContent edited by
- (diff)
- 6:06 AM org/doc/ListOfServicesBlockingTor edited by
- gutenberg.org still blocking. (diff)
- 6:03 AM Ticket #19143 (Change the BadContent rules) reopened by
- Replying to qbi: > I changed the regex for the phone …
- 3:45 AM doc/meek edited by
- Apr 2016 cost email. (diff)
- 1:53 AM org/meetings/2016SummerMeeting edited by
- Added yours truly. (diff)
- 1:50 AM doc/meek edited by
- Remove old client hello diff. (diff)
- 1:29 AM Ticket #18927 (Check meek fingerprint on ESR 45) closed by
- fixed: It looks like there's no problem. Firefox 45.0.2esr …
- 1:24 AM doc/meek/SampleClientHellos edited by
- Fix 45.0.2esr heading. (diff)
- 1:21 AM doc/meek/SampleClientHellos edited by
- Firefox 38.8.0esr, Firefox 45.0.2esr, Tor Browesr 6.0a5. (diff)
May 20, 2016:
- 11:49 PM doc/gsoc edited by
- (diff)
- 9:16 PM Ticket #19145 (tor doesn't work for me) created by
- tor doesn't work for me
- 9:15 PM doc/emailLists edited by
- correct link to Gmane (diff)
- 8:58 PM Ticket #19144 (Expensive hardening jobs have no verbose check) closed by
- invalid
- 8:43 PM Ticket #19143 (Change the BadContent rules) closed by
- fixed: I changed the regex for the phone numbers a bit. So it should fit to …
- 8:37 PM BadContent edited by
- improve the regex for telephone numbers a bit (diff)
- 8:26 PM doc/meek/SampleClientHellos edited by
- Use headings and a table of contents. (diff)
- 8:21 PM Ticket #19144 (Expensive hardening jobs have no verbose check) created by
-
The expensive hardening jobs do not execute
VERBOSE=yes make check
… - 7:48 PM Ticket #19121 (reinstate the update.xml hash check) closed by
- fixed: Looks good, thanks. This is commit …
- 6:00 PM Ticket #19143 (Change the BadContent rules) created by
-
The BadContent page contains the
http:
line. I'm suspecting this … - 5:49 PM Ticket #19142 (Remove the environ configure check) created by
-
See ticket:19139#comment:1 on why the
environ
variable configure … - 5:37 PM org/meetings/2016SummerMeeting edited by
- (diff)
- 5:30 PM org/meetings/2016SummerMeeting edited by
- (diff)
- 5:10 PM org/meetings/2016SummerMeeting edited by
- (diff)
- 5:07 PM org/meetings/2016SummerMeeting edited by
- (diff)
- 5:06 PM org/meetings/2016SummerMeeting edited by
- airport (diff)
- 5:03 PM org/meetings/2016SummerMeeting edited by
- Adding myself to the table. (diff)
- 4:50 PM Ticket #19141 (Please create tor-meeting@ mailing list) created by
- This will be the one true list name to end all list names. Previous …
- 4:50 PM org/meetings/2016SummerDevMeeting edited by
- (diff)
- 4:48 PM org/meetings/2016SummerDevMeeting edited by
- (diff)
- 4:48 PM org/meetings/2016SummerMeeting created by
- 4:38 PM Ticket #16599 (Onionoo feature: family ID) closed by
- user disappeared
- 4:15 PM org/meetings/2016SummerDevMeeting created by
- 4:11 PM doc/GoodBadISPs edited by
- (diff)
- 3:08 PM Ticket #19139 (Let Autoconf handle enabling C and POSIX extensions) created by
- The comment on …
- 2:54 PM Ticket #19126 (Consistently use uint64_t for integers in shared random structs) reopened by
- Re-opened, but recommend 64 bit now.
- 2:52 PM Ticket #19127 (Don't crash authorities with more than 254 shared random reveals) closed by
- invalid: Obsoleted by #19134, because the spec says 8 bytes of reveal_num, not …
- 1:47 PM Ticket #19138 (Received extra server info (size 0)) created by
- What is a size 0 server info? Should we mention it at all? […]
- 1:04 PM org/teams/MetricsTeam edited by
- Update roadmap from May 19 meeting. (diff)
- 12:36 PM Ticket #18934 (test suite failures with expensive hardening.) closed by
- fixed: Applied; thanks!
- 12:13 PM Ticket #19130 (Seg fault in round_int64_to_next_multiple_of()) closed by
- fixed: Fixed and applying to master.
- 12:02 PM Ticket #16534 (Failed to remove debugging options in Firefox) closed by
- fixed: Fixed by #18885.
- 11:58 AM Ticket #17508 (Using FORTIFY_SOURCE breaks inlining of memcpy when comiling Tor ...) closed by
- fixed: Fixed in 6.0a5.
- 8:30 AM Ticket #19137 (Prepare moving our MAR files to cdn.tpo) created by
- We want to have our MAR files on a CDN to reduce the load on our …
- 8:21 AM Ticket #19131 (Tor Browser Bundle Crash) closed by
- invalid: I am not sure what you are using but at least your tor (0.2.4.27) is …
- 8:07 AM Ticket #19136 (Crushed on Windows10 (Tor 0.2.8.1-alpha 9093e3769746742f)) closed by
- duplicate: Duplicate of #8185.
- 7:51 AM Ticket #19136 (Crushed on Windows10 (Tor 0.2.8.1-alpha 9093e3769746742f)) created by
- [周五 5月 20 14:08:28 2016] Tor软件错误 - Tor 软件遇到了一个内部错误。请将下列错误信息通过 …
- 7:46 AM Ticket #19135 ('refresh tor browser' makes it inoperable) created by
- On starting tor browser I got a dialog box asking me if I wanted to …
- 2:19 AM Ticket #19126 (Consistently use uint64_t for integers in shared random structs) closed by
- invalid: Obsoleted by #19134, because the spec says 8 bytes of reveal_num, not …
- 2:16 AM Ticket #19134 (Shared Random: INT_8 means 8 bytes, not 8 bits) created by
- generate_srv should take 8 bytes of reveal_num and version, not 8 …
- 1:47 AM Ticket #19133 (Clarify how INT_N truncates values) created by
-
We've assumed that INT_1(x), where x is an integer, means
x % 256
. …
May 19, 2016:
- 11:08 PM Ticket #19132 (shared random: missing field 'fetch_missing_votes' initializer) created by
- dgoulet's ticket16943_029_02 fails to compile on OS X with `Apple LLVM …
- 8:55 PM Ticket #19131 (Tor Browser Bundle Crash) created by
- "Tor unexpectedly exited. This might be due to a bug in Tor itself, …
- 8:49 PM doc/emailLists edited by
- Dropping the part about tor-internal@. We haven't been asking … (diff)
- 8:05 PM Ticket #18809 (Handle linked connections better during bootstrap) closed by
- fixed: Both fixes merged. Thanks!
- 7:59 PM Ticket #19079 (clang -m32 -ftrapv seems buggy with 64-bit signed integer multiply) closed by
- fixed: I'm assuming that the llvm source is okay. :) Merging to master.
- 7:57 PM Ticket #19073 (Remove duplicate signing_cert field from extrainfo and routerinfo.) closed by
- fixed: merged to maint-0.2.8 and forward.
- 7:51 PM doc/emailLists edited by
- Probably shouldn't have a comment there. (diff)
- 7:50 PM doc/emailLists edited by
- Revise tor-project@ membership criteria to match what we've been using. (diff)
- 7:36 PM doc/CollecTor/AnalysisDescriptorCompletenessFromScratch edited by
- added link to config (diff)
- 7:30 PM doc/CollecTor/CollecTorServerConfigUsed created by
- 7:18 PM doc/CollecTor/AnalysisDescriptorCompletenessFromScratch edited by
- (diff)
- 7:17 PM doc/CollecTor/AnalysisDescriptorCompletenessFromScratch created by
- 6:49 PM Ticket #19130 (Seg fault in round_int64_to_next_multiple_of()) created by
- On moria1, git 249f3a16 […] Looks like it's in the "add noise when …
- 6:45 PM Ticket #19129 (Allow Fallback Directories with no DirPort) created by
- In #12538, we made almost every relay support begindir-style directory …
- 6:39 PM Ticket #19128 (Bug: src/common/crypto.c:3039: memwipe: Assertion sz < SIZE_T_CEILING ...) created by
- git 2b8ba551d3eab2793214ab34a1c9a47a888402cd at a hardened stable …
- 6:37 PM Ticket #17372 (Use Guard as Fallback Directory) closed by
- duplicate
- 6:02 PM Ticket #19127 (Don't crash authorities with more than 254 shared random reveals) created by
- Rather than asserting that a tor network never has more than 253 …
- 5:54 PM Ticket #19126 (Consistently use uint64_t for integers in shared random structs) created by
- Rather than using int sometimes and uint32_t other times, we could …
- 5:47 PM Ticket #19125 ([prop250] Fix a time parsing error on platforms with 32 bit time_t) created by
- On platforms with 32 bit time_t, tor can't parse some dates in 2038, …
- 4:59 PM doc/meek edited by
- Link Mar 2016 cost email. (diff)
- 4:02 PM Ticket #19124 (Shared Random and Half-Hour Consensuses) created by
- My test authority was asleep for an hour, and so it didn't have a …
- 4:00 PM Ticket #19123 (Plz update my key in the keyring) closed by
- fixed
- 3:59 PM Ticket #19123 (Plz update my key in the keyring) created by
- Hi, my key expired last month, but I've updated it and pushed those …
- 3:58 PM Ticket #19122 (Documentation for "User" option specifies wrong kind of argument) created by
- https://www.torproject.org/docs/tor-manual.html.en User UID On …
- 3:00 PM Ticket #19121 (reinstate the update.xml hash check) created by
- While working on #18912, Kathy and I discovered the following Mozilla …
- 2:59 PM org/doc/ListOfServicesBlockingTor edited by
- (diff)
- 1:59 PM Ticket #19120 (Integrate and remove Clang hardening instructions) created by
-
The file
contrib/clang/sanitize_blacklist.txt
contains instructions … - 11:34 AM Ticket #5102 (segfault in entry_guard_register_connect_status on tor bridge running ...) closed by
- user disappeared: ack
- 11:27 AM Ticket #18944 (Remove block-malicious-sites-checkbox on TLS error page) closed by
- wontfix: Replying to gk: > The first thing is We are not in the …
- 11:26 AM Ticket #19119 (Repurpose block-malicious-sites-checkbox on TLS error page in Tor Browser) created by
- Right now the checkbox on the neterror page sends a report about an …
- 5:06 AM Ticket #1117 (bridge authorities mark every bridge stable+guard) closed by
- fixed: I just checked a networkstatus from Tonga and this one looks good. Closing!
- 3:23 AM Ticket #19118 (Add organization name to each relay) created by
- Roster quantifies things like "organization diversity" as something …
- 3:19 AM Ticket #19027 (Adding organization name for each relay) closed by
- invalid: Replying to virgil: > Roster quantifies things like …
Note: See TracTimeline
for information about the timeline view.