Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'needs-proposal'

  • #1250 enhancement: strange SOCKS error code when connecting to a hidden service using the ... (new)
  • #2395 enhancement: Break Wed and Wee weights into two classes each (assigned)
  • #2473 project: Develop a design to support multiple bridge authorities (new)
  • #2667 defect: Exits should block reentry into the tor network (new)
  • #2693 enhancement: Design and implement improved algorithm for choosing consensus method (new)
  • #2998 defect: If your bridge is near your exit, Tor might surprise you by failing ... (new)
  • #3028 enhancement: META: Support non-clique topologies on the network (new)
  • #3459 enhancement: Expose information about dir conns to controllers (accepted)
  • #3520 enhancement: CIRC FAILED REASON=DESTROYED events do not specify which hop sent the ... (new)
  • #3652 enhancement: Export clock skew opinion as getinfo command (needs_revision)
  • #4391 defect: GETINFO ns/all doesn't return 'p' lines -- make something that does! (new)
  • #4631 enhancement: Idea to make consensus voting more resistant (new)
  • #4700 enhancement: Tor should provide a mechanism for hidden services to differentiate ... (closed: implemented)
  • #4826 enhancement: Write proposal for improved consensus voting schedules (new)
  • #5392 task: Write proposal for n23 patch behavior (needs_revision)
  • #5456 project: Defend against path bias and tagging attacks (new)
  • #5641 enhancement: Exit Enclave equivalent for encrypted Tor-to-Tor connections (new)
  • #5903 enhancement: Restore ExcludeEntryNodes feature (new)
  • #6256 enhancement: Make circuit isolation isolate exits? (signal NEWNYM exit bucketing) (new)
  • #6676 task: Nuke ‘MyFamily’ (new)
  • #6790 enhancement: Write proposal draft for directory mirrors to accept, aggregate and ... (new)
  • #7148 defect: Even better parameter voting protocol (new)
  • #7829 task: Support all kinds of DNS over Tor (new)
  • #8453 enhancement: Alter flag-weight balancing equations (new)
  • #9001 defect: Slow Guard Discovery of Hidden Services and Clients (new)
  • #9165 project: Evaluate datagram-based transports; build and merge as appropriate (new)
  • #9208 enhancement: Allow node operator to avoid Guard flag (needs_information)
  • #9498 enhancement: Allow bridge descriptors to contain no address if they are not being ... (new)
  • #9689 project: Write proposal for RELAY_AUTHENTICATE/multipath AUTHENTICATE delivery (new)
  • #9954 defect: Replace broadcast voting protocol with something more robust (new)
  • #11101 enhancement: Bridges should report implementation versions of their pluggable transports (new)
  • #11119 defect: Write a proposal for client-side key pinning (needs_information)
  • #11121 defect: Revocation process for authority keys (new)
  • #11158 enhancement: Write a proposal for a "couldn't reach consensus" statement (new)
  • #11207 enhancement: Sybil selection should be trickier to game (new)
  • #11327 defect: Dir auths should choose Fast and Guard flags by consensus weight if ... (needs_revision)
  • #11328 defect: Dir auths should compute Guard WFU using the consensus, not private history (new)
  • #11458 enhancement: A newer signing cert should innoculate us against older ones? (new)
  • #11973 defect: Should relays stop making unencrypted directory connections? (new)
  • #12799 defect: fingerprints - descriptor Space removal, case normalization (new)
  • #13230 enhancement: Make good use of unstable relays (new)
  • #13444 project: "GhostNode" - support relays that cannot accept incoming connections. (new)
  • #13508 enhancement: Add messaging protocol that is resistant to traffic analysis (new)
  • #13705 enhancement: Allow relays to promise in their descriptor that their IP address ... (new)
  • #13908 enhancement: Make it safe to set NumDirectoryGuards=1 (new)
  • #15000 defect: bring some sanity to quoted strings in the controller api (needs_revision)
  • #15060 enhancement: Decide the fate of MyFamily (new)
  • #15061 defect: Support Ed25519 identities in controller interface (assigned)
  • #15232 defect: Specify a potential TLS-replacing protocol for future use in Tor. (new)
  • #15238 enhancement: Improve or replace TorFlow (new)
  • #15941 task: Form a plan for killing off client versions which assume they'll live ... (accepted)
  • #16059 enhancement: Add a "rendezvous approver" control API (new)
  • #16978 defect: Minority of hostile dirauths can influence consensus in dangerous ways (new)
  • #17272 task: Finalize a proposal for postquantum circuit-extension (assigned)
  • #17278 defect: Fix malleable relay crypto (accepted)
  • #17957 enhancement: Detect stolen onion service key (new)
  • #18636 project: Write sub-proposals for each part of prop257: Refactoring authorities. ... (accepted)
  • #18938 defect: Authorities should reject non-UTF-8 content in ExtraInfo descriptors (closed: duplicate)
  • #19304 task: Write a proposal for having dirauths push to fallbacks, rather than pull. (new)
  • #19305 task: Write a proposal for separating "upload descriptors here" from the ... (new)
  • #19306 task: Write a proposal for removing liveness-testing from dirauths. (new)
  • #19625 project: Allow relays to set peering policy (needs_information)
  • #20699 enhancement: prop224: Add control port events and commands (closed: fixed)
  • #20742 enhancement: prop224: Implement stealth client authorization (assigned)
  • #21413 defect: Exits can get the Exit flag without having any ports in their ... (new)
  • #21424 defect: Treat directory guard success only as a partial success for the guard? (new)
  • #22339 defect: META: Implement some form of jurisdiction/geography/topology-aware routing (reopened)
  • #22340 defect: META: allow exits to restrict on something more sophisticated than IPs (new)
  • #22455 task: Enumerate cases where we want to retry circuits, and correctly balance ... (new)
  • #22498 defect: Offline directory authorities need a way to post their certificate to ... (new)
  • #22820 enhancement: Give the Exit flag to Exits that use the secure IRC port 6697 (closed: wontfix)
  • #23100 enhancement: Circuit Build Timeout needs to count hidden service circuits (closed: fixed)
  • #23170 task: Include ed25519 relay id keys in the consensus (closed: wontfix)
  • #23280 enhancement: Censorship resistant onion sites (new)
  • #24103 enhancement: Remove the NoEdConsensus flag (closed: wontfix)
  • #24366 enhancement: compare_vote_rs() could check more fields for better SHA1 collision ... (new)
  • #24404 enhancement: Propose a relay protover that allows IPv6 extends (new)
  • #24405 enhancement: Implement relay IPv6 extends with proposed protover (new)
  • #24487 defect: Reverse path selection (choose outer hops first) (assigned)
  • #24617 enhancement: Feature flags for new controller-accessible Tor features (new)
  • #24839 task: Add a torrc option and descriptor line to opt-in as a FallbackDir (new)
  • #24990 task: Write a proposal for a post-quantum lattice KEX (new)
  • #25066 enhancement: Rendezvous points should return signed proof of the established rend point (new)
  • #25153 task: Specify how PrivCount in Tor statistics are configured and interpreted (assigned)
  • #25729 defect: UTF8 encoded TORRC does NOT parse non-Latin paths (reopened)
  • #26137 enhancement: Integrate AS-aware circuit selection (new)
  • #26168 enhancement: Rename HSDir consensus flag to OnionDir (new)
  • #26240 defect: Check Maxmind GeoIPLocation Database before distributing (new)
  • #26646 enhancement: add support for multiple OutboundBindAddressExit IP(ranges) (new)
  • #26691 enhancement: add 'working DNS' to the list of mandatory requirements for the 'exit' flag (new)
  • #27790 enhancement: sbws: design and construct bias curves (new)
  • #27906 defect: PrivCount noise specification (assigned)
  • #27907 enhancement: PrivCount config and version spec (new)
  • #28679 enhancement: Bridge connections on startup (new)