Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-hs'

Results (1 - 100 of 218)

1 2 3
  • #393 defect: hidden services resolve hosts only once (assigned)
  • #449 defect: dns failures prevent legitimate options being set (new)
  • #1250 enhancement: strange SOCKS error code when connecting to a hidden service using the ... (new)
  • #2743 defect: safelogging should cover hidden service name and intro-points too (assigned)
  • #3317 defect: Tor should lock its HiddenServiceDirs (new)
  • #3522 enhancement: Allow controllers to post HS descriptors to Tor's cache (new)
  • #4850 enhancement: Build multiple circuits and use the fastest? (new)
  • #4857 defect: Disabling an HS with service-side rend circs in progress may produce ... (new)
  • #5271 enhancement: add log messages when a hidden service consistently doesn't have any ... (new)
  • #6176 defect: Clean up service IDs (new)
  • #6228 enhancement: NSS module for .onion DNS name resolution (new)
  • #6418 enhancement: Drop support for older versions of the hidden service protocol (new)
  • #6504 enhancement: Support Windows environment variables in HiddenServiceDir (needs_information)
  • #6772 enhancement: Fall back to alternative OR or Dir port if the current fails (new)
  • #7590 enhancement: [PATCH] New option LocalOutboundBindAddress (needs_revision)
  • #8742 defect: Byte history leaks information about local usage/hidden services (reopened)
  • #9001 defect: Slow Guard Discovery of Hidden Services and Clients (new)
  • #9685 enhancement: Improve Tor2web mode performance by having Tor2web client to be the ... (reopened)
  • #12500 enhancement: Add an option to upload hidden service descriptors some time after startup (new)
  • #13194 enhancement: Track time between ESTABLISH_RENDEZVOUS and RENDEZVOUS1 cell (new)
  • #13195 enhancement: Collect aggregate stats around hidden service descriptor publishes and ... (new)
  • #13466 enhancement: Collect aggregate stats of ntor-using hidden service interactions vs ... (new)
  • #13484 task: Do we have edge cases with rend_consider_descriptor_republication()? ... (new)
  • #13494 enhancement: Regression test about Hidden Service time synchronization (new)
  • #13590 enhancement: Extend HiddenServicePort VIRTPORT semantics (closed: wontfix)
  • #13737 enhancement: Move circuit building crypto to worker (assigned)
  • #13738 enhancement: Make worker handle introduction point crypto (new)
  • #13800 defect: circuit does not close after hidden service is shutdown via control port (new)
  • #14006 defect: Hidden service error: "We'd like to launch a circuit to handle a ... (needs_information)
  • #14150 enhancement: Dirauths should expose the value of MinUptimeHidServDirectoryV2 as a ... (new)
  • #14828 defect: Multiple hidden services can share a pk_digest/service_id. (needs_revision)
  • #14854 defect: Document the hardlimit of HiddenServiceAuthorizeClient basic (new)
  • #15008 defect: Design an opt-in Hidden Service Public Directory Submission system (new)
  • #15186 enhancement: Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? (new)
  • #15272 task: Think of more research questions that we can answer with statistics (new)
  • #15540 enhancement: Increase the capacity of a HS server by using bridges after we ... (new)
  • #15557 defect: Improve relaunch logic for failed rendezvous circuits (new)
  • #15618 defect: Tried to establish rendezvous on non-OR circuit with purpose Acting as ... (new)
  • #15621 enhancement: Kill the pre-version 3 intro protocol code with fire. (new)
  • #15729 enhancement: Proposal: Hidden Service Revocation (new)
  • #15938 defect: HS descriptor cache leaks timing information to local users (new)
  • #15991 enhancement: Option to skip authorization verification in INTRODUCE2 cell (new)
  • #16059 enhancement: Add a "rendezvous approver" control API (new)
  • #16387 enhancement: Improve reachability of hidden services on mobile phones (new)
  • #16520 task: Add research idea to Run some onion services to observe crawling trends (assigned)
  • #16537 enhancement: Allow onion services to publish voluntary usage stats (new)
  • #16538 project: Limit the impact of a malicious HSDir (new)
  • #16548 task: Change the HS nomenclature from hidden to onion (new)
  • #16558 defect: Dir auths should vote about Invalid like they do about BadExit (new)
  • #16646 defect: Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) (new)
  • #16966 enhancement: Better solution for an HS client descriptor cache entry to expire (needs_information)
  • #17216 enhancement: Make Tor Browser's updater work over Hidden Services (new)
  • #17254 enhancement: Scalable HSes by splitting intro/rendezvous (needs_revision)
  • #17343 enhancement: Add torrc option OnionService* alias for HiddenService* (new)
  • #17359 defect: DisablePredictedCircuits causes bootstrap to hang at "Connecting to ... (new)
  • #17360 enhancement: Hidden service option for the number of predicted circuits (new)
  • #17520 enhancement: Relax the rend cache failure cleanup timer (needs_information)
  • #17627 enhancement: Add missing controller events so we can link every step of the HS dance (new)
  • #17640 enhancement: Handle CREATE/CREATED cell processing gracefully under load. (assigned)
  • #17673 defect: circuit_handle_first_hop assumes all one-hop circuits are directory ... (new)
  • #17692 defect: Review every use of onehop_tunnel for assumptions that it's a ... (new)
  • #17768 enhancement: Measure Hidden Service Rendezvous Path Lengths (new)
  • #17928 enhancement: Warnings in syslog for wrong permissions on hidden service dir are ... (new)
  • #17957 enhancement: Detect stolen onion service key (new)
  • #18037 defect: Should the user be allowed to specify FQDNs for HS TARGETs? (new)
  • #18082 enhancement: Log separate HS extra-info stats for Single Onion Services (new)
  • #18098 enhancement: prop224: Implement tor-genkey tool for offline HS key creation (needs_revision)
  • #18157 enhancement: Which hidden services am I running? (new)
  • #18190 enhancement: Make identicons for hidden services to prevent phishing (new)
  • #18284 enhancement: Add RSOSIntroductionPoints feature (new)
  • #18608 defect: Limiting ADD_ONION TARGET access. (new)
  • #18620 enhancement: HSFORGET command to clear cached client state for a HS (needs_revision)
  • #19162 defect: Make it even harder to become HSDir (accepted)
  • #19324 enhancement: controller: events for hidden service intro point changes, descriptor ... (new)
  • #19522 defect: HS intro circuit retry logic fails when network interface is down (needs_revision)
  • #19647 enhancement: HS Descriptors should only contain UTF-8 (new)
  • #19926 defect: BUG warning in connection_ap_attach_pending: waiting for rendezvous desc :* (new)
  • #20006 enhancement: HSFETCH fails for hidden services which use client authentication (needs_revision)
  • #20007 defect: Sandbox causing crash when setting HidServAuth when there is a hidden ... (needs_information)
  • #20035 enhancement: Identify client-specific options that work with hidden services (new)
  • #20046 defect: Test hidden services with different consensuses (new)
  • #20082 enhancement: Lower initial descriptor upload delay for hidden services (needs_revision)
  • #20169 enhancement: hs_desc, hs_desc_content - BAD_DESC|NOT_FOUND (new)
  • #20188 enhancement: hsfetch hs_desc FAILED with REASON missing (new)
  • #20212 enhancement: Tor can be forced to open too many circuits by embedding .onion resources (new)
  • #20225 defect: tor "wedged" and become unable to connect to a hidden service (needs_information)
  • #20289 enhancement: HS_DESC event while waiting for upload (new)
  • #20332 defect: Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS (new)
  • #20371 enhancement: Lower HSDir query backoff delay (new)
  • #20594 enhancement: hs: Make HSDir produce HS statistics for prop224 (new)
  • #20742 enhancement: prop224: Implement stealth client authorization (assigned)
  • #21084 defect: sometimes we call circuit has_opened() more than 2 times on client side (new)
  • #21117 defect: can't migrate onion services to single-hop onion services (new)
  • #21284 enhancement: Add torrc option for non-anonymous SocksPort (new)
  • #21285 enhancement: Add tor compilation to disable all non-anonymous services (new)
  • #21297 defect: Hidden service unavailable. (new)
  • #21360 enhancement: add controller event to track changes to 'getinfo onions/detached' (new)
  • #21446 defect: Number of Introduction Points for a (SingleOnion?) HS seems variable, ... (needs_information)
  • #21483 defect: DuckDuckGo Onion should be the default instead of DuckDuckGo (needs_information)
  • #21509 task: Fuzz v3 hidden services (new)
1 2 3