Closed
Milestone
Tor: 0.4.2.x-final
Unstarted Issues (open and unassigned)
0
Ongoing Issues (open and assigned)
0
Completed Issues (closed)
194
- control: HSFETCH command fails to validate v2 addresses
- sendme: Change default emit cell version from 0 to 1
- relay: Warn about the lack of ContactInfo and the consequence
- Add diagnostics for confusing corruption issue #32564 in ewma
- Minor issues when handling ACTIVE control signal
- Don't say "future instances of this warning will be suppressed" when we don't mean it.
- Use IF_BUG_ONCE in buf_flush_to_tls()
- closing stdio fds on exit can interfere with LeakSanitizer, etc
- Travis: Remove stem from the list of allow_failure jobs
- Decode key files with Unix or Windows newlines
- dir-auth: Dir auths should resume sending 503's but never to relays or other dir auths
- Backport the diagnostic logs for is_possible_guard crash
- set_main_thread() not called on second initialization with pthreads
- sandbox error on 0.4.2.x
- Bad tor_assertf() in structvar.c
- Use CHECK_PRINTF with tor_assertion_failed_() and tor_bug_occurred_().
- Tor should lower-case its BridgeDistribution string
- 'buf_read_from_tls()' can return the wrong error code
- Reject 0.2.9 and 0.4.0 in dirserv_rejects_tor_version()
- core dump centos8
- Setting ORPort [ipv6]:auto mistakenly advertises port 94
- make check Message After Testsuite Summary
- Actually check most shell scripts for errors
- Can't perform reverse DNS lookup for a (binary) IPv6 address
- "Skipping obsolete configuration option." doesn't say which one
- when cross-compiling, lzma and zstd will be detected on build system
- single onion v3 IPv6 intro circuit BUG() warnings
- Interpret --disable-module-dirauth=no correctly
- tor man page should clarify that KBytes is 1024 bytes
- CID 1454769: Resource leaks in build_establish_intro_dos_extension()
- CID 1454761: wrong type passed to unlock_cb_buf()?
- process_unix_exec assertion failure when ServerTransportPlugin refers to nonexistent file
- Assertion mp->conf_state == PT_PROTO_COMPLETED failed in managed_proxy_stdout_callback
- spec: ClientAuth option of ADD_ONION is only v2
- test fail: assert(ip->time_to_expire OP_GE now + INTRO_POINT_LIFETIME_MIN_SECONDS
- connection_dir_is_anonymous: Non-fatal assertion !(CONST_TO_OR_CIRCUIT(circ)->p_chan == NULL) failed
- CID 1454593: passing negative value to memset
- Fix a typo in log.c
- Recommend pkg-config when systemd fails
- Add comments to prevent recurrence of #31495
- In tests and log.c, stop using ~0 a log domain mask
- test addr/parse takes a long time on master on some machines
- Refactor some control error-handling code
- Improve logging documentation
- Fix a typo in the practracker usage message
- Use the full name of optional modules, rather than an abbreviation
- Update outdated documentation note for "bridge-distribution"
- Update padding-spec.txt to cover hs circuit setup obfuscation
- practracker git hook warning: Unusual pattern permitted.h in testdata
- Bug: tor_addr_is_internal() called from src/feature/dirauth/process_descs.c:447 with a non-IP address of type 0
- annotate_ifdef_directives: avoid double-negation
- -Wextra-semi causes build failure on debian bullseye
- Make "annotate_ifdef_directives" script comply with line-width limits
- Add accessor functions for cb_buf, which enforce locking and unlocking
- CID 1453653: Integer handling (NEGATIVE_RETURNS) in build_establish_intro_dos_extension()
- Make checkShellScripts.sh handle path errors better
- Allow git-push-all.sh to be run from any directory
- Add usage help option to git scripts
- Split microdescs_parse_from_string() into smaller functions
- hs-v3: Service circuit retry limit should not close a valid circuit
- Should trunnel_abort() be tor_abort_() or tor_raw_abort_() ?
- Make sure we have test coverage for Option, +Option and /Option across defaults, torrc, command line
- Remove unused assign/encode functions in structvar.
- Remove non-_ex typedvar.c function
- Fill in all missing documentation in config, confparse, etc.
- Move confparse.[ch] into lib/confmgt
- config refactoring: fix hierarchy of configuration variable flags
- Explain config_type_extended usage and purpose
- Reorder the early subsystems based on their dependencies
- Avoid a race condition where log and err both try to close the sigsafe fds
- Update the function comment in format_number_sigsafe()
- Work out why chutney didn't fail due to #31495 cannot configure bridges
- hs-v3: Simplify decrypt_desc_layer interface
- Space out the arguments to the cell functions in rend_process_relay_cell()
- practracker scans build directories inside the tor/ directory
- test-timers fail on maint-0.2.9
- CID 1452819: nul-terminated string handling, possibly spurious
- hs-v3: Client can re-pick bad intro points
- Use ptrdiff_t for struct_member_t.offset, etc
- config refactoring: fix redundant reset logic
- git-push-all.sh: shellcheck warnings
- clarify that tor's license is free software / open source
- cannot configure bridges
- config refactoring: follow-ups from merged commits
- Update hsv3 spec for unreachable/failed single onion retries using 3 hops
- CodeStructure.md is not markdown compliant
- Practracker integration tests for headers and includes
- Practracker: document new features
- config: stop using atof()
- Remove duplicate call to practracker in pre-commit hook
- Fix some typos in the 0.4.1 ReleaseNotes and ChangeLog
- Fix coverity failures in unit tests as of 19 August 2019
- CID 1452041: Use 64-bit literal in parse_log_domain()
- Raise rustc minimum version
- Fix some typos in the man page
- Explain Padding 1 and 2 in tor-spec.txt
- Make 0.4.1 and later clients require Padding=2
- hs: Crash in token_bucket_ctr_refill() of the INTRO2 DoS defense
- Move the connection_edge_process_relay_cell() assignment out of the if statement in circuit_receive_relay_cell()
- Compiler "note" in test_addr.c: variable tracking size limit exceeded with ‘-fvar-tracking-assignments’
- Jenkins failure on windows: Overflow in implicit constant conversion
- Jenkins failure on windows: ENETUNREACH undeclared.
- Practracker --list-overbroad produces confusing output when there is an exception
- make check-includes does not check out of tree builds correctly
- Use SEVERITY_MASK_IDX() to find the LOG_ERR index in the unit tests
- Document logs that are excluded from the control port log event
- Modify git-merge-forward.sh so it can create test merge branches
- Add envvar to pass options to practracker
- Run practracker_tests.py as part of make check
- please sign Tor releases with an OpenPGP tool that includes Issuer Fingerprint subpackets
- More tests for practracker
- Make confparse able to handle multiple config_format_t objects at once
- Line unexpectedly reached at channel_tls_handle_cell at ../src/core/or/channeltls.c:1111
- Space out first connection_edge_process_relay_cell() line in circuit_receive_relay_cell()
- Refactor practracker's issue-listing code to return a generator
- potential docs update needed for GuardLifetime?
- Start conversation about auto-formatting our C code
- Teach practracker about .may_include files
- Teach practracker to apply separate rules for C headers
- Check tor_vasprintf for error return values.
- tor_bug_occurred_() channel_tls_handle_cell: This line should not have been reached.
- tor returns first 4 bytes of IPv6 address only when using SOCKS command "F0"
- Circuitpadding updated comments
- remove specified target_hopnum from relay-side machines
- transition when we send our first padding packet, not on received
- Stop showing git scripts changes, unless the base is master
- Coverity: Several warnings from test code
- Coverity: circpadding: dead code in circpad_machine_remove_token
- Coverity doesn't understand that begin_cell_parse() won't return address==NULL when is_begindir is false
- Coverity is confused by switch statement in siphash24 implementation
- tor-print-ed-signing-cert shows local time, without a timezone
- pre-push hook runs practracker unconditionally
- Make shellcheck ignore user-created directories, and run it during pre-commit
- Fix shellcheck warning about unused variable in test_rebind.sh
- Shellcheck tests should exclude src/rust/registry
- Add comments about the chunk format in extrainfo_dump_to_string()
- Stop removing the ed25519 signature when the extra-info file is too big
- Update the fallback entry in the man page
- Add the source= line to the dir list spec
- [warn] Unexpected INTRODUCE_ACK on circuit 3944288021.
- Move variable definition code out of confparse.c, and refactor
- hs-v3: Implement proposal 305 - ESTABLISH_INTRO Cell DoS Defense Extension
- hs-v3: Close intro circuits when cleaning up the client descriptor cache
- Move struct manipulation code out of confparse.c
- Refactor and improve test coverage in confparse.c
- Eliminate some uses of lower-level control protocol output functions
- Move option-listing, setting, validation code out of confparse.c
- Move variable manipulation code out of confparse.c
- Skip "make test" in Travis stem builds
- Allow TOR_MASTER_NAME and TOR_WKT_NAME to be overridden in the git scripts
- Stop hard-coding the bash path in the git scripts
- Separate front-end and back-end of handle implementation.
- Travis: remove cron jobs for 0.3.4; add for 0.4.1
- Update git scripts to remove 0.3.4, include 0.4.1
- Make a subsystem for evloop
- Fix a small memory leak in nt_service_install() in ntmain.c
- hs-v3: Write a proposal for an ESTABLISH_INTRO cell extension containing DoS defense parameters
- Cache outdated fetched descriptors on directory authorities
- Return a distinct was_router_added_t when formatting annotations fails
- Practracker: usability improvements from May retrospective
- Write a coccinelle script to catch increment/decrement calls inside log_debug().
- tor_addr_port_lookup() is overly permissive
- Restrict the tor CI stem job to tests that actually use tor
- Write better unit tests for dirserv_load_fingerprint_file()
- Implement a generic counter token bucket
- Move FP_REJECT and similar constants to a header, so we can access them in the tests
- Add our own base-64 encoded ed25519 public key in dirserv_add_own_fingerprint()
- Remove torctl.in from contrib/dist
- Fix coverity warnings in test_parsecommon.c
- Improve documentation for chutney warnings in "make test-network-all"
- Refactor periodic event system so each subsystem "owns" its own periodic events
- Fix coverity failures as of 04-11-2019
- For CI testing, put garbage in ~/.torrc
- rework bootstrap reporting to use pubsub
- How can we automatically add #else and #endif comments?
- Make git-push-all.sh push branches in a specific order
- practracker problems and CI broken on master
- Improve Tor best practices tracker
- Deprecate RecommendedPackages torrc option, and remove the code for voting for packages
- INTRO2 replay warn logs with v3 onions
- hs: ADD_ONION with NEW:BEST is still pinned on v2
- Lint all our shell scripts with shellcheck on CI
- restore HiddenServiceAuthorizeClient in v3
- Revise "handles" to be opaque, safe. Document standard usage
- HSv3 client auth insufficiently documented (was: HiddenServiceAuthorizeClient incompatible)
- HS intermittently fails: Non-fatal assertion failed in send_introduce1
- Check IPv6 exit policies on microdescs
- dos: Block single hop client at the HSDir
- dos: Block single hop clients at the intro point
- Single hop onion service denial of service issues
- Handle unreachable addresses on v3 single onion services by using a 3 hop path
- IPv6 v3 Onion Services support
- extend_info_describe should list IPv6 address (if present)
- wish: conditionally build man page (tor.1) and html doc using independent configure options
Loading
Loading
Loading