Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-client'

Results (101 - 200 of 429)

1 2 3 4 5
  • #7755 defect: circuit_t::timestamp_dirty should be cleaned up (new)
  • #7757 enhancement: Maybe revisit node flag weight calculations (assigned)
  • #7798 defect: Use directory guards even when consensus isn't live (needs_information)
  • #7870 defect: Retry on a new circuit for more reasons. (needs_revision)
  • #7899 defect: We forget to set tls_error sometimes (new)
  • #7956 defect: Tor uses Roaming (remote) %APPDATA% instead of %LOCALAPPDATA% (assigned)
  • #7971 defect: review address lists in tor_addr_is_internal_() (new)
  • #7986 enhancement: Lengthen the consensus validity interval (needs_revision)
  • #8001 defect: obfsproxy makes tor warn when one bridge is down (assigned)
  • #8159 enhancement: Consolidate thresholds for path build bias and use bias (assigned)
  • #8160 enhancement: Create separate pending counters during circuit construction (assigned)
  • #8323 enhancement: Missing 'GETINFO md/all' (closed: fixed)
  • #8351 enhancement: Refactor our controller-command/torrc-option processing logic into a ... (needs_revision)
  • #8387 defect: Unbuilt one-hop circuits sometimes hang around forever (assigned)
  • #8453 enhancement: Alter flag-weight balancing equations (assigned)
  • #8486 enhancement: Introduce ExitNode country code per listener (new)
  • #8593 defect: Circuit build timeout not respected? (assigned)
  • #8749 enhancement: Return information about the leaking application (new)
  • #8787 defect: Check return values for more unix functions (new)
  • #8962 defect: pathbias_count_use_attempt strange path state log lines (new)
  • #9024 enhancement: add supplementary groups when changing uid (new)
  • #9045 defect: Don't let the call frequency of update_networkstatus_downloads() ... (new)
  • #9188 defect: Our weighting algorithms probably behave strangely when guards are disabled (new)
  • #9213 defect: Shouldn't ~/.torrc override /etc/torrc ? (new)
  • #9241 enhancement: Abstract and decouple path selection from circuit construction (new)
  • #9860 defect: junk log messages every time SETCONF changes the set of ORPorts (needs_revision)
  • #9925 defect: Directory Authorities can crash client/relay by scrambling microdesc ... (needs_revision)
  • #9968 enhancement: Time out quicker on microdesc fetch failures while we're bootstrapping (new)
  • #9998 enhancement: resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 (new)
  • #10024 enhancement: Close and open sockets on IP change, tracking (new)
  • #10186 enhancement: Backtrace support for windows (assigned)
  • #10416 defect: Tor won't start on Windows when path contains non-ascii characters (assigned)
  • #10476 enhancement: Reattach non open streams if circuit destroyed (new)
  • #10478 defect: Use prepend_policy or similar in preference to ... (new)
  • #10481 defect: connection_mark_unattached_ap_: checking always true edge_has_sent_end (new)
  • #10510 defect: Getting a lot of system clock jumped messages (new)
  • #10747 enhancement: Support alternate DNS such as Namecoin/OpenNIC/etc (new)
  • #10812 defect: CryptReleaseContext missed for windows (new)
  • #10871 defect: Download more microdescriptors with a shorter request (new)
  • #10922 defect: tor connected to bwauth produces lots of pathbias_count_use_attempt ... (needs_information)
  • #10969 defect: Set of guard nodes can act as a linkability fingerprint (assigned)
  • #11010 enhancement: add ClientConnectPolicy config option (needs_revision)
  • #11059 enhancement: Nodes' country codes should be "definite" and "possible" (new)
  • #11119 defect: Write a proposal for client-side key pinning (needs_information)
  • #11145 defect: coverage utility should merge multiple output files (new)
  • #11146 defect: cov-diff utility should handle new source files (new)
  • #11301 defect: Tor does not reconnect after network loss with guards used as bridges (closed: fixed)
  • #11325 defect: RFE: Adhere to XDB base directory specification (new)
  • #11360 enhancement: Listen on IPv6 by default for SocksPort *:Port (new)
  • #11397 enhancement: Keep using too-dirty circuits if no new circuit can be built? (new)
  • #11458 enhancement: A newer signing cert should innoculate us against older ones? (new)
  • #11462 enhancement: Re-promote "We stalled too much while trying to write" warning if it ... (new)
  • #11625 defect: Tor DNSPORT returns NXDOMAIN for AAAA records? (new)
  • #11660 defect: Make tor_spawn_background and related interfaces work the same on ... (closed: implemented)
  • #11743 defect: nodelist_add_microdesc: assign md to all appropriate nodes properly (new)
  • #12062 defect: Audit DisableNetwork, we_are_hibernating usage (closed: implemented)
  • #12401 defect: Document EntryGuardPathBias in doc/state-contents.txt (assigned)
  • #12456 defect: Implement prop229 ("Further SOCKS5 extensions") (closed: wontfix)
  • #12572 enhancement: Proposal for OwningControllerTimeout option (new)
  • #12898 enhancement: Remove naming support from Tor (assigned)
  • #12900 defect: Remove config related naming stuff (assigned)
  • #12901 defect: Remove client-related naming stuff (assigned)
  • #12990 defect: route certificate errors (new)
  • #13147 defect: Curious debian hurd unit test failure (new)
  • #13167 defect: Export dirauth files via directory protocol (new)
  • #13221 defect: Misleading error messages about bind_ipv4_only and bind_ipv6_only? (closed: fixed)
  • #13260 defect: Transform code to cleaner c99 style (needs_information)
  • #13461 enhancement: Point to Tor.framework in contrib, for iOS and macOS (new)
  • #13737 enhancement: Move circuit building crypto to worker (assigned)
  • #13738 enhancement: Make worker handle introduction point crypto (new)
  • #13908 enhancement: Make it safe to set NumDirectoryGuards=1 (new)
  • #13932 enhancement: Some way for multiple Tor processes to share directory information (new)
  • #13977 task: Evaluate alternate SSL/TLS libraries: CyaSSL, GnuTLS, ... (new)
  • #14039 defect: Many unnecessary CPU wakeups per second (closed: duplicate)
  • #14186 defect: Try to use fchmod() first when changing permissions on an AF_UNIX socket (new)
  • #14197 defect: Reverse lookup on automapped addresses doesn't work (new)
  • #14209 enhancement: Implement SOCKSPort windows:path for named pipes (new)
  • #14223 defect: END_STREAM_REASON_TIMEOUT blurs together two very different error cases (new)
  • #14266 defect: Make address mapping conditional on having the particular address ... (new)
  • #14579 defect: Clients cannot use multiple transports with a single bridge (new)
  • #14715 defect: Change the default for automaphostsonresolve to be on-by-default? (new)
  • #14827 defect: Tor controller command to write its file to disk (new)
  • #14900 defect: To link connections only if they ready (reopened)
  • #14921 defect: Investigate whether we sometimes remove all predicted ports at startup (new)
  • #14957 defect: Clients wait for an extra consensus before learning the correct ... (new)
  • #15000 defect: bring some sanity to quoted strings in the controller api (needs_revision)
  • #15059 enhancement: Allow UI to identify servers by Ed25519 keys (assigned)
  • #15061 defect: Support Ed25519 identities in controller interface (assigned)
  • #15214 defect: networkstatus_compute_consensus() is unreasonably large and should be ... (new)
  • #15458 enhancement: StrongSocksIsolation option (w/ virtual circuits?) (new)
  • #15518 defect: Tor considers routers in the same IPv6 /16 to be "in the same subnet" (closed: fixed)
  • #15557 defect: Improve relaunch logic for failed rendezvous circuits (new)
  • #15607 defect: Tor log dates imprecise (needs_revision)
  • #15660 defect: [feature suggestion] Need signal to totally switch to the new set of ... (new)
  • #15713 defect: toggling DisableNetwork during bootstrap causes delay (accepted)
  • #15715 defect: spurious "Network is unreachable" error after setting DisableNetwork=1 (accepted)
  • #15765 task: Tor doesn't reconnect automatically when tun/tap device goes down. (new)
  • #15785 defect: New proxy settings don't close old TLS connections (new)
  • #15938 defect: HS descriptor cache leaks timing information to local users (new)
  • #15961 enhancement: tor fails to handle half-closed TCP connections: it should forward ... (new)
1 2 3 4 5