Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-client'

Results (1 - 100 of 407)

1 2 3 4 5
  • #449 defect: dns failures prevent legitimate options being set (accepted)
  • #507 defect: tor-gencert linked against event/pthread (closed: fixed)
  • #584 enhancement: Clients process descriptor fetches as they arrive? (new)
  • #1099 defect: Spurious bootstrap warnings if no-route-to-host (new)
  • #1136 defect: When Tor is offline, it doesn't quite run out of relays, so doesn't ... (assigned)
  • #1247 enhancement: bootstrap hickups when network is down (new)
  • #1270 defect: Spec conformance issues on get_next_token() reported by outofwords (needs_revision)
  • #1299 defect: Tor should verify signatures before parsing (new)
  • #1354 defect: Configuring Tor with --with*dir gives wrong directories (assigned)
  • #1802 defect: ControlPort GETCONF does not recognize command aliases (new)
  • #2077 defect: Overwriting files can fail on Windows (needs_information)
  • #2149 enhancement: new 'extra dormant' mode for people who never use their tor (closed: implemented)
  • #2395 enhancement: Break Wed and Wee weights into two classes each (assigned)
  • #2507 defect: It's probably not spelled "NATD" (new)
  • #2628 project: Be smarter about launching connections to authorities to learn about ... (new)
  • #2681 enhancement: brainstorm ways to let Tor clients use yesterday's consensus more safely (new)
  • #2878 enhancement: Don't bootstrap from an old consensus if we're about to replace it (new)
  • #2915 enhancement: Explore options to reduce binary size of Tor (new)
  • #2967 defect: bad pidfile handling on ENOSPC (new)
  • #2983 defect: Errant circuit creation beyond MAPADDRESS validity (new)
  • #2991 defect: Confusing log messages when a DA starts using a new key (new)
  • #3021 defect: Make the microdesc format a little more flexible, with optional TAP key (assigned)
  • #3037 enhancement: Internal checks to detect client streams/circuits whose sock request ... (new)
  • #3080 defect: Bug: The application request to "jabber.org":5222 has launched 10 ... (new)
  • #3145 enhancement: excludeexitnodes by ip misleading when exit relay uses outboundbindaddress (new)
  • #3290 enhancement: Design some way to ensure circuit reuse for FTP (and other?) ... (new)
  • #3459 enhancement: Expose information about dir conns to controllers (accepted)
  • #3501 enhancement: Teach Tor to run the Control Port over TLS (new)
  • #3520 enhancement: CIRC FAILED REASON=DESTROYED events do not specify which hop sent the ... (new)
  • #3566 enhancement: Should controller events respect SafeLogging 1 torrc option? (new)
  • #3569 enhancement: Refactor socks parsing (closed: implemented)
  • #3652 enhancement: Export clock skew opinion as getinfo command (needs_revision)
  • #3698 defect: Multi-line torrc options conflict with Windows paths (assigned)
  • #3733 defect: Tor should abandon rendezvous circuits that cause a client request to ... (accepted)
  • #3794 task: tor-chroot scripts (closed: wontfix)
  • #3852 enhancement: Make DNS resolution happen on particular exit nodes for particular ... (new)
  • #3940 defect: Allow MapAddress .exit even if AllowDotExit is 0 (closed: worksforme)
  • #3943 enhancement: self-test the socks port before bootstrapping is complete? (needs_information)
  • #4187 defect: A verified unverified-consensus should be renamed to cached-consensus (closed: fixed)
  • #4229 defect: smartlist_len returns a (signed) int (new)
  • #4233 enhancement: Exact addition/summation and memory allocation (needs_revision)
  • #4260 enhancement: [PATCH] Update TOR build instructions for mingw (assigned)
  • #4310 task: Reorder tor manpage entries within sections (new)
  • #4320 defect: Audit functions called during options_act_reversible() (new)
  • #4373 defect: When we close a conn due to bad CERTS cell, we complain about stuff in ... (new)
  • #4374 enhancement: If you explicitly specify a geoip file and it's not there, shouldn't ... (new)
  • #4391 defect: GETINFO ns/all doesn't return 'p' lines -- make something that does! (new)
  • #4580 defect: Some Tor clients go nuts requesting the consensus if there is no ... (new)
  • #4648 defect: Tor shouldn't call expand_filename on filenames specified on the ... (new)
  • #4806 enhancement: Detect and warn when running IPv6-using client without IPv6 address privacy (needs_revision)
  • #4885 enhancement: Make all paths absolute (new)
  • #4904 defect: tor-resolve falsely says can't resolve if answer is 127.0.0.1 (new)
  • #5219 enhancement: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #5221 project: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #5222 enhancement: Intelligently use capabilities/privileges and drop what we don't need ... (new)
  • #5241 enhancement: Log location at DEBUG / INFO level (new)
  • #5287 enhancement: Turn LogMessageDomains on by default? (new)
  • #5401 enhancement: tag control log events so arm can know they're from the same place in ... (new)
  • #5409 defect: Warn if we're on Windows, and the user ends a line accepting a ... (assigned)
  • #5456 project: Defend against path bias and tagging attacks (new)
  • #5553 task: prevent protocol leaks; Tor client connection API or protocol review howto (new)
  • #5641 enhancement: Exit Enclave equivalent for encrypted Tor-to-Tor connections (new)
  • #5683 enhancement: add libtool support to tor (closed: wontfix)
  • #5707 enhancement: Use end to end stream timing data to further prune circuits (assigned)
  • #5902 defect: The whole "choose a doomed exit at random" business is busted (new)
  • #5915 enhancement: Write patch to make socks handshakes succeed instantly (new)
  • #5966 enhancement: Can we speed up bootstrapping by starting circuit building earlier? (closed: wontfix)
  • #6010 enhancement: UpdateBridgesFromAuthority isn't actually usable (new)
  • #6198 project: Make sure that we clear addresses before freeing connections (new)
  • #6236 task: Remove duplicate code between parse_{c,s}method_line (closed: implemented)
  • #6256 enhancement: Make circuit isolation isolate exits? (signal NEWNYM exit bucketing) (new)
  • #6288 enhancement: Aggressive reconnection attempt when using Tor Client with Socks (new)
  • #6289 enhancement: Multiple Socks Server support in Tor Client (new)
  • #6489 enhancement: Document that clients also have BWRate and BWBurst. (closed: fixed)
  • #6505 defect: GETINFO dir/status-vote/current/consensus returns "Unrecognized key" ... (needs_revision)
  • #6772 enhancement: Fall back to alternative OR or Dir port if the current fails (new)
  • #6802 enhancement: Make our config parsing less kludgy (new)
  • #6877 defect: Finally replace all char[] buffers with uint8_t[] buffers (new)
  • #6883 project: Separate configuration options for separate Socks/NATD/Trans/DNS ports (new)
  • #6936 defect: link to librt and libdl only when needed (new)
  • #7027 enhancement: Defend against Website Traffic Fingerprinting (new)
  • #7077 defect: Recover from junk in cached-descriptors (new)
  • #7106 project: Write "how to be nice to the Tor network" spec (new)
  • #7117 enhancement: One of our code-checking tools should make sure that we don't add more ... (new)
  • #7164 defect: microdesc.c:378: Bug: microdesc_free() called, but md was still ... (needs_revision)
  • #7174 project: Refactor node_t and router lists to make it easier to identify bugs (new)
  • #7176 enhancement: Adapt and update AccessLabs' patches for reduced Tor memory ... (closed: not a bug)
  • #7216 defect: networkstatus_check_consensus_signature() shouldn't warn because of ... (needs_revision)
  • #7357 enhancement: Collect more statistics to better understand simulations (new)
  • #7358 task: Decide on list of stats to collect (new)
  • #7360 task: Document process of collection and extraction, formatting, etc. (new)
  • #7382 enhancement: Design/implement technique for measuring/collecting inter-relay ... (new)
  • #7457 enhancement: Add client-side log indicator that an obfsbridge works (new)
  • #7478 enhancement: Allow routersets to include/exclude nodes by IPv6 address (needs_revision)
  • #7481 enhancement: There should be some way to indicate [2001:...].foo.exit (closed: wontfix)
  • #7482 defect: Discard nonsense in address.c about v4-mapped addresses (needs_revision)
  • #7553 enhancement: [simple patch] Expose ISO_STREAM via isolation flag config option (closed: wontfix)
  • #7590 enhancement: [PATCH] New option LocalOutboundBindAddress (needs_revision)
  • #7646 defect: fix/enhance getinfo ns/id/* commands (new)
  • #7660 enhancement: Refactor circuit cannibalization into one place (new)
1 2 3 4 5