#29989: Add a flag to set chosen_exit_optional to false for MapAddress torrc
option
(and controller?)
-+-
Reporter: babyfarkmcgeezaxxon | Owner: (none)
Type: enhancement
#28693: Add an option to disable circuit padding
-+-
Reporter: teor | Owner: (none)
Type: defect | Status:
#28694: When CircuitPadding is implemented in Tor, set it to 0 in sbws
-+-
Reporter: teor | Owner: (none)
Type: enhancement | Status: new
Batch modification to #29500, #28633, #28635, #28694, #28778, #28779, #29821,
#29840, #29990 by teor:
sponsor to Sponsor2
Comment:
Move all WTF-PAD tickets that do not have a sponsor into sponsor2.
--
Tickets URL:
#29500: Broken circuitpadding unittests on appveyor
-+-
Reporter: asn | Owner: teor
Type: defect | Status:
#29990: test_circuitpadding_circuitsetup_machine() fails when monotonic time
difference is zero
-+-
Reporter: teor | Owner: (none)
Type: defect |
#29990: test_circuitpadding_circuitsetup_machine() fails when monotonic time
difference is zero
-+-
Reporter: teor | Owner: (none)
Type: defect | Status: new
Priority: Medium |
#29500: Broken circuitpadding unittests on appveyor
-+-
Reporter: asn | Owner: teor
Type: defect | Status:
#29938: pubsub: coverity sees a null pointer deref in lint_message_consistency
(CID
1444257)
--+
Reporter: nickm | Owner: nickm
Type: defect| Status: closed
Priority: Medium|
#27207: Examples in CodingStandardsRust.md are wrong
-+-
Reporter: cyberpunks | Owner: (none)
Type: defect | Status: new
Priority: Medium
#29979: Don't recommend expect() in CodingStandardsRust, because it panics
---+---
Reporter: teor | Owner: (none)
Type: defect | Status:
#29060: shellcheck: test-network.sh issues
-+-
Reporter: rl1987 | Owner: rl1987
Type: defect | Status:
#29989: MapAddress directive added to torrc doesn't work for some websites,
fails
to assign specified exit node
-+--
Reporter: babyfarkmcgeezaxxon | Owner: (none)
Type: defect | Status:
#27199: panic inside rust extern "C" function is undefined behavior
-+-
Reporter: cyberpunks | Owner: (none)
Type: defect | Status:
#29913: Stop assuming that /usr/bin/python3 exists
-+-
Reporter: teor | Owner: teor
Type: defect | Status:
#27199: panic inside rust extern "C" function is undefined behavior
-+-
Reporter: cyberpunks | Owner: (none)
Type: defect | Status:
#26460: Some? autoconf tests that include stdio.h fail with a missing ssp.h on
cygwin
-+-
Reporter: teor | Owner: (none)
Type: defect |
#29724: Create a blog post about work done and future work
--+---
Reporter: juga | Owner: juga
Type: defect| Status: needs_review
Priority: Medium
#29724: Create a blog post about work done and future work
--+---
Reporter: juga | Owner: juga
Type: defect| Status: needs_review
Priority: Medium
#29979: Don't recommend expect() in CodingStandardsRust, because it panics
---+---
Reporter: teor | Owner: (none)
Type: defect | Status:
#29979: Don't recommend expect() in CodingStandardsRust, because it panics
---+---
Reporter: teor | Owner: (none)
Type: defect | Status:
#29988: Add phw to sponsor19.git with RW access
-+
Reporter: sysrqb | Owner: tor-gitadm
Type: task | Status: new
Priority: Medium
#29816: replace "Tor VM hosts" spreadsheet with Grafana dashboard
-+-
Reporter: anarcat | Owner: tpa
Type: task | Status: new
Priority:
#29938: pubsub: coverity sees a null pointer deref in lint_message_consistency
(CID
1444257)
--+
Reporter: nickm | Owner: nickm
Type: defect| Status: merge_ready
Priority: Medium|
#29668: Drop thread_fast_rng during postfork; improve thread_fast_rng
fork-safety
--+
Reporter: nickm | Owner: nickm
Type: defect| Status: needs_review
Priority: High |
#29668: Drop thread_fast_rng during postfork; improve thread_fast_rng
fork-safety
--+
Reporter: nickm | Owner: nickm
Type: defect| Status: needs_review
Priority: Medium|
#28878: WTF-PAD: Improve deterministic randomness in tests
-+-
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Low
#24367: Changing pluggable transports (during start-up) in Tor Browser is broken
-+-
Reporter: gk | Owner: (none)
Type: defect | Status:
#29875: Going from obfs4 to snowflake using the Tor Network Settings from the
Torbutton doesn't work
-+-
Reporter: cypherpunks | Owner: (none)
Type: defect
#29500: Broken circuitpadding unittests on appveyor
-+-
Reporter: asn | Owner: teor
Type: defect | Status:
#29034: circuit: Cleanup an HS circuit when it is being re-purposed
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status:
#29034: circuit: Cleanup an HS circuit when it is being re-purposed
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status:
#29500: Broken circuitpadding unittests on appveyor
-+-
Reporter: asn | Owner: teor
Type: defect | Status:
#29034: circuit: Cleanup an HS circuit when it is being re-purposed
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status:
#29034: circuit: Cleanup an HS circuit when it is being re-purposed
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status:
#28223: Unparseable microdescriptor on public relay
-+-
Reporter: teor | Owner: nickm
Type: defect | Status:
#29357: add an ActiveOnStartup config option
---+---
Reporter: mcs| Owner: nickm
Type: enhancement| Status:
#29986: wishlist
--+-
Reporter: master hong | Owner: (none)
Type: defect| Status: closed
Priority: Medium| Milestone:
Component: Core Tor/Tor |Version:
Severity: Normal|
#29527: Division by zero: undefined behaviour in
circuitpadding/circuitpadding_sample_distribution test
-+-
Reporter: teor | Owner: teor
Type: defect
#29819: Seccomp: sandbox crash on rt_sigaction with libseccomp 0.2.4
---+
Reporter: toralf | Owner: nickm
Type: defect | Status: assigned
Priority: Medium
#29986: wishlist
---+-
Reporter: master hong| Owner: (none)
Type: defect | Status: closed
Priority: Medium |
#29987: clear out unowned files on servers
-+-
Reporter: anarcat | Owner: tpa
Type: project | Status: new
Priority: Low
#29682: remove traces munin-node everywhere
-+-
Reporter: anarcat | Owner: anarcat
Type: defect | Status:
#29987: clear out unowned files on servers
-+-
Reporter: anarcat | Owner: tpa
Type: project | Status: new
Priority: Low
#29682: remove traces munin-node everywhere
-+-
Reporter: anarcat | Owner: anarcat
Type: defect | Status:
#29841: ipsec VPN generates gigantic logs
-+-
Reporter: anarcat | Owner: weasel
Type: defect | Status:
#29841: ipsec VPN generates gigantic logs
-+
Reporter: anarcat | Owner: weasel
Type: defect | Status: closed
Priority: Low
#27503: Disabling accessibility on Windows breaks screen readers
-+-
Reporter: gk | Owner:
| pospeselr
Type: defect
#29986: wishlist
---+---
Reporter: master hong| Owner: (none)
Type: defect | Status: new
Priority: Medium |
#29871: Meek-Azure Pluggable Transport Not working
--+---
Reporter: bakertaylor28 | Owner: dcf
Type: defect| Status: needs_information
Priority: Medium| Milestone:
Component:
#29734: Broker should receive country stats information from Proxy and Client
-+-
Reporter: cohosh | Owner: cohosh
Type: enhancement | Status: merge_ready
Priority: Medium
#29977: My connection continues to timeout
--+--
Reporter: 71PlymouthGTX | Owner: tbb-team
Type: defect| Status: new
Priority: Medium|
#29978: My connection continues to timeout
--+--
Reporter: 71PlymouthGTX | Owner: tbb-team
Type: defect| Status: closed
Priority: Medium|
#21304: Sanitize snowflake.log
---+-
Reporter: arlolra| Owner: cohosh
Type: defect | Status: merge_ready
Priority: Medium | Milestone:
Component:
#29913: Stop assuming that /usr/bin/python3 exists
---+
Reporter: teor | Owner: teor
Type: defect | Status: merge_ready
Priority: Medium | Milestone: Tor:
#29859: Playing videos on Twitter is not working and freezing the mobile browser
-+-
Reporter: gk | Owner: tbb-
| team
Type:
#29985: Give phw access to Snowflake infrastructure hosts
---+--
Reporter: dcf| Owner: (none)
Type: task | Status: needs_review
Priority: Medium |
#27850: Provide stand-alone snowflake proxy for 32-bit
---+--
Reporter: traumschule| Owner: dcf
Type: defect | Status: closed
Priority: Medium | Milestone:
#29985: Give phw access to Snowflake infrastructure hosts
---+--
Reporter: dcf| Owner: (none)
Type: task | Status: needs_review
Priority: Medium |
#29985: Give phw access to Snowflake infrastructure hosts
---+
Reporter: dcf| Owner: (none)
Type: task | Status: new
Priority: Medium | Milestone:
#27539: Create plan for releasing on F-Droid
-+-
Reporter: sysrqb | Owner: sysrqb
Type: enhancement | Status:
#22029: Allow ed25519 keys to be banned in the approved-routers file
-+-
Reporter: teor | Owner: neel
Type: enhancement | Status:
#29984: Controller protocol parser can't find empty initial line
--+
Reporter: nickm | Owner: nickm
Type: defect| Status: assigned
Priority: Medium| Milestone: Tor: 0.4.1.x-final
#29984: Controller protocol parser can't find empty initial line
--+
Reporter: nickm | Owner: nickm
Type: defect| Status: assigned
Priority: Medium| Milestone: Tor: 0.4.1.x-final
#24973: Tor should be more gentle when launching dozens of circuits at once
-+-
Reporter: asn | Owner: (none)
Type: defect | Status:
#29984: Controller protocol parser can't find empty initial line
---+
Reporter: nickm | Owner: nickm
Type: defect | Status: assigned
Priority: Medium | Milestone: Tor:
#29034: circuit: Cleanup an HS circuit when it is being re-purposed
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status:
#20371: Lower HSDir query backoff delay
-+-
Reporter: twim | Owner: (none)
Type: enhancement | Status: new
Priority: Medium
#21621: Intro points can get stuck in CIRCUIT_PURPOSE_S_ESTABLISH_INTRO
-+-
Reporter: teor | Owner: (none)
Type: defect | Status: new
#17640: Handle CREATE/CREATED cell processing gracefully under load.
-+-
Reporter: yawning | Owner: yawning
Type: enhancement | Status:
#16387: Improve reachability of hidden services on mobile phones
-+-
Reporter: asn | Owner: (none)
Type: enhancement | Status: new
Priority:
#15516: Consider dropping INTRODUCE2 cells when under load
+--
Reporter: special | Owner: (none)
Type: enhancement | Status: new
Priority: Medium
#15463: Tor deals poorly with a very large number of incoming connection
requests.
--+
Reporter: alberto | Owner: yawning
Type: defect| Status: new
#6418: Drop support for older versions of the hidden service protocol
---+---
Reporter: nickm | Owner: (none)
Type: enhancement| Status: new
#3733: Tor should abandon rendezvous circuits that cause a client request to
time
out
-+-
Reporter: rransom | Owner: dgoulet
Type: defect |
#27680: Explain how to use auth cookie for onion services
--+
Reporter: traumschule | Owner: traumschule
Type: enhancement | Status: needs_review
Priority: Medium| Milestone:
Component: Core
#27842: Consider end-to-end introduction ACKs
-+-
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Medium
#29583: HSv3: Faulty cross-certs in introduction point keys (allows naive
onionbalance for v3s)
-+-
Reporter: asn | Owner: (none)
Type: defect |
#26768: Support onionbalance in HSv3
-+-
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Medium |
#26294: attacker can force intro point rotation by ddos
-+--
Reporter: arma | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: unspecified
#24973: Tor should be more gentle when launching dozens of circuits at once
-+-
Reporter: asn | Owner: (none)
Type: defect | Status:
#23493: IPv6 v3 Single Onion Services fail with a bug warning
-+-
Reporter: teor | Owner: (none)
Type: defect | Status: new
Priority:
#16059: Add a "rendezvous approver" control API
-+-
Reporter: special | Owner: (none)
Type: enhancement | Status: new
Priority: Medium
#13739: Optimize the functions called in circuit_launch_by_extend_info()
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status: new
#29607: 2019 Q1: Denial of service on v2 and v3 onion service
--+---
Reporter: pidgin| Owner: pidgin
Type: defect| Status: accepted
Priority: Immediate | Milestone:
Component: Core Tor/Tor |
#25882: clients not detecting stale onion service introduction points
-+-
Reporter: cypherpunks | Owner: dgoulet
Type: defect | Status:
#28005: Officially support onions in HTTPS-Everywhere
-+-
Reporter: asn | Owner: legind
Type: defect | Status: new
Priority: Medium
#29982: Clicking on cog/gear icon crashes Tor Browser for Android
-+-
Reporter: gk | Owner: tbb-
| team
Type: defect
#23764: hs-v3: No live consensus on client with a bridge
-+-
Reporter: dgoulet | Owner: dgoulet
Type: defect | Status: new
Priority: High
#22893: prop224: Make intro point per-service and not per-descriptor
-+-
Reporter: dgoulet | Owner: dgoulet
Type: enhancement | Status:
#28970: tor_bug_occurred_(): Bug: ../src/or/hs_client.c:624:
setup_intro_circ_auth_key: Non-fatal assertion
-+-
Reporter: torcrash | Owner: asn
Type: defect
#26294: attacker can force intro point rotation by ddos
-+--
Reporter: arma | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: unspecified
#16059: Add a "rendezvous approver" control API
-+-
Reporter: special | Owner: (none)
Type: enhancement | Status: new
Priority: Medium
#13739: Optimize the functions called in circuit_launch_by_extend_info()
-+-
Reporter: dgoulet | Owner: (none)
Type: defect | Status: new
#27842: Consider end-to-end introduction ACKs
-+-
Reporter: asn | Owner: (none)
Type: defect | Status: new
Priority: Medium
#22455: Enumerate cases where we want to retry circuits, and correctly balance
retry robustness with guard discovery
-+-
Reporter: arma | Owner: (none)
Type: task
#22893: prop224: Make intro point per-service and not per-descriptor
-+-
Reporter: dgoulet | Owner: dgoulet
Type: enhancement | Status:
#28970: tor_bug_occurred_(): Bug: ../src/or/hs_client.c:624:
setup_intro_circ_auth_key: Non-fatal assertion
-+-
Reporter: torcrash | Owner: asn
Type: defect
#29652: Evaluate the reusability of existing check.tpo application
-+
Reporter: irl | Owner: irl
Type: task | Status: closed
Priority: Medium |
#29983: Update URLs for new Tor Project website
+--
Reporter: irl | Owner: irl
Type: defect | Status: needs_review
Priority: Medium | Milestone:
1 - 100 of 163 matches
Mail list logo