Re: [Tails-dev] [tor-qa] Tor Browser 5.0 is ready for testing!

2015-08-10 Thread Mike Perry
Georg Koppen:
> Mike Perry:
> > https://people.torproject.org/~mikeperry/builds/5.0-build2/
> > 
> > This release is our first stable release based on Firefox 38-ESR. We've
> > done a lot of work to ensure that this release is minimally disruptive
> > in terms of changes to the UI/UX, but some hacks were needed, especially
> > to ensure the "Tiles" feature was disabled, and to clean up the NoScript
> > whitelist.
> > 
> > The current Firefox 31-ESR is end-of-life on Tuesday, August 11th, so we
> > need to switch all users to 5.0 for them to pick up security updates. As
> > such, extra testing would be appreciated!
> 
> FWIW: One thing we already found and which unfortunately makes a build3
> necessary is the incompatibility with the localized language packs. I
> was under the impression (wrongly as it turns out) that Mozilla fixed
> their versioning scheme we get with the git checkouts starting with
> their esr38 cycle and forgot to doublecheck that.

If anyone was waiting for build3 before testing (which was a bad idea),
it is now ready:
https://people.torproject.org/~mikeperry/builds/5.0-build3/

Please test.


-- 
Mike Perry


signature.asc
Description: Digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] [tor-qa] Tor Browser 4.5 is ready for testing

2015-04-26 Thread Mike Perry
We had to do a rebuild over the weekend for two bugs:
 * Bug 15794: Crash on some pages with SVG images if SVG is disabled
 * Bug 15795: Some security slider prefs do not trigger custom checkbox

We also updated HTTPS-Everywhere to 5.0.3.

New builds are at:
https://people.torproject.org/~mikeperry/builds/4.5-build5/

Georg Koppen:
> Hi,
> 
> we are excited to announce the first stable version in the 4.5 series
> being ready for testing. It will be the next alpha as well. Bundles can
> be found on
> 
> https://people.torproject.org/~mikeperry/builds/4.5-build4/
> 
> Compared to 4.5a5 we were able to put another couple of important
> usability fixes into this release. We improved HTTP connection handling,
> the HTTP authentication experience and fixed the TLS connection display,
> to name a few. Moreover, we neutered Blob URIs to a great deal which can
> get used to track users across domains and, finally, brought all Tor
> Browser components up-to-date.
> 
> The complete changelog since 4.5a5 is:
> 
> Tor Browser 4.5 -- Apr 28 2015
>  * All Platforms
>* Update Tor to 0.2.6.7 with additional patches:
>  * Bug 15482: Reset timestamp_dirty each time a SOCKSAuth circuit is
> used
>* Update NoScript to 2.6.9.22
>* Update HTTPS-Everywhere to 5.0.2
>  * Bug 15689: Resume building HTTPS-Everywhere from git tags
>* Update meek to 0.17
>* Update obfs4proxy to 0.0.5
>* Update Tor Launcher to 0.2.7.4
>  * Bug 15704: Do not enable network if wizard is opened
>  * Bug 11879: Stop bootstrap if Cancel or Open Settings is clicked
>  * Bug 13576: Don't strip "bridge" from the middle of bridge lines
>  * Bug 15657: Display the host:port of any connection faiures in
> bootstrap
>* Update Torbutton to 1.9.2.1
>  * Bug 15562: Bind SharedWorkers to thirdparty pref
>  * Bug 15533: Restore default security level when restoring defaults
>  * Bug 15510: Close Tor Circuit UI control port connections on New
> Identity
>  * Bug 15472: Make node text black in circuit status UI
>  * Bug 15502: Wipe blob URIs on New Identity
>  * Bug 14429: Disable automatic window resizing for now
>* Bug 4100: Raise HTTP Keep-Alive back to 115 second default
>* Bug 13875: Spoof window.devicePixelRatio to avoid DPI fingerprinting
>* Bug 15411: Remove old (and unused) cacheDomain cache isolation
> mechanism
>* Bugs 14716+13254: Fix issues with HTTP Auth usage and TLS
> connection info display
>* Bug 15502: Isolate blob URI scope to URL domain; block WebWorker access
>* Bug 15562: Disable Javascript SharedWorkers due to third party tracking
>* Bug 15757: Disable Mozilla video statistics API extensions
>* Bug 15758: Disable Device Sensor APIs
>  * Linux
>* Bug 15747: Improve start-tor-browser argument handling
>* Bug 15672: Provide desktop app registration+unregistration for Linux
>  * Windows
>* Bug 15539: Make installer exe signatures reproducibly removable
>* Bug 10761: Fix instances of shutdown crashes
> 
> Georg
> 



> ___
> tor-qa mailing list
> tor...@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-qa


-- 
Mike Perry


signature.asc
Description: Digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Make Tor Binary location configurable in Tor Launcher?

2014-06-17 Thread Mike Perry
Hey Tails folks, hey Sukhbir,

In our efforts to streamline and reorganize the Tor Browser directory
structure for the Firefox updater, we have changed how Tor Launcher
finds the Tor binary:
https://trac.torproject.org/projects/tor/ticket/11641
https://gitweb.torproject.org/user/brade/tor-launcher.git/commitdiff/6599aca0c63944a4db7782fd47c0c6569d8dfdf0

We created a maint-0.2.5 Tor Launcher branch that preserves the old
location and behavior for Tor Launcher 0.2.5.x releases in Tor Browser
3.6, while the master branch will house 0.2.6 and use this new directory
structure for our upcoming 4.0-alpha series.

While reviewing that patch, it occurred to me that it might be useful to
make the path to the Tor binary configurable in a pref, rather than
hardcoding the depth and pieces of the directory structure in the code
and launching logic.

However, it probably only makes sense to do this if it would also be
useful to non-TBB consumers of Tor Launcher. Otherwise, we can keep
using the hardcoded values just for us, if you guys already have an
alternate way of launching Tor that you prefer.

Let us know what you think!

-- 
Mike Perry


signature.asc
Description: Digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Tor Launcher as a standalone XUL app in Tails

2014-02-25 Thread Mike Perry
Mark Smith:
> >>Another small consideration is that we (TBB developers) will probably
> >>not test Tor Launcher as a standalone XUL application because we will
> >>not be using it that way... so it is possible we will accidentally break
> >>something that is needed in that mode.  Of course we will try not to do so.
> >
> >As long as Tor Launcher more or less sticks with its current design, and
> >continues to keep away from stuff directly affecting Firefox (leaving
> >that to Tor Button) and only do stuff related to
> >starting/configuring/monitoring Tor processes, I expect very little
> >problems due to your upstream changes.
> >
> >Does this look like your plan for the foreseeable future?
> 
> Yes, although I leave it to Mike (in his role as TBB chief
> architect) to comment as well.  Requirements may dictate a future
> change in direction, but for now the plan is for Torbutton and Tor
> Launcher to work together but maintain their distinct roles.

Yes, I think it is reasonable to assume that Tor Launcher should behave
independently of Firefox (modulo minor oversights). In addition to
XULRunner/Tails, we want it to continue to work with Thunderbird, and be
easy to port to Instantbird, as well.

To what degree does Tails have automated testing? Will you be able to
keep an eye on 'master' and tell us if you run into problems?

As far as the patches, they should have a Tor Launcher ticket to
correspond to them. Perhaps attach them there?


-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Tor Browser branding in Tails?

2013-12-07 Thread Mike Perry
Oh, and for the record, you proabably want to build with the patches up
to aa57efd7c1807b334a456d0a8e89bdc160eeb296 of tor-browser-24.1.1esr-1
in tor-browser.git (to pick up the commit that disables the mixed
content blocker in Firefox, which enables considerably more
HTTPS-Everywhere rules).

Note that that branch still has not been rebased on top of FF24.2.0 yet.
I will be making a new branch for that this weekend (which will also
squash those fixup commits).

intrigeri:
> Hi Mike,
> 
> intrigeri wrote (01 Dec 2013 16:05:08 GMT) :
> > how annoying do you think it is if some of the Tor Browser branding
> > (mainly:  window title bar, some text in "About Tor Browser") is
> > applied in Tails 0.22?
> 
> > I guess we could change this by dropping the "Tor Browser's official
> > .mozconfigs" patch. To be honest, I'm a bit reluctant to change this
> > *now* for 0.22 (frozen, will be released in a bit more than a week),
> > and I'm afraid we did not think of this earlier in this release cycle,
> > but I would be happy to fix this for 0.23 if you think it's required.
> 
> Thanks for your reply on #tor-dev wrt. which patches we should drop if
> we wanted *not* to call our browser "Tor Browser": FTR you suggested
> we only drop the Rebrand-Firefox-to-TorBrowser patch, and we keep
> applying the mozconfig one. This is already what we do, and the result
> is a browser that calls itself "Tor Browser", so I'm afraid this is
> not an option. If you think we have to *not* call our browser this
> way, I guess I'll have to try dropping the mozconfig patch too.
> 
> More importantly, I've not seen any reply from you on the "how
> annoying [...]" question above. I plan to build our browser based on
> 24.2.0esr at some point during the week-end. Without any answer on
> this topic, I'll assume it's fine that we call our browser "Tor
> Browser", at least for one Tails release, and I will avoid fiddling
> with the branding at the last minute.
> 
> Cheers,
> -- 
>   intrigeri
>   | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
>   | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Tor Browser branding in Tails?

2013-12-07 Thread Mike Perry
intrigeri:
> Hi Mike,
> 
> intrigeri wrote (01 Dec 2013 16:05:08 GMT) :
> > how annoying do you think it is if some of the Tor Browser branding
> > (mainly:  window title bar, some text in "About Tor Browser") is
> > applied in Tails 0.22?
> 
> > I guess we could change this by dropping the "Tor Browser's official
> > .mozconfigs" patch. To be honest, I'm a bit reluctant to change this
> > *now* for 0.22 (frozen, will be released in a bit more than a week),
> > and I'm afraid we did not think of this earlier in this release cycle,
> > but I would be happy to fix this for 0.23 if you think it's required.
> 
> Thanks for your reply on #tor-dev wrt. which patches we should drop if
> we wanted *not* to call our browser "Tor Browser": FTR you suggested
> we only drop the Rebrand-Firefox-to-TorBrowser patch, and we keep
> applying the mozconfig one. This is already what we do, and the result
> is a browser that calls itself "Tor Browser", so I'm afraid this is
> not an option. If you think we have to *not* call our browser this
> way, I guess I'll have to try dropping the mozconfig patch too.

Oh, this may be due to the .mozconfig line:
mk_add_options MOZ_APP_DISPLAYNAME=TorBrowser

Without that, it should call itself Iceweasel/Firefox again in all
places.

> More importantly, I've not seen any reply from you on the "how
> annoying [...]" question above. I plan to build our browser based on
> 24.2.0esr at some point during the week-end. Without any answer on
> this topic, I'll assume it's fine that we call our browser "Tor
> Browser", at least for one Tails release, and I will avoid fiddling
> with the branding at the last minute.

I thought the "how annoying" question was addressed to the Tails
development list, not me. I don't care what you call your browser :).

I might suggest that your non-Debian users will find it more
understandable to have an "Insecure Browser" and a "Tor Browser", rather
than an "Insecure Browser" and an "Iceweasel" (wtf is an Iceweasel
anyway?) but that is for you to decide.

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


[Tails-dev] New Firefox 24.1.0esr branch (with full patch set)

2013-10-23 Thread Mike Perry
Hey everyone,

Just wanted to give you the heads up that I have created a new FF24esr
branch based on Mozilla's FF24.1.0esr release tag. This should have all
of our FF17 patches fully rebased and squashed back into 1 commit per
patch.

The branch is torbrowser-firefox24.1.0esr on my remote 
https://git.torproject.org/user/mikeperry/tor-browser.git.

The head of that branch should have hash
0afe6cc436e994f176d71c340516f04074e91eeb

It compiles on Linux, but I have not tried a full Gitian build with it
yet, nor have I tested running it. It also requires a couple commits to
Tor Launcher that have been merged to origin/master but have not been
tagged with a release yet.

There probably also will have to be new patches written once I finish
with https://trac.torproject.org/projects/tor/ticket/9608 and with the
networking code review.

There's also this pile of already-known issues to contend with:
https://trac.torproject.org/projects/tor/query?keywords=~ff24-esr

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Timing of the move to FF24

2013-10-14 Thread Mike Perry
Ugh. Python snuck into my C++. Should be fixed.

intrigeri:
> Hi Mike,
> 
> Mike Perry wrote (25 Sep 2013 02:37:38 GMT) :
> > intrigeri:
> >> 1. When do you expect to have published preliminary Torbrowser
> >>patches, rebased on FF24?
> 
> > Right now:
> > https://gitweb.torproject.org/user/mikeperry/tor-browser.git/shortlog/refs/heads/torbrowser-firefox24.0
> 
> Thanks!
> 
> It fails to build for me, apparently due to:
> 
>   +  if (!spec.IsEmpty())
>   +msg.AppendASCII(spec.get());
>   +  else:
>   +msg.AppendASCII(NS_LITERAL_STRING("Unknown URI!"));
> 
> ... in fixup-Isolate-the-Image-Cache-per-url-bar-domain.patch.
> 
> That triggers:
> 
>   /tmp/buildd/iceweasel-24.0/image/src/imgLoader.cpp: In member function 
> 'nsAutoCString imgLoader::GetCacheKey(nsIURI*, nsIURI*)':
>   /tmp/buildd/iceweasel-24.0/image/src/imgLoader.cpp:1866:11: error: expected 
> primary-expression before ':' token
>  else:
>^
>   /tmp/buildd/iceweasel-24.0/image/src/imgLoader.cpp:1866:11: error: expected 
> ';' before ':' token
> 
> I could presumably easily fix it locally, but it's way easier (patches
> management -wise) if I can just pile up another fixup commit from you
> on top of that one.
> 
> Cheers,
> -- 
>   intrigeri
>   | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
>   | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Timing of the move to FF24

2013-09-24 Thread Mike Perry
intrigeri:
> Hi Mike,
> 
> we at Tails need to organize the schedule for our next releases wrt.
> the move to FF24.
> 
> If you already have a rough timeline in mind, I'd be happy to read it.
> 
> Otherwise, having your answers to a few simple questions should be
> enough, for now, so that we can get organized:
> 
> 0. Will there be Torbutton changes that Tails should care about?
>If yes, then when can we start to play with it?

I think you mostly want to pick up the patch for Bug #8478.

However, you should probably start investigating 1.6.x and see how bad
it is for you to use. 1.5.x will probably be EOL as soon as TBB 3.0 is
stable (which is blocked on just a couple bugs).

Not sure if our branding additions to 1.6.x will conflict with yours or
not.

> 1. When do you expect to have published preliminary Torbrowser
>patches, rebased on FF24?

Right now:
https://gitweb.torproject.org/user/mikeperry/tor-browser.git/shortlog/refs/heads/torbrowser-firefox24.0

Not all patches have been applied. Here's the ones that have lots of
conflicts that I haven't done yet:
https://gitweb.torproject.org/user/mikeperry/tor-browser.git/tree/refs/heads/torbrowser-firefox24.0:/BADPATCHES

> 2. Does it sound reasonable that we do the bulk of our own migration
>work, based on your updated Torbrowser patches and the Iceweasel
>sources, on 2013-11-25? If not, when should we do it?
>
> 3. We plan to release a RC1 with FF24 on 2013-12-02, and the final ISO
>on 2013-12-11, the same day as FF17 is EOL'd. Totally crazy, or
>only half-crazy?

Probably slightly less than half-crazy? The main things I'd be worried
about if I were you is dealing with Tor Launcher and 1.6.x. Leaving Tor
Launcher out but Torbutton 1.6.x in might cause some problems. You can
also try including Tor Launcher in with extensions.torlauncher.start_tor
set to false, but it still may complain if you don't set the
TOR_CONTROL_PORT and TOR_CONTROL_PASSWD env vars anyway.

Do you have a schedule link for the ESR release date btw? I can't find
the release calendar I used to have.

FWIW, I am hoping to have working Gitian builds with FF24 in a couple
weeks.


-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Patches for next stable TBB / Tails

2013-05-02 Thread Mike Perry
Thus spake intrigeri (intrig...@boum.org):

> Hi,
> 
> Mike Perry wrote (01 May 2013 20:50:03 GMT) :
> > I say go for it. Onward and upward! :)
> 
> Thanks! Is Torbutton 1.5.2 strictly needed by the updated patches, or
> may we skip that one and save some time?

You want 1.5.2 to reduce/eliminate hangs on New Identity:
https://trac.torproject.org/projects/tor/ticket/8642

That bug *might* be exacerbated by the Optimistic Data patch (I noticed
it way more frequently after making a debug build with the Optimistic
Data patch, and that patch does change the behavior of
nsISocketTransport in a general way), but it also might still be there
without it.

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Patches for next stable TBB / Tails

2013-05-01 Thread Mike Perry
Thus spake intrigeri (intrig...@boum.org):

> Hi Mike,
> 
> will the April Torbrowser patch updates (especially the Optimistic
> Data SOCKS handshake, and the numerous pipelining changes) be included
> in TBB that will be released soon after FF 17.0.6esr?

Yes. My plan is to include all patches in TBB-stable, unless we hear
problems with the alphas. So far, all reports about the alphas have been
positive (and people are running them, due to crash bugs in the
current TBB-stable).

In fact, we'll be doing a TBB-stable release in the next few days with
these patches to fix the crash bugs for everyone.

I've also been running these patches in my own build of TBB-stable
(which I use for all Tor-related web browsing, as well as for reading
the news). It's been fine for me - no new regressions at least.

> The freeze for Tails 0.18 is in two days, so I wonder if I hurry to
> prepare this stuff (and the according prefs changes), test it, have it
> reviewed & merged in time, or if we should just postpone it for some
> future release. Given the alpha bundles just came out, it seems a bit
> early to me to decide.

I say go for it. Onward and upward! :)

> Thoughts, Mike or anyone?
> 
> Cheers,
> -- 
>   intrigeri
>   | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
>   | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Testing image cache and DOM storage isolation

2013-04-17 Thread Mike Perry
Thus spake intrigeri (intrig...@boum.org):

> I'm now taking time to apply to the Tails' web browser the last two
> meaningful Torbrowser patches we were not using yet:
> 
>   - 0026-Isolate-DOM-storage-to-first-party-URI.patch
>   - 0024-Isolate-the-Image-Cache-per-url-bar-domain.patch
> 
> I'm now trying to verify that applying these patches actually makes
> a difference. How do you do it?

First, note that I just fixed a bug in 0024 that caused an intermittent
crash on New Identity and on exit:
https://trac.torproject.org/projects/tor/ticket/8628

So you want to get the latest patch from origin/maint-2.4.

There are also some other patch updates that I've made since the last
TBB release, but I'm still working on them.

> about:cache shows the same regardless of whether the image cache patch
> is applied or not; this is explained, I guess, by the Torbrowser
> design doc that reads "Additionally, because the image cache is
> a separate entity from the content cache, we had to patch Firefox to
> also isolate this cache per url bar domain."

According to my notes in the original bug
(https://trac.torproject.org/projects/tor/ticket/5742), the patch should
cause additional domain= entries for each url bar to appear in
about:cache. Otherwise I think only one entry appears for a given image,
regardless of url bar domains used to load it... However, the patch was
first written for Firefox 10. Things may have changed wrt about:cache
display since then.

You can manually verify that the Google logo image actually loads over the
network for all three of these pages:
https://encrypted.google.com/
https://anonym-surfen.de/ImageTest.html
https://anonymous-proxy-servers.net/en/ImageTest.html

If the patch is not working/not applied, the Google image will come from
the cache for the second two, and the web developer console should say
"304 not modified" in the "Net" logs.


For DOM storage, you can try hosting this container page on an
additional domain, and verify that the iframe can't retrieve any values
set from the original container page from trial.pearlcrescent.com:
http://trial.pearlcrescent.com/tor/storageContainer.html

> Ideally, I'd like to add this to our automated test suite, but at
> least a quick'n'dirty manual check would be much better than nothing
> before we merge this branch.

What do you use for automated testing of Firefox? I see some pages
mentioning something called "Cucumber?"

Are you able to inspect the browser state from that framework?

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Tor Launcher extension [Was: Mike's March 2013]

2013-04-02 Thread Mike Perry
Thus spake intrigeri (intrig...@boum.org):

> Hi Mike and fellow Tails developers,
> 
> Mike Perry wrote (02 Apr 2013 02:55:20 GMT) :
> > 5. I helped Pearl Crescent get a bunch of feedback on their Tor Launcher
> > extension at the dev meeting and elsewhere. My current estimation is
> > that shipping some running code in a TBB-alpha is still more important
> > at this point than anything else, given the number of partially
> > conflicting usability parameters involved. If you think otherwise, you
> > should probably email me now before it's too late.
> 
> We, at Tails, should evaluate if and how this project would fit our
> needs. Assuming we replace Vidalia with this extension some day, we
> most probably would not want it to launch Tor, but merely control it.
> 
> Mike,
> 
> 1. Any obvious showstopper, off the top of your head, regarding how
>the Tor Launcher could be usable for Tails?

I think you guys mostly won't use it. My guess is you'd probably just
set the env vars $TOR_CONTROL_PORT and $TOR_CONTROL_PASSWD to allow New
Identity and simply launch Firefox directly without any form of network
configuration in the browser.

#8511 might cause you problems if you use a $TOR_SOCKS_PORT env var with
a value other than 9151, though. You may want to either add iptables
redirect rule for 9151 or add an additional SocksPort line to your torrc
rather than messing with TBB's socks port env vars for that reason.
Changing the socks port at runtime will cause the issues mentioned in
that bug.

> 2. Will the "control a system-wide Tor instance, that possibly is
>started or restarted after the Torbrowser" usecase be supported?

Unlikely, unless you provide us with a $TOR_CONTROL_PASSWD env var (or
a COOKIE/SAFECOOKIE auth implementation for Torbutton...)

I also want to allow Vidalia to continue to exist as a standalone
controller package via either COOKIE or SAFECOOKIE auth mechanisms. This
probably means that $TOR_CONTROL_PASSWD will ultimately be deprecated
from Tor Browser. If the privsep properties of SAFECOOKIE appeal to
you, let me know. Otherwise initial versions will likely support only
COOKIE auth at best.
 
> Starting points to look into this:
> 
>   * ticket: https://trac.torproject.org/projects/tor/ticket/6009
>   * source: https://gitweb.torproject.org/tor-launcher.git

Yep, you're in the right place. See also the tor-launcher remotes.

The plan for Tor Launcher in TBB-alpha is "maximumly minimalist". If
everything works out, you should be able to use Tor Browser without Tor
Launcher at all, but you may have to change/replace the
start-tor-browser script slightly, and/or tweak some env vars before
launching your patched Firefox.

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] Integration of Tor, Tor Browser, Tor IM, Tor Birdy, Vidalia, Tor Router, Tails, etc.

2012-09-10 Thread Mike Perry
Thus spake adrelanos (adrela...@riseup.net):

> The current [TBB launch] integration has a lot open issues and feature
> requests. [2]

Wow, even more than I thought! :)

> Because there might come a proposal [1] to solve this cleanly, I created
> an overview of all related open issues. [2] There are just so many
> issues I though it makes sense to create an overview so nothing gets
> forgotten. Feel free to edit/correct/expand the wiki site. Add your wishes.
> 
> I cc'ed all effected people, if someone has been forgotten, feel free to
> forward this mail.
> 
> Can we have this discussion on tor-dev?

I think so. Again, I think the path to max success for you here is to
make your own package/collection/tar.gz of launch scripts for different
scenarios. That way, you can experiment without getting bogged down by
design proposals and formalities for making the TBB itself usable.

It might be the case at first that it seems like you're being ignored.
Once you have stuff that works, or at least have some kind of plan, I
think people will listen/test stuff/make suggestions on tor-dev.  Any
earlier stages might want the wider input from the tor-talk crowd,
though.

It's quite possible that Jake's "Zygote-process named-pipe Tor
coordinator" can just be an addition to all of this stuff at the end, as
a helper process for finding the right Tor socks port. It's also likely
that simple python (or even shell) prototypes will work just fine,
even if they only just guess at defaults and test them.

If you block on env var support in Torbutton, please let me know. Right
now I think you can make a lot of progress even as-is. I think #5611
should help you do more, but isn't strickly needed yet? Am I correct
there?
 
> [1] https://trac.torproject.org/projects/tor/ticket/5611#comment:43
> [2] https://trac.torproject.org/projects/tor/wiki/doc/TB

-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev


Re: [Tails-dev] [tor-talk] Please review Tails stream isolation plans

2012-08-28 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com):

> On 8/28/12, adrelanos  wrote:
> 
> > I really think before you activate IsolateDestAddr/Port for web, Nick's
> > or Roger's option is required.
> 
> Nick or Roger would say no.  But they are planning to specifically
> leave those options disabled for the web browser.  (That's what
> “enabled by default (but for the web browser)” meant.)

Here's the ticket for implementing Tor Browser's use of the circuit
isolation feature: https://trac.torproject.org/projects/tor/ticket/3455

Summary: we plan on using some variation of the "url bar isolation"
property from
https://www.torproject.org/projects/torbrowser/design/#privacy to guide
our circuit reuse implementation. So long as the url bar stays the same,
we'll use the same circuit for sure. This shouldn't be *too* tricky to
do using mozIThirdPartyUtil.

I'm still debating if we should *also* try to track user
click-nagivation, and use the same circuit so long as the user is
clicking on links (as opposed to entering a fresh new value in the URL
bar). This could be modeled by tracking the referer, or the last url bar
domain to be entered. This will be trickier to implement, but will
reduce client circuit creation.

Either route will require a patch to Firefox, since it is not possible
to set SOCKS usernames+passwords from a .xpi right now.

Roger also wants to turn this into a research project of some kind to
determine the optimal circuit isolation mechanism network-wide, but that
seems like a waste of time to me, since what I'm proposing doesn't
strike me as very resource-intensive in the common case. I'm open to
suggestions on how to make it less painful, though.


-- 
Mike Perry


signature.asc
Description: Digital signature
___
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev