Re: [Tails-dev] Tor Browser 12.5.0 Candidate Builds available

2023-06-22 Thread richard
Sorry to say, we had to make another build last night with a pref flip which 
does affect all your distributions. The download spam pref flip has some edge 
cases upstream which we will need to fix in 12.5.1 in the coming weeks so we 
reverted it. We also included a pref flip to fix screen reader support on some 
Windows systems, but that doesn't affect any of you :)


12.5-build2:

- 
https://tb-build-05.torproject.org/~richard/builds/torbrowser/release/unsigned/12.5-build2/


I'll be signing and publishing this release shortly.

A regularly scheduled minor ESR update (12.5.1) should be coming in the first 
week of July.


best,
-Richard

On 6/20/23 01:09, richard wrote:

Hello All,

Tor Browser 12.5.0 release candidate builds are now available for testing:

- 
https://tb-build-05.torproject.org/~richard/builds/torbrowser/release/unsigned/12.5.0-build1/


This is a major release, but you *shouldn't* have any breaking changes with 
regards to packaging as it is still on the esr102 series.


The full changelog from 12.0.0 can be found here:

- 
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/blob/tbb-12.5.0-build1/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt


best,
-Richard


OpenPGP_0xDE47360363F34B2C.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] new features coming in to be aware of

2023-06-22 Thread anonym

On 20/06/2023 19.19, richard wrote:

Hi Tails devs,

So the legacy tor daemon recently got two new features in alpha you 
should be aware of, proof-of-work and conflux circuits:


Thanks for the heads-up! This is very valuable!

- proof-of-work: Onion service providers will be able to opt-in to a 
proof-of-work requirement for connecting clients as a ddos 
counter-measure. Legacy clients which do not support this feature will 
not be able to connect to onion services making use of it. This feature 
will be transparent to the user, though in Tor Browser we may surface 
custom ui notifying the user if they failed to complete the pow in-time 
(or other pow-specific errors). The details are still tbd, but any error 
would be surfaced to applications via a custom SOCKS5 error code 
(similar to how the tor daemon notifies applications that client auth is 
required to access an onion service)


Am I correct to assume that as long as we have a tor and Tor Browser 
that supports this, and our Tor Browser's SocksPort has ExtendedErrors 
enabled, then we are good to go for this feature, or is something more 
needed?


- conflux circuits: the network team has developed a multiple-circuit 
selection routing system whereby clients will open multiple circuits to 
an endpoint, and divide traffic between the circuits to increase network 
performance. Any ux that shows a user's circuit will need to be updated 
to account for this new conflux circuit reality. For the initial stable 
release, conflux circuits will only work with clearnet endpoints so 
onion services are unaffected. The browser team will be working with ux 
on any required ui changes during the next release cycle, so if Tails 
has an analogous thing outside of Tor Browser you can probably follow 
our lead there.


Tails has a simple Vidalia-esque circuit viewer where each circuit is 
listed along with its streams, so (if I understand correctly) with 
conflux circuits it can be the case that the same stream can be listed 
under multiple circuits. Since (IIRC) pre-conflux streams associate with 
a single circuit id it indeed sounds like there will be some work needed 
here. And this circuit viewer uses Stem, which is unmaintained, which 
could complicate things a bit further. :)


Tails also has a control port filter (that sits between tor and the 
applications using the control port) that I believe will be affected: 
since Tails runs a single system-wide tor instance there are concerns 
about applications that have access to the control port snooping on 
other circuits/streams (among other things), so the filter enforces 
restrictions so a control port user only can see its own streams and 
associated circuits. If streams can associate to multiple circuits then 
Tails' control port filter must take that into account.


Again, thanks for the heads-up!

Cheers!
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.