Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with '032-unreached'

  • #3652 enhancement: Export clock skew opinion as getinfo command (needs_revision)
  • #4187 defect: A verified unverified-consensus should be renamed to cached-consensus (closed: fixed)
  • #7707 defect: Impose a minimum write size for TLS writes (needs_information)
  • #9001 defect: Slow Guard Discovery of Hidden Services and Clients (new)
  • #10510 defect: Getting a lot of system clock jumped messages (new)
  • #10871 defect: Download more microdescriptors with a shorter request (new)
  • #11101 enhancement: Bridges should report implementation versions of their pluggable transports (new)
  • #13043 defect: torspec lies about accepting both IPv4 and IPv6 for ORAddress lines (closed: fixed)
  • #14957 defect: Clients wait for an extra consensus before learning the correct ... (new)
  • #16844 defect: Slow clients can't bootstrap because they expire their consensus fetch ... (new)
  • #17848 defect: Tor ignores tunneled connections when checking existing directory downloads (new)
  • #18298 enhancement: reduce warn loglevel entry for missing ed25519_master_id_public_key to ... (new)
  • #18757 defect: Memunit config defaults say "KB" rather than "KBytes" (needs_revision)
  • #19174 defect: libscrypt check fails when libscrypt requires libm (needs_revision)
  • #19220 defect: Do not override Makefile user variables (new)
  • #19487 defect: Meek and ReachableAddresses (needs_revision)
  • #19669 defect: log_prefix_ maybe getting weird output from strftime (new)
  • #19987 enhancement: Unit Test Guard, Middle, Exit, Intro, and Rend node choices (new)
  • #20423 defect: Clock jumps on relay due to hostname lookup timeouts (reopened)
  • #21207 task: Test scenarios for clients that are idle for large periods of time (new)
  • #21346 defect: Clients with NoIPv4Traffic should only choose IPv6-supporting Exits (closed: not a bug)
  • #21659 enhancement: Prop275: When 0.2.9 is the oldest remaining supported series, make ... (new)
  • #21758 enhancement: Improve compression estimators for directory spooling (new)
  • #21765 defect: PortForwardingHelper stdout/stderr log forwarding seems fragile (closed: wontfix)
  • #21789 enhancement: Use cached address values more often (new)
  • #21809 defect: Tor sometimes waits much longer than ShutdownWaitLength (new)
  • #21810 defect: Port rebind should not be performed after soft accounting limit reached (new)
  • #21900 defect: evdns fails when resolv.conf is missing, but succeeds when resolv.conf ... (closed: fixed)
  • #22204 defect: I can't list a relay in my EntryNodes if it doesn't have the Guard flag (new)
  • #22210 defect: circuit_is_acceptable is slow due to IP and fingerprint parsing (new)
  • #22251 enhancement: Time to not require Tor relays to support old link versions? (new)
  • #22308 enhancement: Consider resetting wfu/mtbf/tk values for relays when they switch IP ... (new)
  • #22310 defect: Tor 0.3.x clients won't use Guard-flagged relays as Guards if they ... (closed: implemented)
  • #22331 defect: Tor needs to stop trying to read directories before it changes users (new)
  • #22358 enhancement: should dir auths count it as a downtime if descriptor uptime resets? (new)
  • #22473 defect: Do any controllers still use getinfo network-status? (new)
  • #22477 defect: Add -Wl,--large-address-aware to tor-for-Windows build chain (new)
  • #22495 defect: Partial write in key-pinning-journal results in corrupted line (new)
  • #22571 defect: AssumeReachable 1 on a relay doesn't make it publish quickly (new)
  • #22619 defect: SessionGroup = Reading config failed (accepted)
  • #22641 defect: If you setconf socksport=1000, it returns 553 error but then it sets ... (new)
  • #22660 defect: Guard against stack smashing attacks in tor with additional compiler ... (needs_revision)
  • #22663 defect: Tor keeps using a very slow guard (new)
  • #22758 defect: When starting with no authority certificates, launch certificate ... (new)
  • #22825 enhancement: test: Add unit tests for circuit_send_next_onion_skin() (new)
  • #22848 defect: Increase default Tor buffer sizes on Windows (new)
  • #22881 defect: Unreachable relays launch multiple testing circuits per second (new)
  • #22889 defect: Add "no peer authentication" to the list of client identification ... (new)
  • #22907 task: Investigate using cargo-vendor for offline dependencies (closed: fixed)
  • #22936 defect: Apply Windows Tor build patch for VS2015 (new)
  • #22994 defect: Use consistently named constants for relay command specifications (new)
  • #23082 defect: tor_addr_parse is overly permissive (closed: fixed)
  • #23094 enhancement: prop224: Optimize hsdir_index calculation (closed: implemented)
  • #23107 defect: prop224: Optimize hs_circ_service_get_intro_circ() digest calculation (closed: fixed)
  • #23113 defect: Manage DNS state better when "All nameservers have failed" (new)
  • #23126 enhancement: HSDirs should publish some count about new-style onion addresses (new)
  • #23163 defect: Wrong name for new tor config options (closed: fixed)
  • #23459 defect: prop224: Specialize interface of hs_circuitmap_get_rend_circ_client_side() (closed: implemented)
  • #23508 defect: large clock skews cause numerous bootstrap UX issues (new)