Closed
Milestone
Tor: 0.2.9.x-final
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
392
- Update to December GeoIP2 database
- Re-enable 1 or 2 more macOS jobs in Travis
- consider clang -std=gnu99 in Travis for better C99 portability
- Update to November GeoIP2 database
- Backport "Travis: Use Ubuntu Bionic, but keep Trusty for chutney"
- Travis: Use a newer macOS image
- Tor Travis: Make chutney work on Xenial and Bionic images
- Update to October GeoIP2 database
- Consider demoting ".exit is disabled" log message to info
- new ip-address for tor.dizum.com (auth-dir)
- Appveyor: cast between incompatible function types in compat_time
- appveyor: labs(time_t) is not allowed
- channel: channel_tls_handle_cell() CELL_VERSIONS code reached
- Consider using data-URI to embed how_tor_works_thumb.png image into tor-exit-notice.html
- Add a chutney job that runs on macOS, so that IPv6 chutney tests work
- Update to June GeoIP2 database
- Stop crashing when encountering an unknown router annotation
- Fixed tor_vasprintf on systems without vasprintf.
- Update to May GeoIP2 database
- Remove sudo: false from Travis
- release-0.2.9 doesn't compile on old rhel
- OOB access with huge buffers (src/lib/buf/buffers.c)
- Do not cache cipher list classification if cipher list is not yet available.
- Update to April GeoIP2 database
- Fix memory leaks in shared random unit tests: simple version
- Backport test-network.sh fixes to 0.2.9
- Update to March GeoIP2 database
- Test failure due to missing sr_state_free[_all]() in shared-random unit tests
- Update to February GeoIP2 database
- Use Chutney in Tor's CI
- Coverage merge failures cause test_process_slow stderr check to fail
- Make "tried to establish rendezvous on non-OR circuit" into a protocol warning
- Update to January GeoIP2 database
- Generate a new fallback list in 2019 and backport it to all supported Tor versions
- Update to December GeoIP2 database
- Make tor_addr_is_internal_() aware of RFC 6598 (Carrier Grade NAT/Large Scale NAT) IPv4 Ranges
- FreeBSD build warning in aes_new_cipher()
- Update to November GeoIP2 database
- Update to October GeoIP2 database
- Update to September GeoIP2 database
- Crash in tortls/cert_matches_key with openssl 1.0.2p
- Update to August GeoIP2 database
- Switch to new bridge auth "Serge"
- Update to July GeoIP2 database
- Update to June GeoIP2 database
- Out-of-bounds smartlist access in protover_compute_vote()
- Update to May GeoIP2 database
- Bug: Assertion bin_counts > 0 failed in circuit_build_times_get_xm at ../src/or/circuitstats.c:772.
- Update to April GeoIP2 database
- Update to March GeoIP2 database
- Update to February GeoIP2 database
- hs: circuit_log_ancient_one_hop_circuits() should probably not log single onion service rendezvous circuit
- monotonic_time unit test fail, 0.3.3.1-alpha debian armel
- Allow sleep() in the sandbox
- Bug: Line unexpectedly reached at pathbias_should_count at src/or/circpathbias.c:372
- We have two conflicting notions of channel_is_client()
- Update to January GeoIP2 database
- Generate a new fallback list in 2018 and backport it to all supported versions
- Clear the address when fascist_firewall_choose_address_base() can't find an address
- Update to December GeoIP2 database
- to->pending->tqh_last is 0xFFFFFFFFFFFFFFFF。
- Ignore cached bridge descriptors until we check if they are running
- sandbox incompatible with glibc 2.26 (openat() not handled for all our files)
- Fix TROVE-2017-010: Remote DoS attack against directory authorities
- Update to November GeoIP2 database
- Delay descriptor bandwidth reporting on established relays
- rend_service_prune_list_impl_() doesn't copy over desc_is_dirty when copying intro points
- Update to October GeoIP2 database
- Tor's seccomp sandbox does not know about the syscall epoll_pwait
- prop224: Clients mark intro circs as timed-out within seconds
- Avoid relays resolving their own address on every download status check
- Update to September GeoIP2 database
- compute_weighted_bandwidths: do not add 0.5 to final_weight
- Update to August GeoIP2 database
- Tor relay crashes at consensus_diff_queue_diff_work() with assertion in_main_thread() failed
- Review coverity build warnings
- Clang warnings when building with openssl and scrypt
- Unused variables in donna's SSE2 header
- Update to July GeoIP2 database
- Warnings from isnan, isinfinite, signbit on mingw
- Windows relay is several times slower than Linux relay
- Update to June GeoIP2 database
- tor fails to start with 'Sandbox 1'
- Fix GCC7 -Wimplicit-fallthrough warnings
- dir auth attempts to fetch a descriptor every minute for every relay with mismatched rsa/ed key
- Logic error with monthly accounting
- Update to May GeoIP2 database
- GETINFO extra-info/digest/<digest>
- (Sandbox) Caught a bad syscall attempt (syscall getpid)
- Update to April GeoIP2 database
- Update to March GeoIP2 database
- Bug: Assertion linked_dir_conn_base failed in connection_ap_handshake_send_begin
- CRYPTO_THREADID_set_callback
- Reject Tor versions that contain non-numeric prefixes
- Update to February GeoIP2 database
- connection timeouts are affecting Tor Browser usability
- potential bug: Some IPv6Exits do not add the ipv6-policy line to their descriptor
- tor-resolve: Do not truncate too long hostnames
- [warn] connection_edge_process_relay_cell (at origin) failed.
- Update to January GeoIP2 database
- Dir auths should vote BadExit even if they don't vote Running
- setrlimit fails OSX Sierra
- configure complains of missing libevent C-headers
- Assertion in 0.2.9.8: monotime_coarse_get
- TROVE-2016-12-002: read one byte past end of buffer in get_token()
- Test: memory leak in single onion service test
- Typo in macOS Sierra macro in configure
- Update to December GeoIP2 database
- Non-fatal assertion !(delay == INT_MAX) failed in next_random_exponential_delay at src/or/directory.c:3792
- Minor fixes to test_single_onion_poisoning
- memory leak in connection_handle_listener_read()
- memory leak in tor_cert_parse()
- memory leak in sandbox_getaddrinfo()
- Non-anonymous single-hop HS enabled tor doesn't detect already existing anonymous, HS at start-up
- Grammar issue in HiddenServiceSingleHopMode documentation
- Unit test address/get_if_addrs6_list_no_internal should succeed if there are only internal addresses
- Silence long-term one-hop circuit diagnostic for single onion intro point circuits
- Rate limit router_pick_published_address log message
- Avoid resetting download status on 503
- Update to November GeoIP2 database
- Ensure relays don't make multiple connections during bootstrap
- Limit next_attempt_overflow to TIME_MAX, not INT_MAX
- Header comment in protover.c has an incomplete sentence that just
- Some unit tests fail when logging messages on Windows / MinGW64
- Should tor keep on retrying, even if it has reached the failure limit?
- Each download request should only increment the failure count once
- Check the directory for each rend service, not just the last one
- A running Tor won't update the microdesc consensus
- Should HiddenServiceNonAnonymousMode change default SocksPort to 0?
- circuit_pick_extend_handshake: Non-fatal assertion !(node_prev == NULL) failed
- tortls test failures with recent LibreSSL (OpenBSD -current)
- compute_num_cpus() purports to clamp to 16, but doesn't.
- minor memory leak in threadpool_queue_update()
- Module documentation for assorted modules, group 1
- Create a Tor-specific vulnerabilty enumeration scheme
- [warn] Remote server sent bogus reason code 65021
- "Tor cannot connect to the Internet if ReachableAddresses, ReachableORAddresses, or ReachableDirAddresses reject all addresses. Please accept some addresses in these options." when "FascistFirewall 1" is set
- Stop claiming to support openssl 1.0.0
- Update to October GeoIP2 database
- Use correct arguments to tor_calloc
- cert-spec.txt contains incomplete reference / documentation for certificate types
- Confusing "Not all bridges handle conditional consensus downloading" comment
- dirvote.c refs dir-vote sec 3.4.3, should be 3.8.3
- Provide a shim for SSL_cipher_get_id in OpenSSL versions < 1.0.1
- tor_fragile_assert() when Unix domain socket is used
- seccomp2 crash after closing and opening ipv6 DirPort + OrPort
- update changelog to say how many fallbacks we removed and how many remain
- Fix compilation on osx sierra (10.12)
- Configure misidentifies clock_gettime and getentropy on macOS Sierra/XCode8 when compiling for iOS 8
- Update docstring for parse_bridge_line() in src/or/config.c
- current_consensus is an unmarked hazard
- Keep the interface address order returned by the OS
- setevents hs_desc cancels other setevents
- Fix parse_virtual_addr_network minimum network size
- Add AES256 support to crypto_cipher_t
- Extra closing bracket in non-gcc IF_BUG_ONCE_
- hidden service won't work with local ipv6 address
- Update PathsNeededToBuildCircuits man page entry with actual default
- Clang's -Wthread-safety requires annotations we aren't using
- something wrong with commit 41cc1f612bd2112ab7cec0cc4fdeb68c26e231bf
- Update to September GeoIP2 database
- Messages for BUG() failures are backward
- Tor fails to start if RelayBandwidthRate < 75 KB/s despite torrc stating minimum is 20 KB/s
- potential memory corruption in or/buffers.c (not exploitable)
- Fix spacing and comment issues in Tor
- Add chutney's single-onion and single-onion-ipv6 targets to make test-network-all
- Make test-memwipe work better on OpenBSD
- Permit sched_yield in sandbox
- Bug: Duplicate call to circuit_mark_for_close
- Unit tests for ed25519 link handshake code
- Always log BUG messages from the unit tests
- Test failure when running with --debug
- Fix typo in tor man page (ControlPort description)
- Make Tor2web work with ReachableAddresses
- Ed25519 certificate parsing does badly with expirations after 2038
- Stop upgrading client to intro connections to ntor
- Never include non-Valid nodes in consensus.
- Infer running and valid from presence in consensus
- Stop allowing 3DES in TLS ciphersuites
- pathbias_count_use_attempt: Bug: Used circuit is in strange path state new
- pathbias_mark_use_success: Bug: Used circuit 243 is in strange path state new
- testsuite fails on mips, powerpc, s390x
- Test failure for monotonic time on some machines
- prop224: Proposal fixes from implementation of HSDir support
- Test fails on Debian experimental reproducible builds
- warns on startup that it cannot remove bw_accounting
- Tor v0.2.9.1-alpha-dev (git-b3f43a22ab921ce6) - failing options/validate__transproxy test on NetBSD
- Implement proposal 264 (protocol versioning)
- Fix mistake in comments in seccomp sandbox
- Update to August GeoIP2 database
- make-test-network-all has never detected IPv6 on linux
- evutil_secure_rng_add_bytes() not present in openbsd libevent 2
- Dual-install of libevent 1 and libevent 2 on openbsd confuses our autoconf logic
- ENABLE_GCC_WARNING is broken on GCC < 4.6
- Write a quick how-to for ht.h
- Introduce prefixed sign/verify functions
- tor_fragile_assert() in evdns_get_orig_address() on tor-0.2.9-alpha-1
- Add deprecation facility, and deprecate some old options
- Round down DNS TTL to the nearest DEFAULT_DNS_TTL (30 minutes)
- Solaris, compile warning: "_FILE_OFFSET_BITS" redefined and core dump
- Fix OpenBSD build bot errors
- mingw compile failure
- need to ship compat_time.h
- VirtualAddrNetworkIPv6 manpage entry correction
- Update to July GeoIP2 database
- Allow HSDir retries more often in test networks
- Call chutney's test-network.sh from Tor's test-network.sh
- Don't allow hidden services in Tor2web mode
- Make sure extend_info_from_router is only called on servers
- Incorrect log message on mismatch ownership in check_private_dir
- SR: Fix issues Coverity found:
- Implement a voting_schedule_free() function
- Misleading prop250 log messages
- Memleaks in shared rand code
- Require libevent >= 2
- Edge case test fail in shared random code
- GETINFO exit-policy/reject-private/relay and ExitPolicyRejectLocalInterfaces
- Bug: Directory m��V�W�ٱq����/(��>� delivered a consensus, but a routerstatus could not be found for it.
- tor-gencert --passphrase-fd bad text
- --passphrase-fd is undocumented
- typo in src/or/routerkeys.c
- dir-spec.txt: Fix typos
- dir-spec.txt: Fix a typo
- dir-spec.txt: Fix a typo
- dir-spec.txt: Simplify router-sig-ed25519 description
- dir-spec.txt: Clarify identity key
- Unit test util/time is broken on OpenBSD
- Match 15055_wip commits to #15055 subtickets
- Revise prop259 to fit the Tor networking API
- Memory leak while parsing a crafted torrc
- Rencache unit test can fail on very slow system
- base*_encode/decode functions should clear any unused portion of their target buffer.
- Rip out --enable-bufferevents
- Remove --disable-transparent configure option?
- Negative number of suppressed messages
- tv_mdiff rounds incorrectly
- test-network-all target does not work with out-of-tree builds
- Update to June GeoIP2 database
- DNSPort broken on OpenBSD 5.9
- Improve coverage on compat_*threads and workqueue
- controller: expose Download timer/timeout/retry information
- Revise {extend,create}_cell_format to use trunnel
- Document miscellaneous things in src/common in tor-guts
- Document memory-related parts of src/common in tor-guts
- Have tor-guts describe containers
- Have tor-guts cover string-related util functions
- Have tor-guts cover time-related util functions
- Have tor-guts cover our cryptography functions
- Have tor-guts cover how to use OS functionality from Tor
- Document channels in detail
- Document how circuitmux works
- Specify "tunnelled-dir-server" in dir-spec.txt
- Potential heap corruption in do_getpass in routerkeys.c
- Our approach to warnings leaves too few warnings with Clang.
- Build failure on mingw-64
- torrc: Comments Need Clarifying
- [prop250] Remove unnecessary assertion in sr_compute_srv
- Teach scripts/maint/format_changelog.py about links to bugs
- Drop tidbit about tor-ops@ from man page
- Add new compiler warnings
- Create subtickets for all high-time-needed tickets in 0.2.9
- Integer overflows in case conversion tables
- torrc parsing b0rks on carriage-return
- Make sure clients almost always use ntor
- [prop220] Advertise support for Ed25519 link authentication
- [prop220] Add ed25519-ID field to channel and/or or_connection
- [prop220] Understand and validate ed25519-signed AUTH0002 cells
- [prop220] Check all new certificate types (incl cross-cert and ed25519)
- [prop220] send AUTHENTICATE cells with correct ed25519 signatures
- [prop220] send CERTS cells correctly for Ed25519
- man page spells --enable-tor2web-mode --enable-tor2webmode
- Looks like a memory leak?
- Let Autoconf handle enabling C and POSIX extensions
- Shared Random: INT_8 means 8 bytes, not 8 bits
- shared random: missing field 'fetch_missing_votes' initializer
- Seg fault in round_int64_to_next_multiple_of()
- Don't crash authorities with more than 254 shared random reveals
- Consistently use uint64_t for integers in shared random structs
- [prop250] Fix a time parsing error on platforms with 32 bit time_t
- Shared Random and Half-Hour Consensuses
- Documentation for "User" option specifies wrong kind of argument
- Integrate and remove Clang hardening instructions
- clang -m32 -ftrapv seems buggy with 64-bit signed integer multiply
- Wrong length used in networkstatus_parse_detached_signatures
- The tor_parse_* functions should check and warn on max < min
- Turn on --enable-gcc-warnings-advisory by default
- Tor nightly does not compile with mingw-w64
- Test failure on the latest commit
- Write v3-status-votes file even when we fail to make a consensus
- Rip out client directory fetch instrumentation
- Merge the header checks in configure.ac
- RSA cross-certification of ed25519 keys differs from spec
- Refactor code that looks at voted-on parameters during voting
- [prop250] Pointer corruption and other failures in master and maint-0.2.8
- Relays should accept RENDEZVOUS1 cells of variable size
- Update to May GeoIP2 database
- Tweak vanity onion scheme to avoid producing invalid keys
- Fix typo in prop224
- Download authority certificates even under blackholed authorities or fallbacks
- Trivial memory leak when reading truncated ed25519 key files
- test suite failures with expensive hardening.
- Is time-caching necessary in tor_gettimeofday_cached_monotonic?
- Implement monotonic time in a better way than simply calling down to libevent's non-monotonic time
- tor_gettimeofday_cached_monotonic, as designed, could stall indefinitely
- tor_gettimeofday_cached_monotonic seems to be busted
- Avoid variable shadowing in Tor
- Should we stop appling --enable-expensive-hardening to constant-time code ?
- --enable-expensive-hardening has hard-to-debug failures when run-time libraries aren't installed
- Remove needless MIN/MAX definitions.
- Add a soft-deprecation mechanism for configuration options
- dir auths vote "package" lines out of order
- Clients don't use optimistic data to fetch their first consensus, because we told them to ask the consensus whether they should
- I'd like to customize rejection message from dir auths to relay
- dir-spec never got updated with new Fast / Guard cutoffs
- Unix socket paths cannot contain spaces
- Do not have git ignore files that are also tracked
- Improve comments on connection_t address
- Perform cache lookup when FetchHidServDescriptors is set
- New SOCKS port restriction to only allow connections to .onion
- Fire a`STATUS_SERVER` event when the hibernation state changes.
- Don't declare the symbol "incoming queue" in every file including channel.h
- Numerous WSAStartup warnings in unit tests on windows
- Manual on website doesn't render ipv6 addresses right
- Use smarter algorithms to handle socket exhaustion
- Perform a Severe Bug Retrospective for the last few years.
- Dir auths should only give Guard if Stable
- Write a tool to move functions around from module to module
- Write a tool to check for modularity violations in Tor's codebase
- Tor could use a set of BUG_ON, BUG, etc macros to help us use tor_assert less.
- torspec: Fix typo and explain variable in prop 224
- Deleting an ephemeral service doesn't always destroy intro circuits
- tor_addr_is_internal should never block PT dummy addresses
- Fix duplicate check for "only allow internal addresses if we are on a network with nonstandard authorities"
- Rename tor_dup_addr to make it clear that it returns a string
- Exits on 0.2.7 publicise all their IP addresses in their descriptor
- Allow relays to have an IPv6 DirPort on the same port as the IPv4 DirPort
- Allow Listening on :: for IPv6
- Fined-grain timer implementation to support per-connection or per-circuit timers
- Tor could use a publish/subscribe abstraction
- Tor could use a generic 'handle' implementation.
- HiddenServicePort IPv6 broken
- Log unparseable votes so they can be analysed
- base32 encoding API doesn't work for a source length that is not a multiple of 5 or 8
- tor logging twice when --+Log argument and config are used
- 'make test-stem' yields No rule to make target '"./src/or/tor"'
- Write options_validate tests for RSOS
- Control connection pre-auth local DoS when bufferevents enabled
- Update RSOS extend_info_from_node calls to be direct connections
- src/or/connection_edge.c typo
- Build tor with -ftrapv by default
- Bridge clients should get directory documents via IPv6
- Use ClientIPv4 and ClientIPv6 to select a bridge address
- Block local addresses for rendezvous on RSOS servers
- Memory leak in routerkeys.c
- inaccurate log line (-1 out of 360)
- Use router_get_my_routerinfo() rather than desc_routerinfo
- Our default Guard value is still 3 if no latest consensus or no params
- Patch dir-spec with the shared randomness info
- tor refuses to create AF_LOCAL SOCKS sockets accessible by other users
- Complete users manuals for low-level layers in tor-guts
- Multiple new anti-DoS designs implemented since Oct 2015
- tor-guts documentation should cover all modules
- Overall Tor test coverage very high... over 75%?
- Alpha version of module-isolation framework
- Have a suite of >3 anti-dos proposals
- Implement new key blinding scheme for proposal 224
- Rendezvous Single Onion Services: One-Hop Intro Point and Rendezvous
- Implement prop250 (Random Number Generation During Tor Voting)
- Consider changing MOCK_DECL and MOCK_IMPL so that ctags still finds mocked functions
- Increase torgzip coverage as high as possible
- All cryptography unit test coverage should be over 95%; all should have test vectors
- Have a way to mark lines as "unreachable by unit tests"
- Split directory_handle_command_get into per-command functions
- Make tor connection failures random-exponential-backoff
- Implement an advisory-only request to stop for old clients
- Allow client authorization on control port ADD_ONION services
- compiler warnings with --enable-bufferevents
- cosmetic issue in log message : v0.1.2.3 versus 0.2.3.4
- Move timeliness check out of tor_cert_checksig, or into tor_cert_get_checkable_sig
- Document medium-scale design of key Tor abstractions
- Bugs when registering guard status in connection_or_connect()
- Tor needs a protocol versioning scheme
- base16_decode() API is inconsistent and error-prone
- Self-test reachability test - Listen address from ORPort is ignored, it uses default address unless specified via Address argument
- Extend TLS RSA link keys to 2048-bit
- Stop signed left shift overflows in curve25519-donna (non-64-bit)
- Maybe we want three preemptive internal circs for hidden services?
- make test fails with bufferevents enable
- Assertion evbuffer_get_length(bufferevent_get_input(bufev_in)) == 0 failed
- Do not call networkstatus_reset_download_failures() hourly
- circuit_package_relay_cell(): Bug: outgoing relay cell has n_chan==NULL. Dropping.
- Analyze risks and benefits of clients having three guards
Loading
Loading
Loading