Mail Index
- [tor-bugs] #4622 [- Select a component]: Error when running Tor browser bundle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4622 [Tor Browser]: Error when running Tor browser bundle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4618 [Tor Relay]: Compiler warnings in transports.c
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3186 [Tor Client]: another process running in our data directory?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1523 [Tor Client]: descriptor error
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2077 [Tor Client]: Tor crashes in Vidalia 0.2.2.17a-0.2.10
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4623 [Tor bundles/installation]: Windows Vidalia relay bundle needs review
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2764 [Analysis]: analyze security tradeoffs from using a socks proxy vs a bridge to reach the Tor network
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3292 [Analysis]: Should bridge users care if their bridge changes fingerprint?
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4624 [Tor Bridge]: Config option to declare whether you're using bridges for reachability or for security
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3292 [Analysis]: Should bridge users care if their bridge changes fingerprint?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4624 [Tor Bridge]: Config option to declare whether you're using bridges for reachability or for security
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3292 [Tor Bridge]: Let bridge users specify that they don't care if their bridge changes fingerprint (was: Should bridge users care if their bridge changes fingerprint?)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3292 [Tor Bridge]: Let bridge users specify that they don't care if their bridge changes fingerprint
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2764 [Analysis]: analyze security tradeoffs from using a socks proxy vs a bridge to reach the Tor network
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4624 [Tor Bridge]: Config option to declare whether you're using bridges for reachability or for security
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4455 [Tor Client]: Add configuration option PreferIPv6?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3466 [Tor Bridge]: Tor build variant to support lightweight socks bridge (was: Tor build variant to run lightweight socks bridge)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2764 [Analysis]: analyze security tradeoffs from using a socks proxy vs a bridge to reach the Tor network
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4625 [Analysis]: Figure out what to do with the FC paper proposing adaptive bridge address distribution
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4601 [arm]: Arm torrc validation case sensetive
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4601 [arm]: Arm torrc validation case sensetive
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4618 [Tor Relay]: Compiler warnings in transports.c
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4460 [Thandy]: Extend and integrate Vidalia and Thandy to install or update TBB components
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4601 [Tor Cloud]: Arm torrc validation case sensetive
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4601 [Tor Cloud]: Arm torrc validation fails on Tor Cloud (was: Arm torrc validation case sensetive)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4621 [arm]: Minor help text tweak
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4601 [Tor Cloud]: Arm torrc validation fails on Tor Cloud
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4627 [Torctl]: TorCtl doesn't handle quoted passwords
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4628 [Vidalia]: Connection refused by peer (Win 7 SP1 x64)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4629 [Torctl]: TorCtl doesn't expand relative paths
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4630 [Torctl]: TorCtl doesn't support jail paths
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3563 [Tor Bridge]: Bridge/entry support for ipv6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4297 [BridgeDB]: Teach bridgedb how to handle descriptors with IPv6 addresses
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3563 [Tor Bridge]: Bridge/entry support for ipv6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4303 [Torctl]: Tor controllers should check the length of authentication-cookie files
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4631 [Tor Directory Authority]: Idea to make consensus voting more resistant
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4631 [Tor Directory Authority]: Idea to make consensus voting more resistant
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3757 [Tor bundles/installation]: Tor 'Expert Bundle' for Windows does not install files into default directory
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4610 [Tor Client]: Recent Git master segfaults
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4632 [Trac]: Trac does not allow a ticket in âneeds_informationâ to be set directly to âneeds_reviewâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4596 [Torflow]: Tune PID control knobs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4596 [Torflow]: Tune PID control knobs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2667 [Tor Relay]: Exits should block reentry into the tor network
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2667 [Tor Relay]: Exits should block reentry into the tor network
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4633 [Tor Client]: Coverity false positive about malloc(strlen(str))
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4610 [Tor Client]: Recent Git master segfaults
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4633 [Tor Client]: Coverity false positive about malloc(strlen(str))
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4610 [Tor Client]: Recent Git master segfaults
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4610 [Tor Client]: Recent Git master segfaults
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4532 [Tor Relay]: spawn_cpuworker(): implicit init of conn->addr
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4531 [Tor Client]: connection_tls_start_handshake(): inconstistency checks of conn->tls
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4530 [Tor Client]: tor_addr_port_lookup(): addr_out filled with random bytes if transient failure
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4528 [Tor Relay]: read_to_buf_tls(): Inconsistency in code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4533 [Tor Client]: compat.h: tor_socket_t defined as intptr_t instead native SOCKET (Windows)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4534 [Tor Client]: connection_connect(): Inconsistency in code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4535 [Tor Client]: tor_accept_socket(): incosistency in code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4592 [Tor Relay]: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4594 [Tor Relay]: tor_tls_state_changed_callback(): detects of ClientHello is too late
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4536 [Tor Directory Authority]: DirAllowPrivateAddresses: Inconsistency in code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4556 [Tor Client]: Write an IPv6 implementation and deployment roadmap draft
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4555 [Tor Bridge]: Write a proposal that enables bridges and relays to advertise their IPv6 address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3958 [Torctl]: pytorctl should learn to try both CookieAuth and PasswordAuth
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3958 [Torctl]: pytorctl should learn to try both CookieAuth and PasswordAuth
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4588 [Tor Relay]: Tor hang on with cpu at 100%
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4575 [Tor Client]: 0.2.3.8-alpha fails to bootstrap
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4600 [Tor Relay]: Spec doesn't mention password quotes
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4619 [Tor Relay]: Find out if we need to optimise node_get_all_orports()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4617 [Tor Client]: IPv6 bridge address might go unused
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4624 [Tor Bridge]: Config option to declare whether you're using bridges for reachability or for security
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4609 [Tor Hidden Services]: rend-spec.txt describes HidServAuth option incorrectly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4608 [Tor Hidden Services]: Describe replay prevention for INTRODUCE2 cells in rend-spec.txt
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4591 [Tor Relay]: Don't set SSL_MODE_NO_AUTO_CHAIN during renegotiation.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3689 [Tor Client]: tor hangs on establishing an encrypted directory connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4620 [Tor Relay]: Move the prefer_ipv6 to node_t
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3325 [Tor Client]: Log message when a client tries to connect to an invalid hostname is incorrect
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3448 [Tor Client]: Log message mentions âtor-opsâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3311 [Tor Hidden Services]: Log message indicating HS descriptor uploads have been started is misleading
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3296 [Tor Client]: Exitnode that can't handle a predicted port -> endless circuit creation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2077 [Tor Client]: Tor crashes in Vidalia 0.2.2.17a-0.2.10
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1776 [Tor Bridge]: Allow regular relays to be used as bridges
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1297 [Tor Hidden Services]: Update hidden service logic to be more resilient to timeout
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1852 [Tor Bridge]: Tor clients remember bridge info across restarts
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #535 [Tor Relay]: servers should support hearing "not new descriptor"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2761 [Orbot]: Orbot Service not shutting down
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4635 [Tor bundles/installation]: Vidalia Bundle must be installed by the user account it is to run in
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4530 [Tor Client]: tor_addr_port_lookup(): addr_out filled with random bytes if transient failure
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3448 [Tor Client]: Log message mentions âtor-opsâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2267 [Tor Relay]: resolve_my_address() resolves incorrect address.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1523 [Tor Client]: descriptor error
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3543 [Tor Relay]: Too many absent v2 networkstatuses means caches can't purge their routerlist
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3322 [Tor Bridge]: We don't retry our bridges if we have an unconfigured bridge that's up
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3017 [Tor Relay]: DNS update causes Tor to fail
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1136 [Tor Client]: When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2751 [Tor Directory Authority]: Don't give remotely exploitable relays the HSDir flag
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3027 [Tor Relay]: Possible problem after Win7x64 updates of 4/27/11
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3207 [Tor Relay]: limit more keys to the exponent we specify
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3207 [Tor Relay]: limit more keys to the exponent we specify
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2751 [Tor Directory Authority]: Don't give remotely exploitable relays the HSDir flag
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4622 [Tor bundles/installation]: Error when running Tor browser bundle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4012 [Tor Client]: usemicrodescriptors not in 0.2.3.x man page
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4536 [Tor Directory Authority]: DirAllowPrivateAddresses: Inconsistency in code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4535 [Tor Client]: tor_accept_socket(): incosistency in code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2749 [Tor Hidden Services]: Persistent storage for HSDir descriptors
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4622 [Tor bundles/installation]: Error when running Tor browser bundle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4622 [Tor bundles/installation]: Error when running Tor browser bundle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4336 [Tor Relay]: Updated Tor crashes on Win7/x86_64
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4531 [Tor Client]: connection_tls_start_handshake(): inconstistency checks of conn->tls
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4532 [Tor Relay]: spawn_cpuworker(): implicit init of conn->addr
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4504 [Tor Browser]: After enabling Shockwave Flash it is always disabled upon restart
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4169 [Tor Client]: "foo" is not a sensible bootstrap problem
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2863 [Tor Relay]: feature request: 'include' config directive
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3847 [Tor Relay]: Provide ability to round robin outgoing exit connections on multiple interfaces
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3794 [Tor Client]: tor-chroot scripts
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3794 [Tor Client]: tor-chroot scripts
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3794 [Tor Client]: tor-chroot scripts
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3782 [Tor Relay]: Tor should learn to chroot
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3027 [Tor Relay]: Possible problem after Win7x64 updates of 4/27/11
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1035 [Tor Directory Authority]: Relay on dynamic IP marked as stable and guard
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3027 [Tor Relay]: Possible problem after Win7x64 updates of 4/27/11
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1065 [Tor bundles/installation]: Tor Browser Bundle Pidgin debug issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4229 [Tor Client]: smartlist_len returns a (signed) int
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4533 [Tor Client]: compat.h: tor_socket_t defined as intptr_t instead native SOCKET (Windows)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3027 [Tor Relay]: Possible problem after Win7x64 updates of 4/27/11
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4636 [Tor Client]: Add GETINFO interface_address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4575 [Tor Client]: 0.2.3.8-alpha fails to bootstrap
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4210 [Tor Client]: Undefined version comparisions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4341 [Tor Relay]: MyFamily Option Requires a Dollar Sign "$"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4575 [Tor Client]: 0.2.3.8-alpha fails to bootstrap
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4638 [BridgeDB]: cant connect
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4638 [BridgeDB]: cant connect
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4210 [Tor Client]: Undefined version comparisions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4341 [Tor Relay]: MyFamily Option Requires a Dollar Sign "$"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4638 [Tor Client]: cant connect
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4623 [Tor bundles/installation]: Windows Vidalia relay bundle needs review
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2940 [TorBrowserButton]: Adapt browser time based on tor's notion of clock skew...
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4639 [Tor bundles/installation]: Tails bugs/improvements
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4639 [Tor bundles/installation]: Tails bugs/improvements
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4639 [Tor bundles/installation]: Tails bugs/improvements
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4640 [Vidalia]: bug in saving torrc using vidalia
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2644 [Vidalia]: Choosing to relay should not default to being an exit
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2553 [Tor Hidden Services]: tor2web mode for accessing hidden services
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4594 [Tor Relay]: tor_tls_state_changed_callback(): detects of ClientHello is too late
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4642 [Vidalia]: Upgrade non-exit relay from old Vidalia to Vidalia 0.2.15 and get marked an exit relay
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4642 [Vidalia]: Upgrade non-exit relay from old Vidalia to Vidalia 0.2.15 and get marked an exit relay
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2644 [Vidalia]: Choosing to relay should not default to being an exit
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4643 [Vidalia]: Vidalia 0.2.15 on OS X has broken menu bar
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4171 [Tor Hidden Services]: âTried to establish rendezvous on non-OR or non-edge circuit.â
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4636 [Tor Client]: Add GETINFO interface_address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4636 [Tor Client]: Add GETINFO interface_address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4636 [Tor Client]: Add GETINFO interface_address
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4644 [Tor Directory Authority]: tor_addr_is_internal shows up in profiles -- can we fix that?
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4645 [Tor Client]: Deprecate and remove is_internal_IP
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4636 [Tor Client]: Add GETINFO interface_address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4638 [Tor Client]: cant connect
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4549 [Tor Bridge]: Implement user-defined certificate strings through torrc (part of the proposal 179 efforts)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4646 [Tor Bridge]: Outdated proposals 189, 190 and 191 in torspec.git.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4338 [Tor Browser]: TBB creates Mozilla folder in user folder
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4647 [Tor Client]: Tor needs to parse its command line exactly once
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4648 [Tor Client]: Tor shouldn't call expand_filename on filenames specified on the command line
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4647 [Tor Client]: Tor needs to parse its command line exactly once
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4263 [Tor Browser]: TBB on Mac OS X 10.5.8 fails to run
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4649 [Tor Browser]: Check doesn't notify of new TorBrowser release
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4165 [Website]: research migrating website from wml to markdown and jekyll
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4511 [Website]: Download page lacks anchors for direct links to the various sections
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4395 [Website]: New email address for support requests
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4223 [Company]: Give chiiph the ability to upload to vescum
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1867 [Company]: Verified backups
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4615 [Company]: old-host shutdown
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3962 [Tor Check]: Add duckduckgo searchbox to check.tp.o?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4648 [Tor Client]: Tor shouldn't call expand_filename on filenames specified on the command line
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3962 [Tor Check]: Add duckduckgo searchbox to check.tp.o?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4219 [Website]: Update docs/faq#DoesntWork
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4651 [Analysis]: get datagram-transport pdf source into svn/git
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2912 [Metrics Data Processor]: Tag and release metrics-db version 0.0.1
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2647 [Metrics Data Processor]: Clean up metrics Git repositories
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4395 [Website]: New email address for support requests
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4652 [Tor Client]: update urls in sample torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4647 [Tor Client]: Tor needs to parse its command line exactly once
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4647 [Tor Client]: Tor needs to parse its command line exactly once
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4653 [Tor Client]: Use SSL_state_string_long() instead of homebrewed ssl_state_to_string()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4653 [Tor Client]: Use SSL_state_string_long() instead of homebrewed ssl_state_to_string()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3391 [arm]: add arm to the official tor deb repository
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4653 [Tor Client]: Use SSL_state_string_long() instead of homebrewed ssl_state_to_string()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4341 [Tor Relay]: MyFamily Option Requires a Dollar Sign "$"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4341 [Tor Relay]: MyFamily Option Requires a Dollar Sign "$"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4341 [Tor Relay]: MyFamily Option Requires a Dollar Sign "$"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4171 [Tor Hidden Services]: âTried to establish rendezvous on non-OR or non-edge circuit.â
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4651 [Analysis]: get datagram-transport pdf source into svn/git
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4637 [Tor Client]: Two coverity deadcode issues
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4646 [Tor Bridge]: Outdated proposals 189, 190 and 191 in torspec.git.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4511 [Website]: Download page lacks anchors for direct links to the various sections
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4647 [Tor Client]: Tor needs to parse its command line exactly once
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3843 [Vidalia]: Linux TBB: Vidalia + "controlport auto" = missing port.conf file
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2552 [Tor Hidden Services]: help tor2web work better
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2552 [Tor Hidden Services]: help tor2web work better
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4654 [- Select a component]: Control TCP Socket not created under some circumstances
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4654 [Tor Client]: Control TCP Socket not created under some circumstances
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4654 [Tor Client]: Control TCP Socket not created under some circumstances
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3843 [Vidalia]: Linux TBB: Vidalia + "controlport auto" = missing port.conf file
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4656 [Vidalia]: Textboxes of "Bandwidth limits" in Vidalia squeezed
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4656 [Vidalia]: Textboxes of "Bandwidth limits" in Vidalia squeezed
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4657 [Tor Bridge]: setting myfamily on a bridge should warn (and fail?)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4641 [Tor Hidden Services]: Proposal 171 changes broke âtor2web modeâ
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3920 [GetTor]: macos tbb too big for gmail
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4658 [Tor bundles/installation]: suse and suse-experimental does not exist
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4659 [Website]: Simplify Linux instructions on /projects/torbrowser.html.en
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4660 [Tor Browser]: search box isn't cleared on 'new identity'
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4658 [Tor bundles/installation]: suse and suse-experimental do not exist (was: suse and suse-experimental does not exist)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3757 [Tor bundles/installation]: Tor 'Expert Bundle' for Windows does not install files into default directory
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4623 [Tor bundles/installation]: Windows Vidalia relay bundle needs review
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3757 [Tor bundles/installation]: Tor 'Expert Bundle' for Windows does not install files into default directory
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4514 [Translations]: Glossary for translation
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4661 [Metrics Utilities]: When metrics fetches a consensus from each authority, remember fetch duration
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4250 [Metrics Utilities]: metrics consensus health should check the consensus from each authority
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4628 [Vidalia]: Connection refused by peer (Win 7 SP1 x64)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4517 [Tor Browser]: drag-n-drop bypasses tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4517 [Tor Browser]: drag-n-drop bypasses tor on Unity (was: drag-n-drop bypasses tor)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4517 [Tor Browser]: drag-n-drop bypasses tor on Unity
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4663 [Tor Browser]: Tor Browser Bundle Linux - Vidalia - Proxy Settings Getting By Passed
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Browser]: Tor Browser Bundle Linux - Vidalia - Proxy Settings Getting By Passed
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4517 [Tor Browser]: drag-n-drop bypasses tor on Unity
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4517 [Tor Browser]: drag-n-drop bypasses tor on Unity
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4661 [Metrics Utilities]: When metrics fetches a consensus from each authority, remember fetch duration
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4664 [Tor Client]: ./autogen.sh puts stuff on stderr
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4664 [Tor Client]: ./autogen.sh puts stuff on stderr
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4602 [arm]: Arm's torrc validation misses alternate Log default
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4665 [EFF-HTTPS Everywhere]: Breaks NSF award search
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4601 [arm]: Arm torrc validation fails on Tor Cloud
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3962 [Tor Check]: Add duckduckgo searchbox to check.tp.o?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4488 [Tor Relay]: Track down the N23 patch, then update it for modern Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4099 [Tor Browser]: Disable TLS Session resumption and Session IDs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4099 [Tor Browser]: Disable TLS Session resumption and Session IDs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4603 [Tor Browser]: Lower HTTP Keep-Alive limit
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4667 [Tor Browser]: Close keep-alive connections on "New Identity"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4668 [Tor Relay]: Restore or rewrite renegotiation-limiting code
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4669 [TorBrowserButton]: Enable TLS False Start
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4592 [Tor Relay]: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4594 [Tor Relay]: tor_tls_state_changed_callback(): detects of ClientHello is too late
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4312 [Tor Relay]: Rate limit renegotiations
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4582 [Tor Client]: master fails to build with libevent 1: event_free not a known function
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4670 [Tor Relay]: More bugs on renegotiation limiting code.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4670 [Tor Relay]: More bugs on renegotiation limiting code.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4668 [Tor Relay]: Restore or rewrite renegotiation-limiting code
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4099 [Tor Browser]: Disable TLS Session resumption and Session IDs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4592 [Tor Relay]: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4592 [Tor Relay]: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4592 [Tor Relay]: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4548 [Tor Bridge]: Implement dynamic (rakshasa) primes (part of proposal 179)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4662 [Tor Relay]: Revert changes from bug4312 and thereafter until 0.2.4.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4671 [Analysis]: Start a list of designs that are related to proposal 182
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4672 [Tor Relay]: f77f9bd and 40a87c4 re-commited into master after #4662
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4672 [Tor Relay]: f77f9bd and 40a87c4 re-commited into master after #4662
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4673 [Metrics Website]: Partition the 67, 000, 000 row statusentry table in the metrics database
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4639 [Tor bundles/installation]: Tails bugs/improvements
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running master
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4674 [Tor Client]: Update to December GeoIP database
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4674 [Tor Client]: Update to December GeoIP database
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4661 [Metrics Utilities]: When metrics fetches a consensus from each authority, remember fetch duration
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4661 [Metrics Utilities]: When metrics fetches a consensus from each authority, remember fetch duration
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4674 [Tor Client]: Update to December GeoIP database
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4672 [Tor Relay]: f77f9bd and 40a87c4 re-commited into master after #4662
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4661 [Metrics Utilities]: When metrics fetches a consensus from each authority, remember fetch duration
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4626 [Tor Directory Authority]: Very high cpu usage for gabelmoo running with renegotiation-limiting code (was: Very high cpu usage for gabelmoo running master)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4672 [Tor Relay]: f77f9bd and 40a87c4 re-commited into master after #4662
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4675 [Tor Cloud]: Bad link for us-west-2 launching
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4675 [Tor Cloud]: Bad link for us-west-2 launching
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4667 [Tor Browser]: Close keep-alive connections on "New Identity"
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4676 [Tor Relay]: Eliminate "family" field in tor_addr_t
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4676 [Tor Relay]: Eliminate "family" field in tor_addr_t
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3587 [Tor Bridge]: Accounting should work with pluggable transports
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4677 [Tor Relay]: master won't build without V2_HANDSHAKE_SERVER
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4517 [Tor Browser]: drag-n-drop bypasses tor on Unity
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4667 [Tor Browser]: Close keep-alive connections on "New Identity"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4611 [TorBrowserButton]: Torbutton fails to indicate when 'New Identity' fails.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4603 [Tor Browser]: Lower HTTP Keep-Alive limit
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4099 [Tor Browser]: Disable TLS Session resumption and Session IDs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3587 [Tor Bridge]: Accounting should work with pluggable transports
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3589 [Tor Bridge]: Advertise bridge pluggable transports using extra-info lines
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3589 [Tor Bridge]: Advertise bridge pluggable transports using extra-info lines
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3589 [Tor Bridge]: Advertise bridge pluggable transports using extra-info lines
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4485 [Analysis]: Research: can we get rid of the stream-level sendme cells?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4490 [Analysis]: Sensitivity analysis of different ways to sample relay capacity for simulations
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4506 [Analysis]: Simulate the N23 design to see how it performs for typical and for really slow client connections
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4465 [Tor Relay]: Reduce token bucket refill interval
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4561 [Tor Client]: Extend Tor to no longer assume that a relay or bridge has exactly one address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4563 [Tor Client]: Enable clients to talk to public bridges via IPv6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4564 [Tor Client]: Enable clients to talk to non-bridge relays via IPv6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4565 [Tor Relay]: Enable relays to talk to other relays via IPv6
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4678 [Orbot]: Orbot fails to start on Asus Transformer with Prime 2.1.1 FW
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4678 [Orbot]: Orbot fails to start on Asus Transformer with Prime 2.1.1 FW
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4625 [Analysis]: Figure out what to do with the FC paper proposing adaptive bridge address distribution
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4679 [Pluggable transport]: Design a pluggable transport roadmap
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4679 [Pluggable transport]: Design a pluggable transport roadmap
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4679 [Pluggable transport]: Design a pluggable transport roadmap
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4248 [Analysis]: Hack up stunnel to test a transport that uses a vanilla SSL handshake
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4680 [Pluggable transport]: Design, build, and document Morpher as a pluggable transport
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4676 [Tor Relay]: Eliminate "family" field in tor_addr_t
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3378 [Torouter]: Tor 0.2.3.x and tor-fw-helper
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4681 [- Select a component]: what is JOB DESCRIPTION?
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4682 [Tor Relay]: Evaluate proposal 182 and compare it to other designs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4671 [Analysis]: Start a list of designs that are related to proposal 182
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4683 [Analysis]: Come up with a testing plan for datagram-based designs
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4684 [Analysis]: Implement and experiment with one or more datagram-based designs
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4685 [Pluggable transport]: Design and implement further pluggable transport extensions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4682 [Tor Relay]: Evaluate proposal 182 and compare it to other designs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4671 [Analysis]: Start a list of designs that are related to proposal 182
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4678 [Orbot]: Orbot fails to start on Asus Transformer with Prime 2.1.1 FW
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4686 [Metrics Data Processor]: Decide whether we want to archive consensus download times
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4661 [Metrics Utilities]: When metrics fetches a consensus from each authority, remember fetch duration
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4678 [Orbot]: Orbot fails to start on Asus Transformer with Prime 2.1.1 FW
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4687 [Metrics Data Processor]: Provide metrics data from the last 3--7 days via rsync
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4678 [Orbot]: Orbot fails to start on Asus Transformer with Prime 2.1.1 FW
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4678 [Orbot]: Orbot fails to start on Asus Transformer with Prime 2.1.1 FW
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4676 [Tor Relay]: Eliminate "family" field in tor_addr_t
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4655 [Tor Hidden Services]: Try clearing stream-isolation state on newly opened rendezvous circs
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4688 [Tor Relay]: control-spec doesn't specify rounding for status/clients-seen
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4665 [EFF-HTTPS Everywhere]: Breaks NSF award search
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4689 [Tor Cloud]: Run AMI-Exposed against Tor Cloud images
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4013 [Tor Client]: Tor 0.2.3.x client can't use 0.2.2.x bridge
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4690 [Tor Support]: Use article section on RT to help new support assistants get started
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Browser]: Tor Browser Bundle Linux - Vidalia - Proxy Settings Getting By Passed
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Browser]: Tor Browser Bundle Linux - Vidalia - Proxy Settings Getting By Passed
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken (was: Tor Browser Bundle Linux - Vidalia - Proxy Settings Getting By Passed)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4691 [Tor Client]: building libnatpmp doesn't work on unix
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4691 [Tor Client]: building libnatpmp doesn't work on unix
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4691 [Tor Client]: building libnatpmp doesn't work on unix
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4462 [TorBrowserButton]: TBB tries to 'restore session' if Firefox crashed last time; then it exits when I click restore; also, isn't remembering session state dangerous?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4691 [Tor Client]: building libnatpmp doesn't work on unix
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4691 [Tor Client]: building libnatpmp doesn't work on unix
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4691 [Tor Client]: building libnatpmp doesn't work on unix
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4692 [Tor Relay]: If only a working static OpenSSL is available, ./configure fails
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4693 [Pluggable transport]: Start using doxygen with obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4666 [Company]: Write proposal for proof-of-work service
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4694 [arm]: Merge request: UPnP support
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4695 [Torperf]: scumbag tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4695 [Torperf]: scumbag tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4695 [Torperf]: scumbag tor
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4696 [Tor Client]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4698 [Tor Hidden Services]: MapAddress fails when both arguments are .onion addresses.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4698 [Tor Hidden Services]: MapAddress fails when both arguments are .onion addresses.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4699 [Tor Client]: Tor resolves invalid .onion addresses when AutomapHostsOnResolve is 1.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4700 [Tor Hidden Services]: Tor should provide a mechanism for hidden services to differentiate authorized clients.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4334 [TorBrowserButton]: Tor mistakes single word for URL
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4701 [TorBrowserButton]: "new identity" (& "cookie protection") is always gray
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4693 [Pluggable transport]: Start using doxygen with obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4221 [Tor Cloud]: change login user for EC2 Image
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4075 [Analysis]: Tracking of Bridge reachability
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4690 [Tor Support]: Use article section on RT to help new support assistants get started
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3757 [Tor bundles/installation]: Tor 'Expert Bundle' for Windows does not install files into default directory
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4693 [Pluggable transport]: Start using doxygen with obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4699 [Tor Client]: Tor resolves invalid .onion addresses when AutomapHostsOnResolve is 1.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4698 [Tor Hidden Services]: MapAddress should be able to map from invalid .onion names (was: MapAddress fails when both arguments are .onion addresses.)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4702 [Tor Relay]: Crash in init_dh_param on Tor 0.2.3.9-alpha
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4692 [Tor Relay]: If only a working static OpenSSL is available, ./configure fails
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4694 [arm]: Merge request: UPnP support
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4702 [Tor Relay]: Crash in init_dh_param on Tor 0.2.3.9-alpha
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4703 [Tor Client]: Compilation with clang 3.0 currently fails with warnings enabled
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4703 [Tor Client]: Compilation with clang 3.0 currently fails with warnings enabled
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4702 [Tor Relay]: Crash in init_dh_param on Tor 0.2.3.9-alpha
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4703 [Tor Client]: Compilation with clang 3.0 currently fails with warnings enabled
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4702 [Tor Relay]: Crash in init_dh_param on Tor 0.2.3.9-alpha
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4702 [Tor Relay]: Crash in init_dh_param on Tor 0.2.3.9-alpha
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4669 [TorBrowserButton]: Enable TLS False Start
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4596 [Torflow]: Tune PID control knobs
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4704 [Agile]: Mike Perry's Iteration Report 20111225
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4597 [Agile]: Mike Perry's Iteration Report 20111211
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2875 [Tor Browser]: Spoof Desktop Resolution in TorBrowser
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2872 [Tor Browser]: Limit the fonts available in TorBrowser
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4597 [Agile]: Mike Perry's Iteration Report 20111211
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4705 [Tor Browser]: Support Firefox 9
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4706 [TorBrowserButton]: Release Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4707 [Tor Browser]: Update TBB design doc
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4708 [Torflow]: Implement bwauth cap for latency
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4709 [Torflow]: Implement bwauth cap for TCP socket exhaustion
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4710 [Tor Relay]: Tor does not convert TCP socket exhaustion to END_STREAM_REASON_RESOURCELIMIT
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4709 [Torflow]: Implement bwauth cap for TCP socket exhaustion
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4710 [Tor Relay]: Tor does not convert TCP socket exhaustion to END_STREAM_REASON_RESOURCELIMIT
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4709 [Torflow]: Implement bwauth cap for TCP socket exhaustion
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4703 [Tor Client]: Compilation with clang 3.0 currently fails with warnings enabled
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4711 [Vidalia]: Vidalia Proxy settings partly loss after toggle.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4712 [Tor Relay]: Review and update any existing patches for proposal 182
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4712 [Tor Relay]: Review and update any existing patches for proposal 182
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4712 [Tor Relay]: Review and update any existing patches for proposal 182
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3825 [Tor Hidden Services]: HS intro points overloaded with CREATE cells cause connectivity failures
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4560 [Pluggable transport]: Write down the threat model of obfs2
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4558 [Pluggable transport]: Write an architecture overview of obfsproxy
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4713 [Metrics Utilities]: Review new consensus-health check implementation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4713 [Metrics Utilities]: Review new consensus-health check implementation
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4714 [Tor Support]: Have RT send an email to owner when ticket is updated
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4696 [Tor Relay]: add OutboundBindInterface option to torrc
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4715 [Tor Relay]: computer is too slow while the CPU is idle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3994 [Tor bundles/installation]: Get TorBrowser in Debian
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4537 [Tor Directory Authority]: Make tor26 not v1 dir auth anymore?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3391 [arm]: add arm to the official tor deb repository
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4716 [- Select a component]: Bug on oreniric last update
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: Bug on oreniric last update
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: Bug on oreniric last update
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings (was: Bug on oreniric last update)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4537 [Tor Directory Authority]: Make tor26 not v1 dir auth anymore?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4537 [Tor Directory Authority]: Make tor26 not v1 dir auth anymore?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4710 [Tor Relay]: Tor does not convert TCP socket exhaustion to END_STREAM_REASON_RESOURCELIMIT
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4717 [- Select a component]: OK so i install Tor Browser and i cant login to every web
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4402 [Thandy]: Thandy should ignore config files only when upgrading a package
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4718 [TorBrowserButton]: Perform versioncheck periodically in background
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4719 [Tor Cloud]: Tor Cloud image for the South America (Sao Paulo) region
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4720 [Vidalia]: Build and test Vidalia 0.3.x with Qt 4.7 and make Windows and OS X Vidalia bundles for testers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4045 [Vidalia]: Test Vidalia-0.3.1-rc (alpha release)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4721 [Tor Relay]: Control socket available prior to generating DH modulus
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows (was: Rearranging tabs broken with Torbutton 1.4.5)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4723 [- Select a component]: Outback Steakhouse Coupons Latest Arrivals
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4724 [Vidalia]: Vidalia should not provide HTTP proxy option
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4663 [Tor Client]: Tor proxy settings bypassed when proxy is down/broken
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4726 [Tor Bridge]: Doxyzenize the file-level documentation of transports.c.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4726 [Tor Bridge]: Doxyzenize the file-level documentation of transports.c.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4721 [Tor Relay]: Control socket available prior to generating DH modulus
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4439 [Metrics Utilities]: Develop a Java/Python API that wraps relay descriptor sources and provides unified access to them
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4719 [Tor Cloud]: Tor Cloud image for the South America (Sao Paulo) region
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4719 [Tor Cloud]: Tor Cloud image for the South America (Sao Paulo) region
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4719 [Tor Cloud]: Tor Cloud image for the South America (Sao Paulo) region
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4639 [Tor bundles/installation]: Tails bugs/improvements
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4728 [Tor Browser]: torbutton icon missing from aurora toolbar
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4729 [- Select a component]: AddressSanitizer detects numerous errors in Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4729 [Tor Client]: AddressSanitizer detects numerous errors in Tor
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4730 [Torflow]: Bwuath: Use only "slow" measurements for positive feedback
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4709 [Torflow]: Implement bwauth cap for TCP socket exhaustion
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4302 [EFF-HTTPS Everywhere]: Enabling GoogleServices but not Google Search sometimes breaks results links
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1702 [Company]: backup pg on jepsonii
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4687 [Metrics Data Processor]: Provide metrics data from the last 3--7 days via rsync
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4451 [Tor Support]: Spam on RT - anything we can do?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3915 [Tor Client]: Control listener on /var/run/tor/control
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3774 [Tor Client]: ControlSocket file not honored in tor configuration
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3650 [Tor bundles/installation]: Ubuntu Natty tor package recommends polipo and tsocks
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4703 [Tor Client]: Compilation with clang 3.0 currently fails with warnings enabled
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4731 [Tor Bridge]: enabling full country name output for "status/clients-seen" (2-letter code already implemented)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2630 [Company]: make all our systems use security aware resolvers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4730 [Torflow]: Bwuath: Use only "slow" measurements for positive feedback
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4732 [Tor Browser]: Tor Browser Bundle Slow To Start In Linux
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4733 [Tor Relay]: test suite fails on the hurd
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4733 [Tor Relay]: test suite fails on the hurd
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4728 [Tor Browser]: torbutton icon missing from aurora toolbar
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4734 [Tor Relay]: Tor DNS resolver only supports UDP sockets so can't resolve large RRs
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4735 [HTTPS Everywhere: Chrome]: HTTPS Everywhere breaks pogo.com avatar editing
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4735 [EFF-HTTPS Everywhere]: HTTPS Everywhere breaks pogo.com avatar editing
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4734 [Tor Relay]: Tor DNS resolver only supports UDP sockets so can't resolve large RRs
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4731 [Tor Bridge]: enabling full country name output for "status/clients-seen" (2-letter code already implemented)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4726 [Tor Bridge]: Doxyzenize the file-level documentation of transports.c.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4558 [Pluggable transport]: Write an architecture overview of obfsproxy
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4736 [Vidalia]: Please add option to disable warnings about Tor version
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4736 [Vidalia]: Please add option to disable warnings about Tor version
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4558 [Pluggable transport]: Write an architecture overview of obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4560 [Pluggable transport]: Write down the threat model of obfs2
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4558 [Pluggable transport]: Write an architecture overview of obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4560 [Pluggable transport]: Write down the threat model of obfs2
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3825 [Tor Hidden Services]: HS intro points overloaded with CREATE cells cause connectivity failures
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4732 [Tor Browser]: Tor Browser Bundle Slow To Start In Linux
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4722 [TorBrowserButton]: Rearranging tabs broken with Torbutton 1.4.5 on Windows
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4706 [TorBrowserButton]: Release Torbutton 1.4.5
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4737 [Tor Browser]: Running Firefox & Tor At The Same Time - Can't Shutdown & Restart Firefox
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4737 [Tor Browser]: Running Firefox & Tor At The Same Time - Can't Shutdown & Restart Firefox
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4738 [Tor Browser]: browser.startup.homepage_override.buildID; 20111215062133
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4739 [Company]: tor-qa list name poorly chosen
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4715 [Tor Relay]: computer is too slow while the CPU is idle
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4345 [Tor Relay]: Bug: closing wedged cpuworker.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4740 [Torbutton]: Unable to customize Firefox toolbar
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4737 [Tor Browser]: Running Firefox & Tor At The Same Time - Can't Shutdown & Restart Firefox
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4731 [Tor Bridge]: enabling full country name output for "status/clients-seen" (2-letter code already implemented)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4739 [Company]: tor-qa list name poorly chosen
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4739 [Company]: tor-qa list name poorly chosen
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4590 [Website]: easy download page has sig for windows but not others
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4159 [Website]: Documentation Validating/Verifying before installing
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4590 [Website]: easy download page has sig for windows but not others
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4737 [Tor Browser]: Running Firefox & Tor At The Same Time - Can't Shutdown & Restart Firefox
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4731 [Tor Bridge]: enabling full country name output for "status/clients-seen" (2-letter code already implemented)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4430 [TorBrowserButton]: Session Store filter sometimes fails?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4430 [TorBrowserButton]: Session Store filter sometimes fails?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4271 [Torflow]: Perform some integrity checking in bw auth fetches
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4559 [Pluggable transport]: Write an obfs2 specification document
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4559 [Pluggable transport]: Write an obfs2 specification document
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4741 [Pluggable transport]: obfsproxy: don't log transmissions of a closed connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4741 [Pluggable transport]: obfsproxy: don't log transmissions of a closed connection
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4742 [Pluggable transport]: obfsproxy: usage() is outdated
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4742 [Pluggable transport]: obfsproxy: usage() is outdated
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3382 [Pluggable transport]: Improve general code quality of obfsproxy
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4744 [Tor Bridge]: GFW probes based on Tor's SSL cipher list (?)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4185 [Tor Bridge]: Bridge easily detected by GFW
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4745 [Tor Relay]: Possible flaws in sockaddr validation in connection_handle_listener_read()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4746 [Tor Relay]: Add a header to 'keys/dynamic_dh_params'.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4746 [Tor Relay]: Add a header to 'keys/dynamic_dh_params'.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4746 [Tor Relay]: Add a header to 'keys/dynamic_dh_params'.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4746 [Tor Relay]: Add a header to 'keys/dynamic_dh_params'.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4744 [Tor Bridge]: GFW probes based on Tor's SSL cipher list (?)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4727 [Tor Client]: Porting to Haiku (Patch increasing portability)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4742 [Pluggable transport]: obfsproxy: usage() is outdated
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4745 [Tor Relay]: Possible flaws in sockaddr validation in connection_handle_listener_read()
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4747 [Tor Relay]: getsockname in connection_handle_listener_read should be getpeername
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4747 [Tor Relay]: getsockname in connection_handle_listener_read should be getpeername
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4745 [Tor Relay]: Possible flaws in sockaddr validation in connection_handle_listener_read()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4741 [Pluggable transport]: obfsproxy: don't log transmissions of a closed connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4559 [Pluggable transport]: Write an obfs2 specification document
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4747 [Tor Relay]: getsockname in connection_handle_listener_read should be getpeername
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4747 [Tor Relay]: getsockname in connection_handle_listener_read should be getpeername
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4745 [Tor Relay]: Possible flaws in sockaddr validation in connection_handle_listener_read()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4747 [Tor Relay]: getsockname in connection_handle_listener_read should be getpeername
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4748 [Tor Client]: --defaults-torrc is not documented in manpage
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4531 [Tor Client]: connection_tls_start_handshake(): inconstistency checks of conn->tls
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4749 [Torbutton]: Torbutton 1.4.5.1 will not save Exceptions in the Firefox cookie manager
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3825 [Tor Hidden Services]: HS intro points overloaded with CREATE cells cause connectivity failures
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4750 [Company]: Mailing list for support assistants
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3825 [Tor Hidden Services]: HS intro points overloaded with CREATE cells cause connectivity failures
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4740 [Torbutton]: Unable to customise Firefox toolbar (was: Unable to customize Firefox toolbar)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3587 [Tor Bridge]: Accounting should work with pluggable transports
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4531 [Tor Client]: connection_tls_start_handshake(): inconstistency checks of conn->tls
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4751 [Tor Bridge]: Clarify function names and documention in transports.c
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4751 [Tor Bridge]: Clarify function names and documention in transports.c
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4725 [Tor Bridge]: Managed proxies should not bind locally by default
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4531 [Tor Client]: connection_tls_start_handshake(): inconstistency checks of conn->tls
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4752 [Tor Client]: Older command-line behavior of -log might be more reasonable
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3825 [Tor Hidden Services]: HS intro points overloaded with CREATE cells cause connectivity failures
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4752 [Tor Client]: Older command-line behavior of -log might be more reasonable
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4496 [Tor Support]: Create an IM bot that can send out software and documentation
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4750 [Company]: Mailing list for support assistants
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4750 [Company]: Mailing list for support assistants
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4753 [Tor Client]: Tor Client Bug
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4732 [Tor Browser]: Tor Browser Bundle Slow To Start In Linux
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4754 [Torbutton]: Firefox fails to start if Torbutton is enabled and the network is inaccessible.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4754 [Torbutton]: Firefox fails to start if Torbutton is enabled and the network is inaccessible.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4732 [Tor Browser]: Tor Browser Bundle Slow To Start In Linux
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4754 [Torbutton]: Firefox fails to start if Torbutton is enabled and the network is inaccessible.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4754 [Torbutton]: Firefox fails to start if Torbutton is enabled and the network is inaccessible.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4732 [Tor Browser]: Tor Browser Bundle Slow To Start In Linux
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4732 [Tor Browser]: Tor Browser Bundle Slow To Start In Linux
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4750 [Company]: Mailing list for support assistants
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4753 [Tor Client]: Tor Client Bug: "connection_stop_reading: Assertion conn->read_event failed; aborting." (was: Tor Client Bug)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4755 [TorBrowserButton]: Spoof screen coordinates on DOM MouseEvent
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4755 [TorBrowserButton]: Spoof screen coordinates on DOM MouseEvent
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2875 [Tor Browser]: Spoof Desktop Resolution in TorBrowser
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4705 [Tor Browser]: Support Firefox 9
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4740 [Torbutton]: Unable to customise Firefox toolbar
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4740 [Torbutton]: Unable to customise Firefox toolbar
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4750 [Company]: Mailing list for support assistants
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4714 [Tor Support]: Have RT send an email to owner when ticket is updated
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4714 [Tor Support]: Have RT send an email to owner when ticket is updated
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4573 [Tor Support]: Need right-to-left editor for Request Tracker
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4412 [Tor Support]: Evaluate the Tor support system
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4756 [Tor Browser]: build-scripts/INSTALL instructions out-of-date
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2198 [Polipo]: Polipo cron task returns with exit code 1 if Polipo is not running
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1240 [Tor Relay]: stop calling getsockname if accept returns a bad address
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4413 [Tor Relay]: Non-triggerable integer overflow in crypto_random_hostname()
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4757 [Tor Browser]: Tor issues (??) on Firefox 8.0.1, Mac OS X 10.7.2
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4413 [Tor Relay]: Non-triggerable integer overflow in crypto_random_hostname()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4754 [Torbutton]: Firefox fails to start if Torbutton is enabled and the network is inaccessible.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4758 [Torbutton]: TorButton 1.4.5.1 requires Navigation Bar
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3313 [Tor Client]: Security enhancement against malware for Tor
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3749 [Tor Check]: integrate html redesign into check.tpo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4297 [BridgeDB]: Teach bridgedb how to handle descriptors with IPv6 addresses
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4760 [Tor Bridge]: "ORPort [::]:9001" sometimes listens to both IPv4 and IPv6, sometimes to IPv4 only.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4760 [Tor Bridge]: "ORPort [::]:9001" sometimes listens to both IPv4 and IPv6, sometimes to IPv4 only.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4697 [Tor Relay]: Assertion connection_state_is_connecting(conn) failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2681 [Tor Client]: brainstorm ways to let Tor clients use yesterday's consensus more safely
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4761 [Tor Hidden Services]: HSes could join a client's rend circ before the INTRODUCE_ACK arrives
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1101 [Tor Client]: getinfo config-file doesn't handle relative paths well
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2571 [Tor Client]: warn if entrynodes set but useentrynodes 0
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2411 [Tor Client]: expand getinfo circuit-status to show build_state flags
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3457 [Tor Client]: Expose more circuit state-change events to controllers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4075 [Analysis]: Tracking of Bridge reachability
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4762 [Tor Bridge]: I'm using Linux Puppy which runs as ROOT always. Your install script cant be run in root.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4763 [Tor Browser]: TorBrowser remembers location of last locally-opened file: "File > Open File ..."
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4764 [Tor Browser]: TorBrowser: add secure wiping to 'Clear Recent History' (ideally automatic, on shutdown)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4765 [Company]: Turn tor-translation into a private mailing list
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3749 [Tor Check]: integrate html redesign into check.tpo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3749 [Tor Check]: integrate html redesign into check.tpo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3749 [Tor Check]: integrate html redesign into check.tpo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4761 [Tor Hidden Services]: HSes could join a client's rend circ before the INTRODUCE_ACK arrives
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2575 [Tor Relay]: No DNS means no exiting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4762 [Tor Bridge]: I'm using Linux Puppy which runs as ROOT always. Your install script cant be run in root.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4762 [Tor bundles/installation]: I'm using Linux Puppy which runs as ROOT always. Your install script cant be run in root.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4759 [Tor Hidden Services]: Rend circ corresponding to an intro circ is looked up improperly
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4744 [Tor Bridge]: GFW probes based on Tor's SSL cipher list (?)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3749 [Tor Check]: integrate html redesign into check.tpo
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4766 [Tor Browser]: check always tells me to upgrade
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4766 [Tor Browser]: check always tells me to upgrade
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4767 [Torbutton]: torbutton disables the possibility to drag and save shortcut links
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4767 [Torbutton]: torbutton disables the possibility to drag and save shortcut links
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1297 [Tor Hidden Services]: Update hidden service logic to be more resilient to timeout
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3457 [Tor Client]: Expose more circuit state-change events to controllers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4634 [Company]: Need a VM to set up web log analysis tools
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4768 [Pluggable transport]: obfsproxy: support autoconf 2.59
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4716 [Tor bundles/installation]: vidalia-0.2.15-1~oneiric tries to start a per-user Tor with system-wide settings
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3056 [Tor Relay]: tor/vidalia, debian libevent-2.0-5 eventdns: Address mismatch? etc.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1297 [Tor Hidden Services]: Update hidden service logic to be more resilient to timeout
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4769 [Torbutton]: browser.cache.disk_cache_ssl should be set to "false"
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4770 [Tor Browser]: TorBrowser RAM cache capacity not configured, re: "browser.cache.memory.capacity"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2943 [Vidalia]: Vidalia will launch Firefox a second time when Tor sends CIRCUIT_ESTABLISHED
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3195 [Vidalia]: Vidalia in TBB gives no hint that there's a browser window coming
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3759 [Vidalia]: 'Basic' message log discards non-oldest entries when full
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4771 [BridgeDB]: bridgedb should make clearer in its logs which addresses it knows are from bulk-exitlist
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4772 [BridgeDB]: bridgedb doesn't read the new log severity on hup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4290 [Vidalia]: Vidalia should not let users check "Use Bridges" without entering any
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3729 [Pluggable transport]: obfsproxy rate limiting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3729 [Pluggable transport]: obfsproxy rate limiting
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4773 [Tor Bridge]: Implement Extended OR port (part of proposal 180)
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4774 [Tor Browser]: TorBrowser Aurora build optimized for Windows OS
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4770 [Tor Browser]: TorBrowser RAM cache capacity not configured, re: "browser.cache.memory.capacity"
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4304 [Vidalia]: Vidalia should check the length of authentication-cookie files
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4379 [Vidalia]: workaround for setting socks port to 9050 on OS X does NOT work
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2107 [Vidalia]: When running a relay, Vidalia doesn't close when Windows shuts down
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2131 [Vidalia]: Windows Requires Login As Administrator
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3587 [Tor Bridge]: Accounting should work with pluggable transports
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2135 [Vidalia]: Generalize Vidalia's configuration for Firefox
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2136 [Vidalia]: Add more config file options to Vidalia
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2163 [Vidalia]: Disable menubar icon in OS X
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3587 [Tor Bridge]: Accounting should work with pluggable transports
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4656 [Vidalia]: Textboxes of "Bandwidth limits" in Vidalia squeezed
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4037 [Vidalia]: Search for Relay
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3635 [Vidalia]: Start/stop tor is not logical
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4191 [Vidalia]: Unable to set Tor as a "middle relay."
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4191 [Vidalia]: Unable to set Tor as a "middle relay."
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3386 [Tor bundles/installation]: Windows TBB: Vidalia cannot find Tor executable
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3386 [Tor bundles/installation]: Windows TBB: Vidalia cannot find Tor executable
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4775 [Tor Browser]: Re-open Aurora/Firefox within Tor Browser Bundle for Mac
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4778 [Tor Relay]: Bug in timer{add, sub} compatibility functions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4778 [Tor Relay]: Bug in timer{add, sub} compatibility functions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2319 [Vidalia]: Windows Vidalia Bundle stores Tor DataDirectory and Vidalia config dir in Roaming AppData directory
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4778 [Tor Relay]: Bug in timer{add, sub} compatibility functions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4778 [Tor Relay]: Bug in timer{add, sub} compatibility functions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3874 [Vidalia]: If tor dies while vidalia is waiting for port.conf, vidalia should notice better
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3988 [Vidalia]: Test Vidalia-0.2.15-rc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3342 [Vidalia]: Bridge usage summary in git alpha says time in GMT but doesn't say it does
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2644 [Vidalia]: Choosing to relay should not default to being an exit
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2188 [Vidalia]: Feature Request: Bandwidth Display Lock
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3843 [Vidalia]: Linux TBB: Vidalia + "controlport auto" = missing port.conf file
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2581 [Vidalia]: Add easiers ways to copy bridge information
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4776 [Metrics Website]: useful metrics network page graph: cdf of advertised bandwidth
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4776 [Metrics Website]: useful metrics network page graph: cdf of advertised bandwidth
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4642 [Vidalia]: Upgrade non-exit relay from old Vidalia to Vidalia 0.2.15 and get marked an exit relay
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4777 [arm]: Proc tools should account for big-endian architectures
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4780 [Tor Relay]: Make install runs even if make test fails
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4781 [Tor Relay]: Tor does not run a self test at startup
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4782 [- Select a component]: Impossible to run Tor Browser Bundle on Windows 7 as normal user
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Impossible to run Tor Browser Bundle on Windows 7 as normal user
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Impossible to run Tor Browser Bundle on Windows 7 as normal user
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Impossible to run Tor Browser Bundle on Windows 7 as normal user
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Impossible to run Tor Browser Bundle on Windows 7 as normal user
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Impossible to run Tor Browser Bundle on Windows 7 as normal user
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4773 [Tor Bridge]: Implement Extended OR port (part of proposal 180)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2728 [Vidalia]: Request: "Restart Proxy Application" button
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4783 [Tor Browser]: Set Referrer to loaded website
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4784 [Tor Relay]: Exit enclave mode does not work
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4773 [Tor Bridge]: Implement Extended OR port (part of proposal 180)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4778 [Tor Relay]: Bug in timer{add, sub} compatibility functions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4778 [Tor Relay]: Bug in timer{add, sub} compatibility functions
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4785 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4785 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4780 [Tor Relay]: Make install runs even if make test fails
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4781 [Tor Relay]: Tor does not run a self test at startup
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4784 [Tor Relay]: Exit enclave mode does not work
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3587 [Tor Bridge]: Accounting should work with pluggable transports
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4787 [Website]: www.torproject.org hidden service appears dead
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4784 [Tor Relay]: Exit enclave mode does not work
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Firefox gives confusing error message when TBB is run from a directory which it cannot write to (was: Impossible to run Tor Browser Bundle on Windows 7 as normal user)
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4339 [Tor Relay]: Turn on the last part of proposal 110
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Firefox gives confusing error message when TBB is run from a directory which it cannot write to
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4782 [Tor Browser]: Firefox gives confusing error message when TBB is run from a directory which it cannot write to
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4789 [- Select a component]: Firefox is already running -error message
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4185 [Tor Bridge]: Bridge easily detected by GFW
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1297 [Tor Hidden Services]: Update hidden service logic to be more resilient to timeout
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4790 [Tor Browser]: Aurora (Browser) does not open
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4791 [Vidalia]: Vidalia control panel pops up even though "Show this window on startup" is unchecked
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4740 [Torbutton]: Unable to customise Firefox toolbar
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4792 [Tor Relay]: Network throughput on tor relay stalls
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4463 [Website]: Set up web log analysis tool
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3763 [EFF-HTTPS Everywhere]: allow changing local rules without restarting Firefox
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4650 [Tor Client]: DisableDebuggerAttachment pretends to be disabled if you change it and hup
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4793 [Tor Browser]: BleachBit - Says Can't Clean Firefox Open
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4794 [Tor Browser]: NoScript Is Not Being Used Properly By The Tor Project
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4776 [Metrics Website]: useful metrics network page graph: cdf of advertised bandwidth
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4687 [Metrics Data Processor]: Provide metrics data from the last 3--7 days via rsync
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4795 [Tor bundles/installation]: TBB does not like the standard theme on Windows XP, Vista, and 7
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4796 [Tor Hidden Services]: circuitlist.c:1222: _circuit_mark_for_close: Assertion ocirc->rend_data failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4796 [Tor Hidden Services]: circuitlist.c:1222: _circuit_mark_for_close: Assertion ocirc->rend_data failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4795 [Tor bundles/installation]: TBB does not like the standard theme on Windows XP, Vista, and 7
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4795 [Tor Browser]: TBB does not like the standard theme on Windows XP, Vista, and 7
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4297 [BridgeDB]: Teach bridgedb how to handle descriptors with IPv6 addresses
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4747 [Tor Relay]: getsockname in connection_handle_listener_read should be getpeername
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4745 [Tor Relay]: Possible flaws in sockaddr validation in connection_handle_listener_read()
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4796 [Tor Hidden Services]: circuitlist.c:1222: _circuit_mark_for_close: Assertion ocirc->rend_data failed; aborting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4786 [Tor Relay]: Never downgrade cells from RELAY_EARLY to RELAY.
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2301 [BridgeDB]: migrate bridgedb to tor server
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1827 [Tor Client]: binding a socket for 18.0.0.1 to learn our interface address is freaking out users
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4665 [EFF-HTTPS Everywhere]: Breaks NSF award search
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4055 [EFF-HTTPS Everywhere]: HTTPS Everywhere breaks LastPass saved login
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4735 [EFF-HTTPS Everywhere]: HTTPS Everywhere breaks pogo.com avatar editing
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4246 [Website]: Create a JS-based clock-check page to diagnose HS problems
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4707 [Tor Browser]: Update TBB design doc
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2872 [Tor Browser]: Limit the fonts available in TorBrowser
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4797 [Tor Browser]: Find some font snobs to test font-limiting patch
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4181 [Vidalia]: Vidalia edited torrc file gets overwritten
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4182 [Vidalia]: Vidalia uses random SOCKS port
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3948 [Tor Client]: "fooport auto" should be able to get a hint
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4798 [Website]: Update docs/en/tor-hidden-service.wml with instructions for Win 7
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4799 [Company]: Mailing list for onionbox beta testers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4799 [Company]: Mailing list for onionbox beta testers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4799 [Company]: Mailing list for onionbox beta testers
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4185 [Tor Bridge]: Bridge easily detected by GFW
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4800 [Company]: Install script to generate RT stats
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #3729 [Pluggable transport]: obfsproxy rate limiting
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4743 [Pluggable transport]: obfsproxy: obfs2 server sends handshake message on client connection
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4801 [- Select a component]: Can a website see what websites you are viewing in other tabs?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4776 [Metrics Website]: useful metrics network page graph: cdf of advertised bandwidth
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4801 [Tor Browser]: Can a website see what websites you are viewing in other tabs?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4560 [Pluggable transport]: Write down the threat model of obfs2
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4558 [Pluggable transport]: Write an architecture overview of obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4558 [Pluggable transport]: Write an architecture overview of obfsproxy
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4802 [Vidalia]: Tor Network Map sort-by-country bugged
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4788 [Tor Directory Authority]: Reject all relays and bridges running 0.2.0.x
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4801 [Tor Browser]: Can a website see what websites you are viewing in other tabs?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4798 [Website]: Update docs/en/tor-hidden-service.wml with instructions for Win 7
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4803 [Tor Client]: Log message contains typo
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4804 [EFF-HTTPS Everywhere]: ram consumption
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4556 [Tor Client]: Write an IPv6 implementation and deployment roadmap draft
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4556 [Tor Client]: Write an IPv6 implementation and deployment roadmap draft
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1936 [Tor Relay]: "All nameservers have failed" eventdns message
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #1936 [Tor Relay]: "All nameservers have failed" eventdns message
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4805 [Vidalia]: Vidalia 0.2.15 update messed up with TOR config
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4805 [Vidalia]: Vidalia 0.2.15 update messed up with TOR config
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4803 [Tor Client]: Log message contains typo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4803 [Tor Client]: Log message contains typo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4803 [Tor Client]: Log message contains typo
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4806 [Tor Client]: Detect and warn when running IPv6-using client without IPv6 address privacy
- From: Tor Bug Tracker & Wiki
- [tor-bugs] #4807 [- Select a component]: Tor changes IP every 3-5 minutes
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4807 [- Select a component]: Tor changes IP every 3-5 minutes
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4803 [Tor Client]: Log message contains typo
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #2043 [Torflow]: soat with --target never ends?
- From: Tor Bug Tracker & Wiki
- Re: [tor-bugs] #4805 [Vidalia]: Vidalia 0.2.15 update messed up with TOR config
- From: Tor Bug Tracker & Wiki
Mail converted by MHonArc