Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '-childID'

Results (1 - 100 of 9285)

1 2 3 4 5 6 7 8 9 10 11
  • #393 defect: hidden services resolve hosts only once (assigned)
  • #449 defect: dns failures prevent legitimate options being set (assigned)
  • #465 enhancement: More fine-grained read/write control of formfills (new)
  • #469 defect: please limit connections by client (needs_revision)
  • #507 defect: tor-gencert linked against event/pthread (closed: fixed)
  • #584 enhancement: Clients process descriptor fetches as they arrive? (new)
  • #697 defect: Wrong DNS configuration could break navigation (new)
  • #925 defect: Tor fails badly when accept(2) returns EMFILE or ENFILE (new)
  • #940 enhancement: Multiple Identity Support (new)
  • #1029 enhancement: Tor relay should log message when it's working again after marking as down (new)
  • #1075 defect: reachability controller status events too liberal (new)
  • #1099 defect: Spurious bootstrap warnings if no-route-to-host (new)
  • #1102 defect: Queuing v3 signature for next consensus, an hour later? (needs_information)
  • #1116 defect: 'Stable' flag assignment inconsistant (new)
  • #1127 defect: no shutdown descriptor published when ORPort is closed but client stays up (new)
  • #1136 defect: When Tor is offline, it doesn't quite run out of relays, so doesn't ... (new)
  • #1181 defect: evdns_server_request_format_response() sets TC flag wrong (new)
  • #1193 defect: Measured BW Authority will not work on private networks with less than ... (new)
  • #1238 defect: Exit flag assigned can be assigned to nodes that don't really exit. (new)
  • #1247 enhancement: bootstrap hickups when network is down (new)
  • #1250 enhancement: strange SOCKS error code when connecting to a hidden service using the ... (new)
  • #1270 defect: Spec conformance issues on get_next_token() reported by outofwords (closed: wontfix)
  • #1299 defect: Tor should verify signatures before parsing (new)
  • #1354 defect: Configuring Tor with --with*dir gives wrong directories (assigned)
  • #1392 defect: Torbutton Addon interferes with toolbar buttons for add-ons (including ... (closed: worksforme)
  • #1593 task: Implement test (-t switch) functionality (closed: fixed)
  • #1623 enhancement: Block protocol handler enumeration (closed: fixed)
  • #1664 enhancement: [w/ PATCH] Disabling loading of images durings Tor (for performance) ... (closed: wontfix)
  • #1749 project: Split relay and link crypto across multiple CPU cores (assigned)
  • #1784 defect: RELAY_TRUNCATE should give cell queues a chance to flush (new)
  • #1802 defect: ControlPort GETCONF does not recognize command aliases (new)
  • #1839 enhancement: Rotate available bridges over time (closed: fixed)
  • #1854 task: Investigate raising the minimum bandwidth for getting the Fast flag (closed: wontfix)
  • #1889 defect: Contradictory bandwidth reports in overlapping extra-info descriptors (new)
  • #1907 defect: Unbalanced bandwidth reported in extra-info (closed: wontfix)
  • #1926 defect: Extra-info descriptors have corrupt {write,read}-history lines (new)
  • #1969 enhancement: Full i18n in preference (closed: fixed)
  • #1991 enhancement: Recognize poor guard performance and switch? (closed: wontfix)
  • #2003 enhancement: Hibernation Soft and Hard Limits Reached Simultaneously (assigned)
  • #2017 defect: ExitAuthority should be easier to run+resilient (closed: wontfix)
  • #2043 defect: soat with --target never ends? (closed: wontfix)
  • #2077 defect: Overwriting files can fail on Windows (needs_information)
  • #2085 enhancement: Vidalia should alert user about bridge status (closed: wontfix)
  • #2149 enhancement: new 'extra dormant' mode for people who never use their tor (closed: implemented)
  • #2150 defect: Autoconnect to a tor instance loaded after startup (closed: wontfix)
  • #2176 defect: Branding of TBB (closed: invalid)
  • #2178 defect: We launch dummy descriptor fetches more often than needed (new)
  • #2179 enhancement: Stream fairness: Stop packaging inbufs onto circuits greedily (new)
  • #2180 enhancement: We should test for fairness on entry and exit connections (new)
  • #2282 enhancement: Publish router descriptors rejected by the authorities or omitted from ... (new)
  • #2308 enhancement: Need instructions for using Vidalia when Tor is started at boot (closed: wontfix)
  • #2340 defect: protect users against freeze, replay and version-rollback attacks (new)
  • #2362 defect: "GETINFO config-text" adds spurious DataDirectory, Log entries (new)
  • #2394 enhancement: Visualize self-reported vs. measured bandwidth of relays (closed: wontfix)
  • #2395 enhancement: Break Wed and Wee weights into two classes each (assigned)
  • #2455 enhancement: Log IP of wrongly replying DNS-Server(s) (needs_revision)
  • #2473 project: Develop a design to support multiple bridge authorities (new)
  • #2482 defect: TLS issues with Torbutton (closed: fixed)
  • #2506 enhancement: Design and implement a more compact GeoIP file format (assigned)
  • #2507 defect: It's probably not spelled "NATD" (new)
  • #2536 enhancement: Disable outgoing token bucket and reduce token bucket refill interval (closed: wontfix)
  • #2544 enhancement: Report potential addon conflicts in a standard, observable way (closed: wontfix)
  • #2615 defect: ttdnsd crash (closed: wontfix)
  • #2628 project: Be smarter about launching connections to authorities to learn about ... (new)
  • #2664 enhancement: DoS and failure resistence improvements (new)
  • #2665 task: Create a dirauth DoS response procedure (new)
  • #2667 defect: Exits should block reentry into the tor network (new)
  • #2668 defect: Rate limit RELAY_EARLY and TLS by IP (closed: fixed)
  • #2681 enhancement: brainstorm ways to let Tor clients use yesterday's consensus more safely (new)
  • #2693 enhancement: Design and implement improved algorithm for choosing consensus method (new)
  • #2715 enhancement: Is rephist-calculated uptime the right metric for HSDir assignment? (new)
  • #2729 defect: Invalid Nodes are not described when used in a circuit (closed: wontfix)
  • #2734 defect: Windows (un)installers should prompt if Vidalia/Tor/Privoxy already running (closed: wontfix)
  • #2736 defect: Welcome screen too small to display message if French is choosen for ... (closed: wontfix)
  • #2739 defect: Clear Memory-Only Intermeditate Cert Store (new)
  • #2740 enhancement: Schedule different torrc options (e.g. bandwidth) at different times (closed: wontfix)
  • #2742 enhancement: Improved flushing of bw auth scanner log message output? (closed: wontfix)
  • #2743 defect: safelogging should cover hidden service name and intro-points too (assigned)
  • #2817 defect: Isolate Access to History navigation to Tor state preference does not work (closed: wontfix)
  • #2818 enhancement: Move SoaT to proper FF automation framework (closed: wontfix)
  • #2860 task: Research TCP connection patterns produced by web browsing (assigned)
  • #2874 enhancement: Block access to Components.interfaces from content script (closed: fixed)
  • #2877 defect: Prevent TLS state from accumulating in Tor Browser (closed: fixed)
  • #2878 enhancement: Don't bootstrap from an old consensus if we're about to replace it (closed: duplicate)
  • #2908 defect: Unable to move Torbutton button in FF4+ (closed: worksforme)
  • #2914 defect: Tor should truncate log file if loglevel < notice (needs_revision)
  • #2915 enhancement: Explore options to reduce binary size of Tor (new)
  • #2926 task: Update Tor Browser Bundle documentation (closed: wontfix)
  • #2938 enhancement: Add a simple activity indicator to the system tray (closed: wontfix)
  • #2940 enhancement: Adapt browser time based on tor's notion of clock skew... (new)
  • #2941 enhancement: Start Vidalia when my system starts (General Setting in OSX) (closed: wontfix)
  • #2950 defect: Make Permissions-Manager memory-only in TorBrowser (closed: fixed)
  • #2966 enhancement: Include bridge country codes in sanitized bridge descriptors (assigned)
  • #2967 defect: bad pidfile handling on ENOSPC (new)
  • #2983 defect: Errant circuit creation beyond MAPADDRESS validity (new)
  • #2991 defect: Confusing log messages when a DA starts using a new key (new)
  • #2998 defect: If your bridge is near your exit, Tor might surprise you by failing ... (new)
  • #3011 enhancement: Some ideas for Vidalia's network graph (closed: wontfix)
  • #3015 enhancement: Enhance bucket functionality (closed: fixed)
  • #3021 defect: Make the microdesc format a little more flexible, with optional TAP key (assigned)
1 2 3 4 5 6 7 8 9 10 11