#22780: Remove code to produce the deprecated torperf.csv
-+--
Reporter: karsten | Owner: metrics-team
Type: enhancement | Status: new
Priority: Medium |
#22625: New blog events default to today
---+--
Reporter: arma | Owner: hiro
Type: defect | Status: needs_review
Priority: Medium | Milestone:
Component: Webpages/Blog |
#22335: Please remove "The" from the blog title
---+---
Reporter: teor | Owner: hiro
Type: defect | Status: needs_information
Priority: Low| Milestone:
Component: Webpages/Blog
#22624: "See all upcoming events" shows you events in 2008
---+--
Reporter: arma | Owner: hiro
Type: defect | Status: needs_review
Priority: Medium | Milestone:
Component: Webpages/Blog
#22724: New blog comment css has only one layer of comment replies
---+--
Reporter: arma | Owner: hiro
Type: defect | Status: accepted
Priority: Medium | Milestone:
Component: Webpages/Blog
#22509: Put "Reply" bar at the bottom of comment
---+
Reporter: cypherpunks| Owner: hiro
Type: enhancement| Status: closed
Priority: Medium | Milestone:
Component: Webpages/Blog |Version:
#22780: Remove code to produce the deprecated torperf.csv
-+--
Reporter: karsten | Owner: metrics-team
Type: enhancement | Status: needs_review
Priority: Medium
#22334: Missing top-right links in blog
---+--
Reporter: teor | Owner: hiro
Type: defect | Status: needs_review
Priority: Low| Milestone:
Component: Webpages/Blog |Version:
#22389: No way to save a draft blog post without publishing it?
---+
Reporter: arma | Owner: hiro
Type: defect | Status: needs_revision
Priority: Medium | Milestone:
Component:
#22639: process to bring changes from tbb to torbridy
---+-
Reporter: cypherpunks| Owner: sukhbir
Type: defect | Status: new
Priority: Medium | Milestone:
#22207: Add bridge authority fingerprint to sanitized bridge network statuses
-+
Reporter: karsten | Owner: metrics-team
Type: enhancement | Status: merge_ready
Priority: Medium |
#22388: Put a favicon in place
---+--
Reporter: arma | Owner: hiro
Type: defect | Status: needs_review
Priority: Low| Milestone:
Component: Webpages/Blog |Version:
#22207: Add bridge authority fingerprint to sanitized bridge network statuses
-+
Reporter: karsten | Owner: metrics-team
Type: enhancement | Status: merge_ready
Priority: Medium |
#22622: You aren't allowed to use tags that haven't already been used
---+--
Reporter: arma | Owner: hiro
Type: defect | Status: needs_review
Priority: Medium | Milestone:
Component:
#22625: New blog events default to today
---+
Reporter: arma | Owner: hiro
Type: defect | Status: needs_revision
Priority: Medium | Milestone:
Component: Webpages/Blog |
#22436: Some blog users have blogger role, and others don't?
---+--
Reporter: arma | Owner: hiro
Type: enhancement| Status: needs_review
Priority: Low| Milestone:
Component:
#22683: adapt metrics-web to metrics-lib 2.0.0/1.9.0 changes
-+--
Reporter: iwakeh | Owner: metrics-team
Type: enhancement | Status: merge_ready
Priority: Medium
#22780: Remove code to produce the deprecated torperf.csv
-+--
Reporter: karsten | Owner: metrics-team
Type: enhancement | Status: merge_ready
Priority: Medium
#22724: New blog comment css has only one layer of comment replies
---+--
Reporter: arma | Owner: hiro
Type: defect | Status: needs_review
Priority: Medium | Milestone:
Component:
#19327: controller: expose fine-grained circuit detail.
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority: Medium
#19324: controller: events for hidden service intro point changes, descriptor
changes, uploads, etc
-+-
Reporter: nickm| Owner:
Type: enhancement |
#19326: Examine fine-grained connection detail; expose via control API
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority:
#19321: controller: Ensure events exist for all guard state transitions
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority:
#19312: Teach module callgraph tool to look for critical edges
+--
Reporter: nickm | Owner:
Type: enhancement | Status: closed
Priority: Medium | Milestone: Tor: unspecified
#19320: controller: expose and adjust timer values
---+---
Reporter: nickm | Owner:
Type: enhancement| Status: new
Priority: Medium
#19310: Make code-movement functionality of module tool easier to preview
--+
Reporter: nickm | Owner:
Type: enhancement | Status: new
Priority:
#19311: Create error vs warning distinction for module callgraph tool.
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority:
#19309: Make target to count and list module callgraph violations
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority:
#19308: Group C files into module-groups for module callgraph purposes
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority:
#22615: Tor no longer works even after re-installing on Windows 10
--+---
Reporter: nicholasac| Owner: tbb-team
Type: defect| Status: needs_information
Priority:
#19418: i2d_RSAPublicKey retval ignored in multiple callsites
-+-
Reporter: asn | Owner:
Type: defect | Status: new
Priority: Medium
#22683: adapt metrics-web to metrics-lib 2.0.0/1.9.0 changes
-+--
Reporter: iwakeh | Owner: metrics-team
Type: enhancement | Status: closed
Priority: Medium
#22780: Remove code to produce the deprecated torperf.csv
-+--
Reporter: karsten | Owner: metrics-team
Type: enhancement | Status: closed
Priority: Medium |
#19460: Improve consensus handling of clients with skewed clocks
-+-
Reporter: asn | Owner:
Type: enhancement | Status: new
Priority: Medium
#19662: On intro failure, Tor2web should build a 3-hop path
-+-
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Low
#19665: Should *Port_set count sockets?
-+-
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium
#19377: Consider retry/backoff behavior when building new circuits
-+-
Reporter: andrea | Owner:
Type: task | Status: new
Priority:
#19379: Consider adding even more compiler warnings, even when they require code
changes.
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
#19329: Integrate callgraph complexity measures into our regular process
---+---
Reporter: nickm | Owner: nickm
Type: defect | Status: accepted
#19364: Implement improved guard-node design
--+
Reporter: asn | Owner:
Type: task | Status: closed
Priority: Medium|
#19610: IPv6-only clients fetch microdescriptors from a small number of IPv6
fallbacks
-+-
Reporter: teor | Owner:
Type: defect | Status:
#19647: HS Descriptors should only contain printable ASCII
--+--
Reporter: teor | Owner:
Type: enhancement | Status: new
Priority: Medium| Milestone: Tor: unspecified
#19625: Allow relays to set peering policy
-+-
Reporter: twim | Owner:
Type: project | Status:
#22782: Change domain front for snowflake to something that isn't blocked
---+-
Reporter: cypherpunks| Owner:
Type: defect | Status: new
Priority: High | Milestone:
#19740: (new ?) efficient attack against an exit relay
-+-
Reporter: toralf | Owner:
Type: defect | Status: closed
Priority: Medium
#19745: Tor2web clients ignore uptime when choosing rendezvous points
+--
Reporter: teor| Owner:
Type: defect | Status: new
Priority: Low | Milestone: Tor: unspecified
#19931: curve25519-donna runtime math errors on armhf
-+-
Reporter: chadmiller | Owner:
Type: defect | Status:
#19945: tor 0.2.8.5-rc connecting/binding to 18.0.0.1 (regression)
---+--
Reporter: landers| Owner:
Type: defect | Status: closed
Priority: Medium
#22781: hs: Unify link specifier API/ABI
---+
Reporter: dgoulet| Owner: dgoulet
Type: enhancement| Status: new
Priority: Medium | Milestone: Tor: 0.3.2.x-final
Component: Core
#19535: A can't-happen case for one-hop circuits actually can happen
-+-
Reporter: andrea | Owner:
Type: defect | Status: new
Priority:
#19531: Major cleanup in our baseXX APIs
-+-
Reporter: dgoulet | Owner:
Type: enhancement | Status: new
Priority: Medium
#19531: Major cleanup in our baseXX APIs
-+-
Reporter: dgoulet | Owner:
Type: enhancement | Status: new
Priority: Medium
#19552: Provide mechanism to find dirconns associated with a download_status_t,
and
expose active download attempts in GETINFO response
-+-
Reporter: andrea | Owner: andrea
Type:
#19560: running tor trying to access its ed25519_signing_secret_key, log message
too loud
---+---
Reporter: weasel | Owner:
Type: defect | Status:
#19990: EntryNodes is incompatible with IPv6-only bootstrap
-+-
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium
#2: Improve our release process: we need fewer surprises.
--+--
Reporter: nickm | Owner:
Type: project | Status: closed
Priority: Medium| Milestone: Tor: unspecified
Component: Core
#19506: missing a tool to inspect id signing certs
-+-
Reporter: weasel | Owner:
Type: defect | Status: new
Priority: High
#19926: BUG warning in connection_ap_attach_pending: waiting for rendezvous
desc :*
--+
Reporter: cypherpunks | Owner:
Type: defect| Status: closed
Priority: Medium|
#19919: If ORPort address is publicly routable, use it to guess Address
-+-
Reporter: teor | Owner:
Type: defect | Status: new
Priority:
#19380: Hand-audit compiler warning results which we wouldn't want to have
on-by-
default.
-+-
Reporter: nickm| Owner:
Type: defect |
#19381: wish: conditionally build man page (tor.1) and html doc using
independent
configure options
-+-
Reporter: toralf | Owner: atagar
Type: enhancement
#19429: Clean up our OpenSSL 1.1 support.
-+-
Reporter: yawning | Owner: yawning
Type: enhancement | Status: new
Priority: Medium
#19565: SR: Use trunnel for the shared random value construction
-+--
Reporter: dgoulet | Owner:
Type: enhancement | Status: new
Priority: Low | Milestone: Tor: unspecified
#19566: SR: Use BUG() instead of tor_assert() when we can
-+-
Reporter: dgoulet | Owner:
Type: enhancement | Status: new
Priority: High
#21321: .onion HTTP is shown as non-secure in Tor Browser
-+-
Reporter: cypherpunks | Owner: tbb-
| team
Type: task
#19777: tor-gencert should warn nicely when PEM passphrases are too short
-+-
Reporter: isis | Owner:
Type: defect | Status: new
#19988: Warn when Port addresses have no effect
-+-
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium
#19989: Tor fails to bootstrap with an Exit as EntryNode
-+-
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium
#19983: Is openssl 1.1.0's "secure heap" feature useful for us?
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority: Medium
#21321: .onion HTTP is shown as non-secure in Tor Browser
-+-
Reporter: cypherpunks | Owner: tbb-
| team
Type: task
#22605: sandbox_intern_string(): Bug: No interned sandbox parameter found for
/etc/tor/torrc.d/
--+
Reporter: toralf| Owner:
Type: defect| Status: new
Priority: Medium| Milestone:
#19328: Try not to log from inside functions called from inside log functions
-+-
Reporter: nickm| Owner:
Type: defect | Status: new
#19572: set Tor Control Authcookie default file location from
/var/lib/tor/control.authcookie to /var/run/tor/control.authcookie
-+-
Reporter: adrelanos| Owner:
Type: defect
#19570: Shared random round gets out of sync
-+--
Reporter: teor | Owner:
Type: enhancement | Status: reopened
Priority: High | Milestone: Tor: unspecified
#19711: circuit_package_relay_cell(): Bug: outgoing relay cell sent from
src/or/relay.c:701 has n_chan==NULL. Dropping. (on Tor 0.2.8.5-rc )
+--
Reporter: user100500 | Owner:
Type:
#19669: `log_prefix_` maybe getting weird output from strftime
---+
Reporter: dcf| Owner:
Type: defect | Status: new
Priority: Low|
#19987: Unit Test Guard, Middle, Exit, Intro, and Rend node choices
-+
Reporter: teor | Owner:
Type: enhancement | Status: new
Priority: Medium |
#19871: Crypto operation counters are unused and obsolete
-+-
Reporter: asn | Owner:
Type: defect | Status: new
Priority: Medium
#19859: Expose stream isolation information to controllers
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority: Medium
#19853: ServerDNSAllowNonRFC953Hostnames affects clients, and
AllowNonRFC953Hostnames affects servers
--+--
Reporter: teor | Owner:
Type: defect| Status: new
#22762: Revise coding standards expectation for tests to be run before review
---+
Reporter: chelseakomlo | Owner: chelseakomlo
Type: task | Status: merge_ready
Priority: Medium |
#19518: Configure argument --without-tcmalloc causes linking with libtcmalloc
library
-+-
Reporter: yurivict271 | Owner:
Type: defect | Status:
#19522: HS intro circuit retry logic fails when network interface is down
-+-
Reporter: asn | Owner:
Type: defect | Status:
#19762: Tor systemd service should have ReadWriteDirectories=/var/run/tor
-+-
Reporter: candrews | Owner:
Type: defect | Status: new
#19759: systemd tor.service hardening: add MemoryDenyWriteExecute=true
-+-
Reporter: candrews | Owner:
Type: enhancement | Status: new
Priority:
#19761: Tor systemd service should have RuntimeDirectory=tor
-+-
Reporter: candrews | Owner:
Type: defect | Status: new
Priority: Medium
#19980: Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good)
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority:
#19959: have a flag for Tor relay location, if a relay is hosted in a data
center,
cloud or physically secured
-+-
Reporter: adrelanos| Owner:
Type: enhancement
#19979: Use OpenSSL 1.1.0 HKDF in Tor when available.
-+-
Reporter: nickm| Owner:
Type: enhancement | Status: new
Priority: Medium
#19656: Shared random state doesn't expire when clock changes?
---+---
Reporter: teor | Owner:
Type: defect | Status: new
Priority: Medium
#19507: tor and tor-gencert disagree on what a month is
-+-
Reporter: weasel | Owner:
Type: defect | Status: new
Priority: Medium
#19431: ratelimit message is incorrect.
-+-
Reporter: nickm| Owner:
Type: defect | Status: new
Priority: Low
#19981: Make sure we build with OpenSSL 1.1.0 with all deprecated APIs removed
-+-
Reporter: nickm| Owner:
Type: defect | Status: new
Priority:
#19982: Remove all openssl calls outside of crypto*.c, tortls*.c
--+--
Reporter: nickm | Owner:
Type: defect| Status: closed
Priority: Medium| Milestone: Tor: unspecified
Component:
#19378: Remove completely irrelevant warnings from the clang list
+--
Reporter: nickm | Owner:
Type: defect | Status: new
Priority: Low | Milestone: Tor:
#19476: Use conditional intervals in heartbeat_callback
---+---
Reporter: cypherpunks| Owner:
Type: defect | Status: needs_review
Priority: Medium
#19485: Use Intel Control-flow Enforcement Technology
-+-
Reporter: cypherpunks | Owner:
Type: enhancement | Status: closed
Priority: Medium
#19795: Make Tor be built with cmake
---+---
Reporter: cypherpunks| Owner:
Type: enhancement| Status: closed
Priority: Medium |
#20006: HSFETCH fails for hidden services which use client authentication
-+-
Reporter: segfault | Owner:
Type: enhancement | Status: new
#20007: Sandbox causing crash when setting HidServAuth when there is a hidden
service running
-+-
Reporter: segfault | Owner:
Type: defect |
1 - 100 of 136 matches
Mail list logo