Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'prop224'

Results (1 - 100 of 143)

1 2
  • #3733 defect: Tor should abandon rendezvous circuits that cause a client request to ... (accepted)
  • #12424 enhancement: Implement improved hidden service protocol (prop224) (closed: fixed)
  • #13484 task: Do we have edge cases with rend_consider_descriptor_republication()? ... (new)
  • #14150 enhancement: Dirauths should expose the value of MinUptimeHidServDirectoryV2 as a ... (new)
  • #15557 defect: Improve relaunch logic for failed rendezvous circuits (new)
  • #15621 enhancement: Kill the pre-version 3 intro protocol code with fire. (assigned)
  • #16538 project: Limit the impact of a malicious HSDir (new)
  • #17242 enhancement: prop224: Implement client support (closed: fixed)
  • #17520 enhancement: Relax the rend cache failure cleanup timer (needs_information)
  • #17690 enhancement: prop224: Control the number of HSDirs using a consensus parameter (closed: fixed)
  • #19162 defect: Make it even harder to become HSDir (accepted)
  • #19647 enhancement: HS Descriptors should only contain UTF-8 (new)
  • #20371 enhancement: Lower HSDir query backoff delay (new)
  • #20524 enhancement: Revise initial descriptor upload behavior for onion services (closed: fixed)
  • #20594 enhancement: hs: Make HSDir produce HS statistics for prop224 (new)
  • #20657 enhancement: prop224: Implement service support. (closed: fixed)
  • #20700 enhancement: prop224: Implement standard client authorization (closed: fixed)
  • #20742 enhancement: prop224: Implement stealth client authorization (assigned)
  • #20961 enhancement: prop224: Implement consensus params to adjust portion of the protocol (closed: fixed)
  • #21295 enhancement: Allow mixed anonymous and non-anonymous onion services in the same tor ... (closed: wontfix)
  • #21403 enhancement: prop224: Implement HS descriptor fetching (closed: fixed)
  • #21509 task: Fuzz v3 hidden services (accepted)
  • #21600 defect: Hidden service introduction point retries occur at 1 second intervals (assigned)
  • #21693 task: prop224: HS descriptors do wasteful double-base64 encoding (closed: wontfix)
  • #21856 enhancement: prop224: Client introduction point failure cache (closed: fixed)
  • #21857 enhancement: prop224: Client introduction point establishment (closed: fixed)
  • #21858 enhancement: prop224: Client rendezvous point establishment (closed: fixed)
  • #21888 enhancement: prop224: Groundwork for service implementation (closed: fixed)
  • #21935 defect: prop224: Deeper testing of HS ntor subsystem (new)
  • #22220 enhancement: hs: Move cell encoding/decoding out of hs_intropoint.c to hs_cell.c (new)
  • #22430 enhancement: Add next gen HS support to chutney (closed: fixed)
  • #22437 enhancement: Add HSv3 chutney networks to tor's make test-network-all (closed: implemented)
  • #22646 enhancement: Implement hidden service client authentication support in chutney (closed: duplicate)
  • #22694 defect: prop224: Disable netflow padding if v3 single onion services are enabled (closed: fixed)
  • #22736 defect: prop224: Update spec wrt overlap behavior of HSes (closed: fixed)
  • #22743 defect: Update specs to describe ed25519 point validation and rationale (closed: implemented)
  • #22995 defect: prop224 should say we use SHA3-256 for rend circuit digests (closed: wontfix)
  • #23019 defect: prop224: Validate received onion addresses on the client side (closed: fixed)
  • #23056 defect: prop224: Intro point aren't transfered between services on HUP (closed: fixed)
  • #23094 enhancement: prop224: Optimize hsdir_index calculation (closed: implemented)
  • #23107 defect: prop224: Optimize hs_circ_service_get_intro_circ() digest calculation (closed: fixed)
  • #23109 defect: prop224: Do we need to re-encode HS desc everytime we upload it? (closed: invalid)
  • #23110 defect: prop224: Rate limit HS descriptor reuploads (closed: fixed)
  • #23123 defect: Cannibalized HS circuit don't have their timestamp_dirty updated (closed: fixed)
  • #23126 enhancement: HSDirs should publish some count about new-style onion addresses (new)
  • #23130 defect: prop224: Synchronize spec with implementation (August 2017) (closed: implemented)
  • #23159 defect: Bug: Non-fatal assertion ei failed in launch_intro_point_circuits at ... (closed: fixed)
  • #23170 task: Include ed25519 relay id keys in the consensus (closed: wontfix)
  • #23233 defect: Unexpected BUG violation in hsv3 decriptor decoding (closed: fixed)
  • #23260 enhancement: Encoding onion key creation date in the url (closed: wontfix)
  • #23300 defect: prop224: General client side issues (assigned)
  • #23301 defect: prop224: Refactor connection_ap_handle_onion (assigned)
  • #23303 defect: hs: Explain why we reset the directory connection timestamp client side (closed: fixed)
  • #23304 defect: prop224: Dump a malformed descriptor in a file and log_warn about it (closed: implemented)
  • #23306 defect: hs: Use the state of a directory connection instead of the HAS_FETCHED ... (assigned)
  • #23307 defect: hs: Don't bruteforce every pending connection when we get a RENDEZVOUS ack (assigned)
  • #23308 enhancement: prop224: Implement note_connection_attempt_succeeded() in the client code (closed: fixed)
  • #23309 defect: hs: We need to get rid of a descriptor when entering non-overlap mode (closed: fixed)
  • #23310 defect: test: prop224 client unit tests (closed: implemented)
  • #23311 defect: prop224: Spammy intro point logs in v2 (closed: fixed)
  • #23327 defect: prop224: client-side memleaks on the last hidserv request subsystem (closed: fixed)
  • #23328 defect: prop224: Uninitialized hsdir indices if requesting onion before ... (closed: worksforme)
  • #23331 defect: prop224: Don't build HS desc if we don't have a live consensus (closed: fixed)
  • #23335 defect: prop224: Clang compile error + bad log_warn on master (closed: fixed)
  • #23340 defect: There is no HSDir3 flag, but prop224 says there should be (closed: fixed)
  • #23343 defect: prop224: Bug: Non-fatal assertion !((strlen(req_key_str) + ... (closed: fixed)
  • #23346 defect: prop224: HSdir set changed detection fails sometimes (closed: fixed)
  • #23355 enhancement: prop224: Implement a client purge state for NEWNYM (closed: implemented)
  • #23360 defect: prop224: Service has dead code which removed a feature (closed: fixed)
  • #23361 defect: prop224: client can pick super old rendezvous points (closed: fixed)
  • #23372 defect: test: stack-use-after-scope in hs_service/build_update_descriptors (closed: fixed)
  • #23387 defect: prop224: HSdir index desynch between client and service (closed: fixed)
  • #23420 defect: prop224: Pad RENDEZVOUS1 cell to match legacy cell length (closed: implemented)
  • #23429 defect: hs: assert on rend_data when pruning the v2 service list (closed: fixed)
  • #23455 defect: hs: hs_circuitmap_get_rend_circ_client_side() doesn't consider ... (closed: fixed)
  • #23457 defect: prop224: Service descriptor uploads race condition (closed: fixed)
  • #23459 defect: prop224: Specialize interface of hs_circuitmap_get_rend_circ_client_side() (closed: implemented)
  • #23465 defect: hs: Downgrade client log warn to info (closed: fixed)
  • #23466 defect: hs: v3 client descriptor cache entry should be indexed by blinded key (closed: fixed)
  • #23477 defect: Remove legacy(?) intro point warning (closed: not a bug)
  • #23478 defect: v3 single onion services appear to be broken (closed: fixed)
  • #23480 defect: hs: Rate limit some logs in hs-v3 subsystem (closed: fixed)
  • #23481 defect: hs-v3: Client fails to reach service before 90% bootstrap (closed: implemented)
  • #23493 defect: IPv6 v3 Single Onion Services fail with a bug warning (new)
  • #23502 defect: prop224: Don't make IPv4 mandatory because one day we'll have IPv6 ... (new)
  • #23507 defect: Add single onion unreachable address algorithm to prop224 (accepted)
  • #23531 defect: prop224: Add changes file for state of prop224 in 0.3.2 (closed: implemented)
  • #23543 defect: prop224: Disconnects on long-lasting HS connections (possibly because ... (closed: invalid)
  • #23545 defect: UX improvement: Tor Browser should handle bogus HSv3 addresses (new)
  • #23567 task: prop224 should become an official specification (closed: implemented)
  • #23576 defect: Make service_intro_point_new() take a node instead of an extend_info (needs_revision)
  • #23577 enhancement: Add rendezvous point IPv6 address to client introduce cells (closed: implemented)
  • #23588 enhancement: Write fascist_firewall_choose_address_ls() and use it in ... (assigned)
  • #23589 defect: Stop assuming that every extend_info contains an IPv4 address in ... (closed: fixed)
  • #23603 defect: hs: Cleanup race between circuit close and free with the HS circuitmap (closed: fixed)
  • #23610 defect: handle_establish_intro() can mark circuits for close twice (closed: fixed)
  • #23621 defect: prop224: Missing tons of mds over time with a lurking client (closed: duplicate)
  • #23623 enhancement: hs: Cache current time period number and SRV start time (closed: implemented)
  • #23641 defect: prop224: Fake client auth lines do not actually provide obfuscation (closed: wontfix)
  • #23662 defect: prop224: Service edge-case where it re-uploads descriptor with same ... (closed: fixed)
1 2