Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'intro'

Results (1 - 100 of 114)

1 2
  • #584 enhancement: Clients process descriptor fetches as they arrive? (new)
  • #1250 enhancement: strange SOCKS error code when connecting to a hidden service using the ... (new)
  • #2743 defect: safelogging should cover hidden service name and intro-points too (assigned)
  • #3511 enhancement: Automatically chosen published ports should be stable (assigned)
  • #3566 enhancement: Should controller events respect SafeLogging 1 torrc option? (new)
  • #3569 enhancement: Refactor socks parsing (closed: implemented)
  • #4391 defect: GETINFO ns/all doesn't return 'p' lines -- make something that does! (new)
  • #4445 enhancement: Gather WARN and ERROR log lines from bwauth children in aggregate.py (new)
  • #4696 enhancement: add OutboundBindInterface option to torrc (new)
  • #4806 enhancement: Detect and warn when running IPv6-using client without IPv6 address privacy (needs_revision)
  • #5271 enhancement: add log messages when a hidden service consistently doesn't have any ... (new)
  • #5915 enhancement: Write patch to make socks handshakes succeed instantly (new)
  • #6176 defect: Clean up service IDs (new)
  • #6313 project: Many of Tor's complex functions should be refactored (new)
  • #6504 enhancement: Support Windows environment variables in HiddenServiceDir (needs_information)
  • #7003 enhancement: Wipe relay key material from memory on common crash conditions (new)
  • #7106 project: Write "how to be nice to the Tor network" spec (new)
  • #7193 enhancement: Tor's sybil protection doesn't consider IPv6 (new)
  • #7479 defect: Replace more linked lists with queue.h implementations (new)
  • #7480 defect: cached_resolve_t expiration is overengineered (new)
  • #7755 defect: circuit_t::timestamp_dirty should be cleaned up (new)
  • #7798 defect: Use directory guards even when consensus isn't live (needs_information)
  • #7869 defect: ntor-onion-key is padded with an equal sign (needs_revision)
  • #8749 enhancement: Return information about the leaking application (new)
  • #9789 defect: TorFlow BandwidthAuthority sleep schedule (new)
  • #10168 enhancement: Use monotonic clocks for time as appropriate (new)
  • #10186 enhancement: Backtrace support for windows (assigned)
  • #10609 defect: aggregate.py should ignore empty scan-data files (needs_review)
  • #11059 enhancement: Nodes' country codes should be "definite" and "possible" (new)
  • #11325 defect: RFE: Adhere to XDB base directory specification (new)
  • #11360 enhancement: Listen on IPv6 by default for SocksPort *:Port (new)
  • #11542 defect: Add a new logging domain for transport proxies (assigned)
  • #13081 defect: Fix build with Visual Studio in Windows (new)
  • #13705 enhancement: Allow relays to promise in their descriptor that their IP address ... (new)
  • #13737 enhancement: Move circuit building crypto to worker (assigned)
  • #13738 enhancement: Make worker handle introduction point crypto (new)
  • #14137 enhancement: Make Tor tests pass under Wine (closed: worksforme)
  • #15015 defect: tor --verify-config should not bind to ports (closed: worksforme)
  • #15214 defect: networkstatus_compute_consensus() is unreasonably large and should be ... (new)
  • #15458 enhancement: StrongSocksIsolation option (w/ virtual circuits?) (new)
  • #15661 defect: Same "non-loopback address" notice is printed twice (new)
  • #16134 enhancement: The various stream lists tied to the circuit structures should use ... (new)
  • #16564 enhancement: Add a line to bridge descriptors specifying they're bridges? (assigned)
  • #16785 enhancement: Only build/use ed25519-donna. (new)
  • #16803 enhancement: Unit tests for sandbox failures (new)
  • #16822 enhancement: make certificate lifetime accessible through Tor's ControlPort (new)
  • #16894 task: Check all logging output is appropriately escaped / escaped_safe_str_client (new)
  • #17038 enhancement: Provide scripts to set up transparent proxying, where supported (new)
  • #17134 enhancement: Add a way to say "Use this option only if supported" in torrc (new)
  • #17782 defect: Relays may publish descriptors with incorrect IP address (needs_revision)
  • #17806 enhancement: Make onion queues rational, combine with workqueue logic. (new)
  • #17957 enhancement: Detect stolen onion service key (new)
  • #18105 enhancement: Replace getsockname with tor_getsockname (closed: implemented)
  • #18321 defect: Exclude our own vote from the consensus if we think our own vote is invalid (accepted)
  • #18491 defect: Stop logging identifying bridge info at 'notice' (closed: duplicate)
  • #18721 enhancement: Define accessors for connection_t's address fields (new)
  • #19320 enhancement: controller: expose and adjust timer values (new)
  • #19321 enhancement: controller: Ensure events exist for all guard state transitions (new)
  • #19324 enhancement: controller: events for hidden service intro point changes, descriptor ... (new)
  • #19326 enhancement: Examine fine-grained connection detail; expose via control API (new)
  • #19327 enhancement: controller: expose fine-grained circuit detail. (new)
  • #20061 defect: When unit testing in Tor2web mode, set the config correctly (new)
  • #20164 enhancement: Warn relay operators when we guess an address from several equally ... (new)
  • #20337 enhancement: Support abstract namespace AF_UNIX sockets. (new)
  • #20469 enhancement: Expose predicted-ports state over the control port (new)
  • #20719 enhancement: prop271 -- make parameters configurable (accepted)
  • #20872 enhancement: option to build non-standard code paths on x86 (new)
  • #21003 defect: extend_info_describe should list IPv6 address (if present) (new)
  • #21115 enhancement: Building Tor With Static SNI (new)
  • #21281 enhancement: Allow process poll rate to be customized (new)
  • #21355 defect: Warn when IPv6Exits have no ipv6-policy line in their descriptor (new)
  • #21405 defect: Clarify "address" in man page: IPv4, IPv6, hostname? (closed: implemented)
  • #21466 enhancement: Get chutney's scripts working with standard shell script checking options (new)
  • #21716 defect: Avoid recursive call to routerlist_remove_old_routers via ... (new)
  • #21864 defect: Support Bridges setting MyFamily to include Relays (new)
  • #22203 enhancement: Should a hup reload the geoip files? (new)
  • #22214 defect: When authority certificates expire, give a better error message (new)
  • #22304 enhancement: Support generating HS private key / onion address without publishing (new)
  • #22463 enhancement: Reduce REACHABLE_TIMEOUT in test networks (new)
  • #22469 defect: tor should probably reject "0x00" in port range specifications (new)
  • #22820 enhancement: Give the Exit flag to Exits that use the secure IRC port 6697 (closed: wontfix)
  • #23288 defect: refactor temporary file cleanup and make it more consistent (new)
  • #23856 enhancement: Reduce relay bandwidth stats interval to 24 hours (closed: implemented)
  • #24001 enhancement: node_get_ed25519_id() should check if the microdesc ed25519 id is all zero (closed: implemented)
  • #24312 defect: Update DirCache Warning (closed: implemented)
  • #24338 defect: DirAuths that have IPv6 addresses don't include them in their vote on ... (new)
  • #24393 enhancement: Clients should check IPv4 and IPv6 subnets when choosing circuit paths (closed: implemented)
  • #24490 defect: Stop setting bridges running in networkstatus_getinfo_by_purpose() (new)
  • #24509 defect: circuit_can_use_tap() should only allow TAP for v2 onion services (needs_revision)
  • #24558 defect: enable expensive hardening message is wrong with static library builds (closed: fixed)
  • #24572 defect: rewrite_node_address_for_bridge() doesn't set rs IPv6 addresses (closed: fixed)
  • #24573 defect: rewrite_node_address_for_bridge() should set IPv6 preferences even if ... (closed: fixed)
  • #24677 defect: Use ping ::1 on Linux when ping6 ::1 fails (closed: fixed)
  • #24681 enhancement: Make the default fallback weight in Tor 10.0 (closed: fixed)
  • #24740 defect: Tor launches two requests for authority certificates on first bootstrap (closed: fixed)
  • #24838 enhancement: Fuzzy match the fallback whitelist (needs_review)
  • #24904 defect: Make geoip use channel_is_client so it ignores flapping relays (closed: implemented)
  • #24907 defect: Stop ignoring should_refuse_unknown_exits() for unauthenticated channels (needs_revision)
  • #24939 defect: chutney should log warnings from tor-gencert and other startup processes (closed: fixed)
  • #24954 defect: Metrics performance measurements use v2 onion services (closed: fixed)
1 2