Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'needs-design'

Results (1 - 100 of 104)

1 2
  • #1238 defect: Exit flag assigned can be assigned to nodes that don't really exit. (new)
  • #3145 enhancement: excludeexitnodes by ip misleading when exit relay uses outboundbindaddress (new)
  • #3290 enhancement: Design some way to ensure circuit reuse for FTP (and other?) ... (new)
  • #3566 enhancement: Should controller events respect SafeLogging 1 torrc option? (new)
  • #3587 defect: Accounting should work with pluggable transports (new)
  • #3698 defect: Multi-line torrc options conflict with Windows paths (assigned)
  • #3852 enhancement: Make DNS resolution happen on particular exit nodes for particular ... (new)
  • #3948 enhancement: "fooport auto" should be able to get a hint (new)
  • #4386 defect: Requesting better "too slow" warning message (new)
  • #4391 defect: GETINFO ns/all doesn't return 'p' lines -- make something that does! (new)
  • #4565 project: Enable relays to talk to other relays via IPv6 (assigned)
  • #4682 project: Deal with 'double door' effects because our read and write rate ... (assigned)
  • #4700 enhancement: Tor should provide a mechanism for hidden services to differentiate ... (closed: implemented)
  • #4734 enhancement: Tor DNS resolver only supports UDP sockets so can't resolve large RRs (new)
  • #4850 enhancement: Build multiple circuits and use the fastest? (new)
  • #5159 defect: Round robin on connection level (more unfairness) (new)
  • #5211 task: Discuss other ways for the bridge authority to run bridge reachability ... (assigned)
  • #5221 project: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #5222 enhancement: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #5379 enhancement: Design adaptive n23 algorithm that works (new)
  • #5641 enhancement: Exit Enclave equivalent for encrypted Tor-to-Tor connections (new)
  • #5903 enhancement: Restore ExcludeEntryNodes feature (new)
  • #6198 project: Make sure that we clear addresses before freeing connections (new)
  • #6419 defect: is it really a protocolwarn when ... (new)
  • #6495 enhancement: Define ReducedExitPolicy/ExitPolicyGroups in tor/dirauths (new)
  • #7481 enhancement: There should be some way to indicate [2001:...].foo.exit (closed: wontfix)
  • #7509 enhancement: Publish and use circuit success rates in extrainfo descriptors (new)
  • #7750 enhancement: Consider packaging inbuf when about to send an end cell (new)
  • #7798 defect: Use directory guards even when consensus isn't live (needs_information)
  • #7870 defect: Retry on a new circuit for more reasons. (needs_revision)
  • #7956 defect: Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% (assigned)
  • #7962 defect: Which address should a multi-ORPort Tor put in its "transport" ... (new)
  • #7971 defect: review address lists in tor_addr_is_internal_() (new)
  • #8159 enhancement: Consolidate thresholds for path build bias and use bias (new)
  • #8786 enhancement: Add extra-info line that tracks the number of consensus downloads over ... (needs_revision)
  • #10221 enhancement: Implement BGP malicious route checks before publishing descriptor in ... (new)
  • #10307 enhancement: Allow Tor relays to configure bandwidth limits around peak usage (new)
  • #10519 defect: tor uses default IP for dirport instead of the one defined in DirPort (new)
  • #10747 enhancement: Support alternate DNS such as Namecoin/OpenNIC/etc (new)
  • #10957 task: Be more aggressive about enabling Extended ORPort (new)
  • #10968 task: Authorities should use past consensuses to decide how to vote on relay ... (new)
  • #11121 defect: Revocation process for authority keys (new)
  • #11207 enhancement: Sybil selection should be trickier to game (new)
  • #11397 enhancement: Keep using too-dirty circuits if no new circuit can be built? (new)
  • #11743 defect: nodelist_add_microdesc: assign md to all appropriate nodes properly (new)
  • #11973 defect: Should relays stop making unencrypted directory connections? (new)
  • #12201 defect: Don't weight by bandwidth when selecting among bridges (closed: wontfix)
  • #12572 enhancement: Proposal for OwningControllerTimeout option (new)
  • #13082 enhancement: Use a better default torrc (new)
  • #13112 defect: Some things are probably broken when we advertise multiple ORPorts and ... (needs_revision)
  • #13155 defect: I can use an extend cell to remotely determine whether two relays have ... (new)
  • #13194 enhancement: Track time between ESTABLISH_RENDEZVOUS and RENDEZVOUS1 cell (new)
  • #13195 enhancement: Collect aggregate stats around hidden service descriptor publishes and ... (new)
  • #13386 defect: "opening new log file" line goes to err-logfile despite being at ... (new)
  • #13466 enhancement: Collect aggregate stats of ntor-using hidden service interactions vs ... (new)
  • #13908 enhancement: Make it safe to set NumDirectoryGuards=1 (new)
  • #13932 enhancement: Some way for multiple Tor processes to share directory information (new)
  • #14197 defect: Reverse lookup on automapped addresses doesn't work (new)
  • #14827 defect: Tor controller command to write its file to disk (new)
  • #14899 enhancement: Enable Tor to work without using filesystem for cached files (new)
  • #14999 defect: Most/all esc_for_log instances in control.c should change. (new)
  • #15008 defect: Design an opt-in Hidden Service Public Directory Submission system (new)
  • #15060 enhancement: Decide the fate of MyFamily (new)
  • #15061 defect: Support Ed25519 identities in controller interface (assigned)
  • #15237 defect: Improve tooling and usability for approved-routers file and its allies (new)
  • #15458 enhancement: StrongSocksIsolation option (w/ virtual circuits?) (new)
  • #15607 defect: Tor log dates imprecise (needs_revision)
  • #15660 defect: [feature suggestion] Need signal to totally switch to the new set of ... (new)
  • #15765 task: Tor doesn't reconnect automatically when tun/tap device goes down. (new)
  • #15938 defect: HS descriptor cache leaks timing information to local users (new)
  • #15991 enhancement: Option to skip authorization verification in INTRODUCE2 cell (new)
  • #16120 enhancement: Detect if the network goes down (new)
  • #16562 defect: Harmonize curve25519-signature format with what others are doing (new)
  • #16636 enhancement: Add AccountingSetBytesRead/Written (needs_information)
  • #16845 enhancement: make unverified consensus ISOTime accessible through Tor's ControlPort (reopened)
  • #16895 enhancement: allow Tor to parse bridge information copied and pasted verbatim from ... (new)
  • #16966 enhancement: Better solution for an HS client descriptor cache entry to expire (needs_information)
  • #17057 enhancement: add reverse proxy to bridges (new)
  • #17120 enhancement: Fire a circuit status control port event when circuit isolation changes. (new)
  • #17438 defect: if HSDir is set then report a (blurred) uptime of > 96h (new)
  • #17807 enhancement: Use OpenSSL 1.1.0 ASYNC engine support (new)
  • #17945 enhancement: Stop single hop client connections to Single Onion Services (accepted)
  • #17956 defect: Let tor handle disconnects better (new)
  • #17990 defect: torrc default config ORPort should be changed to 443 from 9001 (new)
  • #18142 enhancement: Anti-Automated-Scanning: Support "marking" with iptables TCP ... (new)
  • #18346 enhancement: Separate the various roles that directory authorities play, from a ... (accepted)
  • #19069 defect: When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can ... (new)
  • #19129 enhancement: Allow Fallback Directories with no DirPort (new)
  • #19162 defect: Make it even harder to become HSDir (accepted)
  • #19859 enhancement: Expose stream isolation information to controllers (new)
  • #20132 enhancement: Let large client deployments use a local directory cache (new)
  • #20555 defect: Stream isolation for DNS (new)
  • #20676 enhancement: Disposable Exit Nodes (new)
  • #21006 defect: Reduce NumDirectoryGuards to 1 (new)
  • #21237 defect: Support domain isolation for onion connections too? (new)
  • #21413 defect: Exits can get the Exit flag without having any ports in their ... (new)
  • #21424 defect: Treat directory guard success only as a partial success for the guard? (new)
  • #21502 enhancement: create exitnode socksportoption since .node.exit is bad idea (new)
  • #22304 enhancement: Support generating HS private key / onion address without publishing (new)
  • #22407 defect: Support HTTP CONNECT tunnels as an alternative to SOCKS (closed: implemented)
1 2