Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'easy'

Results (101 - 200 of 313)

1 2 3 4
  • #18891 defect: Make it clear that Address only works for IPv4 (closed: fixed)
  • #18892 enhancement: Add IP versions to man page (closed: fixed)
  • #18918 defect: Clarify directory and ORPort checking functions (closed: implemented)
  • #18938 defect: Authorities should reject non-UTF-8 content in ExtraInfo descriptors (closed: duplicate)
  • #18982 defect: Tor should log 1-based hop numbers (closed: implemented)
  • #18988 enhancement: log error level messages if relay (self) is not in consensus (needs_revision)
  • #19013 defect: Authorities should log a more accurate message when reachability ... (new)
  • #19019 defect: When chutney fails because of ports, tell the user (new)
  • #19034 defect: Declaring authorities with matching relay keys should fail (new)
  • #19138 defect: Received extra server info (size 0) (new)
  • #19381 enhancement: wish: conditionally build man page (tor.1) and html doc using ... (new)
  • #19566 enhancement: SR: Use BUG() instead of tor_assert() when we can (closed: fixed)
  • #19669 defect: log_prefix_ maybe getting weird output from strftime (new)
  • #19679 enhancement: Collapsible FAQ items (new)
  • #19774 enhancement: bridges.torproject.org could use a favicon (assigned)
  • #19853 defect: ServerDNSAllowNonRFC953Hostnames affects clients, and ... (new)
  • #19926 defect: BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* (accepted)
  • #19959 enhancement: have a flag for Tor relay location, if a relay is hosted in a data ... (new)
  • #19979 enhancement: Use OpenSSL 1.1.0 HKDF in Tor when available. (closed: implemented)
  • #20035 enhancement: Identify client-specific options that work with hidden services (new)
  • #20045 enhancement: FAQ + man page entry for using Tor from an IPv6 only host. (closed: fixed)
  • #20061 defect: When unit testing in Tor2web mode, set the config correctly (new)
  • #20119 enhancement: Tor should exit if it fails to write its PidFile, under principle of ... (closed: fixed)
  • #20153 defect: VirtualAddrNetworkIPv6 man entry should say "[FC00::]/7" (new)
  • #20168 enhancement: Clarify our #if{n}def by commenting what they are at the #elif/#else/#endif (closed: fixed)
  • #20218 defect: Fix and refactor and redocument routerstatus_has_changed (needs_revision)
  • #20353 defect: evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails (new)
  • #20455 defect: bwauth cron scripts need to be run in the BwAuthority directory (new)
  • #20474 defect: Tor should try harder to choose nodes in small networks (closed: duplicate)
  • #20601 enhancement: Clients should reject outdated consensuses as soon as they parse them (new)
  • #20611 defect: Relays should log a message when they return a 503 error to a client (closed: wontfix)
  • #20625 enhancement: When a consensus doesn't have enough signatures, write it (and sigs) ... (needs_revision)
  • #20653 defect: Test targets should gracefully handle missing dependencies (new)
  • #20887 defect: DIRCACHE_MIN_MEM_MB does not stringify on FreeBSD, we should use %d instead (closed: fixed)
  • #21003 defect: extend_info_describe should list IPv6 address (if present) (needs_revision)
  • #21109 defect: apparent inconsistency in prop264 (closed: implemented)
  • #21115 enhancement: Building Tor With Static SNI (new)
  • #21281 enhancement: Allow process poll rate to be customized (new)
  • #21355 defect: Warn when IPv6Exits have no ipv6-policy line in their descriptor (new)
  • #21405 defect: Clarify "address" in man page: IPv4, IPv6, hostname? (closed: implemented)
  • #21466 enhancement: Get chutney's scripts working with standard shell script checking options (new)
  • #21716 defect: Avoid recursive call to routerlist_remove_old_routers via ... (new)
  • #21810 defect: Port rebind should not be performed after soft accounting limit reached (new)
  • #21910 enhancement: Refactor connection_edge_process_relay_cell() (new)
  • #22049 enhancement: The various proxy options should support an AF_LOCAL socket. (new)
  • #22068 defect: Make it explicit that Torsocks won't work correctly in certain ... (closed: fixed)
  • #22090 enhancement: Rename channel client functions for clarity (assigned)
  • #22110 defect: Defining TOR_BUILD_TAG and tor_git_revision violates the version spec (closed: fixed)
  • #22145 defect: Document which interface is used for DNS requests in the context of ... (closed: fixed)
  • #22214 defect: When authority certificates expire, give a better error message (new)
  • #22360 enhancement: chutney's --quiet mode could be quieter (new)
  • #22382 defect: Fix fd leak-on-close from tor-fw-helper pipe (new)
  • #22448 defect: Move circuit_t.timestamp_dirty into origin_circuit_t (new)
  • #22449 defect: Remove timestamp_dirty kludge from mark_circuit_unusable_for_new_conns() (new)
  • #22463 enhancement: Reduce REACHABLE_TIMEOUT in test networks (new)
  • #22491 defect: DownloadExtraInfo doesn't download bridge extra infos (new)
  • #22495 defect: Partial write in key-pinning-journal results in corrupted line (new)
  • #22668 enhancement: Add ed25519 public key to format_node_description and callers (new)
  • #22700 defect: Stop relays using the Client*IPv6* options (new)
  • #22723 defect: Avoid double-quoting esc_for_log output (new)
  • #22882 defect: The v4 link protocol requires the initiator to set the most significant bit (closed: fixed)
  • #22937 defect: Clarify how resolved values are encoded in cells (closed: fixed)
  • #23066 defect: Test granularity, distribution, and inner range of crypto_rand* functions (new)
  • #23092 defect: Stop ignoring CircuitIdleTimeout when it's lower than ... (closed: wontfix)
  • #23168 defect: Guard sample calls relay descriptors a "consensus" (needs_revision)
  • #23233 defect: Unexpected BUG violation in hsv3 decriptor decoding (closed: fixed)
  • #23237 enhancement: Add 'GETINFO ip-to-country/available' (closed: implemented)
  • #23271 defect: control_auth_cookie isn't deleted when tor stops (closed: fixed)
  • #23305 defect: hs: Maybe don't use REND_DESC_ID_V2_LEN_BASE32 as the length for a ... (closed: implemented)
  • #23459 defect: prop224: Specialize interface of hs_circuitmap_get_rend_circ_client_side() (closed: implemented)
  • #23537 defect: Allow the new sched to respond to a new conensus, not the old one. (closed: fixed)
  • #23538 defect: Allow KISTSchedRunInterval to be negative (closed: wontfix)
  • #23539 defect: We've defined "don't use kist" as a negative interval, so don't check ... (closed: fixed)
  • #23560 defect: Fix typo(s) in comment(s) in the scheduling system. (closed: fixed)
  • #23575 defect: Avoid printf warning in scheduler_ev_add (closed: fixed)
  • #23579 enhancement: sched: Add accessors for channel_pending list (accepted)
  • #23611 defect: misspelled reference "UseEntryGuardsAsDirectoryGuards" to obsolete ... (closed: fixed)
  • #23635 enhancement: improve AccountingStart manual entry (closed: fixed)
  • #23650 defect: Tor source code has many typos (closed: fixed)
  • #23678 defect: Tor kinda _is_ an http proxy now... (closed: fixed)
  • #23760 enhancement: Use node_get_curve25519_onion_key() in extend_info_from_node() (closed: implemented)
  • #23774 defect: sched: KIST doesn't free the socket info hashtable on free_all() (closed: fixed)
  • #23856 enhancement: Reduce relay bandwidth stats interval to 24 hours (closed: implemented)
  • #23859 defect: stem parse_file doesn't handle stdin (closed: fixed)
  • #23886 enhancement: Write FFI bindings and function pointers for ed25519-dalek (new)
  • #23966 enhancement: Refactor node_has_curve25519_onion_key() to use ... (closed: implemented)
  • #23976 defect: Stop setting CircuitIdleTimeout in chutney, it's obsolete (closed: wontfix)
  • #24001 enhancement: node_get_ed25519_id() should check if the microdesc ed25519 id is all zero (closed: implemented)
  • #24023 defect: Is proto required for alternate relay implementations? (closed: implemented)
  • #24230 defect: control: HS_DESC event failed upload sends back the wrong Action (closed: fixed)
  • #24262 defect: hs-v3: Change "hsdir-interval" to "hsdir_interval" to match the spec (closed: fixed)
  • #24312 defect: Update DirCache Warning (closed: implemented)
  • #24318 defect: Clarify that the RelayBandwidth* options exclude directory fetches by ... (closed: fixed)
  • #24338 defect: DirAuths that have IPv6 addresses don't include them in their vote on ... (closed: fixed)
  • #24484 defect: free(NULL) always works (nowadays) so stop acting like it might not (closed: fixed)
  • #24490 defect: Stop setting bridges running in networkstatus_getinfo_by_purpose() (new)
  • #24509 defect: circuit_can_use_tap() should only allow TAP for v2 onion services (needs_revision)
  • #24531 defect: sched: Add function to change scheduler state and always use it (closed: fixed)
  • #24558 defect: enable expensive hardening message is wrong with static library builds (closed: fixed)
  • #24572 defect: rewrite_node_address_for_bridge() doesn't set rs IPv6 addresses (closed: fixed)
1 2 3 4