Closed
Milestone
Apr 30, 2022–May 31, 2023
Tor: 0.4.8.x-freeze
Unstarted Issues (open and unassigned)
12
- Tor 0.4.7.13 died: Caught signal 11
- Investigate address detection usage in Tor
- connection_edge_about_to_close(): Bug: (Harmless.) Edge connection (marked at ../src/core/or/circuitlist.c:2684)
- SocksPort WorldWritable sets file mode to 755 instead of 666
- Do phase 3 of proposal 289
- "Unknown option ''" log message is confusing
- "No more HSDir available to query" log message is confusing
- "This line should not have been reached"
- Consider investigating The Maze
- dirport but no orport triggers assert failure
- IPv4-mapped IPV6 addresses fail badly
- No clear message in logs when obfs4proxy is missing
Ongoing Issues (open and assigned)
3
Completed Issues (closed)
46
- Compiler warnings from hashx on macos/aarch64
- New metrics for the relay-side hidden service interactions
- HashX: Incomplete error propagation on mprotect failure, segfault
- Coverity report after PoW merge
- Some coverity issues from main
- Post-Conflux merge: "All routers are down or won't exit -- choosing a doomed exit at random." log messages
- Tune algorithms for conflux
- Create changes file for Conflux
- Change the default of relays per IP address to 4
- clang: Fix warnings about unused variables
- LeakSanitizer: detected memory leaks tor_strdup_
- Add lost comments about decay playing a role in guaranteed Stable flag assignment guaranteed familiarity
- relay: Decouple streams blocked on channel
- TROVE-2022-002: The SafeSocks option for SOCKS4(a) is inverted leading to SOCKS4 going through
- conflux: Cell parsing and handling
- rotate moria1's relay identity and v3 identity keys
- conflux: New protocol version to support
- calculate n_threads as "num-cpus +1" instead "num-cpus -1"
- Update default congestion control params
- relay: Onionskin wait cutoff and MaxOnionQueueDelay in queue should be consensus parameters
- relay: Bump MAX_DETECTABLE_CPUS
- hs: Service rendezvous circuit can be repurposed
- hs: Don't retry to open a service RP circuit while iterating on the circuit list
- hs: Client rendez-vous circuit expiry is a mess
- hs: Service only retries a failing RP once instead of using hs_service_max_rdv_failures consensus param
- hs: Client intro failure cache being poluted by circuit closing without a NACK from the intro
- dirauth: Remove Faravahar from code
- dirauth: Change dizum IP address
- ExitPolicy should apply to already established outbound connections (with a config option, off by default)
- Reject relays running Tor 0.4.6.x
- connection_or_set_ext_or_identifier() uses uninitialized data
- Parameterize Fast+Guard cutoffs
- metricsport query returns duplicated / redundant ntor and ntor_v3 values
- prop327: Implement PoW over Introduction Circuits
- Confidential: From cypherpunks: DNSPort crash on Windows
- Allow ignoring of SIGINT
- Typo in microdesc.c
- Implement UDP over tor (prop339)
- Implement Conflux in C-Tor (Proposal 329)
- Enable OpenSSL readahead
- Consider reducing the range of sendme_inc negotiation
- Remove unused BDP algorithms and other congestion control algs
- Add an optional flag for the export circuit id protocol on the port-by-port basis
- ONION_CLIENT_AUTH_ADD does not have an error-code specified if caller tries to add too many clients
- SIGSEGV on potentially malformed state file
- "Pluggable Transport process terminated" but Tor keeps on going (and of course doesn't work)
Loading
Loading
Loading