Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-client'

Results (201 - 300 of 429)

1 2 3 4 5
  • #16004 enhancement: Support Isolation by SCM_CREDENTIALS / SCM_CREDS for AF_UNIX endpoints (new)
  • #16070 defect: Tor log doesn't have to be world readable (new)
  • #16120 enhancement: Detect if the network goes down (new)
  • #16294 defect: Unable to bootstrap when no relays meet criteria; logging messages ... (new)
  • #16366 defect: tor hangs for 30 seconds when parsing torrc ending in backslash-newline (new)
  • #16420 enhancement: Hide number of tor clients running on a shared network (new)
  • #16579 defect: (Sandbox) Caught a bad syscall attempt (syscall socket) (accepted)
  • #16585 defect: Long-running activity in scheduler_run() blocks network, creating ... (new)
  • #16824 defect: Emit a warning message about side channel leaks when using relays as ... (needs_revision)
  • #16844 defect: Slow clients can't bootstrap because they expire their consensus fetch ... (new)
  • #17028 defect: silently ignore a bad/missing --defaults-torrc (needs_revision)
  • #17032 defect: Threadpool doesn't get shutdown when changing from relay to client (new)
  • #17038 enhancement: Provide scripts to set up transparent proxying, where supported (new)
  • #17147 defect: long-running client path-selection not seeing some (fast) exit nodes (needs_information)
  • #17197 defect: Use CRLF for all text files written on Windows, accept either CRLF or ... (new)
  • #17217 enhancement: Change clients to automatically use IPv6 if they can bootstrap over it (assigned)
  • #17224 enhancement: Refactor common parts of parse_dir_authority_line and ... (new)
  • #17225 enhancement: Merge NS_EXPIRY_SLOP and REASONABLY_LIVE_TIME (new)
  • #17230 defect: Local DNS resolver will not resolve AAAA records with fc00::/8 prefixes. (new)
  • #17279 defect: Implement large/split create cells (proposal 249) (new)
  • #17520 enhancement: Relax the rend cache failure cleanup timer (needs_information)
  • #17543 defect: Bring some clarity to behavior of net_is_disabled() vs DisableNetwork ... (closed: duplicate)
  • #17636 defect: Can a single IPv6 bridge failure stop Tor connecting? (new)
  • #17673 defect: circuit_handle_first_hop assumes all one-hop circuits are directory ... (new)
  • #17692 defect: Review every use of onehop_tunnel for assumptions that it's a ... (new)
  • #17728 enhancement: Use NETINFO handshake rather than date header to check time with ... (new)
  • #17754 defect: 0.2.7.5 cannot work inside lxc container (needs_information)
  • #17773 enhancement: Should clients avoid using guards that lost the Guard flag? (accepted)
  • #17799 defect: Use a better PRNG unless OpenSSL starts using a better one on their own. (closed: worksforme)
  • #17808 defect: Tor doesn't produce a backtrace on gcc x86_64 on macOS (needs_information)
  • #17811 task: Tor Clients on IPv6 (new)
  • #17835 enhancement: Make ClientPreferIPv6ORPort smarter (assigned)
  • #17867 enhancement: Remove addresses and ports from dir_server_t and just use the ones in ... (new)
  • #17873 defect: replacing 0.0.0.0 listeners at runtime fails (closed: implemented)
  • #17882 defect: Remove needless *_support_ntor() (closed: wontfix)
  • #17911 task: check Tor for local clock leaks (new)
  • #17949 enhancement: Make loopback address search more accurate (needs_revision)
  • #17953 defect: Fallback to resolving localhost when interface searches fail (new)
  • #17971 defect: Unrecognized relay in exit address '[scrubbed].exit'. Refusing. (new)
  • #17991 enhancement: Handle non-127.0.0.1 IPv4 loopback addresses (new)
  • #18124 enhancement: We never use interface names on Windows, avoid retrieving them (new)
  • #18154 defect: attempt to open a socket after DisableNetwork=1 transition (new)
  • #18213 defect: The parameter WarnUnsafeSocks does not work as specified in the ... (accepted)
  • #18276 defect: directory_send_command doesn't check string operation return values (new)
  • #18323 enhancement: Add support for HTTP/1.1 for Transfer-Encoding: chunked (new)
  • #18451 defect: log msg is printed twice after 5 sec (new)
  • #18457 defect: continues to start on unix socket open errors (new)
  • #18481 defect: Allow the fallback directory schedules to be changed outside a test network (new)
  • #18562 defect: Do we need to chown AF_UNIX sockets? (new)
  • #18605 enhancement: Consider including fallback directory mirrors with multiple IP addresses (new)
  • #18614 defect: tor uses full cpu when unplugged (closed: worksforme)
  • #18643 enhancement: Replace the most error-prone binary parsers with trunnel (new)
  • #18644 task: Replace our routerparse.c core with something machine-generated (new)
  • #18645 task: Replace our http parser with something machine-generated (new)
  • #18721 enhancement: Define accessors for connection_t's address fields (new)
  • #18823 enhancement: Sanity check on the fallback dir torrc values (new)
  • #18859 defect: A new SOCKS connection should use a pre-built circuit for its first stream (closed: fixed)
  • #18987 enhancement: Ship a cached-certs file with Tor, to speed first bootstrap (new)
  • #19034 defect: Declaring authorities with matching relay keys should fail (new)
  • #19069 defect: When DisableNetwork is 1 but !circuit_enough_testing_circs(), we can ... (new)
  • #19074 defect: Mark fallback directories down when their key is wrong (new)
  • #19129 enhancement: Allow Fallback Directories with no DirPort (new)
  • #19138 defect: Received extra server info (size 0) (new)
  • #19174 defect: libscrypt check fails when libscrypt requires libm (needs_revision)
  • #19460 enhancement: Improve consensus handling of clients with skewed clocks (closed: fixed)
  • #19531 enhancement: Major cleanup in our baseXX APIs (new)
  • #19610 defect: IPv6-only clients fetch microdescriptors from a small number of IPv6 ... (closed: fixed)
  • #19711 defect: circuit_package_relay_cell(): Bug: outgoing relay cell sent from ... (closed: duplicate)
  • #19853 defect: ServerDNSAllowNonRFC953Hostnames affects clients, and ... (new)
  • #19980 enhancement: Use OpenSSL 1.1.0 X5519 in Tor when available (if it's good) (new)
  • #19983 enhancement: Is openssl 1.1.0's "secure heap" feature useful for us? (new)
  • #19989 defect: Tor fails to bootstrap with an Exit as EntryNode (new)
  • #19990 defect: EntryNodes is incompatible with IPv6-only bootstrap (closed: wontfix)
  • #20035 enhancement: Identify client-specific options that work with hidden services (new)
  • #20050 defect: Testing: add a controller feature to generate paths without building ... (needs_revision)
  • #20071 defect: Tor clients need 4 routers when connecting via IPv6, but only 3 using IPv4 (new)
  • #20132 enhancement: Let large client deployments use a local directory cache (closed: duplicate)
  • #20191 defect: Prevent a recurrence of #20103 (new)
  • #20225 defect: tor "wedged" and become unable to connect to a hidden service (needs_information)
  • #20337 enhancement: Support abstract namespace AF_UNIX sockets. (new)
  • #20353 defect: evutil_ersatz_socketpair: use AF_INET6 if AF_INET bind fails (new)
  • #20362 defect: Bug: Used circuit is in strange path state new (new)
  • #20474 defect: Tor should try harder to choose nodes in small networks (closed: duplicate)
  • #20528 defect: Make sure bridge clients update bridges when options are updated (needs_revision)
  • #20531 defect: rewrite_node_address_for_bridge and ... (new)
  • #20535 defect: A 304 "Not Modified" should update the time to when we next expect a ... (new)
  • #20554 enhancement: Refactor circuit_expire_building (new)
  • #20555 defect: Stream isolation for DNS (new)
  • #20601 enhancement: Clients should reject outdated consensuses as soon as they parse them (new)
  • #20605 enhancement: Reduce the exponential backoff variance (closed: fixed)
  • #20719 enhancement: prop271 -- make parameters configurable (assigned)
  • #20874 defect: ReachableAddresses adds an extra reject *:* on every SAVECONF (closed: fixed)
  • #21006 defect: Reduce NumDirectoryGuards to 1 (new)
  • #21043 defect: Make ClientUseIPv4 and ClientUseIPv6 equivalent to ReachableAddresses (new)
  • #21149 enhancement: Document what Tor means by "using reasonable defaults" (new)
  • #21237 defect: Support domain isolation for onion connections too? (new)
  • #21338 defect: Have client ciphers match Chrome instead of Firefox? (new)
  • #21349 defect: Split up very long functions in entrynodes.c (closed: implemented)
  • #21358 defect: Tor fails to reconnect after computer resumes from sleep (new)
  • #21397 enhancement: Tor TransparentProxy documentation: add IPv6 support / port to nftables (new)
1 2 3 4 5