#23061: crypto_rand_double() should produce all possible outputs on platforms
with
32-bit int
-+-
Reporter: teor | Owner: nickm
Type: defect |
#23083: BridgeDB gives the same bridges even to differrent IPs. It worth
nothing to
block the most of them.
--+---
Reporter: cypherpunks | Owner: isis
Type: defect| Status: closed
#23061: crypto_rand_double() should produce all possible outputs on platforms
with
32-bit int
-+-
Reporter: teor | Owner: nickm
Type: defect |
#23061: crypto_rand_double() should produce all possible outputs on platforms
with
32-bit int
-+-
Reporter: teor | Owner: nickm
Type: defect |
#23061: crypto_rand_double() should produce all possible outputs on platforms
with
32-bit int
-+-
Reporter: teor | Owner: nickm
Type: defect |
#22789: Tor 0.3.1.4-alpha crash on OpenBSD-current
-+-
Reporter: fredzupy | Owner: nickm
Type: defect | Status:
#22926: The Tor compression code can call functions that are NULL
--+
Reporter: teor | Owner: ahf
Type: defect| Status: assigned
Priority: Medium| Milestone: Tor: 0.3.1.x-final
#23080: connection_ext_or_handle_cmd_useraddr and proposal 196 disagree on the
format of ExtORPort USERADDR
+-
Reporter: dcf | Owner:
Type: defect |
#18628: Devise some way for the browser proxy to forward metadata to the bridge
before the OR data
---+--
Reporter: arlolra| Owner:
Type: defect | Status: needs_review
Priority:
#23080: connection_ext_or_handle_cmd_useraddr and proposal 196 disagree on the
format of ExtORPort USERADDR
--+
Reporter: dcf | Owner:
Type: defect| Status: new
Priority: Medium|
#23047: Please add iwakeh to the onionoo, metrics, and exonerator groups
-+
Reporter: karsten | Owner: tpa
Type: task | Status: closed
#21321: .onion HTTP is shown as non-secure in Tor Browser
-+-
Reporter: cypherpunks | Owner: tbb-
| team
Type: task
#23047: Please add iwakeh to the onionoo, metrics, and exonerator groups
-+
Reporter: karsten | Owner: tpa
Type: task | Status: closed
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: Medium|
#22926: The Tor compression code can call functions that are NULL
--+
Reporter: teor | Owner: ahf
Type: defect| Status: assigned
Priority: Medium| Milestone: Tor: 0.3.1.x-final
#23088: >Please note that you must send the email using an address from one of
the
following email providers: Riseup, Gmail or Yahoo.
--+-
Reporter: cypherpunks | Owner: isis
Type: defect|
#23086: GIMP Captcha uses insecure random number generator
--+---
Reporter: cypherpunks | Owner: isis
Type: defect| Status: closed
Priority: Medium| Milestone:
#23085: Clicking on Test Tor Network Settings and then click the back button
and I
get this error The address isn’t valid
--+---
Reporter: Dbryrtfbcbhgf | Owner: tbb-team
Type: defect|
#23087: Get rid of GIMP in GiMP captcha
--+---
Reporter: cypherpunks | Owner: isis
Type: defect| Status: closed
Priority: Medium| Milestone:
Component:
#23080: connection_ext_or_handle_cmd_useraddr and proposal 196 disagree on the
format of ExtORPort USERADDR
+--
Reporter: dcf | Owner:
Type: defect
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: needs_review
#23091: Broken condition in check_expired_networkstatus_callback()
--+
Reporter: dgoulet | Owner:
Type: defect| Status: merge_ready
Priority: Medium| Milestone: Tor: 0.3.2.x-final
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
-+-
Reporter: Vort | Owner:
Type: defect |
#23087: Get rid of GIMP in GiMP captcha
--+--
Reporter: cypherpunks | Owner: isis
Type: defect| Status: new
Priority: Medium| Milestone:
Component:
#23089: What if 194.132.0.0/16 and 149.202.98.0/24 get blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: new
Priority: Very High
#23085: Clicking on Test Tor Network Settings and then click the back button
and I
get this error The address isn’t valid
--+--
Reporter: Dbryrtfbcbhgf | Owner: tbb-team
Type: defect|
#23086: GIMP Captcha uses insecure random number generator
--+--
Reporter: cypherpunks | Owner: isis
Type: defect| Status: new
Priority: Medium| Milestone:
Component:
#23080: connection_ext_or_handle_cmd_useraddr and proposal 196 disagree on the
format of ExtORPort USERADDR
+--
Reporter: dcf | Owner:
Type: defect
#23082: tor_addr_parse is overly permissive
--+
Reporter: dcf | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor: 0.3.2.x-final
Component: Core Tor/Tor |
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: Medium|
#22926: The Tor compression code can call functions that are NULL
--+
Reporter: teor | Owner: ahf
Type: defect| Status: assigned
Priority: Medium| Milestone: Tor: 0.3.1.x-final
#23082: tor_addr_parse is overly permissive
--+
Reporter: dcf | Owner:
Type: defect| Status: new
Priority: Medium| Milestone:
Component: Core Tor/Tor |Version: Tor:
#23084: Make all .onion services of TorProject use HTTPS over Tor to prevent
MitM
--+-
Reporter: cypherpunks | Owner:
Type: defect| Status: new
Priority: Medium|
#23083: BridgeDB gives the same bridges even to differrent IPs. It worth
nothing to
block the most of them.
--+--
Reporter: cypherpunks | Owner: isis
Type: defect| Status: new
Priority:
#23085: Clicking on Test Tor Network Settings and then click the back button
and I
get this error The address isn’t valid
--+--
Reporter: Dbryrtfbcbhgf | Owner: tbb-team
Type: defect|
#23089: What if 194.132.0.0/16 and 149.202.98.0/24 and 192.36.31.0/24 got
blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: new
Priority:
#23089: What if 194.132.209.0/24 and 149.202.98.0/24 and 192.36.31.0/24 got
blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: new
#23089: What if 194.132.0.0/16 and 149.202.98.0/24 and 192.36.31.0/32 got
blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: new
Priority:
#23082: tor_addr_parse is overly permissive
--+
Reporter: dcf | Owner:
Type: defect| Status: new
Priority: Medium| Milestone:
Component: Core Tor/Tor |Version: Tor:
#23088: >Please note that you must send the email using an address from one of
the
following email providers: Riseup, Gmail or Yahoo.
--+--
Reporter: cypherpunks | Owner: isis
Type: defect|
#23071: test_hs_ntor.sh fails with recent pysha3
-+
Reporter: nickm| Owner: nickm
Type: defect | Status: needs_review
Priority: Medium | Milestone: Tor: 0.3.1.x-final
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: Medium|
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
-+-
Reporter: Vort | Owner:
Type: defect |
#23092: CircuitIdleTimeout man entry should document IDLE_TIMEOUT_WHILE_LEARNING
--+
Reporter: teor | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor:
#23092: CircuitIdleTimeout man entry should document IDLE_TIMEOUT_WHILE_LEARNING
--+
Reporter: teor | Owner:
Type: defect| Status: needs_revision
Priority: Medium| Milestone: Tor:
#18628: Devise some way for the browser proxy to forward metadata to the bridge
before the OR data
---+--
Reporter: arlolra| Owner:
Type: defect | Status: needs_review
Priority:
#23092: CircuitIdleTimeout man entry should document IDLE_TIMEOUT_WHILE_LEARNING
--+
Reporter: teor | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor:
#22874: Standalone broker (independent of App Engine)
---+--
Reporter: dcf| Owner: cmm32
Type: project| Status: assigned
Priority: High | Milestone:
#22343: Save as... in the context menu results in using the catch-all circuit
-+-
Reporter: gk | Owner:
| arthuredelstein
#18628: Devise some way for the browser proxy to forward metadata to the bridge
before the OR data
---+--
Reporter: arlolra| Owner:
Type: defect | Status: needs_review
Priority:
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: Medium|
#23085: Clicking on Test Tor Network Settings and then click the back button
and I
get this error The address isn’t valid
--+---
Reporter: Dbryrtfbcbhgf | Owner: tbb-team
Type: defect|
#23090: Sandbox failure on Debian 8.9 under OpenVZ with kernel version 2.6.32
--+
Reporter: teor | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor: 0.3.2.x-final
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: Medium|
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: Medium|
#23089: What if 194.132.209.0/24 and 149.202.98.0/24 and 192.36.31.0/24 got
blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: closed
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: High
#23090: Sandbox failure on Debian 8.9 under OpenVZ with kernel version 2.6.32
--+
Reporter: teor | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor: 0.3.2.x-final
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: High
#21948: Going back to about:tor page gives a "The address isn’t valid"-error
-+-
Reporter: gk | Owner: mcs
Type: defect | Status:
#23089: What if 194.132.209.0/24 and 149.202.98.0/24 and 192.36.31.0/24 got
blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: new
#23090: Sandbox failure on Debian 8.9 under OpenVZ with kernel version 2.6.32
--+
Reporter: teor | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor: 0.3.2.x-final
#23071: test_hs_ntor.sh fails with recent pysha3
-+
Reporter: nickm| Owner: nickm
Type: defect | Status: needs_revision
Priority: Medium | Milestone: Tor:
#23071: test_hs_ntor.sh fails with recent pysha3
-+
Reporter: nickm| Owner: nickm
Type: defect | Status: needs_review
Priority: Medium | Milestone: Tor: 0.3.1.x-final
#23061: crypto_rand_double() should produce all possible outputs on platforms
with
32-bit int
-+-
Reporter: teor | Owner: nickm
Type: defect |
#22876: The cypherpunks account can be deleted by everyone
--+---
Reporter: cypherpunks | Owner: qbi
Type: task | Status: closed
Priority: Medium
#22876: The cypherpunks account can be deleted by everyone
--+---
Reporter: cypherpunks | Owner: qbi
Type: task | Status: closed
Priority: Medium
#23089: What if 0.0.0.0/0 got blocked?
-+-
Reporter: cypherpunks | Owner: asn
Type: defect | Status: closed
Priority: Very High|
#23088: >Please note that you must send the email using an address from one of
the
following email providers: Riseup, Gmail or Yahoo.
--+--
Reporter: cypherpunks | Owner: isis
Type: defect|
#23090: Sandbox failure on Debian 8.9 under OpenVZ with kernel version 2.6.32
-+-
Reporter: teor | Owner:
Type: defect | Status: new
#23064: Tor doesn't open on OS X anymore
--+---
Reporter: nirvanh | Owner: tbb-team
Type: defect| Status: needs_information
Priority: Very High |
#23082: tor_addr_parse is overly permissive
--+
Reporter: dcf | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor: 0.3.2.x-final
Component: Core Tor/Tor |
#23071: test_hs_ntor.sh fails with recent pysha3
-+
Reporter: nickm| Owner: nickm
Type: defect | Status: closed
Priority: Medium | Milestone: Tor: 0.3.1.x-final
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: High
#23091: Broken condition in check_expired_networkstatus_callback()
--+
Reporter: dgoulet | Owner:
Type: defect| Status: new
Priority: Medium| Milestone: Tor: 0.3.2.x-final
#23091: Broken condition in check_expired_networkstatus_callback()
--+
Reporter: dgoulet | Owner:
Type: defect| Status: needs_review
Priority: Medium| Milestone: Tor: 0.3.2.x-final
#23081: Tor relay crashes at consensus_diff_queue_diff_work() with assertion
in_main_thread() failed
--+
Reporter: Vort | Owner:
Type: defect| Status: new
Priority: High
#23075: Add an option to select the number of cores used for building in tor-
browser-build.git
--+
Reporter: boklm | Owner: boklm
Type: task | Status: closed
Priority:
#23091: Broken condition in check_expired_networkstatus_callback()
--+
Reporter: dgoulet | Owner:
Type: defect| Status: needs_review
Priority: Medium| Milestone: Tor: 0.3.2.x-final
79 matches
Mail list logo