Re: [tor-bugs] #14717 [HTTPS Everywhere/HTTPS Everywhere: Chrome]: HTTPS Everywhere extension for Chrome - the main icon never renders; it's just an invisible blank spot

2017-10-03 Thread Tor Bug Tracker & Wiki
#14717: HTTPS Everywhere extension for Chrome - the main icon never renders; 
it's
just an invisible blank spot
-+-
 Reporter:  cypherpunks  |  Owner:  (none)
 Type:  defect   | Status:  closed
 Priority:  High |  Milestone:
Component:  HTTPS Everywhere/HTTPS Everywhere:   |Version:
  Chrome |
 Severity:  Blocker  | Resolution:  fixed
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by cypherpunks):

 * status:  new => closed
 * resolution:   => fixed
 * severity:   => Blocker


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #15378 [HTTPS Everywhere/HTTPS Everywhere: Chrome]: HTTPS Everywhere breaks images in tumblr.com

2017-10-03 Thread Tor Bug Tracker & Wiki
#15378: HTTPS Everywhere breaks images in tumblr.com
-+-
 Reporter:  cypherpunks  |  Owner:  (none)
 Type:  defect   | Status:  closed
 Priority:  High |  Milestone:
Component:  HTTPS Everywhere/HTTPS Everywhere:   |Version:
  Chrome | Resolution:
 Severity:   |  worksforme
 Keywords:  HTTPS Everywhere Chrome Tumblr   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by cypherpunks):

 * status:  new => closed
 * resolution:   => worksforme


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23747 [Applications/Tor Browser]: "Temporarily allow all this page" disables JS on all other tabs

2017-10-03 Thread Tor Bug Tracker & Wiki
#23747: "Temporarily allow all this page" disables JS on all other tabs
--+--
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major |   Keywords:  noscript
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 subj

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23671 [Core Tor/Tor]: Say how many other nodes we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23671: Say how many other nodes we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.3.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by asn):

 * status:  assigned => needs_review


Comment:

 Did this as part of the #23670 patch since it touched the same code and
 would generate conflicts otherwise.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23670 [Core Tor/Tor]: Say how many primary entry guards we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23670: Say how many primary entry guards we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.3.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---

Comment (by asn):

 Pushed two more commits implementing the #23671 feature as well, since
 they are very tightly coupled.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23739 [Core Tor/Tor]: improve documentation on how we use gcov

2017-10-03 Thread Tor Bug Tracker & Wiki
#23739: improve documentation on how we use gcov
-+-
 Reporter:  catalyst |  Owner:
 |  catalyst
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.9.1-alpha
 Severity:  Normal   | Resolution:
 Keywords:  new-developers tor-doc tor-tests-|  Actual Points:
  coverage   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by asn):

 * status:  needs_review => needs_revision


Comment:

 Docs look good. I think there is a tiny typo error where it says `and line
 numbers are deleted79`. Or is `deleted79`  something actual?

 Other than this, looks good.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23746 [Core Tor/Tor]: torguts.git/tree/01d-crypto.md#n13 is incomplete

2017-10-03 Thread Tor Bug Tracker & Wiki
#23746: torguts.git/tree/01d-crypto.md#n13 is incomplete
--+--
 Reporter:  ewong |  Owner:  nickm
 Type:  defect| Status:  assigned
 Priority:  Low   |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Minor | Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by nickm):

 Yes, a lot of my sentences have a

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23746 [Core Tor/Tor]: torguts.git/tree/01d-crypto.md#n13 is incomplete

2017-10-03 Thread Tor Bug Tracker & Wiki
#23746: torguts.git/tree/01d-crypto.md#n13 is incomplete
--+
 Reporter:  ewong |  Owner:  nickm
 Type:  defect| Status:  closed
 Priority:  Low   |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Minor | Resolution:  fixed
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by nickm):

 * status:  assigned => closed
 * resolution:   => fixed


Comment:

 Removed the sentence fragment. Whatever it was supposed to say is no
 longer in my head.  If the same question comes up again (whatever that
 question was), we can write a better answer.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23695 [Core Tor/Tor]: Add resource on writing Rust FFI to doc/HACKING/GettingStartedRust.md

2017-10-03 Thread Tor Bug Tracker & Wiki
#23695: Add resource on writing Rust FFI to doc/HACKING/GettingStartedRust.md
-+
 Reporter:  isis |  Owner:  (none)
 Type:  enhancement  | Status:  closed
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:  Tor: 0.3.1.4-alpha
 Severity:  Normal   | Resolution:  implemented
 Keywords:  rust-pilot, tor-doc  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by nickm):

 * status:  merge_ready => closed
 * resolution:   => implemented


Comment:

 merged!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23741 [Core Tor/Tor]: scripts/test/coverage tries to mv .gcov files to /

2017-10-03 Thread Tor Bug Tracker & Wiki
#23741: scripts/test/coverage tries to mv .gcov files to /
+
 Reporter:  catalyst|  Owner:  catalyst
 Type:  defect  | Status:  closed
 Priority:  Medium  |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor|Version:  Tor: 0.2.5.1-alpha
 Severity:  Normal  | Resolution:  fixed
 Keywords:  tor-tests-coverage  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+
Changes (by nickm):

 * status:  needs_review => closed
 * resolution:   => fixed


Comment:

 lgtm; merged!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23671 [Core Tor/Tor]: Say how many other nodes we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23671: Say how many other nodes we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by nickm):

 * milestone:  Tor: 0.3.3.x-final => Tor: 0.3.2.x-final


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23670 [Core Tor/Tor]: Say how many primary entry guards we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23670: Say how many primary entry guards we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by nickm):

 * milestone:  Tor: 0.3.3.x-final => Tor: 0.3.2.x-final


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23603 [Core Tor/Tor]: hs: Cleanup race between circuit close and free with the HS circuitmap

2017-10-03 Thread Tor Bug Tracker & Wiki
#23603: hs: Cleanup race between circuit close and free with the HS circuitmap
--+
 Reporter:  dgoulet   |  Owner:  dgoulet
 Type:  defect| Status:  needs_revision
 Priority:  High  |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-hs|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by asn):

 Replying to [comment:14 dgoulet]:
 > Indeed. The `circuit_retries` is really about "How many time have used
 this IP to build a circuit" regardless of success or fail. Even if the
 circuit was taken down 5 min later, we still count that as a "try".
 >
 > Apart from all the numerous issues with this behavior, one of the bug
 here is that we reach 3 try which is not above the limit of 4, so we open
 a new circuit and `circuit_retries == 4` which makes us clean it up the
 second after because we've reached our max...
 >
 > We should:
 >
 > 1. Allow the circuit creation up to 3 tries.
 > 2. Deny circuit creation at > 3 and clean it up at > 3.
 >
 > Kind of tricky here, so I think the easiest way to do that is that if
 circuit_retries is 3 and we want to launch, ++ it and deny the launch.
 >
 > OR we only cleanup the intro point if it doesn't have a circuit
 established and the counter has reached the max? (Which is what v2 does,
 cleanups only if it realizes that the retry has reached the max and the
 last circuit is gone thus a retry is soon about to be launched).
 >
 > If you have a more elegant solution, I'm all ears?

 Hmmm, I feel like the first solution you suggested is less racy and more
 straightforward than the first (at least to my mind). Curious why v2 is
 doing it the other way. Maybe I have not thought of something?

 I'd also like to either rename `circuit_retries` to `circuits_launched`,
 or restore the `circuit_retries` semantic by only increasing it when we
 fail and actually retry a circuit. Because right now `circuit_retries`
 will also count the first circuit launch which is '''not''' a retry. I
 feel like that will also simplify logic and understanding.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23678 [Core Tor/Tor]: Tor kinda _is_ an http proxy now...

2017-10-03 Thread Tor Bug Tracker & Wiki
#23678: Tor kinda _is_ an http proxy now...
-+
 Reporter:  nickm|  Owner:  nickm
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  easy tor-doc ux  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by nickm):

 * status:  needs_revision => closed
 * resolution:   => fixed


Comment:

 Thanks! Fixed that (with f923aeee1b14c2f64a657049ba46e68d70f53a0f) and
 merged the branch.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22548 [Applications/Tor Browser]: Firefox downgrades VP9 videos to VP8 when measured performance is not enough

2017-10-03 Thread Tor Bug Tracker & Wiki
#22548: Firefox downgrades VP9 videos to VP8 when measured performance is not
enough
--+--
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-fingerprinting, tbb-easy  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by cypherpunks):

 * status:  reopened => needs_review


Comment:

 Set `media.benchmark.vp9.threshold` to `0` to fix this ticket without
 patching.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23670 [Core Tor/Tor]: Say how many primary entry guards we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23670: Say how many primary entry guards we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---

Comment (by nickm):

 Two issues:
   1) Changes file, please?
   2) I think that the old function name name
 (`entry_guards_have_enough_dir_info_to_build_circuits`) was much more
 clear than (`entry_guards_get_dir_info_status_str`); it's not clear from
 the name of the new function that it checks whether there is enough dir
 info, and returns NULL if there is enough.  Maybe instead the function
 could be named something like
 `entry_guards_get_err_str_if_dir_info_missing()` ?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23670 [Core Tor/Tor]: Say how many primary entry guards we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23670: Say how many primary entry guards we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_revision
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by nickm):

 * status:  needs_review => needs_revision


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22614 [Applications/Tor Browser]: Make e10s/non-e10s Tor Browsers indistinguishable

2017-10-03 Thread Tor Bug Tracker & Wiki
#22614: Make e10s/non-e10s Tor Browsers indistinguishable
--+--
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  ff52-esr, tbb-fingerprinting  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by cypherpunks):

 * status:  new => needs_review


Comment:

 Set `dom.disable_window_showModalDialog` to `true` to fix the obvious part
 of this ticket without patching.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #13575 [Applications/Tor Browser]: Disable randomised Firefox HTTP cache decay user test groups

2017-10-03 Thread Tor Bug Tracker & Wiki
#13575: Disable randomised Firefox HTTP cache decay user test groups
-+-
 Reporter:  isis |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-pref, tbb-fingerprinting,|  Actual Points:
  ff52-esr   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by cypherpunks):

 * status:  new => needs_review


Comment:

 > we should be setting `browser.cache.frecency_experiment` to `-1`
 to fix this ticket without patching.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23747 [Applications/Tor Browser]: "Temporarily allow all this page" disables JS on all other tabs

2017-10-03 Thread Tor Bug Tracker & Wiki
#23747: "Temporarily allow all this page" disables JS on all other tabs
--+---
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  needs_information
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:  noscript  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---
Changes (by boklm):

 * status:  new => needs_information


Comment:

 I don't reproduce that. Clicking on "Temporarily allow all this page" does
 not enable or disable JS on other tabs for me.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23724 [Applications/Tor Browser]: NoScript restartless update breaks Security Slider and its icon disappears

2017-10-03 Thread Tor Bug Tracker & Wiki
#23724: NoScript restartless update breaks Security Slider and its icon 
disappears
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Critical  | Resolution:
 Keywords:  noscript  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 This madness was reported for 5.1rc2, but it was released untested! See
 https://forums.informaction.com/viewtopic.php?f=7&t=2

 After restart NoScript resets to TBB's defaults (Low), ignoring the
 Security Slider settings.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23739 [Core Tor/Tor]: improve documentation on how we use gcov

2017-10-03 Thread Tor Bug Tracker & Wiki
#23739: improve documentation on how we use gcov
-+-
 Reporter:  catalyst |  Owner:
 |  catalyst
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.9.1-alpha
 Severity:  Normal   | Resolution:
 Keywords:  new-developers tor-doc tor-tests-|  Actual Points:
  coverage   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by catalyst):

 * status:  needs_revision => needs_review


Comment:

 Thanks!  I pushed an update to the merge request fixing that.  (I was
 adjusting fill column settings and one escaped.)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23670 [Core Tor/Tor]: Say how many primary entry guards we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23670: Say how many primary entry guards we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by asn):

 * status:  needs_revision => needs_review


Comment:

 Pushed two new commits addressing both comments above.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23747 [Applications/Tor Browser]: "Temporarily allow all this page" disables JS on all other tabs

2017-10-03 Thread Tor Bug Tracker & Wiki
#23747: "Temporarily allow all this page" disables JS on all other tabs
--+--
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:  noscript  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by cypherpunks):

 * status:  needs_information => new


Comment:

 Maybe, you just don't notice that?
 Open http://example.com/
 Press "Temporarily allow all this page"
 And check that JS-dependent features stopped to function on Trac

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23739 [Core Tor/Tor]: improve documentation on how we use gcov

2017-10-03 Thread Tor Bug Tracker & Wiki
#23739: improve documentation on how we use gcov
-+-
 Reporter:  catalyst |  Owner:
 |  catalyst
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.9.1-alpha
 Severity:  Normal   | Resolution:
 Keywords:  new-developers tor-doc tor-tests-|  implemented
  coverage   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by nickm):

 * status:  needs_review => closed
 * resolution:   => implemented


Comment:

 Another step forward! Merging in 0.3.2.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23670 [Core Tor/Tor]: Say how many primary entry guards we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23670: Say how many primary entry guards we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:  closed
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
   |  implemented
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by nickm):

 * status:  needs_review => closed
 * resolution:   => implemented


Comment:

 Looks good! Testing and merging.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23671 [Core Tor/Tor]: Say how many other nodes we're missing descriptors for

2017-10-03 Thread Tor Bug Tracker & Wiki
#23671: Say how many other nodes we're missing descriptors for
---+---
 Reporter:  teor   |  Owner:  asn
 Type:  enhancement| Status:  closed
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Normal | Resolution:
   |  implemented
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID:  #21969 | Points:  0.5
 Reviewer: |Sponsor:
---+---
Changes (by nickm):

 * status:  needs_review => closed
 * resolution:   => implemented


Comment:

 Implemented with the merge of #23670.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23748 [Core Tor/Tor]: inconsistent/redundant handling of hs_ed25519_public_key file

2017-10-03 Thread Tor Bug Tracker & Wiki
#23748: inconsistent/redundant handling of hs_ed25519_public_key file
--+-
 Reporter:  cathugger |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:  0.3.2.2-alpha
 Severity:  Normal|   Keywords:  tor-hs, prop224
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+-
 When creating directory for v3 onion services, tor generates 3 files:
 "hs_ed25519_secret_key" consisting 64 bytes expanded secret key,
 "hs_ed25519_public_key" consisting 32 bytes public key and "hostname"
 consisting base32 representation of public key plus checksum, version
 identifier and ".onion" suffix.
 When reading existing v3 onion service directory, however, tor reads only
 "hs_ed25519_secret_key" file, completely ignoring "hs_ed25519_public_key",
 even if it holds public key not matching secret key in
 "hs_ed25519_secret_key".
 This can lead to potentially confusing behavior, when
 hs_ed25519_secret_key is changed, tor subsequently generates new hostname,
 but hs_ed25519_public_key stays old.
 Either hs_ed25519_public_key should not be generated in the first place,
 as it's unnecessary and redundant, or it should be checked for
 correctness.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23748 [Core Tor/Tor]: inconsistent/redundant handling of hs_ed25519_public_key file

2017-10-03 Thread Tor Bug Tracker & Wiki
#23748: inconsistent/redundant handling of hs_ed25519_public_key file
-+
 Reporter:  cathugger|  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:  0.3.2.2-alpha
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by dgoulet):

 * milestone:   => Tor: 0.3.2.x-final


Comment:

 The public key is really not useful to tor right now.

 The reason we have tor write it to disk is because of the not implemented
 offline key feature where tor will need the public key to generate the
 .onion but won't load any private key. Instead, it will load a series of
 blinded key pre-generated by the operator.

 That being said, we don't have this feature anyway but we still put the
 public key on disk so if we get the offline keys let say next version, an
 operator would be able to remove the private key and tor would work out
 with the public key.

 But true, tor should write the public key on disk if only the private key
 is found.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23727 [Archived/Ooni]: Allow to turn off notification for the ooniprobe android app

2017-10-03 Thread Tor Bug Tracker & Wiki
#23727: Allow to turn off notification for the ooniprobe android app
---+--
 Reporter:  torland|  Owner:  hellais, anadahz
 Type:  defect | Status:  new
 Priority:  Medium |  Milestone:
Component:  Archived/Ooni  |Version:
 Severity:  Normal | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
Changes (by dgoulet):

 * owner:  (none) => hellais, anadahz
 * component:  - Select a component => Archived/Ooni


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23672 [Core Tor/Tor]: hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection

2017-10-03 Thread Tor Bug Tracker & Wiki
#23672: hs-v3: With multiple SOCKS connection to the same .onion, don't trigger 
a
descriptor fetch for each connection
-+-
 Reporter:  dgoulet  |  Owner:  dgoulet
 Type:  defect   | Status:  merge_ready
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.2.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, tor-client, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by dgoulet):

 https://oniongit.eu/dgoulet/tor/merge_requests/8

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23733 [Applications/Tor Browser]: Tor failed to launch in OSX

2017-10-03 Thread Tor Bug Tracker & Wiki
#23733: Tor failed to launch in OSX
--+--
 Reporter:  jakob4800 |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by dgoulet):

 * owner:  (none) => tbb-team
 * component:  - Select a component => Applications/Tor Browser


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #21969 [Core Tor/Tor]: We're missing descriptors for some of our primary entry guards

2017-10-03 Thread Tor Bug Tracker & Wiki
#21969: We're missing descriptors for some of our primary entry guards
---+---
 Reporter:  asn|  Owner:  asn
 Type:  defect | Status:
   |  needs_information
 Priority:  High   |  Milestone:  Tor:
   |  0.3.2.x-final
Component:  Core Tor/Tor   |Version:  Tor:
   |  0.3.0.6
 Severity:  Normal | Resolution:
 Keywords:  tor-guard, tor-bridge, tor-client  |  Actual Points:
Parent ID: | Points:  1.5
 Reviewer: |Sponsor:  SponsorU
---+---

Comment (by asn):

 We merged #23671 and #23670  to master today, and hopefully those new logs
 will help us debug this issue better. If you are hunting for this bug,
 please upgrade to latest master :) Thanks!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23722 [Core Tor/Tor]: Somebody should profile a Tor 0.3.1.7 relay

2017-10-03 Thread Tor Bug Tracker & Wiki
#23722: Somebody should profile a Tor 0.3.1.7 relay
--+
 Reporter:  arma  |  Owner:  (none)
 Type:  enhancement   | Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by nickm):

 Weird! Was the server seeing much traffic at the time? I'm surprised that
 none of the compression algorithms, digest algorithms, or AES appeared on
 profile.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23722 [Core Tor/Tor]: Somebody should profile a Tor 0.3.1.7 relay

2017-10-03 Thread Tor Bug Tracker & Wiki
#23722: Somebody should profile a Tor 0.3.1.7 relay
--+
 Reporter:  arma  |  Owner:  (none)
 Type:  enhancement   | Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by dgoulet):

 ~5.1MB/sec at the time for ~100 minutes.

 Aren't we using the AES-ni if available, would it be seen in the profile?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23672 [Core Tor/Tor]: hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection

2017-10-03 Thread Tor Bug Tracker & Wiki
#23672: hs-v3: With multiple SOCKS connection to the same .onion, don't trigger 
a
descriptor fetch for each connection
-+-
 Reporter:  dgoulet  |  Owner:  dgoulet
 Type:  defect   | Status:  merge_ready
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.2.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, tor-client, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by dgoulet):

 Replied to Nickm's comment

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23749 [Obfuscation/Snowflake]: Snowflake-client potentially suffers from memory leaks

2017-10-03 Thread Tor Bug Tracker & Wiki
#23749: Snowflake-client potentially suffers from memory leaks
---+
 Reporter:  cypherpunks|  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  High   |  Milestone:
Component:  Obfuscation/Snowflake  |Version:
 Severity:  Major  | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+
Changes (by cypherpunks):

 * priority:  Medium => High
 * severity:  Normal => Major


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23749 [Obfuscation/Snowflake]: Snowflake-client potentially suffers from memory leaks

2017-10-03 Thread Tor Bug Tracker & Wiki
#23749: Snowflake-client potentially suffers from memory leaks
---+
 Reporter:  cypherpunks|  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  Medium |  Milestone:
Component:  Obfuscation/Snowflake  |Version:
 Severity:  Normal |   Keywords:
Actual Points: |  Parent ID:
   Points: |   Reviewer:
  Sponsor: |
---+
 It uses up to 160.5 MiB on my system after 6 hours of use, so it seems
 that it's due to some memory leak, no?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #21312 [Obfuscation/Snowflake]: snowflake-client is pegged at 100% cpu

2017-10-03 Thread Tor Bug Tracker & Wiki
#21312: snowflake-client is pegged at 100% cpu
---+
 Reporter:  arlolra|  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  High   |  Milestone:
Component:  Obfuscation/Snowflake  |Version:
 Severity:  Major  | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+
Changes (by cypherpunks):

 * priority:  Medium => High
 * severity:  Normal => Major


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23747 [Applications/Tor Browser]: "Temporarily allow all this page" disables JS on all other tabs

2017-10-03 Thread Tor Bug Tracker & Wiki
#23747: "Temporarily allow all this page" disables JS on all other tabs
--+---
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  needs_information
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:  noscript  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---
Changes (by gk):

 * status:  new => needs_information


Comment:

 Replying to [comment:2 cypherpunks]:
 > Maybe, you just don't notice that?
 > Open http://example.com/
 > Press "Temporarily allow all this page"
 > And check that JS-dependent features stopped to function on Trac
 >
 > Opened DDG Search page will show you
 > > You are being redirected to
 the non-JavaScript site.Click here if
 it doesn't happen automatically.

 Could you give us some steps to reproduce your issue? Where are you
 starting from? Are you setting the security slider to "high"? Or "medium"?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23733 [Applications/Tor Browser]: Tor failed to launch in OSX

2017-10-03 Thread Tor Bug Tracker & Wiki
#23733: Tor failed to launch in OSX
--+--
 Reporter:  jakob4800 |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by catalyst):

 * cc: catalyst (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23748 [Core Tor/Tor]: inconsistent/redundant handling of hs_ed25519_public_key file

2017-10-03 Thread Tor Bug Tracker & Wiki
#23748: inconsistent/redundant handling of hs_ed25519_public_key file
-+
 Reporter:  cathugger|  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:  0.3.2.2-alpha
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+

Comment (by cathugger):

 So it looks like currently keeping public key around is good idea.
 I'll add patch which add proper checking of public_key and recreating it
 if it gets deleted.
 INIT_ED_KEY_MISSING_SECRET_OK flag can be added later for blinded keys
 usecase.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23748 [Core Tor/Tor]: inconsistent/redundant handling of hs_ed25519_public_key file

2017-10-03 Thread Tor Bug Tracker & Wiki
#23748: inconsistent/redundant handling of hs_ed25519_public_key file
-+
 Reporter:  cathugger|  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:  0.3.2.2-alpha
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by cathugger):

 * Attachment "addsplitcheck.patch" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23745 [Applications/Tor Browser]: Tab crashes when using Tor Browser to access Google Drive

2017-10-03 Thread Tor Bug Tracker & Wiki
#23745: Tab crashes when using Tor Browser to access Google Drive
--+--
 Reporter:  angelotheram2 |  Owner:  tbb-team
 Type:  defect| Status:  assigned
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:  tbb-crash |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * cc: mcs, brade, arthuredelstein (added)
 * status:  needs_information => assigned


Comment:

 Replying to [comment:1 gk]:
 > Is that reproducible? Does it go away if you set
 `browser.tabs.remote.autostart.2` to `false` in your `about:config` and
 try again after restart? Does it happen with a vanilla Firefox 52 ESR as
 well? (see https://www.mozilla.org/en-US/firefox/organizations/all/ for a
 download option)

 Without e10s the crash does not happen and Firefox is not affected. mcs,
 brade, arthur: Can anybody of you take a look at that and figure out what
 is going on?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23745 [Applications/Tor Browser]: Tab crashes when using Tor Browser to access Google Drive

2017-10-03 Thread Tor Bug Tracker & Wiki
#23745: Tab crashes when using Tor Browser to access Google Drive
-+-
 Reporter:  angelotheram2|  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Major| Resolution:
 Keywords:  tbb-crash, tbb-e10s, |  Actual Points:
  TorBrowserTeam201710   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * keywords:  tbb-crash => tbb-crash, tbb-e10s, TorBrowserTeam201710


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23750 [Core Tor/Tor]: Isolate libevent usage to a few locations

2017-10-03 Thread Tor Bug Tracker & Wiki
#23750: Isolate libevent usage to a few locations
--+
 Reporter:  nickm |  Owner:  nickm
 Type:  enhancement   | Status:  assigned
 Priority:  Medium|  Milestone:  Tor: 0.3.3.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal|   Keywords:  refactoring technical-debt
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 With #21841, we restricted openssl header usage to a small number of
 modules.  We should do the same with libevent.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23672 [Core Tor/Tor]: hs-v3: With multiple SOCKS connection to the same .onion, don't trigger a descriptor fetch for each connection

2017-10-03 Thread Tor Bug Tracker & Wiki
#23672: hs-v3: With multiple SOCKS connection to the same .onion, don't trigger 
a
descriptor fetch for each connection
-+-
 Reporter:  dgoulet  |  Owner:  dgoulet
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.2.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  tor-hs, tor-client, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by nickm):

 * status:  merge_ready => closed
 * resolution:   => fixed


Comment:

 thanks for the updates! merging.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23733 [Applications/Tor Browser]: Tor failed to launch in OSX

2017-10-03 Thread Tor Bug Tracker & Wiki
#23733: Tor failed to launch in OSX
--+--
 Reporter:  jakob4800 |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-usability ux  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by catalyst):

 * keywords:   => tbb-usability ux


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23748 [Core Tor/Tor]: inconsistent/redundant handling of hs_ed25519_public_key file

2017-10-03 Thread Tor Bug Tracker & Wiki
#23748: inconsistent/redundant handling of hs_ed25519_public_key file
-+
 Reporter:  cathugger|  Owner:  (none)
 Type:  defect   | Status:  needs_review
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:  0.3.2.2-alpha
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by dgoulet):

 * status:  new => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23740 [Core Tor/Tor]: prop224: tor_bug_occurred_(): Bug: src/or/hs_service.c:403: service_intro_point_new: Non-fatal assertion !(!ls) failed. (on Tor 0.3.2.1-alpha 290274dbb5428bc5)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23740: prop224: tor_bug_occurred_(): Bug: src/or/hs_service.c:403:
service_intro_point_new: Non-fatal assertion !(!ls) failed. (on Tor
0.3.2.1-alpha 290274dbb5428bc5)
--+
 Reporter:  asn   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.2.1-alpha
 Severity:  Normal| Resolution:
 Keywords:  prop224 tor-ipv6, tor-hs  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by dgoulet):

 * keywords:  prop224 tor-ipv6 => prop224 tor-ipv6, tor-hs


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23577 [Core Tor/Tor]: Make setup_introduce1_data() take a node instead of an extend_info

2017-10-03 Thread Tor Bug Tracker & Wiki
#23577: Make setup_introduce1_data() take a node instead of an extend_info
-+-
 Reporter:  teor |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  prop224, tor-hs, single-onion, ipv6  |  Actual Points:
Parent ID:  #23493   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by neel):

 * Attachment "001-setup_introduce1_data_node.patch" added.

 Patch to make setup_introduce1_data() take a node & create
 get_lspecs_from_node() & remove legacy get_lspecs_from_extend_info() in
 hs_circuit.c

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23577 [Core Tor/Tor]: Make setup_introduce1_data() take a node instead of an extend_info

2017-10-03 Thread Tor Bug Tracker & Wiki
#23577: Make setup_introduce1_data() take a node instead of an extend_info
-+-
 Reporter:  teor |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  prop224, tor-hs, single-onion, ipv6  |  Actual Points:
Parent ID:  #23493   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by neel):

 I have created a patch to address this. The filename is
 001-setup_introduce1_data_node.patch.

 -Neel

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23748 [Core Tor/Tor]: inconsistent/redundant handling of hs_ed25519_public_key file

2017-10-03 Thread Tor Bug Tracker & Wiki
#23748: inconsistent/redundant handling of hs_ed25519_public_key file
-+
 Reporter:  cathugger|  Owner:  (none)
 Type:  defect   | Status:  merge_ready
 Priority:  Medium   |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor |Version:  0.3.2.2-alpha
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, prop224  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by dgoulet):

 * status:  needs_review => merge_ready


Comment:

 See branch: `bug23748_032_01`

 It takes cathugger's patch and add a changes file.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22983 [Metrics/Library]: Add a Descriptor subinterface and implementation for Tor web server logs

2017-10-03 Thread Tor Bug Tracker & Wiki
#22983: Add a Descriptor subinterface and implementation for Tor web server logs
-+---
 Reporter:  iwakeh   |  Owner:  metrics-team
 Type:  enhancement  | Status:  needs_review
 Priority:  Medium   |  Milestone:  metrics-lib 2.2.0
Component:  Metrics/Library  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  metrics-2017 |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+---
Changes (by iwakeh):

 * status:  needs_information => needs_review


Comment:

 Please review [https://gitweb.torproject.org/user/iwakeh/metrics-
 lib.git/log?h=task-22983-3 this task branch], which is based on the
 current master and already uses java 8 features.

 The implementation changed quite a bit as it could build on the web server
 log specification (#23243).  That's why I didn't continue on the earlier
 branch,  because I think the code is easier to review in total here.
 This dev version of metrics-lib was also system-tested as part of
 CollecTor's new module, i.e., used for sync and local imports there.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #21312 [Obfuscation/Snowflake]: snowflake-client is pegged at 100% cpu

2017-10-03 Thread Tor Bug Tracker & Wiki
#21312: snowflake-client is pegged at 100% cpu
---+
 Reporter:  arlolra|  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  High   |  Milestone:
Component:  Obfuscation/Snowflake  |Version:
 Severity:  Major  | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+
Changes (by dcf):

 * cc: dcf (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23740 [Core Tor/Tor]: prop224: tor_bug_occurred_(): Bug: src/or/hs_service.c:403: service_intro_point_new: Non-fatal assertion !(!ls) failed. (on Tor 0.3.2.1-alpha 290274dbb5428bc5)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23740: prop224: tor_bug_occurred_(): Bug: src/or/hs_service.c:403:
service_intro_point_new: Non-fatal assertion !(!ls) failed. (on Tor
0.3.2.1-alpha 290274dbb5428bc5)
--+
 Reporter:  asn   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.2.1-alpha
 Severity:  Normal| Resolution:
 Keywords:  prop224 tor-ipv6, tor-hs  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by dgoulet):

 This is in single onion service mode. We should wait until #23493 is
 sorted out before doing anything with this even though the fix is simple.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23749 [Obfuscation/Snowflake]: Snowflake-client potentially suffers from memory leaks

2017-10-03 Thread Tor Bug Tracker & Wiki
#23749: Snowflake-client potentially suffers from memory leaks
---+
 Reporter:  cypherpunks|  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  High   |  Milestone:
Component:  Obfuscation/Snowflake  |Version:
 Severity:  Major  | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+
Changes (by dcf):

 * cc: dcf (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23577 [Core Tor/Tor]: Make setup_introduce1_data() take a node instead of an extend_info

2017-10-03 Thread Tor Bug Tracker & Wiki
#23577: Make setup_introduce1_data() take a node instead of an extend_info
-+-
 Reporter:  teor |  Owner:  (none)
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  prop224, tor-hs, single-onion, ipv6  |  Actual Points:
Parent ID:  #23493   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by dgoulet):

 * status:  new => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23751 [- Select a component]: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.

2017-10-03 Thread Tor Bug Tracker & Wiki
#23751: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.
--+
 Reporter:  Felixix   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 Duplicate to #23676 ?
 But the buffers.c:690 seems new.

 {{{
 [warn] tor_bug_occurred_: Bug: src/common/buffers.c:690: buf_add: Non-
 fatal assertion !(buf->datalen >= INT_MAX - string_len) failed.
 [warn] tor_bug_occurred_: Bug: src/or/scheduler_kist.c:406:
 update_socket_written: Non-fatal assertion !((!ent)) failed.
 [warn] tor_bug_occurred_: Bug: src/or/scheduler_kist.c:374:
 socket_can_write: Non-fatal assertion !((!ent)) failed.
 }}}

 At the end of the log file's time the tor process stays at 100% cpu.
 Server hang up and a reboot was necessary.
 I jumped on 3.2.2a already.

 {{{
 Sep 21 23:14:06.010 [notice] Tor 0.3.2.1-alpha (git-290274dbb5428bc5)
 running on FreeBSD with Libevent 2.1.8-stable, OpenSSL LibreSSL 2.5.4,
 Zlib 1.2.8, Liblzma 5.2.2, and Libzstd 1.3.1.
 }}}

 
 {{{
 Oct 02 02:14:18.000 [notice] Heartbeat: Tor's uptime is 10 days 2:59
 hours, with 193846 circuits open. I've sent 6390.97 GB and received
 6348.01 GB.
 Oct 02 02:14:18.000 [notice] Circuit handshake stats since last time:
 4007/4007 TAP, 132384/132384 NTor.
 Oct 02 02:14:18.000 [notice] Since startup, we have initiated 0 v1
 connections, 0 v2 connections, 0 v3 connections, and 418760 v4
 connections; and received 2215 v1 connections, 43847 v2 connections,
 101525 v3 connections, and 746328 v4 connections.
 Oct 02 02:31:24.000 [notice] Scheduler type KISTLite has been enabled.
 Oct 02 02:58:02.000 [warn] tor_bug_occurred_: Bug:
 src/common/buffers.c:690: buf_add: Non-fatal assertion !(buf->datalen >=
 INT_MAX - string_len) failed. (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: Non-fatal assertion !(buf->datalen >=
 INT_MAX - string_len) failed in buf_add at src/common/buffers.c:690. Stack
 trace: (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x11a2bf8  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x11bd82c  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x11a435b  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x1129572
  at /usr/local/bin/tor (on Tor
 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x10f2d38
  at /usr/local/bin/tor (on Tor
 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x10e78cb
  at /usr/local/bin/tor (on Tor
 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x10e7ed8
  at /usr/local/bin/tor (on Tor
 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x109e20a
  at /usr/local/bin/tor (on
 Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x10e8702
  at /usr/local/bin/tor (on Tor
 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x10db0f6
  at /usr/local/bin/tor (on Tor 0.3.2.1-alpha
 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x10d9912  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x801b37a96
  at /usr/local/lib/libevent-2.1.so.6
 (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x801b33cfe  at
 /usr/local/lib/libevent-2.1.so.6 (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x1072d15  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x1075119  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x1070b69  at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x1070a61 <_start+0x1a1> at
 /usr/local/bin/tor (on Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] write_to_buf failed on an orconn; notifying of
 error (fd 1935)
 Oct 02 02:58:02.000 [warn] Scheduler asked to release channel 1994256 but
 it wasn't in channels_pending
 Oct 02 02:58:02.000 [warn] tor_bug_occurred_: Bug:
 src/or/scheduler_kist.c:406: update_socket_written: Non-fatal assertion
 !((!ent)) failed. (Future instances of this warning will be silenced.) (on
 Tor 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: Non-fatal assertion !((!ent)) failed in
 update_socket_written at src/or/scheduler_kist.c:406. Stack trace: (on Tor
 0.3.2.1-alpha 290274dbb5428bc5)
 Oct 02 02:58:02.000 [warn] Bug: 0x11a2bf8  at
 /usr/l

Re: [tor-bugs] #23711 [Core Tor/Tor]: sched: KIST writes to kernel and get a "wants to write" notification right after

2017-10-03 Thread Tor Bug Tracker & Wiki
#23711: sched: KIST writes to kernel and get a "wants to write" notification 
right
after
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.3.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-sched |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by dgoulet):

 * milestone:  Tor: 0.3.2.x-final => Tor: 0.3.3.x-final


Comment:

 This won't really get fixed until #23744 so postponing.

 For now, I think it is fine, KIST recovers properly from that.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23710 [Core Tor/Tor]: sched: channel_more_to_flush() is probably looking at the wrong queue

2017-10-03 Thread Tor Bug Tracker & Wiki
#23710: sched: channel_more_to_flush() is probably looking at the wrong queue
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:  Tor: 0.3.3.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-sched |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by dgoulet):

 Quick note: #23709 is a thing, the `incoming_queue` is always empty so it
 doesn't affect `channel_more_to_flush()` as it it basically always true
 that it is empty so it will never return 1 in the case of it being non
 empty.

 Thus, it is safe for now to leave it that way.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23751 [Core Tor/Tor]: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.

2017-10-03 Thread Tor Bug Tracker & Wiki
#23751: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.
+--
 Reporter:  Felixix |  Owner:  (none)
 Type:  defect  | Status:  new
 Priority:  High|  Milestone:  Tor:
|  0.3.2.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  tor-channel, tor-sched, tor-buffer  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--
Changes (by dgoulet):

 * keywords:   => tor-channel, tor-sched, tor-buffer
 * priority:  Medium => High
 * component:  - Select a component => Core Tor/Tor
 * milestone:   => Tor: 0.3.2.x-final


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22428 [Metrics/CollecTor]: Add webstats module

2017-10-03 Thread Tor Bug Tracker & Wiki
#22428: Add webstats module
---+-
 Reporter:  iwakeh |  Owner:  iwakeh
 Type:  enhancement| Status:  needs_review
 Priority:  High   |  Milestone:  CollecTor 1.4.0
Component:  Metrics/CollecTor  |Version:
 Severity:  Normal | Resolution:
 Keywords:  metrics-2017   |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+-
Changes (by iwakeh):

 * status:  needs_information => needs_review


Comment:

 Please review
 [​https://gitweb.torproject.org/user/iwakeh/collector.git/?h=task-22428-3
 this task branch], which is based on the current master and already uses
 java 8 features.

 The implementation changed quite a bit as it could build on the web server
 log specification (#23243). That's why I didn't continue on the earlier
 branch, because I think the code is easier to review in total here.
 It builds on 2.1.0-dev version of metrics-lib.
 Besides the (j)unit tests I ran system tests for sync and local import
 functionality with the supplied real logs.
 The metrics-lib version needs to be adapted as soon as a release with log
 descriptors is available.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23752 [Metrics]: Use Java 8 features in all of Metrics' Java products (Summary ticket)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23752: Use Java 8 features in all of Metrics' Java products  (Summary ticket)
-+--
 Reporter:  iwakeh   |  Owner:  metrics-team
 Type:  enhancement  | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Metrics  |Version:
 Severity:  Normal   |   Keywords:
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+--
 The new features of java 8 should be used.  This ticket starts collecting
 the features and approaches we want to use and comments should add and
 discuss the various topics one per comment in order to have the tickets
 for the various products simply refer to a comment number (if possible).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #21312 [Obfuscation/Snowflake]: snowflake-client is pegged at 100% cpu

2017-10-03 Thread Tor Bug Tracker & Wiki
#21312: snowflake-client is pegged at 100% cpu
---+--
 Reporter:  arlolra|  Owner:  arlolra
 Type:  defect | Status:  assigned
 Priority:  High   |  Milestone:
Component:  Obfuscation/Snowflake  |Version:
 Severity:  Major  | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
Changes (by arlolra):

 * status:  new => assigned
 * owner:  (none) => arlolra


Comment:

 I'll probably be working on this next week at the dev meeting.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23752 [Metrics]: Use Java 8 features in all of Metrics' Java products (Summary ticket)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23752: Use Java 8 features in all of Metrics' Java products  (Summary ticket)
-+--
 Reporter:  iwakeh   |  Owner:  metrics-team
 Type:  enhancement  | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Metrics  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--

Comment (by iwakeh):

 Use java.time.* classes for date and time parsing and processing.  Some
 examples are in the patches for #22428 and #22983.  More can be found in
 the java.time package description.
 (See http://www.oracle.com/technetwork/articles/java/jf14-date-
 time-2125367.html and https://docs.oracle.com/javase/8/docs/api/java/time
 /package-summary.html#package.description)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23751 [Core Tor/Tor]: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.

2017-10-03 Thread Tor Bug Tracker & Wiki
#23751: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.
+--
 Reporter:  Felixix |  Owner:  (none)
 Type:  defect  | Status:  new
 Priority:  High|  Milestone:  Tor:
|  0.3.2.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  tor-channel, tor-sched, tor-buffer  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by dgoulet):

 From the stacktrace it seems a channel outbuf was filled up which
 triggered the assert when the limit was reached. It then released the
 channel but the scheduler couldn't find it in the pending list so it tried
 to free the channel and the two last BUG() are basically that. Bottom
 line, that channel was never in the scheduler loop.

 This is very weird. The fact that the outbuf was completely full is
 worrying that is:

 1. Was it filled up by then the scheduler?
 2. Or we have a bug where in `KISTLite` mode we didn't allow somehow to
 let the channel write to kernel?

 For (1), currently the only possible way I could find for a channel outbuf
 to be used without the scheduler knowing is during the connection
 handshake but that shouldn't fill up of `INT_MAX` data...

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23751 [Core Tor/Tor]: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.

2017-10-03 Thread Tor Bug Tracker & Wiki
#23751: [warn] tor_bug_occurred_: Bug: src/common/buffers.c, etc.
+--
 Reporter:  Felixix |  Owner:  (none)
 Type:  defect  | Status:  new
 Priority:  High|  Milestone:  Tor:
|  0.3.2.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  tor-channel, tor-sched, tor-buffer  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by pastly):

 Here's some thoughts.

 - Isn't the outbuf limited to like 32KB in size?
 - If the scheduler was what filled up the outbuf, would Vanilla done the
 same thing? Why or why not? Does Vanilla check a limit that KIST/KISTLite
 doesn't? Since Vanilla doesn't write outbuf->kernel, wouldn't it be
 __more__ likely to hit this?
 - What was the state of the channel that got a full outbuf? Was it
 closing? Was data continuing to pour in and for some reason we were never
 able to write, and thus the outbuf filled up? How many scheduling rounds
 did it take for this to happen? Did it all happen in one?

 Bah.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23752 [Metrics]: Use Java 8 features in all of Metrics' Java products (Summary ticket)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23752: Use Java 8 features in all of Metrics' Java products  (Summary ticket)
-+--
 Reporter:  iwakeh   |  Owner:  metrics-team
 Type:  enhancement  | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Metrics  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--

Comment (by iwakeh):

 Use java.util.stream functionality (cf.
 https://docs.oracle.com/javase/8/docs/api/java/util/stream/package-
 summary.html#package.description).
 Here we should also think about where the parallelization would be most
 beneficial.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23712 [Core Tor/Tor]: sched: DESTROY cell on a circuit bypasses the scheduler

2017-10-03 Thread Tor Bug Tracker & Wiki
#23712: sched: DESTROY cell on a circuit bypasses the scheduler
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-sched |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by dgoulet):

 One quick note here. When a DESTROY cell is sent, it is from
 `circuit_about_to_free()` which means that the "circuit_t" will get freed
 momentarily. However, we put a cell on the circuit queue for which we
 should be updating our cmux cell count (`circuitmux_set_num_cells()`) but
 that function takes a circuit object that we can't use... The circ ID is
 available but we can't do much with it with the current interface.

 That is "OK" because for the scheduler to know if more needs to be
 flushed, it uses `circuitmux_num_cells()` which counts the cell + destroy
 cell.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23753 [Core Tor/Tor]: sched: Implement a SCHED_BUG() that prints more information

2017-10-03 Thread Tor Bug Tracker & Wiki
#23753: sched: Implement a SCHED_BUG() that prints more information
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal|   Keywords:  tor-sched
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 Bug such as #23751 and #23676 are very difficult to diagnose or reproduce
 so once we hit a BUG(), we should try to extract as much information as we
 can from the channel and state of the scheduler.

 Thus I propose `SCHED_BUG()`.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23603 [Core Tor/Tor]: hs: Cleanup race between circuit close and free with the HS circuitmap

2017-10-03 Thread Tor Bug Tracker & Wiki
#23603: hs: Cleanup race between circuit close and free with the HS circuitmap
--+
 Reporter:  dgoulet   |  Owner:  dgoulet
 Type:  defect| Status:  needs_revision
 Priority:  High  |  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-hs|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by dgoulet):

 Agree!!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23750 [Core Tor/Tor]: Isolate libevent usage to a few locations

2017-10-03 Thread Tor Bug Tracker & Wiki
#23750: Isolate libevent usage to a few locations
+--
 Reporter:  nickm   |  Owner:  nickm
 Type:  enhancement | Status:  assigned
 Priority:  Medium  |  Milestone:  Tor:
|  0.3.3.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  refactoring technical-debt  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by nickm):

 I've started some work here as `isolate_libevent`.  Let's take a look and
 maybe merge it when 0.3.3 rolls around.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23747 [Applications/Tor Browser]: "Temporarily allow all this page" breaks JS on all other tabs (was: "Temporarily allow all this page" disables JS on all other tabs)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23747: "Temporarily allow all this page" breaks JS on all other tabs
--+--
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:  noscript  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by cypherpunks):

 * status:  needs_information => new


Comment:

 You're asking as if it were a Windows-only issue. Medium/High is required,
 of course.
 Starting with many tabs, search something in DDG, open that example.com
 and allow JS for it. That's all. JS on all other tabs stopped functioning
 (until reload).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23514 [Internal Services/Tor Sysadmin Team]: Please update my PGP public key

2017-10-03 Thread Tor Bug Tracker & Wiki
#23514: Please update my PGP public key
-+
 Reporter:  gk   |  Owner:  tpa
 Type:  enhancement  | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by weasel):

 * status:  new => closed
 * resolution:   => fixed


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #2878 [Core Tor/Tor]: Don't bootstrap from an old consensus if we're about to replace it

2017-10-03 Thread Tor Bug Tracker & Wiki
#2878: Don't bootstrap from an old consensus if we're about to replace it
-+-
 Reporter:  Sebastian|  Owner:  (none)
 Type:  enhancement  | Status:  new
 Priority:  High |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:
 Severity:  Blocker  | Resolution:
 Keywords:  performance, bootstrap, tor-client,  |  Actual Points:
  sponsor8-maybe |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by catalyst):

 * cc: catalyst (added)
 * severity:   => Blocker


Comment:

 What's more, the 85% (`BOOTSTRAP_STATUS_HANDSHAKE_OR`, "Finishing
 handshake with first hop") is very likely caused by the handshake with a
 directory mirror to attempt downloading a more current consensus.  Look at
 how `control_event_bootstrap()` decodes the special status
 `BOOTSTRAP_STATUS_HANDSHAKE`.  On the other hand, I think it takes a
 three-hop circuit to reach `BOOTSTRAP_STATUS_DONE` (100%).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #2878 [Core Tor/Tor]: Don't bootstrap from an old consensus if we're about to replace it

2017-10-03 Thread Tor Bug Tracker & Wiki
#2878: Don't bootstrap from an old consensus if we're about to replace it
-+-
 Reporter:  Sebastian|  Owner:  (none)
 Type:  enhancement  | Status:  new
 Priority:  High |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:
 Severity:  Major| Resolution:
 Keywords:  performance, bootstrap, tor-client,  |  Actual Points:
  sponsor8-maybe |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by catalyst):

 * severity:  Blocker => Major


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23605 [Core Tor/Tor]: BOOTSTRAP PROGRESS=80 is a lie

2017-10-03 Thread Tor Bug Tracker & Wiki
#23605: BOOTSTRAP PROGRESS=80 is a lie
-+-
 Reporter:  catalyst |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  High |  Milestone:  Tor:
 |  0.3.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  bootstrap clock-skew tor-guard   |  Actual Points:
  usability ux   |
Parent ID:  #22266   | Points:
 Reviewer:   |Sponsor:
 |  Sponsor8-can
-+-
Changes (by catalyst):

 * sponsor:   => Sponsor8-can


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #17521 [Core Tor/Tor]: Support capsicum(4) on FreeBSD

2017-10-03 Thread Tor Bug Tracker & Wiki
#17521: Support capsicum(4) on FreeBSD
-+-
 Reporter:  yawning  |  Owner:
 |  shawn.webb
 Type:  enhancement  | Status:
 |  assigned
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:  Tor:
 |  unspecified
 Severity:  Normal   | Resolution:
 Keywords:  tor-relay, security, sandboxing, |  Actual Points:
  BSD, capsicum  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by shawn.webb):

 I've made a ton of progress on this. I now have a mostly capsicumized Tor.
 The very basics are working as of this writing.

 As it stands, what's left to do:

 1. Write sandbox wrappers for a few more libc calls (gmtime(3),
 socketpair(2), etc).
 2. Implement proper memory management (like, call free(3) where
 appropriate).
 3. Clean up a whole freakton of debug code.
 4. Write the Linux equivalent wrapper code (likely macros that just point
 to the corresponding libc functions).
 5. Build full body-suit armor as the person who's tasked with reviewing
 the ensuing patch will likely want to stab me.

 I will have a solution to demo in place by the time the Montreal meetup
 happens.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23753 [Core Tor/Tor]: sched: Implement a SCHED_BUG() that prints more information

2017-10-03 Thread Tor Bug Tracker & Wiki
#23753: sched: Implement a SCHED_BUG() that prints more information
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-sched |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by dgoulet):

 * status:  new => needs_review


Comment:

 See branch: `ticket23753_032_01`.

 Only 5 callsites of `SCHED_BUG()` for now but there are probably more
 places we could benefit from those.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23753 [Core Tor/Tor]: sched: Implement a SCHED_BUG() that prints more information

2017-10-03 Thread Tor Bug Tracker & Wiki
#23753: sched: Implement a SCHED_BUG() that prints more information
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-sched |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by dgoulet):

 Oh and this is what the output looks like (I've intentionally trigger
 one):

 {{{
 Oct 03 14:34:41.153 [warn] tor_bug_occurred_(): Bug:
 src/or/scheduler_kist.c:119: channel_outbuf_length: Non-fatal assertion
 !((channel_tls_from_base((chan)))->conn != ((void *)0)) failed. (on Tor
 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug: Non-fatal assertion
 !((channel_tls_from_base((chan)))->conn != ((void *)0)) failed in
 channel_outbuf_length at src/or/scheduler_kist.c:119. Stack trace: (on Tor
 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug: /usr/lib/x86_64-linux-
 gnu/libasan.so.4(+0x55810) [0x7f0a3ea65810] (on Tor 0.3.2.2-alpha-dev
 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(log_backtrace+0x45)
 [0x5644509cdd05] (on Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(tor_bug_occurred_+0x12c)
 [0x564450a2cbfc] (on Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(+0x805d8d) [0x564450708d8d] (on
 Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(+0x7fa39d) [0x5644506fd39d] (on
 Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug: /usr/lib/x86_64-linux-
 gnu/libevent-2.1.so.6(+0x1f8f5) [0x7f0a3e26a8f5] (on Tor 0.3.2.2-alpha-dev
 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug: /usr/lib/x86_64-linux-
 gnu/libevent-2.1.so.6(event_base_loop+0x5a7) [0x7f0a3e26b227] (on Tor
 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(do_main_loop+0x410)
 [0x5644505a3680] (on Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(tor_main+0x143d)
 [0x5644505a8efd] (on Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(main+0x1c) [0x5644505948ac] (on
 Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug: /lib/x86_64-linux-
 gnu/libc.so.6(__libc_start_main+0xf1) [0x7f0a3c2301c1] (on Tor 0.3.2.2
 -alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] Bug:
 /home/dgoulet/Documents/git/tor/src/or/tor(_start+0x2a) [0x5644505972ba]
 (on Tor 0.3.2.2-alpha-dev 9733102b55884039)
 Oct 03 14:34:41.165 [warn] scheduler_bug_occurred(): Bug: Channel 2 in
 state open and scheduler state 1. Num cells on cmux: 0. Connection outbuf
 len: 2727. Num pending channels: 0. Channel in pending list: no (on Tor
 0.3.2.2-alpha-dev 9733102b55884039)
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23577 [Core Tor/Tor]: Make setup_introduce1_data() take a node instead of an extend_info

2017-10-03 Thread Tor Bug Tracker & Wiki
#23577: Make setup_introduce1_data() take a node instead of an extend_info
-+-
 Reporter:  teor |  Owner:  (none)
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:  Tor:
 |  0.3.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  prop224, tor-hs, single-onion, ipv6  |  Actual Points:
Parent ID:  #23493   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * status:  needs_review => needs_revision


Comment:

 Thank you for the patch, Neel.

 Here's my review:

 Functionality

 The reason we want to make this change is that the node sometimes has an
 IPv6 address.
 If the node has an IPv6 address, we need to add it to the link specifiers.
 Then we can remove the existing (incorrect) comment:
 {{{XXX: IPv6 is not clearly a thing in extend_info_t?}}}

 On some clients and relays, nodes don't have a routerinfo (ri is NULL).
 So you need to use the accessor functions for the primary (IPv4) and IPv6
 addresses for the node, which do the right thing.
 I think they're called something like node_get_primary_orport and
 node_get_ipv6_orport.

 Testing

 Did you test this code before you submitted it?
 Do the unit tests (make test) need changes so they pass with these code
 changes?
 Does chutney work with these changes? (make test-network-all)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #17521 [Core Tor/Tor]: Support capsicum(4) on FreeBSD

2017-10-03 Thread Tor Bug Tracker & Wiki
#17521: Support capsicum(4) on FreeBSD
-+-
 Reporter:  yawning  |  Owner:
 |  shawn.webb
 Type:  enhancement  | Status:
 |  assigned
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:  Tor:
 |  unspecified
 Severity:  Normal   | Resolution:
 Keywords:  tor-relay, security, sandboxing, |  Actual Points:
  BSD, capsicum  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by teor):

 Tor has an existing abstraction layer for accessing seccomp'd syscalls on
 Linux, using a bunch of functions prefixed with sandbox_.
 Is it possible to extend or modify that abstraction layer, rather than
 adding a separate interface for FreeBSD?
 That would make it easier to maintain once it's merged.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23357 [Core Tor/Tor]: Build with non-Cross-DSO CFI

2017-10-03 Thread Tor Bug Tracker & Wiki
#23357: Build with non-Cross-DSO CFI
+--
 Reporter:  shawn.webb  |  Owner:  (none)
 Type:  enhancement | Status:  needs_revision
 Priority:  Medium  |  Milestone:  Tor:
|  0.3.3.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  security, defence-in-depth  |  Actual Points:
Parent ID:  | Points:  1.0
 Reviewer:  |Sponsor:
+--

Comment (by shawn.webb):

 That's unneeded, actually. Since configure honors external CFLAGS and
 LDFLAGS, users can simply set the required CFLAGS and LDFLAGS. That's what
 we're now doing in the HardenedBSD ports tree for Tor.

 To see the CFLAGS and LDFLAGS that get applied, take look here:
 https://github.com/HardenedBSD/hardenedbsd-
 ports/blob/master/Mk/Uses/cfi.mk

 In the HardenedBSD ports tree, we make sure that the proper llvm toolchain
 bits are there: https://github.com/HardenedBSD/hardenedbsd-
 ports/blob/master/Mk/bsd.hardening.mk#L234-L239

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #17521 [Core Tor/Tor]: Support capsicum(4) on FreeBSD

2017-10-03 Thread Tor Bug Tracker & Wiki
#17521: Support capsicum(4) on FreeBSD
-+-
 Reporter:  yawning  |  Owner:
 |  shawn.webb
 Type:  enhancement  | Status:
 |  assigned
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:  Tor:
 |  unspecified
 Severity:  Normal   | Resolution:
 Keywords:  tor-relay, security, sandboxing, |  Actual Points:
  BSD, capsicum  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by shawn.webb):

 The problem is that seccomp2 uses a filtering approach. Essentially, once
 you've whitelisted the things you want to access, you can call open(2),
 socket(2), etc. at will and on demand.

 Capsicum takes a completely different approach, one that's fully
 incompatible with seccomp2. I've writting a PoC do demonstrate the
 approach I'm taking with this ticket:
 https://github.com/lattera/PoCs/tree/master/capsicum_fdpassing

 Note that the code I've written in the Tor codebase has diverged quite a
 bit from the PoC. The PoC is ugly code meant to serve as a brain dump and
 code testing area.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23357 [Core Tor/Tor]: Build with non-Cross-DSO CFI

2017-10-03 Thread Tor Bug Tracker & Wiki
#23357: Build with non-Cross-DSO CFI
+--
 Reporter:  shawn.webb  |  Owner:  (none)
 Type:  enhancement | Status:  needs_revision
 Priority:  Medium  |  Milestone:  Tor:
|  0.3.3.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  security, defence-in-depth  |  Actual Points:
Parent ID:  | Points:  1.0
 Reviewer:  |Sponsor:
+--

Comment (by shawn.webb):

 I'll take a look. Given the recent findings above, this is now lower
 priority for me.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23357 [Core Tor/Tor]: Build with non-Cross-DSO CFI

2017-10-03 Thread Tor Bug Tracker & Wiki
#23357: Build with non-Cross-DSO CFI
+--
 Reporter:  shawn.webb  |  Owner:  (none)
 Type:  enhancement | Status:  needs_revision
 Priority:  Medium  |  Milestone:  Tor:
|  0.3.3.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  security, defence-in-depth  |  Actual Points:
Parent ID:  | Points:  1.0
 Reviewer:  |Sponsor:
+--

Comment (by teor):

 I'm asking for a convenience option to configure which activates the right
 set of flags.
 Then if it works well, we can enable it as part of --enable-fragile-
 hardening, if the compiler supports those options.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23745 [Applications/Tor Browser]: Tab crashes when using Tor Browser to access Google Drive

2017-10-03 Thread Tor Bug Tracker & Wiki
#23745: Tab crashes when using Tor Browser to access Google Drive
-+-
 Reporter:  angelotheram2|  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  assigned
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Major| Resolution:
 Keywords:  tbb-crash, tbb-e10s, |  Actual Points:
  TorBrowserTeam201710   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by angelotheram2):

 It does go away when I set browser.tabs.remote.autostart.2 to false and
 restart the browser.
 I then set browser.tabs.remote.autostart.2 to back to true and the problem
 returns.
 This setting is a clue and a workaround, thanks.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23605 [Core Tor/Tor]: BOOTSTRAP PROGRESS=80 is a lie

2017-10-03 Thread Tor Bug Tracker & Wiki
#23605: BOOTSTRAP PROGRESS=80 is a lie
-+-
 Reporter:  catalyst |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  High |  Milestone:  Tor:
 |  0.3.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  bootstrap clock-skew tor-guard   |  Actual Points:
  usability ux   |
Parent ID:  #22266   | Points:
 Reviewer:   |Sponsor:
 |  Sponsor8-can
-+-
Changes (by mcs):

 * cc: brade, mcs (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #2878 [Core Tor/Tor]: Don't bootstrap from an old consensus if we're about to replace it

2017-10-03 Thread Tor Bug Tracker & Wiki
#2878: Don't bootstrap from an old consensus if we're about to replace it
-+-
 Reporter:  Sebastian|  Owner:  (none)
 Type:  enhancement  | Status:  new
 Priority:  High |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:
 Severity:  Major| Resolution:
 Keywords:  performance, bootstrap, tor-client,  |  Actual Points:
  sponsor8-maybe |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by mcs):

 * cc: brade, mcs (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23753 [Core Tor/Tor]: sched: Implement a SCHED_BUG() that prints more information

2017-10-03 Thread Tor Bug Tracker & Wiki
#23753: sched: Implement a SCHED_BUG() that prints more information
--+
 Reporter:  dgoulet   |  Owner:  (none)
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-sched |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by pastly):

 Looks good to me. I added a callsite in my ticket23753_032_01 (on gitweb
 this time).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22788 [Applications/Tor Browser]: Tor Browser rendering hangs when downloading large PDFs on higher security slider levels

2017-10-03 Thread Tor Bug Tracker & Wiki
#22788: Tor Browser rendering hangs when downloading large PDFs on higher 
security
slider levels
--+--
 Reporter:  teor  |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-security-slider   |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by teor):

 I can confirm that this happens even if the tor process is no longer
 downloading PDFs.
 In fact, it still happens even after the tabs containing the PDFs have
 been closed!

 To reproduce:
 1. Go to
 http://www.mitsubishielectric.com.au/Air_Conditioning_User_Manuals.html
 2. Open a few of the PDFs (I tried about 10)
 3. Wait for some to load and start to render
 4. Close their tabs
 5. Try to open another site

 It took a long time for the tabs and window to close, and I couldn't open
 any other sites, even after tor had stopped downloading anything. I had to
 restart the browser.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23754 [- Select a component]: make failing

2017-10-03 Thread Tor Bug Tracker & Wiki
#23754: make failing
--+
 Reporter:  kkuehl@…  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 The original error looked as follows:
 git clone https://git.torproject.org/builders/tor-browser-build.git
 sudo apt-get install -y libyaml-libyaml-perl libtemplate-perl \
 libio-handle-util-perl libio-all-perl \
 libio-captureoutput-perl libfile-slurp-perl \
 libstring-shellquote-perl libsort-versions-perl \
 libdigest-sha-perl libdata-uuid-perl libdata-dump-perl \
 libfile-copy-recursive-perl git libgtk2.0-dev curl runc

 cd tor-browser-build
 make submodule-update
 make testbuild-linux-x86_64
 git submodule update --init
 ./rbm/rbm build release --target testbuild --target torbrowser-linux-
 x86_64
 Building project tor-browser - tor-browser-7.5a5-linux-x86_64-a14a6a
 Building project container-image - container-image_wheezy-
 amd64-df3a332e7b34.tar.gz
 Building project debootstrap-image - container-image_wheezy-amd64.tar.gz
 Using file /home/kkuehl/Downloads/tor-browser-build/out/debootstrap-image
 /container-image_ubuntu-base-17.04-base-amd64.tar.gz
 Error: Error starting remote:

 json: cannot unmarshal object into Go value of type []string

 Makefile:69: recipe for target 'testbuild-linux-x86_64' failed
 make: *** [testbuild-linux-x86_64] Error 1

 After determining that the error was being emitted from rbm/lib/RBB.pm
 I added a print statement to producte the following more verbose output:

 $ make testbuild-linux-x86_64
 git submodule update --init
 ./rbm/rbm build release --target testbuild --target torbrowser-linux-
 x86_64
 Building project tor-browser - tor-browser-7.5a5-linux-x86_64-a14a6a
 Building project container-image - container-image_wheezy-
 amd64-df3a332e7b34.tar.gz
 Building project debootstrap-image - container-image_wheezy-amd64.tar.gz
 Using file /home/kkuehl/Downloads/tor-browser-build/out/debootstrap-image
 /container-image_ubuntu-base-17.04-base-amd64.tar.gz
 project debootstrap-image command #!/bin/sh
 set -e
 if [ $(ls -1 '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-VfB1R
 /container-image_'* | wc -l) -ne 1 ]
 then
   echo "Can't find container image in input files" >&2
   ls -l '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-VfB1R' >&2
   exit 1
 fi
 mkdir -p '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm
 sudo tar -C '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs
 -xf $(ls -1 '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-VfB1R
 /container-image_'*)
 #!/bin/sh
 set -e
 mkdir -p '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm
 echo '#!/bin/sh' > '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-
 qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm/cmd
 echo 'id rbm >/dev/null 2>&1 || adduser -m rbm || useradd -m rbm' >>
 '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm/cmd
 echo '#!/bin/sh' > '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-
 qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm/run

 echo 'su - root -c /rbm/cmd' >> '/home/kkuehl/Downloads/tor-browser-
 build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm/run
 chmod +x '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm/cmd
 chmod +x '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/rootfs/rbm/run
 cat > '/home/kkuehl/Downloads/tor-browser-build/tmp/rbm-qUfJ9d/rbm-
 
containers/342cf55668a5bfef12e5fa4af3b57de63b7534dcae071c61e816d79c9b5af2b7'/config.json
 << EOF
 {
 "ociVersion": "1.0.0",
 "platform": {
 "os": "linux",
 "arch": "amd64"
 },
 "process": {
 "terminal": false,
 "user": {
 "uid": 0,
 "gid": 0
 },
 "args": [
 "/rbm/run"
 ],
 "env": [
 "PATH

Re: [tor-bugs] #23754 [- Select a component]: make failing

2017-10-03 Thread Tor Bug Tracker & Wiki
#23754: make failing
--+
 Reporter:  kkuehl@…  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by kkuehl@…):

 Host OS:
 lsb_release -a
 No LSB modules are available.
 Distributor ID: Ubuntu
 Description:Ubuntu 17.04
 Release:17.04
 Codename:   zesty

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23754 [Applications/Tor Browser]: make failing

2017-10-03 Thread Tor Bug Tracker & Wiki
#23754: make failing
--+--
 Reporter:  kkuehl@…  |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by kkuehl@…):

 * owner:  (none) => tbb-team
 * component:  - Select a component => Applications/Tor Browser


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23754 [Applications/rbm]: rbm make failing do to golang error while unmarshalling json (was: make failing)

2017-10-03 Thread Tor Bug Tracker & Wiki
#23754: rbm make failing do to golang error while unmarshalling json
--+---
 Reporter:  kkuehl@…  |  Owner:  boklm
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/rbm  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---
Changes (by isis):

 * owner:  tbb-team => boklm
 * component:  Applications/Tor Browser => Applications/rbm


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23754 [Applications/rbm]: rbm make failing do to golang error while unmarshalling json

2017-10-03 Thread Tor Bug Tracker & Wiki
#23754: rbm make failing do to golang error while unmarshalling json
--+---
 Reporter:  kkuehl@…  |  Owner:  boklm
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/rbm  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---

Comment (by sysrqb):

 kkuehl, what version of runc is installed? `sudo runc --version`

 We started working on this [0], but then I became busy and didn't have
 time to respond to boklm.

 I recently tried again, and it building is successful with runc-1.0.0-rc2
 when the config.json for  runc-0.1.1 is used. So I believe the json config
 file should only use the new object format when runc is v1.1 or newer.

 [0] https://lists.torproject.org/pipermail/tbb-
 dev/2017-September/000616.html

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23754 [Applications/rbm]: rbm make failing do to golang error while unmarshalling json

2017-10-03 Thread Tor Bug Tracker & Wiki
#23754: rbm make failing do to golang error while unmarshalling json
--+---
 Reporter:  kkuehl@…  |  Owner:  boklm
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/rbm  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---

Comment (by boklm):

 In ticket #23585 I posted a patch that might fix the issue.

 https://gitweb.torproject.org/user/boklm/tor-browser-
 build.git/commit/?h=bug_23585&id=a48690ea2873d699351929b25c9fd667f31e0890

 Could you try it to see if that fix the issue for you?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23755 [Core Tor/Tor]: conditionalize mirroring script in .gitlab-ci.yml

2017-10-03 Thread Tor Bug Tracker & Wiki
#23755: conditionalize mirroring script in .gitlab-ci.yml
--+---
 Reporter:  catalyst  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal|   Keywords:  tor-ci continuous-integration
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+---
 A few of us have experimented with using the `.gitlab-ci.yml` to run
 continuous integration jobs on gitlab.com and oniongit.eu.  Right now
 they're failing in the "update" job because `$DEPLOY_KEY` isn't
 configured.  At the very least we should make the job cleanly exit if the
 key is not configured.

 Typical output from the "update" job:

 {{{
 $ eval $(ssh-agent -s)
 Agent pid 4533
 $ ssh-add <(echo "$DEPLOY_KEY")
 Enter passphrase for /dev/fd/63: ERROR: Job failed: exit code 1
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #23756 [Core Tor/Tor]: tor's .gitlab-ci.yml is doing mirroring? why?

2017-10-03 Thread Tor Bug Tracker & Wiki
#23756: tor's .gitlab-ci.yml is doing mirroring? why?
--+
 Reporter:  isis  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.1.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.1.3-alpha
 Severity:  Normal|   Keywords:  tor-ci
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 Currently in master we have the following stanza in our .gitlab-ci.yml
 (from #22891):

 {{{
 update:
   script:
 - "apt-get install -y --fix-missing git openssh-client"

 # Run ssh-agent (inside the build environment)
 - eval $(ssh-agent -s)

 # Add the SSH key stored in SSH_PRIVATE_KEY variable to the agent
 store
 - ssh-add <("$DEPLOY_KEY")

 # For Docker builds disable host key checking. Be aware that by adding
 that
 # you are suspectible to man-in-the-middle attacks.
 # WARNING: Use this only with the Docker executor, if you use it with
 shell
 # you will overwrite your user's SSH config.
 - mkdir -p ~/.ssh
 - '[[ -f /.dockerenv ]] && echo -e "Host *\n\tStrictHostKeyChecking
 no\n\n" > ~/.ssh/config'
 # In order to properly check the server's host key, assuming you
 created the
 # SSH_SERVER_HOSTKEYS variable previously, uncomment the following two
 lines
 # instead.
 - mkdir -p ~/.ssh
 - '[[ -f /.dockerenv ]] && echo "$SSH_SERVER_HOSTKEYS" >
 ~/.ssh/known_hosts'
 - echo "merging from torgit"
 - git config --global user.email "labad...@oniongit.eu"
 - git config --global user.name "gitadmin"
 - "mkdir tor"
 - "cd tor"
 - git clone --bare https://git.torproject.org/tor.git
 - git push --mirror g...@oniongit.eu:network/tor.git
 }}}

 Why are we doing this? Can we put a cronjob on the oniongit.eu server
 instead? It's pretty weird and frankly unexpected that my personal fork of
 tor at https://gitlab.com/isis/tor is cloning the official tor repo and
 then trying to mirror it to oniongit.eu. It also has a bunch of other
 problems:

 * The `ssh-add` line [https://gitlab.com/isis/tor/-/jobs/34990901 is
 broken, causing CI to fail because it sits there forever waiting for a
 passphrase].

   I was originally going to patch the `ssh-add` line to instead be `[[ -n
 "${DEPLOY_KEY}" -a -r "$DEPLOY_KEY" ]] && ssh-add "$DEPLOY_KEY" <<<""` but
 if I fix that, then all the rest of this script would run, so I'm rather
 glad it's failing on a more innocuous command.

 * Even if the `ssh-add` line weren't broken, this whole thing fails unless
 it's being run from a fork on oniongit.eu.
 * Why is it disabling SSH hostkey checking?!
 * Why is it making the `~/.ssh` directory twice?
 * Why is it assuming that environment variables are set? e.g. `$FOO`
 versus `${FOO}` or better `test -n ${FOO}`
 * Why is it unconditionally setting (global!) git config options? (I
 assume to disable the warning that git spits out when you don't have
 `$GIT_{AUTHOR,COMMITTER}_{NAME,EMAIL}` set, but why would a CI config set
 them globally instead of just setting the correct environment variables?)
 * Why are the mirror URLs hardcoded?
 * Why is the git username and email hardcoded?
 * Why is any of this even running when I push to
 https://gitlab.com/isis/tor?
 * Why is it unconditionally starting an ssh-agent?


 I'm sorry if this is all necessary and I'm just not understanding the
 setup, but it's all just extremely unexpected behaviour from what is
 supposed to be a CI config file. Further, it's not even doing the same
 testing as our .travis.yml, but I'll make another ticket for that issue.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

  1   2   >