#24954: Metrics performance measurements use v2 onion services
-+-
Reporter: teor | Owner: karsten
Type: defect | Status: closed
Priority: Medium | Milestone:
Component: Metrics/We
#19417: asm.js files should be no linkability risk
-+-
Reporter: gk | Owner: tbb-
| team
Type: defect
#25179: identity leakage, resolution
--+--
Reporter: y2875095 | Owner: tbb-team
Type: defect| Status: closed
Priority: Medium| Milestone:
Component:
#24341: rbm windows builds failing with target arch 386 mismatch with current
arch
amd64
---+--
Reporter: pospeselr | Owner: boklm
Type: defect | Status: needs_review
Priority: Med
#17228: Consideration for disabling referrers within TBB
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: defect| Status: new
Priority: High | Mile
#25180: Protect against Referer Tracking in Tor Browser
--+---
Reporter: cypherpunks | Owner: tbb-team
Type: defect| Status: closed
Priority: Medium| M
#25189: Add some clear warning to download page that modifying 3 to 7|8 is a bad
idea.
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: task | Status: new
Priority: Medium| Milest
#25190: Why "Add to CC" is already set to "tor-dev" email address?
--+
Reporter: cypherpunks | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone:
Com
#25190: Why "Add to CC" is already set to "tor-dev" email address?
--+
Reporter: cypherpunks | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone:
#25189: Add some clear warning to download page that modifying 3 to 7|8 is a bad
idea.
--+
Reporter: cypherpunks | Owner: (none)
Type: task | Status: new
Priority: Medium
#25189: Add some clear warning to download page that modifying 3 to 7|8 is a bad
idea.
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: task | Status: new
Priority: Medium
#25188: Spec bug in formal definition of Document in dir-spec.txt
--+
Reporter: witchof0x20 | Owner: (none)
Type: enhancement | Status: needs_review
Priority: Very Low | Milestone: Tor: 0.3.4.x-f
#25188: Spec bug in formal definition of Document in dir-spec.txt
--+--
Reporter: witchof0x20 | Owner: (none)
Type: enhancement | Status: new
Priority: Very Low | Milestone:
Component: Core Tor/Tor |
#25187: [Android] Tor-enable Apps
+--
Reporter: dovanvu1792@… | Owner: n8fr8
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Orbot
#25186: Please refresh sysrqb's pgp key
-+-
Reporter: sysrqb | Owner: tpa
Type: enhancement | Status: new
Priority: Medium
#25137: Tor blocked in UAE
-+
Reporter: mwolfe | Owner: dcf
Type: task | Status: closed
Priority: Medium | Milestone:
#24806: LTS branch leaks memory continuously under stress/attack, requires back-
port of 0.3.2.8-rc fixes to remain viable
--+--
Reporter: starlight | Owner: (none)
Type: defect| Status: new
Priority: M
#24991: SingleOnion claims "missing descriptors for 1/2 of our primary entry
guards", has no guards, makes no sense
-+-
Reporter: alecmuffett | Owner: (none)
Type: defect
#24992: SingleOnion (and Tor2web?) connections may need better expiry, lots left
open
+
Reporter: alecmuffett | Owner: (none)
Type: defect | Status: new
Priority: Medium
#24991: SingleOnion claims "missing descriptors for 1/2 of our primary entry
guards", has no guards, makes no sense
--+
Reporter: alecmuffett | Owner: (none)
Type: defect| Status:
#13908: Make it safe to set NumDirectoryGuards=1
-+-
Reporter: arma | Owner: (none)
Type: enhancement | Status: new
Priority: Medium
#24806: LTS branch leaks memory continuously under stress/attack, requires back-
port of 0.3.2.8-rc fixes to remain viable
--+--
Reporter: starlight | Owner: (none)
Type: defect| Status: new
Priority: M
#13908: Make it safe to set NumDirectoryGuards=1
-+-
Reporter: arma | Owner: (none)
Type: enhancement | Status: new
Priority: Medium
#14045: Use Firefox SDK
-+-
Reporter: Marnes | Owner: (none)
Type: enhancement | Status: closed
Priority: Medium
#20611: Relays should log a message when they return a 503 error to a client
--+--
Reporter: teor | Owner: (none)
Type: defect| Status: closed
Priority: Medium
#20611: Relays should log a message when they return a 503 error to a client
--+--
Reporter: teor | Owner: (none)
Type: defect| Status: new
Priority: Medium
#24698: Torbrowser keeps hanging and freezing, plus it takes a very long time to
load after hibernation
--+---
Reporter: justmeee | Owner: tbb-team
Type: defect| Status
#25127: Rust implementation of protover_get_supported_protocols() leaks memory
--+
Reporter: nickm | Owner: isis
Type: defect| Status: closed
Priority: Medium
#24698: Torbrowser keeps hanging and freezing, plus it takes a very long time to
load after hibernation
--+---
Reporter: justmeee | Owner: tbb-team
Type: defect| Status
#25127: Rust implementation of protover_get_supported_protocols() leaks memory
--+
Reporter: nickm | Owner: isis
Type: defect| Status: merge_ready
Priority: Medium
#22214: When authority certificates expire, give a better error message
--+--
Reporter: teor | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone: Tor: unspecified
Co
#20611: Relays should log a message when they return a 503 error to a client
--+--
Reporter: teor | Owner: (none)
Type: defect| Status: new
Priority: Medium
#15019: Most FooStatistics entries in the man page don't mention ExtraInfo
descriptors
+--
Reporter: arma| Owner: (none)
Type: defect | Status: new
Priority: Medium
#23633: Why does roflcopter have an empty protocol line in the consensus?
--+
Reporter: arma | Owner: (none)
Type: defect| Status: closed
Priority: Medium| Milestone: Tor: 0.3.3.x
#24954: Metrics performance measurements use v2 onion services
-+-
Reporter: teor | Owner: karsten
Type: defect | Status: merge_ready
Priority: Medium | Milestone:
Component: M
#23250: tor-0.3.0.10: test failure on NetBSD
-+-
Reporter: wiz | Owner: dgoulet
Type: defect | Status: closed
Priority: Medium
#20218: Fix and refactor and redocument routerstatus_has_changed
-+-
Reporter: nickm| Owner: (none)
Type: defect | Status:
#25185: Create utilities for using Rust static strings in C
--+
Reporter: isis | Owner: isis
Type: enhancement | Status: assigned
Priority: Medium| Milestone: Tor: 0.3.4.x-final
Com
#25127: Rust implementation of protover_get_supported_protocols() leaks memory
--+
Reporter: nickm | Owner: isis
Type: defect| Status: merge_ready
Priority: Medium
#25071: Add a test-rust make target to the Makefile
--+
Reporter: teor | Owner: nickm
Type: enhancement | Status: needs_review
Priority: Medium| Milestone: Tor: 0.3.3.x-final
Component:
#25071: Add a test-rust make target to the Makefile
--+
Reporter: teor | Owner: nickm
Type: enhancement | Status: accepted
Priority: Medium| Milestone: Tor: 0.3.3.x-final
Component: Co
#24030: Wrap types in protover.rs
--+
Reporter: nickm | Owner: (none)
Type: defect| Status: closed
Priority: Medium| Milestone: Tor: 0.3.3.x-final
Component: Core Tor/Tor |
#25067: Wrap types in protover.rs
--+
Reporter: frewsxcv | Owner: (none)
Type: enhancement | Status: closed
Priority: Medium| Milestone: Tor: 0.3.3.x-final
Component: Core Tor/Tor |
#25127: Rust implementation of protover_get_supported_protocols() leaks memory
--+
Reporter: nickm | Owner: isis
Type: defect| Status: merge_ready
Priority: Medium
#24341: rbm windows builds failing with target arch 386 mismatch with current
arch
amd64
--+---
Reporter: pospeselr | Owner: boklm
Type: defect| Status: new
Priority: Medium| Milestone
#25183: Implement a way to tell if an IP address is a known relay
-+-
Reporter: dgoulet | Owner: dgoulet
Type: defect | Status:
#25067: Wrap types in protover.rs
--+
Reporter: frewsxcv | Owner: (none)
Type: enhancement | Status: merge_ready
Priority: Medium| Milestone: Tor: 0.3.3.x-final
Component: Core Tor/Tor |
#25184: consensus health says that signatures are sha1, but they're actually
sha256
--+-
Reporter: teor | Owner: tom
Type: defect| Status: new
Priority: Medium
#16849: clear_status_flags_on_sybil might want to clear more flags
-+-
Reporter: teor | Owner:
| ffmancera
Type: defect
#24854: Extract the authority list from config.c
-+-
Reporter: teor | Owner: (none)
Type: enhancement | Status:
#23873: Remove the return value of node_get_prim_orport()
+
Reporter: teor| Owner: (none)
Type: enhancement | Status: merge_ready
Priority: Medium | Milestone: Tor: 0.3.4.x-fi
#4187: A verified unverified-consensus should be renamed to cached-consensus
-+-
Reporter: anonym | Owner: (none)
Type: defect | Status:
#25081: use get_uptime() consistently
--+
Reporter: arma | Owner: (none)
Type: defect| Status: merge_ready
Priority: Medium| Milestone: Tor: 0.3.4.x-final
Component: Core Tor/Tor
#25081: use get_uptime() consistently
--+
Reporter: arma | Owner: (none)
Type: defect| Status: merge_ready
Priority: Medium| Milestone: Tor: 0.3.4.x-final
Component: Core Tor/Tor
#24714: rename conn->timestamp_lastwritten to conn->timestamp_lastwritable
+
Reporter: arma| Owner: valentecaio
Type: defect | Status: merge_ready
Priority: Medium | Miles
#20424: Remove --enable-openbsd-malloc (Tor maxes CPU when
--enable-openbsd-malloc
is used)
-+
Reporter: icanhasaccount | Owner: (none)
Type: defect | Status: needs_revision
Priority: Low
#20424: Remove --enable-openbsd-malloc (Tor maxes CPU when
--enable-openbsd-malloc
is used)
-+
Reporter: icanhasaccount | Owner: (none)
Type: defect | Status: needs_revision
Priority: Low
#25183: Implement a way to tell if an IP address is a known relay
-+-
Reporter: dgoulet | Owner: nickm
Type: defect | Status:
#25127: Rust implementation of protover_get_supported_protocols() leaks memory
--+
Reporter: nickm | Owner: isis
Type: defect| Status: merge_ready
Priority: Medium
#25171: Clarify 'recognized' field in tor-spec
---+
Reporter: atagar | Owner: (none)
Type: defect | Status: needs_review
Priority: Very Low | Milestone: Tor: 0.3.3.x-final
Component:
#25183: Implement a way to tell if an IP address is a known relay
-+-
Reporter: dgoulet | Owner: nickm
Type: defect | Status:
#20218: Fix and refactor and redocument routerstatus_has_changed
-+-
Reporter: nickm| Owner: (none)
Type: defect | Status:
#24494: Specification says nickname is optional in documents but it's always
there
-+--
Reporter: irl | Owner: karsten
Type: defect | Status: needs_review
Priority: Medium | M
#25036: Tor 0.3.2 rejects connections to raw ipv6 addresses
--+
Reporter: pastly| Owner: tbb-team
Type: defect| Status: new
Priority: High
#23653: When accessing onion service with no fetchable descriptor, Tor sits
around
until timeout rather than hanging up
--+
Reporter: arma | Owner: asn
Type: defect| Status: assigned
Priority:
#23250: tor-0.3.0.10: test failure on NetBSD
-+-
Reporter: wiz | Owner: dgoulet
Type: defect | Status: closed
Priority: Medium
#25183: Implement a way to tell if an IP address is a known relay
-+-
Reporter: dgoulet | Owner: nickm
Type: defect | Status: assigned
Priority: Medium | Milestone: Tor: 0.3.3.x-final
#24954: Metrics performance measurements use v2 onion services
-+--
Reporter: teor | Owner: karsten
Type: defect | Status: needs_review
Priority: Medium | Milestone:
Component:
#24973: Tor should be more gentle when launching dozens of circuits at once
+--
Reporter: asn | Owner: (none)
Type: defect | Status:
#20424: Remove --enable-openbsd-malloc (Tor maxes CPU when
--enable-openbsd-malloc
is used)
-+
Reporter: icanhasaccount | Owner: (none)
Type: defect | Status: needs_revision
Priority: Low
#25096: Bump up NumNTorsPerTAP to squeeze out v2 onion service traffic?
--+--
Reporter: arma | Owner: dgoulet
Type: task | Status: needs_review
Priority: Medium| Milestone
#25096: Bump up NumNTorsPerTAP to squeeze out v2 onion service traffic?
--+---
Reporter: arma | Owner: dgoulet
Type: task | Status: needs_information
Priority: Medium|
#25096: Bump up NumNTorsPerTAP to squeeze out v2 onion service traffic?
--+--
Reporter: arma | Owner: dgoulet
Type: task | Status: accepted
Priority: Medium| Milestone:
Compon
#24494: Specification says nickname is optional in documents but it's always
there
-+--
Reporter: irl | Owner: karsten
Type: defect | Status: needs_review
Priority: Medium | M
#25182: systemd unit file starts Tor before IPv6 address is available
--+
Reporter: sjmurdoch | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone:
Component: Core Tor
#21961: should torbrowser enable network.IDN_show_punycode by default?
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: enhancement | Status: needs_review
Priority: Immediate
#21969: We're missing descriptors for some of our primary entry guards
---+---
Reporter: asn| Owner: asn
Type: defect | Status:
#25180: Protect against Referer Tracking in Tor Browser
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: defect| Status: new
Priority: Medium| Miles
#21961: should torbrowser enable network.IDN_show_punycode by default?
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: enhancement | Status: needs_review
Priority: Immediate
: new => needs_review
Comment:
This should be ready to merge:
!https://gitweb.torproject.org/user/kat/webwml.git/commit/?h=press-
updates-20180208
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25037#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproje
#25181: Protect against Referer Tracking in Tor Browser
--+---
Reporter: cypherpunks | Owner: tbb-team
Type: defect| Status: closed
Priority: Medium| M
#25182: systemd unit file starts Tor before IPv6 address is available
--+
Reporter: sjmurdoch | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone:
Component: Core Tor
#25174: Update to February GeoIP2 database
-+-
Reporter: karsten | Owner: (none)
Type: enhancement | Status: closed
Priority: Medium
#25170: explicitly mention email address to contact for rejected relays
--+
Reporter: cypherpunks | Owner: dgoulet
Type: enhancement | Status: closed
Priority: Low | Milestone: Tor: 0.3.3.x-
#23250: tor-0.3.0.10: test failure on NetBSD
-+-
Reporter: wiz | Owner: dgoulet
Type: defect | Status:
#25182: systemd unit file starts Tor before IPv6 address is available
--+
Reporter: sjmurdoch | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone:
Component: Core Tor
#23250: tor-0.3.0.10: test failure on NetBSD
-+-
Reporter: wiz | Owner: dgoulet
Type: defect | Status:
#25182: systemd unit file starts Tor before IPv6 address is available
--+
Reporter: sjmurdoch | Owner: (none)
Type: defect| Status: new
Priority: Medium| Milestone:
Component: Core
#25181: Protect against Referer Tracking in Tor Browser
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: defect| Status: new
Priority: Medium| Miles
#25179: identity leakage, resolution
--+--
Reporter: y2875095 | Owner: tbb-team
Type: defect| Status: new
Priority: Very High | Milestone:
Component: A
#25180: Protect against Referer Tracking in Tor Browser
--+--
Reporter: cypherpunks | Owner: tbb-team
Type: defect| Status: new
Priority: Medium| Miles
#25178: Running 'make testbuild' does not build the windows-x86_64 version
+--
Reporter: boklm | Owner: tbb-team
Type: defect | Status: needs_review
#25179: identity leakage, resolution
--+
Reporter: y2875095 | Owner: (none)
Type: defect| Status: new
Priority: Very High | Milestone:
Component: - Sel
#25170: explicitly mention email address to contact for rejected relays
--+
Reporter: cypherpunks | Owner: dgoulet
Type: enhancement | Status: needs_review
Priority: Low | Milestone: Tor: 0.
#25170: explicitly mention email address to contact for rejected relays
--+
Reporter: cypherpunks | Owner: dgoulet
Type: enhancement | Status: accepted
Priority: Low | Milestone: Tor: 0.3.3.
#25178: Running 'make testbuild' does not build the windows-x86_64 version
--+--
Reporter: boklm | Owner: tbb-team
Type: defect| Status: new
Priority: Medium
#23650: Tor source code has many typos
---+
Reporter: cypherpunks| Owner: arma
Type: defect | Status: closed
Priority: Very Low | Milestone: Tor: 0.3.4.x-
#24459: Update references to Atlas, Compass and Globe
--+
Reporter: t0wer | Owner: irl
Type: defect| Status: closed
Priority: Low | Milestone:
Component: Webpages/Website |
#24494: Specification says nickname is optional in documents but it's always
there
-+--
Reporter: irl | Owner: karsten
Type: defect | Status: accepted
Priority: Medium | Milestone
#22423: Refactor R code to use modern R packages and methods
+--
Reporter: johnbwilliams | Owner: karsten
Type: enhancement | Status: accepted
Priority: Medium | Milestone:
Component
1 - 100 of 135 matches
Mail list logo