Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-hs'

Results (1 - 100 of 394)

1 2 3 4
  • #393 defect: hidden services resolve hosts only once (assigned)
  • #449 defect: dns failures prevent legitimate options being set (accepted)
  • #1250 enhancement: strange SOCKS error code when connecting to a hidden service using the ... (new)
  • #2743 defect: safelogging should cover hidden service name and intro-points too (assigned)
  • #3317 defect: Tor should lock its HiddenServiceDirs (new)
  • #3522 enhancement: Allow controllers to post HS descriptors to Tor's cache (new)
  • #3733 defect: Tor should abandon rendezvous circuits that cause a client request to ... (accepted)
  • #4698 enhancement: MapAddress should be able to map from invalid .onion names (closed: not a bug)
  • #4700 enhancement: Tor should provide a mechanism for hidden services to differentiate ... (closed: implemented)
  • #4850 enhancement: Build multiple circuits and use the fastest? (new)
  • #4857 defect: Disabling an HS with service-side rend circs in progress may produce ... (new)
  • #5271 enhancement: add log messages when a hidden service consistently doesn't have any ... (new)
  • #6176 defect: Clean up service IDs (new)
  • #6228 enhancement: NSS module for .onion DNS name resolution (new)
  • #6418 enhancement: Drop support for older versions of the hidden service protocol (new)
  • #6504 enhancement: Support Windows environment variables in HiddenServiceDir (needs_information)
  • #6772 enhancement: Fall back to alternative OR or Dir port if the current fails (new)
  • #7590 enhancement: [PATCH] New option LocalOutboundBindAddress (needs_revision)
  • #9001 defect: Slow Guard Discovery of Hidden Services and Clients (new)
  • #9685 enhancement: Improve Tor2web mode performance by having Tor2web client to be the ... (reopened)
  • #12399 defect: "Hash of session info was not as expected" should be log_protocol_warn (new)
  • #12424 enhancement: Implement improved hidden service protocol (prop224) (closed: fixed)
  • #12500 enhancement: Add an option to upload hidden service descriptors some time after startup (new)
  • #13194 enhancement: Track time between ESTABLISH_RENDEZVOUS and RENDEZVOUS1 cell (new)
  • #13195 enhancement: Collect aggregate stats around hidden service descriptor publishes and ... (new)
  • #13466 enhancement: Collect aggregate stats of ntor-using hidden service interactions vs ... (new)
  • #13484 task: Do we have edge cases with rend_consider_descriptor_republication()? ... (new)
  • #13494 enhancement: Regression test about Hidden Service time synchronization (new)
  • #13590 enhancement: Extend HiddenServicePort VIRTPORT semantics (new)
  • #13737 enhancement: Move circuit building crypto to worker (assigned)
  • #13738 enhancement: Make worker handle introduction point crypto (new)
  • #13739 defect: Optimize the functions called in circuit_launch_by_extend_info() (new)
  • #13792 enhancement: HS statistics for private tor network to gather info on services, ... (new)
  • #13800 defect: circuit does not close after hidden service is shutdown via control port (new)
  • #13828 enhancement: Refactor rend_cache_store_v2_desc_as_dir and ... (new)
  • #13837 defect: Mitigate guard discovery by pinning middle node (closed: implemented)
  • #14006 defect: Hidden service error: "We'd like to launch a circuit to handle a ... (needs_information)
  • #14150 enhancement: Dirauths should expose the value of MinUptimeHidServDirectoryV2 as a ... (new)
  • #14389 defect: Improve TBB UI of hidden service client authorization (needs_revision)
  • #14828 defect: Multiple hidden services can share a pk_digest/service_id. (needs_revision)
  • #14854 defect: Document the hardlimit of HiddenServiceAuthorizeClient basic (new)
  • #15008 defect: Design an opt-in Hidden Service Public Directory Submission system (new)
  • #15186 enhancement: Can we do HSDesc fetches using PIR, so HSDir can't learn popularity? (new)
  • #15251 task: Make tor support starting with 10.000 Tor Hidden Service (new)
  • #15272 task: Think of more research questions that we can answer with statistics (new)
  • #15463 defect: Tor deals poorly with a very large number of incoming connection requests. (new)
  • #15516 enhancement: Consider dropping INTRODUCE2 cells when under load (new)
  • #15540 enhancement: Increase the capacity of a HS server by using bridges after we ... (new)
  • #15557 defect: Improve relaunch logic for failed rendezvous circuits (new)
  • #15618 defect: Tried to establish rendezvous on non-OR circuit with purpose Acting as ... (needs_information)
  • #15621 enhancement: Kill the pre-version 3 intro protocol code with fire. (assigned)
  • #15729 enhancement: Proposal: Hidden Service Revocation (new)
  • #15938 defect: HS descriptor cache leaks timing information to local users (new)
  • #15991 enhancement: Option to skip authorization verification in INTRODUCE2 cell (new)
  • #16059 enhancement: Add a "rendezvous approver" control API (new)
  • #16106 defect: Sandbox causes crash when creating a hidden service through the ... (closed: wontfix)
  • #16387 enhancement: Improve reachability of hidden services on mobile phones (new)
  • #16520 project: Run some onion services to observe crawling trends (assigned)
  • #16537 enhancement: Allow onion services to publish voluntary usage stats (new)
  • #16538 project: Limit the impact of a malicious HSDir (new)
  • #16548 task: Change the HS nomenclature from hidden to onion (new)
  • #16558 defect: Dir auths should vote about Invalid like they do about BadExit (new)
  • #16646 defect: Cannibalized intro point circuits are now 4 hops, instead of 3 (HS-side) (new)
  • #16966 enhancement: Better solution for an HS client descriptor cache entry to expire (needs_information)
  • #17110 task: Hardening security - HidServAuth (new)
  • #17216 enhancement: Make Tor Browser's updater work over Hidden Services (new)
  • #17242 enhancement: prop224: Implement client support (closed: fixed)
  • #17254 enhancement: Scalable HSes by splitting intro/rendezvous (needs_revision)
  • #17343 enhancement: Add torrc option OnionService* alias for HiddenService* (new)
  • #17357 defect: rend_service_relaunch_rendezvous() ignores rend_service_requires_uptime() (new)
  • #17359 defect: DisablePredictedCircuits causes bootstrap to hang at "Connecting to ... (new)
  • #17360 enhancement: Hidden service option for the number of predicted circuits (new)
  • #17520 enhancement: Relax the rend cache failure cleanup timer (needs_information)
  • #17627 enhancement: Add missing controller events so we can link every step of the HS dance (new)
  • #17640 enhancement: Handle CREATE/CREATED cell processing gracefully under load. (assigned)
  • #17673 defect: circuit_handle_first_hop assumes all one-hop circuits are directory ... (new)
  • #17690 enhancement: prop224: Control the number of HSDirs using a consensus parameter (closed: fixed)
  • #17692 defect: Review every use of onehop_tunnel for assumptions that it's a ... (new)
  • #17768 enhancement: Measure Hidden Service Rendezvous Path Lengths (new)
  • #17857 enhancement: Create a consensus param to disable (netflow) padding if RSOS is enabled (closed: implemented)
  • #17928 enhancement: Warnings in syslog for wrong permissions on hidden service dir are ... (new)
  • #17945 enhancement: Stop single hop client connections to Single Onion Services (accepted)
  • #17948 enhancement: HiddenServicePort should connect to localhost by default (closed: wontfix)
  • #17957 enhancement: Detect stolen onion service key (new)
  • #18037 defect: Should the user be allowed to specify FQDNs for HS TARGETs? (new)
  • #18082 enhancement: Log separate HS extra-info stats for Single Onion Services (new)
  • #18098 enhancement: prop224: Implement tor-genkey tool for offline HS key creation (needs_revision)
  • #18157 enhancement: Which hidden services am I running? (new)
  • #18190 enhancement: Make identicons for hidden services to prevent phishing (new)
  • #18284 enhancement: Add RSOSIntroductionPoints feature (new)
  • #18608 defect: Limiting ADD_ONION TARGET access. (new)
  • #18620 enhancement: HSFORGET command to clear cached client state for a HS (needs_revision)
  • #19162 defect: Make it even harder to become HSDir (accepted)
  • #19324 enhancement: controller: events for hidden service intro point changes, descriptor ... (new)
  • #19522 defect: HS intro circuit retry logic fails when network interface is down (needs_revision)
  • #19647 enhancement: HS Descriptors should only contain UTF-8 (new)
  • #19662 defect: On intro failure, Tor2web should build a 3-hop path (closed: wontfix)
  • #19664 enhancement: IPv6-only Tor2web should use a 3-hop path on unreachable or failed ... (closed: wontfix)
  • #19745 defect: Tor2web clients ignore uptime when choosing rendezvous points (closed: wontfix)
  • #19757 defect: Make a menu to add onion and auth-cookie to TB (new)
1 2 3 4