Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-client'

Results (101 - 200 of 318)

1 2 3 4
  • #8593 defect: Circuit build timeout not respected? (new)
  • #8749 enhancement: Return information about the leaking application (new)
  • #8787 defect: Check return values for more unix functions (new)
  • #8962 defect: pathbias_count_use_attempt strange path state log lines (new)
  • #9024 enhancement: add supplementary groups when changing uid (new)
  • #9045 defect: Don't let the call frequency of update_networkstatus_downloads() ... (new)
  • #9188 defect: Our weighting algorithms probably behave strangely when guards are disabled (new)
  • #9213 defect: Shouldn't ~/.torrc override /etc/torrc ? (new)
  • #9241 enhancement: Abstract and decouple path selection from circuit construction (new)
  • #9860 defect: junk log messages every time SETCONF changes the set of ORPorts (needs_revision)
  • #9925 defect: Directory Authorities can crash client/relay by scrambling microdesc ... (needs_revision)
  • #9968 enhancement: Time out quicker on microdesc fetch failures while we're bootstrapping (new)
  • #9998 enhancement: resolve "localhost", "host", "hostname" and "host.localdomain" to 127.0.0.1 (new)
  • #10024 enhancement: Close and open sockets on IP change, tracking (new)
  • #10186 enhancement: Backtrace support for windows (assigned)
  • #10416 defect: Tor won't start on Windows when path contains non-ascii characters (assigned)
  • #10476 enhancement: Reattach non open streams if circuit destroyed (new)
  • #10478 defect: Use prepend_policy or similar in preference to ... (new)
  • #10481 defect: connection_mark_unattached_ap_: checking always true edge_has_sent_end (new)
  • #10510 defect: Getting a lot of system clock jumped messages (new)
  • #10747 enhancement: Support alternate DNS such as Namecoin/OpenNIC/etc (new)
  • #10812 defect: CryptReleaseContext missed for windows (new)
  • #10871 defect: Download more microdescriptors with a shorter request (new)
  • #10922 defect: tor connected to bwauth produces lots of pathbias_count_use_attempt ... (needs_information)
  • #10969 defect: Set of guard nodes can act as a linkability fingerprint (new)
  • #11010 enhancement: add ClientConnectPolicy config option (needs_revision)
  • #11059 enhancement: Nodes' country codes should be "definite" and "possible" (new)
  • #11119 defect: Write a proposal for client-side key pinning (needs_information)
  • #11145 defect: coverage utility should merge multiple output files (closed: wontfix)
  • #11146 defect: cov-diff utility should handle new source files (closed: wontfix)
  • #11325 defect: RFE: Adhere to XDB base directory specification (closed: wontfix)
  • #11360 enhancement: Listen on IPv6 by default for SocksPort *:Port (new)
  • #11397 enhancement: Keep using too-dirty circuits if no new circuit can be built? (new)
  • #11458 enhancement: A newer signing cert should innoculate us against older ones? (new)
  • #11462 enhancement: Re-promote "We stalled too much while trying to write" warning if it ... (new)
  • #11625 defect: Tor DNSPORT returns NXDOMAIN for AAAA records? (new)
  • #11743 defect: nodelist_add_microdesc: assign md to all appropriate nodes properly (new)
  • #12401 defect: Document EntryGuardPathBias in doc/state-contents.txt (new)
  • #12572 enhancement: Proposal for OwningControllerTimeout option (new)
  • #12898 enhancement: Remove naming support from Tor (assigned)
  • #12900 defect: Remove config related naming stuff (assigned)
  • #12901 defect: Remove client-related naming stuff (assigned)
  • #12990 defect: route certificate errors (closed: user disappeared)
  • #13147 defect: Curious debian hurd unit test failure (new)
  • #13167 defect: Export dirauth files via directory protocol (new)
  • #13260 defect: Transform code to cleaner c99 style (needs_information)
  • #13461 enhancement: Point to Tor.framework in contrib, for iOS and macOS (new)
  • #13737 enhancement: Move circuit building crypto to worker (assigned)
  • #13738 enhancement: Make worker handle introduction point crypto (new)
  • #13908 enhancement: Make it safe to set NumDirectoryGuards=1 (new)
  • #13932 enhancement: Some way for multiple Tor processes to share directory information (new)
  • #13977 task: Evaluate alternate SSL/TLS libraries: CyaSSL, GnuTLS, ... (new)
  • #14186 defect: Try to use fchmod() first when changing permissions on an AF_UNIX socket (new)
  • #14197 defect: Reverse lookup on automapped addresses doesn't work (new)
  • #14209 enhancement: Implement SOCKSPort windows:path for named pipes (new)
  • #14223 defect: END_STREAM_REASON_TIMEOUT blurs together two very different error cases (new)
  • #14266 defect: Make address mapping conditional on having the particular address ... (new)
  • #14579 defect: Clients cannot use multiple transports with a single bridge (new)
  • #14715 defect: Change the default for automaphostsonresolve to be on-by-default? (new)
  • #14827 defect: Tor controller command to write its file to disk (new)
  • #14900 defect: To link connections only if they ready (reopened)
  • #14921 defect: Investigate whether we sometimes remove all predicted ports at startup (new)
  • #14957 defect: Clients wait for an extra consensus before learning the correct ... (new)
  • #15000 defect: bring some sanity to quoted strings in the controller api (needs_revision)
  • #15059 enhancement: Allow UI to identify servers by Ed25519 keys (new)
  • #15061 defect: Support Ed25519 identities in controller interface (new)
  • #15214 defect: networkstatus_compute_consensus() is unreasonably large and should be ... (new)
  • #15458 enhancement: StrongSocksIsolation option (w/ virtual circuits?) (new)
  • #15557 defect: Improve relaunch logic for failed rendezvous circuits (new)
  • #15607 defect: Tor log dates imprecise (needs_revision)
  • #15660 defect: [feature suggestion] Need signal to totally switch to the new set of ... (new)
  • #15713 defect: toggling DisableNetwork during bootstrap causes delay (accepted)
  • #15715 defect: spurious "Network is unreachable" error after setting DisableNetwork=1 (accepted)
  • #15765 task: Tor doesn't reconnect automatically when tun/tap device goes down. (new)
  • #15785 defect: New proxy settings don't close old TLS connections (new)
  • #15938 defect: HS descriptor cache leaks timing information to local users (new)
  • #15961 enhancement: tor fails to handle half-closed TCP connections: it should forward ... (new)
  • #16004 enhancement: Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints (new)
  • #16070 defect: Tor log doesn't have to be world readable (new)
  • #16120 enhancement: Detect if the network goes down (new)
  • #16294 defect: Unable to bootstrap when no relays meet criteria; logging messages ... (new)
  • #16366 defect: tor hangs for 30 seconds when parsing torrc ending in backslash-newline (new)
  • #16420 enhancement: Hide number of tor clients running on a shared network (new)
  • #16579 defect: (Sandbox) Caught a bad syscall attempt (syscall socket) (accepted)
  • #16585 defect: Long-running activity in scheduler_run() blocks network, creating ... (new)
  • #16824 defect: Emit a warning message about side channel leaks when using relays as ... (needs_revision)
  • #16844 defect: Slow clients can't bootstrap because they expire their consensus fetch ... (new)
  • #17028 defect: silently ignore a bad/missing --defaults-torrc (needs_revision)
  • #17032 defect: Threadpool doesn't get shutdown when changing from relay to client (new)
  • #17038 enhancement: Provide scripts to set up transparent proxying, where supported (new)
  • #17147 defect: long-running client path-selection not seeing some (fast) exit nodes (needs_information)
  • #17197 defect: Use CRLF for all text files written on Windows, accept either CRLF or ... (new)
  • #17217 enhancement: Change clients to automatically use IPv6 if they can bootstrap over it (new)
  • #17224 enhancement: Refactor common parts of parse_dir_authority_line and ... (new)
  • #17225 enhancement: Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME (new)
  • #17230 defect: Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. (new)
  • #17279 defect: Implement large/split create cells (proposal 249) (new)
  • #17520 enhancement: Relax the rend cache failure cleanup timer (needs_information)
  • #17636 defect: Can a single IPv6 bridge failure stop Tor connecting? (new)
  • #17673 defect: circuit_handle_first_hop assumes all one-hop circuits are directory ... (new)
1 2 3 4