Closed
Milestone
Tor: 0.3.4.x-final
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
262
- Turn off Travis Rust caching, and see if it speeds up the builds
- Ignore bandwidth file lines with "vote=0"
- hs: circuit_expire_old_circuits_serverside() should check for RP circuits
- PaddingStatistics should be disabled when ExtraInfoStatistics is 0
- Stream hangs while downloading consensus via RELAY_BEGIN_DIR
- Tor stuck in 25% Loading networkstatus consensus
- Appveyor: OpenSSL unit test fails with header and library version mismatch
- Appveyor: always make the logs into build artifacts
- Setting DisableNetwork won't disable NEED_NET events
- Tor 0.3.3.1-alpha resumes allowing RunAsDaemon=1 with relative DataDirectory
- Windows 8.1 and 10 relays claim to be Windows 8
- hs_service/helper_functions test seems unreliable on slow systems
- node: Make node_supports_v3_rendezvous_point() also check for the onion_pk
- hs-v3: Assertion onion_pk failed in introduce1_set_encrypted_onion_key
- conn_close_if_marked: Non-fatal assertion !(connection_is_writing(conn))
- OOM code should count space used in a circuit's half-closed list
- 0.3.4.6-rc ChangeLog omits bug26876
- Windows: cast between incompatible function types in address.c
- hs: rend_client_send_introduction v0 string truncation warning
- Windows: cast between incompatible function types in main
- Appveyor: --disable-gcc-hardening
- Appveyor: all compiled x86_64 executables crash
- Appveyor: tail config.log and cat test-suite.log on failure
- Make tor use chutney mixed+hs-v2 and bridges+hs-v2
- Debian OpenSSL 1.1.1~~pre6-1 defaults to requiring 2048 bit RSA keys
- Duplicate votes on 0.3.4 and later
- When the network doesn't have any exits, use the mid weight as the exit weight
- When checking usable exit descriptors, always check exit policies
- Why do bridges run the retry_dns callback?
- panic inside rust extern "C" function is undefined behavior
- rust protover accepts excess commas in version strings
- bridges fail on Tor 0.3.4.1-alpha and later
- conditionvar_timeout intermittently fails on maint-0.3.3
- Tor seems to be reading from two different time sources in a macOS VM
- Appveyor CI IRC shows the wrong branch for pull requests
- Duplicate call to connection_mark_for_close
- tor-0.3.4.5-rc: fails to build when configured with `./configure --disable-unittests`
- configure --disable-unittests causes build to fail when linking
- --ControlPortWriteToFile reports port 0 on --ControlPort=auto, not opened port
- Appveyor fails test_ntor.sh and test_hs_ntor.sh
- HSPOST command doesn't parse HSADDRESS argument
- Fix 0.3.4: appveyor failures on win32 (geoip binary mode)
- Fix 0.3.4: appveyor failures on win32 (test_dir)
- Add travis builders for Rust without fragile-hardening
- memory leak in parse_protocol_list
- linker failures on 0.3.4 with --disable-module-dirauth
- doctests in src/rust/crypto fail compilation
- Only link dirauth module into libtor_testing once
- remove --all-features from test_rust.sh
- remove redundant "testing" feature from tor_log crate
- Update tor copyright headers to year 2018
- test_rust.sh fails on src/rust/crypto
- Search for python3 with a better list of names.
- relaycell/circbw warning
- Add IPv6 orport for dannenberg
- get 0.3.4.x into Debian sid
- smartlist_len cast to double
- gcc 7 fails on -Wunused-const-variable for Zstd headers
- new compiler warning src/or/router.c:2034:36: warning: potential null pointer dereference
- export rand from the crypto crate
- Don't count 0-length RELAY_DATA cell as valid
- Rust tests don't fail on failure
- Unused Rust code warnings
- Check stream SENDME against max
- Packaged apparmor settings break tor within LXD containers
- Abort in test_bridges.c
- A little bug of circular path of Tor
- Undefined references to EVP_CIPHER_CTX_cleanup() with OpenSSL 1.1.0 no-deprecated
- BUILDTIMEOUT_SET totals are still off
- AF_UNSPEC are actually valid connected cells
- OpenSSL 1.1.1 changed the semantics of the password callback return value
- CIRC_BW fields vague
- our crypto::digests crate isn't actually exported
- the FFI functions in crypto_rand.rs aren't actually exported
- move rand crate into parent crypto crate
- bump rand dependency to 0.5.0-pre.2
- Update cov-diff script to remove extraneous timestamp info
- Update cov-diff script to understand * character
- Add a "CONTRIBUTING" file
- control: ANY_EVENT_IS_INTERESTING() needs to mask the event before testing
- CID 1435546: Error handling issues (CHECKED_RETURN)
- Malformed connected cell closes connection but code continues
- hs-v3: Descriptor signature parsing should have a trailing white-space
- Use a mainloop timer to wake up from hibernation.
- Disable the per-second timer when we can
- client: ControlPort set doesn't mean you're a client
- macOS regression in crypto_rand.c refactor
- make distcheck failing for rust builds due to missing include
- cargo vendor rand-0.5.0-pre.1 dependency
- Replace n_libevent_errors logic with a rate-limiter.
- Fix two cases of nondeterminism in voting_schedule.c coverage
- Remove management of approx_time() from second_elapsed_callback
- Make workqueue cancel code always get covered by tests.
- Stop logging stack contents when reading a zero-length bandwidth file
- LibreSSL compilation warnings on all supported Tor versions
- OpenSSL-nodep fixes seem to have broken LibreSSL
- Allow Tor to accept node_id at the end of a bandwidth file line
- 9abf541f7f breaks Windows builds due to missing ";"
- Solve nondeterminism in testing of hs_get_responsible_hsdirs
- Produce consistent coverage from test_client_pick_intro()
- Use a deterministic PRNG in test_circuit_timeout() for predictable coverage.
- test_channel: keep time constant when running channel/outbound_cell
- Improve deliberate test coverage for addressmap_get_virtual_address()
- module: Write documentation in doc/ on how to write a module
- module: Better safeguard authdir_mode_v3() if dirauth module is disabled
- module: Post-merge tasks for dirauth modularization
- Conflicting ports cause tor to crash
- Cross-compiling tor rust for macOS is broken
- v3 onion keep working without the HiddenServiceVersion 3 line
- Document default value of Nickname parameter [patch]
- Module: Add Travis target for modularized directory authority subsystem
- Move check_whether_*port_reachable() to a scheduled callback, not once-per-second
- Run flush_pending_log_callbacks() on an as-needed basis, not once-per-second
- Handle deferred SIGNEWNYM requests with a mainloop event
- Run or_state_save as a mainloop event
- Create unit test for dirserv_read_measured_bandwidths
- Fix win32 test failure for crypto/openssl_version
- A Tor commit seems to have broken creation of V3 onion services with stem
- Move dirvote_act into a periodic callback
- have travis display test-suite.log from the right place when DISTCHECK=yes
- Remove connection_ap_attach_pending(0) from per-second callback.
- Close closeable objects in a postloop event, not in second_elapsed_callback().
- Move consdiffmgr_rescan() into its own callback
- Remove the need for gettimeofday_cached(); use monotonic time in ewma code
- dirserv: Remove dead code
- make test suite coverage more deterministic
- Add OVERHEAD and DELIVERED fields to CIRC_BW events
- hs-v3: Memleak on SIGHUP
- Run clean_consdiffmgr() callback on all directories
- manual: document that ControlSocket is disabled by default
- Cross-compiling tor rust for Windows is broken
- spelling errors in control-spec.txt
- Fix vanguard restrictions
- Bandwidth List Format
- GETINFO exit-policy for tor client should return 551
- Make NumEntryGuards consistent with #271 consensus params
- 'GETINFO exit-policy/full' fails when disconnected
- Our "has our write bucket been empty recently" check is dependent on TokenBucketRefillInterval
- Investigate using coveralls with travis
- Should Travis use "make distcheck"?
- Refactor refactored token bucket API to be more generic
- 32 bit ASAN failures in _dl_get_tls_static_info
- geoip_load_file() tests don't work on all window build environments
- Non-fatal assertion info failed in onion_extend_cpath at ../src/or/circuitbuild.c:2779.
- Refactor token buckets to meet current coding standards
- Make periodic events array with flags including when they are enabled/disabled
- hs: Reload signal (HUP) doesn't remove a disabled service
- Remove TestingEnableTbEmptyEvent if it is no longer used
- EARLY_CONSENSUS_NOTICE_SKEW of 60 is too strict for some drifting dirauth clocks
- man: RephistTrackTime is not a dirauth only option
- switch Travis to using Rust stable
- fix CID 1433643
- Write a proposal for using two guards, not one
- Update libc version requirement in GettingStartedRust.md and configure.ac
- Incorporate discussion outcomes into prop249 (wide create cells)
- n_possible variable goes unused in channel_get_for_extend()
- module: Modularized directory authority subsystem
- Fix two comment typos in hs_cell.c
- cmux: CircuitPriorityHalflife value is never taken from the consensus
- Track half-closed stream IDs
- Add tor CI config for AppVeyor
- Figure out default vanguard script parameters
- Complete vanguard specification
- Refactor relay cell crypto into a new relaycrypt.c
- Add a unit test for geoip_load_file()
- Expose TZ info on control port for better debugging of time errors
- Expose Tor's RNG to Rust
- module: Basic modularization preparation
- module: Identify a list of tor module
- Initial work on making modules conditionally compiled
- remove router.c internal functions from router.h
- Add unittests for bridges.c module
- rip out PortForwarding options
- CIRC_BW event miscounts, should count all circ data
- mmap length doesn't need to be page-aligned
- tests fail if COMPAT_HAS_MMAN_AND_PAGESIZE is not set
- Provide a control-port mechanisms to manage idle mode better.
- Disable as many timers as possible when DisableNetwork or when idle/hibernating
- Remove as many items as possible from second_elapsed_callback() and run_scheduled_events()
- Create a better-designed system for handling computation outside the event loop
- Avoid needless wakeups for token bucket refills.
- Update the Tor Rust coding standards for new types
- Use uint64_t for Tor's hash tables, even if int is 32 bits
- Configure fails with some OpenSSL 1.1.0 built with no-deprecated.
- commit 4438ef32 breaks tor macOS cross builds
- Document our policy for Rust dependencies
- update PerConnBWRate/Burst manpage entries to not mention consensus
- Torsocks only accepts IPv4 replies but Tor prefers IPv6Automap by default
- get rid of redundant should_record_bridge_info() call in options_act()
- refactor to use should_record_bridge_info() more
- hidden-service-dir description in dir-spec should reference HSDir protovers
- Stem test-full fails on master branch
- Compilation fails: ‘tor_zstd_format_version’ [-Werror=unused-function]
- Remove duplicate #include onion_ntor.h from src/test//test.c
- cmux: Remove round robin code and make EWMA mandatory
- Tor connection.c file have multiple transports.h includes.
- spec: Document our circuit close reasons
- Spec bug in formal definition of Document in dir-spec.txt
- Create utilities for using Rust static strings in C
- systemd unit file starts Tor before IPv6 address is available
- Perhaps, use zstd's "static-only" functions
- Avoid malloc/free on each server-side ntor handshake
- use get_uptime() consistently
- Add optional spell check to makefile to check for typos in tor source code.
- Count hsdir requests against maxcircuitspending
- Non-fatal assertion !(tor_mem_is_zero((const char*)node->hsdir_index->fetch, DIGEST256_LEN))
- Maybe make relay_digest_matches() not use tor_malloc()
- Make rep_hist_note_circuit_handshake_* use channel_is_client()
- build system --disable-unittests has no effect
- Extract the authority list from config.c
- Hidden service xxx exceeded launch limit with 10 intro points in the last 35 seconds. Intro circuit launches are limited to 10 per 300 seconds
- Change the circuit build time defaults to reduce network load
- Tor make check FAIL: src/test/test (on OSX)
- Tor launches two requests for authority certificates on first bootstrap
- Remove the return value of fascist_firewall_choose_address_node()
- rename conn->timestamp_lastwritten to conn->timestamp_lastwritable
- timing wheels should use 32-bit math on 32-bit platforms
- Wrap our PRNG interface(s) in Rust with appropriate traits
- Wrap our sha2 interface in Rust which implements the appropriate traits
- Reset bootstrapping state on shutdown
- Fix more prop224 spec inconsistencies
- free(NULL) always works (nowadays) so stop acting like it might not
- Prune the list of supported consensus methods
- A fresh compiled tor does not honor MaxCircuitDirtiness
- Profile a 0.3.2.x fast relay
- We stop trying to download an md after 8 failed tries
- Decide on initial optimisation strategy for Android performance work
- Attempt to open a stream on first hop of circuit
- dirauths write corrupted keypin journal
- document how to get Travis CI running on your fork of tor
- Remove the return value of node_get_prim_orport()
- Isolate libevent usage to a few locations
- 0.3.1.7: Assertion threadpool failed in cpuworker_queue_work
- Tor source code has many typos
- Bandwidth stats info leak upon close of circuits with queued cells
- Remove deterministic download schedule code and configs
- prop288: Merge privcount-in-tor data collector backend implementation
- prop224: Optimize hs_circ_service_get_intro_circ() digest calculation
- prop224: Optimize hsdir_index calculation
- Tor 0.3.0.9 and 0.3.1.4-alpha on FreeBSD: Failed to find node for hop 0 of our path. Discarding this circuit.
- Investigate using cargo-vendor for offline dependencies
- Missing makefile dependencies make parallel builds fail
- policy for acceptable licenses from contributors
- upgrading Tor-0.2.9.10 to Tor-0.3.0.8 or Tor-0.3.1.3_alpha fails to build circuits
- DIRCACHE_MIN_MEM_MB does not stringify on FreeBSD, we should use %d instead
- Enable DISABLE_DISABLING_ED25519
- Clean up our OpenSSL 1.1 support.
- Clarify directory and ORPort checking functions
- Replace getsockname with tor_getsockname
- tor uses getaddrinfo even if DisableNetwork is set
- Most FooStatistics entries in the man page don't mention ExtraInfo descriptors
- tor --verify-config should not bind to ports
- Many unnecessary CPU wakeups per second
- Improve speed by fixing tor_memeq performance, bottleneck(s)
- [simple patch] Expose ISO_STREAM via isolation flag config option
- Adapt and update AccessLabs' patches for reduced Tor memory consumption for embedded devices
- Remove duplicate code between parse_{c,s}method_line
- add libtool support to tor
- Eliminate "family" field in tor_addr_t
- A verified unverified-consensus should be renamed to cached-consensus
- tor-chroot scripts
- Disable outgoing token bucket and reduce token bucket refill interval
Loading
Loading
Loading