Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '-childID'

Results (1 - 100 of 4493)

1 2 3 4 5 6 7 8 9 10 11
  • #393 defect: hidden services resolve hosts only once (assigned)
  • #449 defect: dns failures prevent legitimate options being set (new)
  • #465 enhancement: More fine-grained read/write control of formfills (new)
  • #469 defect: please limit connections by client (closed: worksforme)
  • #584 enhancement: Clients process descriptor fetches as they arrive? (new)
  • #664 enhancement: Torbutton should not present custom certs if tor is enabled (new)
  • #697 defect: Wrong DNS configuration could break navigation (closed: wontfix)
  • #925 defect: Tor fails badly when accept(2) returns EMFILE or ENFILE (closed: worksforme)
  • #940 enhancement: Multiple Identity Support (new)
  • #966 defect: Do positive DNS tests (closed: worksforme)
  • #975 defect: Torbutton prevents PKCS#12 import/export (new)
  • #1029 enhancement: Tor relay should log message when it's working again after marking as down (new)
  • #1075 defect: reachability controller status events too liberal (closed: invalid)
  • #1099 defect: Spurious bootstrap warnings if no-route-to-host (closed: invalid)
  • #1102 defect: Queuing v3 signature for next consensus, an hour later? (needs_information)
  • #1116 defect: 'Stable' flag assignment inconsistant (new)
  • #1127 defect: no shutdown descriptor published when ORPort is closed but client stays up (new)
  • #1136 defect: When Tor is offline, it doesn't quite run out of relays, so doesn't ... (new)
  • #1181 defect: evdns_server_request_format_response() sets TC flag wrong (new)
  • #1193 defect: Measured BW Authority will not work on private networks with less than ... (new)
  • #1238 defect: Exit flag assigned can be assigned to nodes that don't really exit. (new)
  • #1247 enhancement: bootstrap hickups when network is down (new)
  • #1250 enhancement: strange SOCKS error code when connecting to a hidden service using the ... (new)
  • #1299 defect: Tor should verify signatures before parsing (closed: wontfix)
  • #1354 defect: Configuring Tor with --with*dir gives wrong directories (new)
  • #1749 project: Split relay and link crypto across multiple CPU cores (assigned)
  • #1784 defect: RELAY_TRUNCATE should give cell queues a chance to flush (new)
  • #1802 defect: ControlPort GETCONF does not recognize command aliases (new)
  • #1889 defect: Contradictory bandwidth reports in overlapping extra-info descriptors (new)
  • #1926 defect: Extra-info descriptors have corrupt {write,read}-history lines (new)
  • #2003 enhancement: Hibernation Soft and Hard Limits Reached Simultaneously (assigned)
  • #2077 defect: Overwriting files can fail on Windows (needs_information)
  • #2178 defect: We launch dummy descriptor fetches more often than needed (new)
  • #2179 enhancement: Stream fairness: Stop packaging inbufs onto circuits greedily (new)
  • #2180 enhancement: We should test for fairness on entry and exit connections (new)
  • #2282 enhancement: Publish router descriptors rejected by the authorities or omitted from ... (new)
  • #2340 defect: protect users against freeze, replay and version-rollback attacks (new)
  • #2362 defect: "GETINFO config-text" adds spurious DataDirectory, Log entries (new)
  • #2395 enhancement: Break Wed and Wee weights into two classes each (new)
  • #2455 enhancement: Log IP of wrongly replying DNS-Server(s) (needs_revision)
  • #2473 project: Develop a design to support multiple bridge authorities (new)
  • #2506 enhancement: Design and implement a more compact GeoIP file format (assigned)
  • #2507 defect: It's probably not spelled "NATD" (new)
  • #2628 project: Be smarter about launching connections to authorities to learn about ... (new)
  • #2664 enhancement: DoS and failure resistence improvements (new)
  • #2665 task: Create a dirauth DoS response procedure (new)
  • #2667 defect: Exits should block reentry into the tor network (new)
  • #2681 enhancement: brainstorm ways to let Tor clients use yesterday's consensus more safely (new)
  • #2693 enhancement: Design and implement improved algorithm for choosing consensus method (new)
  • #2715 enhancement: Is rephist-calculated uptime the right metric for HSDir assignment? (new)
  • #2739 defect: Clear Memory-Only Intermeditate Cert Store (new)
  • #2743 defect: safelogging should cover hidden service name and intro-points too (assigned)
  • #2860 task: Research TCP connection patterns produced by web browsing (assigned)
  • #2914 defect: Tor should truncate log file if loglevel < notice (needs_revision)
  • #2915 enhancement: Explore options to reduce binary size of Tor (new)
  • #2940 enhancement: Adapt browser time based on tor's notion of clock skew... (new)
  • #2966 enhancement: Include bridge country codes in sanitized bridge descriptors (assigned)
  • #2967 defect: bad pidfile handling on ENOSPC (new)
  • #2983 defect: Errant circuit creation beyond MAPADDRESS validity (new)
  • #2991 defect: Confusing log messages when a DA starts using a new key (new)
  • #2998 defect: If your bridge is near your exit, Tor might surprise you by failing ... (new)
  • #3021 defect: Make the microdesc format a little more flexible, with optional TAP key (new)
  • #3028 enhancement: META: Support non-clique topologies on the network (new)
  • #3029 enhancement: We should save received documents before parsing them (new)
  • #3037 enhancement: Internal checks to detect client streams/circuits whose sock request ... (new)
  • #3080 defect: Bug: The application request to "jabber.org":5222 has launched 10 ... (new)
  • #3145 enhancement: excludeexitnodes by ip misleading when exit relay uses outboundbindaddress (new)
  • #3217 enhancement: When bridges change, only close the circuits for the bridges we ... (new)
  • #3241 defect: Seeing lots of "crypto error while reading public key from string" on DA (new)
  • #3266 defect: gabelmoo publishes only 1 extra-info descriptor per week (needs_information)
  • #3290 enhancement: Design some way to ensure circuit reuse for FTP (and other?) ... (new)
  • #3317 defect: Tor should lock its HiddenServiceDirs (new)
  • #3322 defect: We don't retry our bridges if we have an unconfigured bridge that's up (new)
  • #3459 enhancement: Expose information about dir conns to controllers (accepted)
  • #3501 enhancement: Teach Tor to run the Control Port over TLS (new)
  • #3511 enhancement: Automatically chosen published ports should be stable (assigned)
  • #3520 enhancement: CIRC FAILED REASON=DESTROYED events do not specify which hop sent the ... (new)
  • #3522 enhancement: Allow controllers to post HS descriptors to Tor's cache (new)
  • #3544 enhancement: Provide Linux users with help for getting Tor Browser icon added to menu (new)
  • #3566 enhancement: Should controller events respect SafeLogging 1 torrc option? (new)
  • #3572 defect: Disable Orbot transparent redirect for rfc1918 & localhost (assigned)
  • #3587 defect: Accounting should work with pluggable transports (new)
  • #3600 defect: Prevent redirects from transmitting+storing cookies+identifiers (new)
  • #3652 enhancement: Export clock skew opinion as getinfo command (needs_revision)
  • #3698 defect: Multi-line torrc options conflict with Windows paths (assigned)
  • #3711 task: Application support for optimistic data: Torsocks (needs_revision)
  • #3767 enhancement: Allow Tor to listen on a specific interface for ORPort (new)
  • #3777 defect: Should not generate mixed-content warnings if rewriting all http to https (accepted)
  • #3780 enhancement: GetTor and BridgeDB should share email processing code (new)
  • #3781 task: Write a spec for GetTor (new)
  • #3782 enhancement: Add native chroot support to Tor (new)
  • #3852 enhancement: Make DNS resolution happen on particular exit nodes for particular ... (new)
  • #3862 enhancement: gettor should automatically include bridges in its answer (new)
  • #3863 task: Do something smarter with Windows Tor crash dumps (reopened)
  • #3876 defect: Simplify format_win_commandline_argument() implementation. (new)
  • #3943 enhancement: self-test the socks port before bootstrapping is complete? (needs_information)
  • #3948 enhancement: "fooport auto" should be able to get a hint (new)
  • #3982 enhancement: MAPADDRESS for IP ranges (CIDR, etc) (reopened)
  • #4036 enhancement: Tor relays/bridges can detect when they are being filtered by SSL cert (new)
  • #4079 enhancement: Comb bw auth logs and fix or demote frequent ERRORs and WARNs (new)
1 2 3 4 5 6 7 8 9 10 11