Open
Milestone
Tor: 0.4.5.x-final
All issues for this milestone are closed. You may close this milestone now.
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
32
- There are too many networks in the chutney networks directory.
- Chutney templates may need an option-fallback feature
- Chutney networks need at least 3 AssumeReachable nodes.
- TestingTorNetwork should not set AssumeReachable 1
- Split assumereachable into self and authority components
- Additonal unit tests for functions related to ipv6 self-test
- control: HSFETCH command fails to validate v2 addresses
-
Fix edge case handling in Rust protover is supported
#34251 042-backport 043-backport 044-should actualpoints::0.1 component::core tor/tor milestone::Tor: 0.4.5.x-final points::0.5 postfreeze-ok priority::medium protover resolution::fixed reviewer::ahf rust severity::normal sponsor::55-can status::closed technical-debt type::defect version::tor 0.3.3.5-rc
- Declare HSIntro=5 in Tor's rust protover implementation
- Refactor tor's circuit path node selection checks
- Allow extend_info to contain both IPv4 and IPv6 ORPorts
- Separate tor's IPv4 and IPv6 reachability flags
- Stop modifying addr on connections, and delete real_addr
- Make clients and bridges send IPv6 extends by default in Tor 0.4.5
- Fill in missing IPv6 addresses in extend cells
- Stop forcing IPv4 and IPv6 traffic on non-SOCKSPorts
- Prop 312: 3.2.2. Stop Directory Authorities Resolving *Port Hostnames
- Prop 311: 4.4.1. Extend IPv6 From All Supported Second-Last Hops
- Prop 311: 4.2. Implement IPv6 ORPort Reachability Self-Tests
- outbuf_flushlen seems to serve no purpose
- Put an up-to-date web version of the Tor manual somewhere
- Run doctest on all of our python files
- Divide connection_edge.c into separate files.
- Validate the fallback scripts CI output using grep and stem
-
Tor lets transports advertise private IP addresses in descriptor
#31009 035-backport 040-backport 041-backport 042-deferred-20190918 043-should 044-deferred anticensorship-wants component::core tor/tor milestone::Tor: 0.4.5.x-final network-team-roadmap-2020Q1 points::0.5 priority::medium severity::normal sponsor::28-can status::new tor-bridge tor-pt type::enhancement
- Auto-tabify makefiles? complain about mistabbed makefiles?
- Update HelpfulTools.md once we have some experience with practracker
- Update Maintaining.md after new merge policy is final
- Automate application of C formatting to code
- Update review guidelines to list best practices
- Place complete obfs4 bridge line in accessible location
- Obfsbridges should be able to "disable" their ORPort
Loading
Loading