Open
Milestone
Tor: 0.2.7.x-final
All issues for this milestone are closed. You may close this milestone now.
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
248
- What the hell? I am trying to sign up and log in and Tor will not let me. I will distroy you if you don't get this shit fixed
- Make a Tor 0.2.7.7 release, with the patch for #20384
- Out of bounds write on directory authorities when voting on duplicate ed25519 keys
- test-network-all can fail by stalling at ping6
- correct_tm() doesn't set r->tm_wday, but format_rfc1123_time() uses it
- Test test_bt.sh fails
- Fix memory handling in incoming cell queues
- unit-test fail to cross-compile for aarch64
- Relay submitted a descriptor with 0 DirPort due to a self-test race condition
- Tor 0.2.7.6 uses 100% of CPU all the time!
- Extra unmatched #endif in configure.ac
- 0.2.7.6 not building on OpenBSD 5.8 (Makefile parse errors)
- Move SOCKSPort open proxy warning to a more sensible location
- pthread_condattr_setclock() used without checking its existence
- weird "export"s in Makefile break old BSD make
- We don't consider the Guard flag when picking a directory guard
- Undefined behavior in tor_cert_checksig
- Debian 8.2 latest tor package tor_0.2.7.5-1~d80.jessie+1_amd64.deb fails on start with "NO_NEW_PRIVILEGES"
- AppArmor profile denies access to run/systemd/notify
- sandbox: ed25519 key creating failed
- Tor unit tests fail on FreeBSD IPv6-only
- Merge ExitPolicyRejectPrivate changes into 0.2.6.10
- manual missing --keygen description
- Memory leak when reading an expired signing key.
- Memory leak in rend_cache_failure_entry_free()
- use-after-free in validate_intro_point_failure
- Memory leak in batch signature checking
- State that HiddenServicePort accepts unix domain sockets as a target parameter.
- hidserv-stats file name not handled by our sandbox
- Tor doesn't build under musl-libc
- Release 0.2.7.4-rc
- get_ifaddrs_* unti tests assume an IPv4 address is configured
- warning in test_crypto_slow.c
- Bug: tor_addr_is_internal() called from src/common/address.c:1646 with a non-IP address of type 49 (on Tor 0.2.7.3-rc 9a4cac74fd2f4bb3)
- new isolation flag inconsistent spelling
- FAIL: src/test/test_keygen.sh running "make V=1 check" using BSD make
- FreeBSD: fix test_bt failures
- Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from routerdesc"
- Malformed IP "2a01" in address pattern; rejecting.
- "make distcheck" is broken on master
- Disable key-pinning for a few months.
- autoconf should check that the SSL implementation has ECC support and at least one usable curve.
- Don't enable SSE2 on x86-64
- Likely regression with Openssl 1.1+ and v2 handshake
- Memory corruption in the HS client
- Put BridgeClient first in bridges+hs and bridges+ipv6+hs
- Implicit time range assumption breaks Tor in Shadow
- Only return 0...255 from main().
- ./configure script error, when build git version (Centos 6.7)
- Segfault in i386 ed25519_donna_pubkey_from_curve25519_pubkey
- Sandbox fails with ed25519 keys
- Sandbox fails on bridge authority
- Add make test-network-all to Tor's test suite
- Test clients, bridges, exits, and hidden services by default
- We need a "never make or load an online master key" option
- Advised to read missing documentation
- Properly free channel during channel_free_list
- tor-resolve: remove -F from usage
- Autodetect chutney if next to tor
- tor 0.2.7 configures OS X system OpenSSL, even though it's too old to work
- logging malformed hostnames in socks5 requests does not respect SafeLogging configuration
- cpuworkers don't exit when indicated
- Tor from git build failure under CentOS 6.7
- Small fixes
- tor: src/common/log.c:484: logv: Assertion `severity >= 3 && severity <= 7' failed.
- extra tor_free() for create_cell_t in command_process_create_cell()
- Add more chutney networks to "make test-network" or such
- Raise coverage on containers, di_ops to 100%
- Tor should reload keys from disk when receiving a SIGHUP
- Don't launch downloads directly from routerlist_retry_directory_downloads()
- Don't call tor_cleanup() directly from lost_owning_controller()
- add two new functions when manually calling --keygen for better management
- Don't call process_signal directly from control.c
- Extract client-only parts of init_keys()
- Move most of directory_all_unreachable into a backend callback
- Example 4GByte accountingmax is crazy low
- recv_ni() and friends don't ask about errno the Windows way?
- echo "crash" | python /home/tfoerste/devel/tor/src/test/bt_test.py gives "BAD"
- Have a way to measure available disk space in DataDir
- If we touch the Ed25519 master ID key, Tor ignores the torrc file after reload signal (HUP)
- set_max_file_descriptors() failures after upgrade to Tor v0.2.7.2-alpha
- Decouple generating controller events from sending them to controllers
- Abnormal behavior when signing key expires if Ed25519 master ID key is offline (missing from /datadirectory/keys)
- Ed25519 --keygen won't work
- Allow FQDNs ending with a single '.' in our SOCKS host name checks.
- ed25519-donna doesn't build on arm without warnings with the stack protector
- Tor fails to build on OpenBSD 5.8 due to libevent config options
- Unpredictable scheduling behavior of threads
- Potential memory leaks in thread pool code
- Remove casting when registering signals
- Work queue test improvements
- Distinguish ENOENT from other error cases when loading keys.
- Always load public master ed25519 key from disk, check for match with signing cert
- Reload keypins on SIGHUP? Or provide some other way to undo a single keypin?
- too many windows failures on jenkins with 0.2.7
- Retire VoteOnHidServDirectoriesV2 ?
- Still had 9 address policies cached at shutdown.
- Investigate building ed25519-donna with SSE2 support.
- Use ed25519-donna batch verification.
- uploaded a descriptor with a Ed25519 key but the <rsa,ed25519> keys don't match what they were before.
- Don't vote HSDir if we aren't voting Valid
- tor_open_cloexec only uses the sandbox when O_CLOEXEC is defined
- Open subtickets tor improving test coverage in specific areas
- connection_write_to_buf: indirect recursion for CONN_TYPE_CONTROL
- Rule 'test-stem-full' ignores configured Python
- Faster Ed25519 implementation.
- Fix typos in rend-spec-ng.txt and tor-spec.txt
- Tor fails to compile on OSX when libscrypt is installed
- Bug: Assertion cp failed in microdescs_parse_from_string at ../src/or/routerparse.c:4168
- Create rendcache.{c|h} for hidden service descriptor cache
- Include a readpassphrase implementation for Linux, Windows
- Bad timestamp check when storing an HS descriptor on the client
- Minor spacing and comment fixes
- Bug: Microdescriptor seemed very old
- Address of struct member is always non-NULL in SSL_SESSION_get_master_key in f90a704f1258
- Bug: Assertion node && node->ri == ri failed in nodelist_assert_ok
- The open file limit is not checked before calling tor_accept_socket_nonblocking()
- [warn] Router $9695DFC35FFEB861329B9F1AB04C46397020CE31~moria1 at 128.31.0.34 uploaded a descriptor with no Ed25519 key, when we previously knew an Ed25519 for it.
- Set the max open file value to the current limit if setrlimit() fails
- HS can repick an expired intro points or one that we've already picked
- Tor does not recognise libressl version and fails to compile on OpenBSD 5.6
- revert commit 49bdfbab or don't overwrite isolation_flags
- (Sandbox) Unexpected syscalls on relay
- identity-ed25519 is undocumented
- Double-free on failure to add ephemeral hidden services
- missing return value check in sb_socket()
- Ensure our scrypt interoperates with openssl's scrypt
- spaces in Tor's systemd unit file causes issues
- [warn] tor_tls_client_is_using_v2_ciphers(): Bug: Whoops. session->ciphers doesn't match SSL_get_ciphers() (on Tor 0.2.7.1-alpha-dev 45a9057 3e69d12dc)
- commit 548b4be seems to change contrib/dist/tor.servic e.in in a buggy way.
- Drop support for OpenSSL without ECC.
- minor fixes: uninitialized values, undefined macros, missing pointer checks, wrong comments, spacing
- Minor revisions for NETWORK_LIVENESS spec
- ipv4 + ipv6 exit : v6 policy is displayed twice, v4 isn't displayed
- Crash on config reload with mixed ephemeral/permanent HS
- Hidden service socket exhaustion by opening many connections
- Drop support for OpenSSL < 1.0
- Silence some make rules
- Test: add unit test for rend_data_t create/free/dup/* functions.
- Don't vote HSDir if we aren't voting Fast
- Segfault in HSPOST control command
- apparent memory corruption -- very difficult to isolate
- Missing descriptor ID in some HS_DESC control event
- Don't assign HSDir flag to relay that can't handle BEGIN_DIR
- Silly ambiguous function names in rendservices
- HS client connections with authorization are broken
- chutney verify hangs on tor hs data transmission verification
- Allow clang runtime sanitizers to be used on tor unit tests
- HS Descriptor Fetch retry behavior is broken.
- Correct "longest possible policy" comment in router_parse_addr_policy_item_from_string()
- Reachability should check ExtendAllowPrivateAddresses not TestingTorNetwork
- tortls.c fails to compile with OpenSSL 1.1.0-dev
- test_address_get_if_addrs_[ifaddrs,win32]() will assert instead of failing gracefully.
- Randomize the introduction point accepted INTRODUCE2 count
- Relax the "Blocking multiple introductions on the same circuit." log message
- Fix Spaces according to Coding Standard
- Base64 code cleanups.
- Disable default fallback directories when DirAuthorities, AlternateDirAuthority, or FallbackDir are set
- Remove references to '*' wildcard transport from pt-spec.txt
- Consistent spelling of SOCKSPort in torrc
- ConnDirectionStatistics is not ignored on client-only mode
- src/test/ntor_ref.py client_part2() doesn't check AUTH matches server response
- Better documentation for *Statistics options in torrc
- handle_control_postdescriptor() modifies a const char
- Have --hash-password imply hush?
- 'tor --dump-config' without an opt should provide usage information
- Regression test fails in tor dev head
- Don't surprise users with new circuits in the middle of browsing
- Tor should prctl(PR_SET_PDEATHSIG, SIGTERM) background processes.
- Remove obsolete version checks
- Tor should not close stdin on child processes.
- Tor dies if you send it a HUP before it read its config, and doesn't take PTs with it
- Control Event Mask Unit Tests & Compile-Time Checks
- Disable assertions during coverage builds
- Test memwipe for correct behavior
- Provide control port event+command for network connectivity info
- Integrate tests into automake test suite
- Remove extra newline at the end of an HS descriptor
- Building from clean checkout broken
- Can hidserv-rend-relayed-cells be negative?
- __PRETTY_FUNCTION__ can have ()s in it, which makes logs look weird.
- autoconf: drop workarounds for libevent <1.3
- Add helper functin that validates a .onion address
- Identify functions most in need of testing, and hardest to test
- specification for module-level isolation in Tor
- Identify controller features desirable for testing support
- Tor crash : bad syscall attempt (syscall prlimit64)
- Allow SocksSockets writable by arbitrary user
- Audit all asserts to ensure they don't have side effects
- Add make rule for verifying changes files format
- testing missing dependency on *_sha1.i
- Write a proposal for removing TAP
- Write a proposal for removing RSA1024 identities
- Improve out-of-tree builds
- Stuck at 85%-bootstrapping for 10-15 minutes in git-320a68026ede1f57+15e7a82
- swap storm and MaxMemInQueues
- Log version on LD_BUG
- Improve configure help layout
- Add new hidserv-stats to dir-spec
- Hidden service descriptor spec clarifications
- --quiet still generates stdout output
- Kill tor_strclear() with fire, and replace it with memwipe().
- Client's choice of rend point can leak info about hidden service's guard relay
- add ability to prevent assignment of guard, exit, and hsdir flags in testing networks
- Controller: add a command to fetch HS descriptor from HSdir(s)
- Controller: retrieve an HS descriptor from the client's cache
- Controller command to get hardcoded dirauths
- Drop test_cmdline_args.py
- Use unpredictability better on Windows
- Implement status/fresh-relay-descs controller command
- Document or remove the --digests option to tor
- Refactor UDP socket black magic in get_interface_address6()
- geoip seems to have problem with unmapped regions
- Make "this socket is group-writeable" an option
- Refactor rend_cache_lookup_entry()
- cross-built tor (mingw under linux) fails to complete test suite
- Check for IP6T_SO_ORIGINAL_DST on the configure file
- Complain if relative paths are used in torrc options
- Old bug back or something is tampering HS?
- Log Tor version if you ask for bug reports in the log
- tor SSL errors with LibreSSL on OS X 10.9
- Kill the DynamicDHGroups feature
- Implement offline encrypted master keys for Ed25519 identities
- Is "Link 1 2" in the descriptors obsolete?
- Add orconfig.h and src/ext to sha1.i files
- rend_consider_services_upload() sets initial next_upload_time which is clobbered when first intro point established?
- Rewrite tor-fw-helper in Go (or another memory-safe language)
- Alternate{Dir,Bridge}Authority aren't sufficient for fully internal TestingTorNetwork
- Review the guardiness python script of #9321
- [patch] Arithmetic undef behaviour: sscanf, memeq, scale array, fmt exit status
- Increase rotation period of guard nodes
- Implement cross certification of identity keys with onion keys (prop 228)
- Implement ed25519 identity keys (prop 220)
- Turn python test scripts into proper TESTS elements
- [PATCH] Fixed transparent proxy destination lookup on FreeBSD
- GSOC seccomp stage 3
- Table-based basepoint multiply optimizations for ntor handshake
- rend_service_introduce() doesn't notice if the rendezvous point is on 127.0.0.1
- Hidden service: Suddenly the service does not respond to new connections (INTRODUCE2 cell on intro circ with no corresponding rend_intro_point_t)
- Authorities should not vote against Fast just because they vote against Running
- Getting the HSDir flag should require the Stable flag
- Hidden services should try harder to reuse their old intro points
-
Adding hidden services through control socket
#6411 027-triaged-1-out component::core tor/tor control globalleaks-wants hidden-service maybe-proposal milestone::Tor: 0.2.7.x-final nickm-review owner::yawning parent::8993 priority::medium reporter::kevinevans resolution::implemented status::closed tor-hs type::enhancement version::tor 0.2.3.19-rc
- If we generate DH groups, do so asynchronously
- If we generate DH groups, we need to change them when our IP changes
- Consider disabling dynamic intro point formula (numerology)
- Allow controllers to post HS descriptors to the HSDir system
- Document torrc format
Loading
Loading