Chutney issueshttps://gitlab.torproject.org/tpo/core/chutney/-/issues2022-02-07T19:32:11Zhttps://gitlab.torproject.org/tpo/core/chutney/-/issues/17712Add chutney support for FallbackDirs2022-02-07T19:32:11ZteorAdd chutney support for FallbackDirsJust like chutney adds DirAuthority lines, it should add a FallbackDir line for each relay / exit. This will allow us to test legacy/trac#15775 / legacy/trac#4483.Just like chutney adds DirAuthority lines, it should add a FallbackDir line for each relay / exit. This will allow us to test legacy/trac#15775 / legacy/trac#4483.https://gitlab.torproject.org/tpo/core/chutney/-/issues/17282Chutney could use a HOWTO for writing new test cases, network tests, etc2022-02-07T19:32:12ZNick MathewsonChutney could use a HOWTO for writing new test cases, network tests, etcDue April 2016Due April 2016https://gitlab.torproject.org/tpo/core/chutney/-/issues/17011chutney doesn't verify using IPv6 addresses2022-02-07T19:31:40Zteorchutney doesn't verify using IPv6 addressesEven when chutney is using IPv6 exits, it doesn't give clients an IPv6 address to connect to when verifying.
When chutney is using IPv6 bridges, I don't know if it gives their IPv6 address to bridge clients.
This is a significant cover...Even when chutney is using IPv6 exits, it doesn't give clients an IPv6 address to connect to when verifying.
When chutney is using IPv6 bridges, I don't know if it gives their IPv6 address to bridge clients.
This is a significant coverage gap that I think is easily fixed by slight modifications to the chutney templating and verification code.https://gitlab.torproject.org/tpo/core/chutney/-/issues/16807Framework for Clients And Relays that Do Bad Things2021-11-15T16:53:02ZNick MathewsonFramework for Clients And Relays that Do Bad ThingsWe need a simple testing framework that pretends to be a client or relay and then breaks the Tor protocols. This won't be trivial, but it will help us make sure that a lot of our countermeasures actually work.We need a simple testing framework that pretends to be a client or relay and then breaks the Tor protocols. This won't be trivial, but it will help us make sure that a lot of our countermeasures actually work.https://gitlab.torproject.org/tpo/core/chutney/-/issues/16806Chutney/integration tests for DNS server/client functionality2021-11-15T16:52:57ZNick MathewsonChutney/integration tests for DNS server/client functionalityhttps://gitlab.torproject.org/tpo/core/chutney/-/issues/11115use argparse for chutney when debian squeeze hits end-of-life2021-11-15T16:52:43ZTracuse argparse for chutney when debian squeeze hits end-of-lifeAs discussed in legacy/trac#10933, this is a reminder ticket for using argparse module to parse arguments in chutney. Currently people might still have Python 2.6 in the system so we will wait until support for debian squeeze ends (2014-...As discussed in legacy/trac#10933, this is a reminder ticket for using argparse module to parse arguments in chutney. Currently people might still have Python 2.6 in the system so we will wait until support for debian squeeze ends (2014-05-04?).
**Trac**:
**Username**: dave2008