Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-guard'

  • #7144 project: Implement Bridge Guards and other anti-enumeration defenses (needs_revision)
  • #9001 defect: Slow Guard Discovery of Hidden Services and Clients (new)
  • #10969 defect: Set of guard nodes can act as a linkability fingerprint (reopened)
  • #12201 defect: Don't weight by bandwidth when selecting among bridges (closed: wontfix)
  • #12401 defect: Document EntryGuardPathBias in doc/state-contents.txt (assigned)
  • #13837 defect: Mitigate guard discovery by pinning middle node (closed: implemented)
  • #14957 defect: Clients wait for an extra consensus before learning the correct ... (new)
  • #16255 defect: Guardfraction on dirauths screws up bandwidth weights (needs_revision)
  • #17295 enhancement: Route-selection and guard-selection logic completely replaced (accepted)
  • #18084 enhancement: Use the same fallback directory mirror to bootstrap (new)
  • #20822 project: Follow-up tasks for prop271 (new guard API) implementation (assigned)
  • #20825 enhancement: User-named guard selections (new)
  • #20827 enhancement: Record guards' ed25519 identities (new)
  • #20832 enhancement: Design proposals to further improve guard security (assigned)
  • #20835 task: Refactor choose_good_entry_server so it is (almost) never used (accepted)
  • #21039 defect: Refactor and simplify guard code of circuit_send_next_onion_skin() (needs_revision)
  • #21969 defect: We're missing descriptors for some of our primary entry guards (new)
  • #22400 defect: We bootstrap from different primary guards when we start with a ... (closed: fixed)
  • #22653 defect: upgrading Tor-0.2.9.10 to Tor-0.3.0.8 or Tor-0.3.1.3_alpha fails to ... (closed: user disappeared)
  • #22663 defect: Tor keeps using a very slow guard (new)
  • #23100 enhancement: Circuit Build Timeout needs to count hidden service circuits (closed: fixed)
  • #23101 enhancement: Predict and build specific HS purpose circuits (rather than GENERAL) (closed: implemented)
  • #23406 defect: Sampled guards are not re-weighted when a new consensus arrives (closed: not a bug)
  • #23605 defect: expired consensus causes guard selection to stall at BOOTSTRAP PROGRESS=80 (assigned)
  • #23670 enhancement: Say how many primary entry guards we're missing descriptors for (closed: implemented)
  • #23671 enhancement: Say how many other nodes we're missing descriptors for (closed: implemented)
  • #23817 defect: Tor re-tries directory mirrors that it knows are missing microdescriptors (closed: fixed)
  • #23862 defect: Tor only updates guard state after a consensus if it has enough ... (closed: fixed)
  • #23863 enhancement: When our directory guards don't have each others' microdescs, we ... (new)
  • #23985 defect: If less than 15 missing mds, Tor will delay md download for 10 mins (closed: fixed)
  • #23989 defect: entry_guards_update_all() will pretend to update primaries even if ... (closed: fixed)
  • #24113 defect: We stop trying to download an md after 8 failed tries (closed: fixed)
  • #24456 defect: Figure out what to do with the guardfraction feature (new)
  • #24947 defect: vanguards bug: connection_ap_expire_beginning(): Bug: circuit->purpose ... (closed: duplicate)
  • #25224 defect: Create a new consensus method that ignores guardfraction votes (new)
  • #25347 defect: Tor keeps on trying the same overloaded guard over and over (needs_revision)
  • #25544 defect: Complete vanguard specification (closed: fixed)
  • #25545 defect: Figure out default vanguard script parameters (closed: fixed)
  • #25546 defect: Merge last vanguard-related tor patches (new)
  • #25753 defect: Check/enforce path restrictions for each path position (assigned)
  • #25754 defect: Make Prop#291 choices (new)
  • #25783 defect: Circuit creation loop when primary guards are unreachable (new)
  • #25886 defect: Have frac_nodes_with_descriptors() take and use for_direct_connect (closed: implemented)
  • #28027 defect: Tor keeps opening circuits while waiting for bridge descriptors (needs_information)
  • #28255 task: verify guard selection consensus expiry constraints (closed: fixed)
  • #28319 defect: accept a reasonably live consensus for path selection (closed: fixed)
  • #28351 enhancement: Test clock skewed clients using chutney (assigned)
  • #28591 defect: Accept a future consensus for bootstrap (needs_revision)
  • #28654 defect: Allow relays to serve future consensuses (new)