Re: [Tails-dev] non-anonymous ephemeral onion services with stem

2016-12-28 Thread Micah Lee
Oops, sorry, disregard! I meant to email this to tor-dev, not tails-dev.

On 12/28/2016 08:53 AM, Micah Lee wrote:
> The stem documentation for create_ephemeral_hidden_service [1] says:
> "Changed in version 1.5.0: Added support for non-anonymous services."
> 
> But I can't figure out to actually use this feature. There doesn't seem
> to be a new argument to say if you want your onion service to be
> non-anonymous.
> 
> It also says, "Changed in version 1.5.0: Added the basic_auth argument."
> But there's a new basic_auth argument you can pass into the function to
> use that.
> 
> [1]
> https://stem.torproject.org/api/control.html#stem.control.Controller.create_ephemeral_hidden_service
> 
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] non-anonymous ephemeral onion services with stem

2016-12-28 Thread Micah Lee
The stem documentation for create_ephemeral_hidden_service [1] says:
"Changed in version 1.5.0: Added support for non-anonymous services."

But I can't figure out to actually use this feature. There doesn't seem
to be a new argument to say if you want your onion service to be
non-anonymous.

It also says, "Changed in version 1.5.0: Added the basic_auth argument."
But there's a new basic_auth argument you can pass into the function to
use that.

[1]
https://stem.torproject.org/api/control.html#stem.control.Controller.create_ephemeral_hidden_service
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Newer version of Tor in Tails

2015-09-09 Thread Micah Lee
On 09/09/2015 10:23 AM, Micah Lee wrote:
> I'm updating OnionShare to add support for ephemeral hidden services,
> which is available in Tor 0.2.7.1-alpha and newer and I'd like to test
> it in Tails to confirm that it works.
> 
> What's the easiest way for me to get a version of Tails that includes
> Tor 0.2.7.1+? Should I boot to Tails 1.5.1 and try to compile and
> install a newer version of Tor? Or is there an alpha version of Tails I
> could use instead?

Actually, nevermind. I realized I can just install the .deb from Tor's
experimental repo, and it seems to work.

-- 
Micah Lee



signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Newer version of Tor in Tails

2015-09-09 Thread Micah Lee
I'm updating OnionShare to add support for ephemeral hidden services,
which is available in Tor 0.2.7.1-alpha and newer and I'd like to test
it in Tails to confirm that it works.

What's the easiest way for me to get a version of Tails that includes
Tor 0.2.7.1+? Should I boot to Tails 1.5.1 and try to compile and
install a newer version of Tor? Or is there an alpha version of Tails I
could use instead?

-- 
Micah Lee



signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] OnionShare bug in Tails

2015-05-18 Thread Micah Lee
On 05/15/2015 11:21 AM, intrigeri wrote:
 Hi Micah,

 Micah Lee wrote (15 May 2015 00:11:53 GMT) :
 OnionShare recently stopped working in Tails
 Can you please be more specific wrt. what version of Tails worked for
 you, and what version stopped working?

I just tested a bunch of old versions of Tails in VMs and confirmed that
it last worked in 1.2.3 and stopped working in 1.3.


 Specifically, OnionShare is able to connect to the Tor control port, but
 when it tries to create a hidden service it now causes the entire tor
 process to crash, and it looks like this is related to Tor sandbox
 warnings. You can look at the issue on github to see the full tor logs,
 but basically there are a handful of sandbox_intern_string(): Bug: No
 interned sandbox parameter found for /var/lib/tor/tmpBuBZmk errors
 (/var/lib/tor/tmpBuBZmk being the hidden service dir), ending with a
 crash: (Sandbox) Caught a bad syscall attempt (syscall open).
 Looks like a bug in Tor sandbox rather than anything Tails-specific
 to me.

Agreed, but I haven't run into it anywhere except in Tails. Maybe this
is because all other platforms use the tor service from Tor Browser
rather than a system Tor, and that doesn't have sandboxing enabled or
something?

 So I can find very little information about what's causing this or how
 to fix it. Anyone here know?
 0. Make sure there are no AppArmor-related messages for Tor in `sudo
dmesg`. If there are, please report them to us.

There are no AppArmor errors.

 1. Try without Tor sandboxing (configuring a bridge as documented via
Tails Greeter + Tor Launcher should be enough, since we disable the
sandbox when special Tor config is requested).

When I enable a bridge it doesn't cause the tor crash. So I think this
is a Tor sandbox issue.

However, onionshare fails for some other reason when a bridge is
enabled. I think this is an entirely separate issue, but I'm looking
into it.

 2. If #1 confirmed that the only problem is caused by Tor sandboxing,
report a bug on the Tor bug tracker: we don't maintain the Tor
sandbox in Tails :)

Apparently tor immediately crashes in Tor Browser if you edit its torrc
and set Sandbox 1. So now I'm testing using a system Tor in Debian,
not Tails, and I can confirm that starting a hidden service causes a
crash. I'll try to make a simpler piece of code that reproduces it and
open a tor bug.

-- 
Micah Lee
OpenPGP: 0B1491929806596254700155FD720AD9EBA34B1C

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] OnionShare bug in Tails

2015-05-14 Thread Micah Lee
OnionShare recently stopped working in Tails and I'm trying to fix it.
Here is the issue:
https://github.com/micahflee/onionshare/issues/179

Specifically, OnionShare is able to connect to the Tor control port, but
when it tries to create a hidden service it now causes the entire tor
process to crash, and it looks like this is related to Tor sandbox
warnings. You can look at the issue on github to see the full tor logs,
but basically there are a handful of sandbox_intern_string(): Bug: No
interned sandbox parameter found for /var/lib/tor/tmpBuBZmk errors
(/var/lib/tor/tmpBuBZmk being the hidden service dir), ending with a
crash: (Sandbox) Caught a bad syscall attempt (syscall open).

While searching for how to solve this I've only found a small handful of
closed tor bugs that were all resolved with patches to tor itself, like:
https://trac.torproject.org/projects/tor/ticket/12041
https://trac.torproject.org/projects/tor/ticket/12035
https://trac.torproject.org/projects/tor/ticket/12064

So I can find very little information about what's causing this or how
to fix it. Anyone here know?

-- 
Micah Lee
OpenPGP: 0B1491929806596254700155FD720AD9EBA34B1C

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Shared screen locking solution for live distributions in Debian

2015-01-13 Thread Micah Lee
On 01/12/2015 03:58 PM, Klaus Knopper wrote:
 Also, screen locking makes only sense if there is the apparent
 possibility that someone else has physical access to the computer while
 the user is not paying attention. Why would I lock the screen if I'm the
 only one using the computer in a safe environment, and shut it down and
 remove the live medium when I'm done with my work.

I outlined some reasons for it here [1], but TL;DR is so you can step
out of your office for a minute to refill your cup of coffee without
having to close all your work, tell everyone you're chatting with that
you'll brb, shut down your computer, and then boot it up again to get
back to work.

[1] https://labs.riseup.net/code/issues/5684#note-11

-- 
Micah Lee
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.