[tor-bugs] #26474 [Webpages/Website]: old experimental version 0.3.3.x https://www.torproject.org/docs/debian.html.en

2018-06-23 Thread Tor Bug Tracker & Wiki
#26474: old experimental version 0.3.3.x
https://www.torproject.org/docs/debian.html.en
--+
 Reporter:  autodidactTor |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Webpages/Website  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 You've forgotten to turn 0.3.3.x into 0.3.4.x under experimental version
 for stretch.

 While you there how about putting in plain brief english what to do if you
 get an error because apt-transport-https isn't installed?

 You could add 'apt install apt-transport-https' in the style of the other
 commands.

 One reason to muck around with tor was to learn Linux but repeatedly there
 are preumptions of prior knowledge which cause me grief and others too
 which is discouraging.
 Have someone review things who isn't into secret lingo.
 Rob

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26227 [Core Tor/Stem]: Review existing stem.client code

2018-06-23 Thread Tor Bug Tracker & Wiki
#26227: Review existing stem.client code
---+--
 Reporter:  dmr|  Owner:  dmr
 Type:  task   | Status:  needs_review
 Priority:  Medium |  Milestone:
Component:  Core Tor/Stem  |Version:
 Severity:  Normal | Resolution:
 Keywords:  client |  Actual Points:
Parent ID: | Points:
 Reviewer:  atagar |Sponsor:
---+--
Changes (by dmr):

 * status:  reopened => needs_review


Comment:

 Replying to [comment:10 atagar]:
 > Hi Dave, sorry about the delay! **Finally** done chewing through these
 and merged.
 >
 > Work looks great! Many thanks for the pull request.

 Hey Damian! Thanks for the review! Glad you got through it - sorry again
 that it was such a big chunk to chew on.

 I'm glancing through the commits you've added in between - they look
 pretty self-explanatory, but I'll let you know if I have any questions,
 and will definitely let you know if I have any comments.

 > Opted to pass on three of the smaller commits...
 >
 > * **Commit 8353d83 (Remove redundant content-length checks):** Think I'd
 prefer to pass on this one. Those conditionals are there so we provide
 callers with nicer error messages. True, they might not be necessary but
 not spotting a need to drop 'em.
 >
 > * **Commit 819c1a2 (Refactor fixed_cell_len determination into a
 @staticmethod):** No longer necessary due to the LinkProtocol class
 addition.
 >
 > * **Commit 79396f5 (Add TODO notes for Cell types without a unit test
 definition):** Eh. Happy to add TODOs but these didn't add much.
 >
 > Everything else has been merged.

 Cool! At a glance, it seems like these all make sense to leave out.

 For
 
[[https://github.com/torproject/stem/pull/1/commits/8353d8399c27901df4412a1e1c8bb57ee3269229|8353d83]]
 specifically:
 I guess I didn't think about it from that perspective. I just noticed that
 several other places relied on the Size `pop()` for the exception
 behavior; these few seemed inconsistent.

 In the case of the `NetinfoCell`, the code is practically unreachable, so
 I'm not sure the check/message really adds much.

 Either way, I think a good follow-up commit would be to annotate the if
 check with a comment saying the purpose is for a nicer exception message.
 (That way it won't look like the code //otherwise wouldn't// check size.)

 > Feel free to reopen if there's anything I missed here.

 Hey, in particular I've reopened this for the review comments in this
 ticket!
 Namely:
 * [[comment:4|comment 4]]
 * [[comment:5|comment 5]] (separate comment, 'cause [[comment:4]] was too
 long)
 * [[comment:9|comment 9]] (pending discussions: circ_id allocation;
 padding, esp. comments in #26228 as called out above)

 Setting to `needs_review` since that seems to be the most relevant thing
 here.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #9145 [Applications/Tor Browser]: Tor Browser for Windows is borked with hardware acceleration enabled (because of gcc?)

2018-06-23 Thread Tor Bug Tracker & Wiki
#9145: Tor Browser for Windows is borked with hardware acceleration enabled
(because of gcc?)
-+-
 Reporter:  dope457  |  Owner:  tbb-team
 Type:  defect   | Status:
 |  needs_review
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-crash, fuck-mingw, ff60-esr  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by sukhbir):

 * status:  new => needs_review


Comment:

 For review:

 tor-browser-build (sets the `CXXFLAGS`):

 https://github.com/azadi/tor-browser-build-1/tree/bug-9145

 Tor Browser (removes the preferences):

 https://github.com/azadi/gecko-dev/tree/bug-9145

 I tested this on a Windows machine with an earlier build and Tor Browser
 was indeed crashing when the preferences were enabled (set to `false`).
 The new build with the above change does not crash; I verified this for
 both the 32- and 64-bit versions of Tor Browser.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26469 [Core Tor/Tor]: tor on SunOS: [err] Error from libevent: evport.c:425: Assertion evpd->ed_pending[i] == fd failed in evport_del

2018-06-23 Thread Tor Bug Tracker & Wiki
#26469: tor on SunOS: [err] Error from libevent: evport.c:425: Assertion
evpd->ed_pending[i] == fd failed in evport_del
-+-
 Reporter:  ruebezahl|  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:  Tor:
 |  0.3.3.7
 Severity:  Critical | Resolution:
 Keywords:  libevent crash 033-backport  |  Actual Points:
  034-proposed   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * keywords:  libevent crash => libevent crash 033-backport 034-proposed
 * milestone:   => Tor: unspecified


Comment:

 Can someone please triage this bug?
 Is it a libevent bug, or is Tor using libevent wrong?

 SunOS is an unsupported platform for Tor, because we don't have anyone who
 runs it, and we're not sure if we can write correct patches for it:
 
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/SupportedPlatforms

 So if it's a Tor bug, we will have to rely on a SunOS user to write a
 patch.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26470 [Core Tor/Tor]: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n" WARN: connection_mark_unattached_ap_(): Bug: stream (marked at src/or/connection_edge.c:2551) sending two s

2018-06-23 Thread Tor Bug Tracker & Wiki
#26470: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n"  WARN:
connection_mark_unattached_ap_(): Bug: stream (marked at
src/or/connection_edge.c:2551) sending two socks replies? (on Tor
0.3.3.5-rc 81d71f0d41adf0d8)
-+-
 Reporter:  Tai683   |  Owner:  (none)
 Type:  defect   | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:  Tor:
 |  0.3.3.5-rc
 Severity:  Normal   | Resolution:
 Keywords:  regression?, 033-backport-maybe, |  Actual Points:
  034-proposed   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * status:  new => needs_information
 * keywords:   => regression?, 033-backport-maybe, 034-proposed
 * version:   => Tor: 0.3.3.5-rc
 * milestone:   => Tor: unspecified


Comment:

 I don't know if we should fix this bug as part of 034.
 Can someone triage?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26319 [Applications/Tor Browser]: Don't package up the whole Tor Browser in the `mach package` step

2018-06-23 Thread Tor Bug Tracker & Wiki
#26319: Don't package up the whole Tor Browser in the `mach package` step
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201806,  |  Actual Points:
  tbb-rbm|
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by sukhbir):

 * status:  needs_revision => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26319 [Applications/Tor Browser]: Don't package up the whole Tor Browser in the `mach package` step

2018-06-23 Thread Tor Bug Tracker & Wiki
#26319: Don't package up the whole Tor Browser in the `mach package` step
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_revision
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201806,  |  Actual Points:
  tbb-rbm|
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by sukhbir):

 For review:

 https://github.com/azadi/tor-browser-build-1/tree/bug-26319-rev1

 I removed the `no-dmg.patch` and tested with a macOS build. Everything
 looks fine.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26473 [Applications/Tor Browser]: Tor Browser high CPU usage while browsing Facebook

2018-06-23 Thread Tor Bug Tracker & Wiki
#26473: Tor Browser high CPU usage while browsing Facebook
--+--
 Reporter:  uzi   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by teor):

 The safest security setting turns off JavaScript, but it also turns off a
 lot of optimisations. (Because optimisations are fingerprintable.)

 I'll leave it to the Tor Browser devs to analyse your stack trace.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26460 [Core Tor/Tor]: Some? autoconf tests that include studio.h fail with a missing ssp.h on cygwin (was: All autoconf tests that include studio.h fail with a missing ssp.h on cygwin)

2018-06-23 Thread Tor Bug Tracker & Wiki
#26460: Some? autoconf tests that include studio.h fail with a missing ssp.h on
cygwin
--+
 Reporter:  teor  |  Owner:  (none)
 Type:  defect| Status:  needs_information
 Priority:  Medium|  Milestone:  Tor: 0.3.4.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.3.1-alpha
 Severity:  Normal| Resolution:
 Keywords:  regression, 033-backport  |  Actual Points:
Parent ID:  #26356| Points:
 Reviewer:|Sponsor:
--+

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26227 [Core Tor/Stem]: Review existing stem.client code

2018-06-23 Thread Tor Bug Tracker & Wiki
#26227: Review existing stem.client code
---+--
 Reporter:  dmr|  Owner:  dmr
 Type:  task   | Status:  reopened
 Priority:  Medium |  Milestone:
Component:  Core Tor/Stem  |Version:
 Severity:  Normal | Resolution:
 Keywords:  client |  Actual Points:
Parent ID: | Points:
 Reviewer:  atagar |Sponsor:
---+--
Changes (by dmr):

 * status:  closed => reopened
 * resolution:  implemented =>


Comment:

 Reopening. Can't set status in same step, so intermediate edit...

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26356 [Core Tor/Tor]: Tor 0.3.3.6 fails to compile under cygwin (x86_64)

2018-06-23 Thread Tor Bug Tracker & Wiki
#26356: Tor 0.3.3.6 fails to compile under cygwin (x86_64)
--+
 Reporter:  gk|  Owner:  (none)
 Type:  defect| Status:  needs_information
 Priority:  Medium|  Milestone:  Tor: 0.3.4.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.3.1-alpha
 Severity:  Normal| Resolution:
 Keywords:  regression, 033-backport  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by teor):

 * status:  new => needs_information


Comment:

 #26460 could be an issue with the environment: the preprocessor can't find
 ssp.h for some input files / command lines, but other similar command
 lines succeed.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26460 [Core Tor/Tor]: All autoconf tests that include studio.h fail with a missing ssp.h on cygwin

2018-06-23 Thread Tor Bug Tracker & Wiki
#26460: All autoconf tests that include studio.h fail with a missing ssp.h on
cygwin
--+
 Reporter:  teor  |  Owner:  (none)
 Type:  defect| Status:  needs_information
 Priority:  Medium|  Milestone:  Tor: 0.3.4.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.3.1-alpha
 Severity:  Normal| Resolution:
 Keywords:  regression, 033-backport  |  Actual Points:
Parent ID:  #26356| Points:
 Reviewer:|Sponsor:
--+
Changes (by teor):

 * status:  new => needs_information


Comment:

 Ok, so I think your preprocessor is broken.
 About half the time, it falils when including ssp.h. And the rest of the
 time, it succeeds.

 {{{
 configure:10878: checking whether the compiler accepts -fwrapv
 configure:10897: gcc -c -g -O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2
 -fstack-protector-all -Wstack-protector --param ssp-buffer-size=1 -fPIE
 -pedantic -Werror -fwrapv  -I${top_srcdir}/src/common conftest.c >&5
 configure:10897: $? = 0
 configure:10916: gcc -o conftest.exe -g -O2 -U_FORTIFY_SOURCE
 -D_FORTIFY_SOURCE=2 -fstack-protector-all -Wstack-protector --param ssp-
 buffer-size=1 -fPIE -pedantic -Werror -fwrapv  -I${top_srcdir}/src/common
 conftest.c  >&5
 configure:10916: $? = 0
 configure:10928: result: yes
 configure:11284: checking whether the linker accepts -z relro -z now
 configure:11327: gcc -o conftest.exe -g -O2 -U_FORTIFY_SOURCE
 -D_FORTIFY_SOURCE=2 -fstack-protector-all -Wstack-protector --param ssp-
 buffer-size=1 -fPIE -pedantic -Werror  -I${top_srcdir}/src/common -z
 relro -z now conftest.c  -lz  -levent -lssl -lcrypto  >&5
 In file included from /usr/include/stdio.h:800,
  from conftest.c:78:
 /usr/local/lib/gcc/x86_64-unknown-cygwin/8.1.0/include/ssp/stdio.h:38:10:
 fatal error: ssp.h: No such file or directory
  #include 
   ^~~
 compilation terminated.
 configure:11327: $? = 1
 configure: program exited with status 1
 configure: failed program was:

 (similar to the last one)
 }}}

 Please try re-running configure, after deleting the config cache.
 Then run a diff between the two logs.

 If there are a lot of differences between the logs, then your preprocessor
 is failing on arbitrary inputs.
 If the logs are identical, it's failing based on some characteristic of
 the input files.

 Please also retry running configure with stack smashing protection off.

 Then, please make sure you have enough available file descriptors, disk
 space, RAM, etc., then reinstall Cygwin, and try again.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #25552 [Core Tor/Tor]: prop224: Onion service rev counters are useless and actually harmful for scalability

2018-06-23 Thread Tor Bug Tracker & Wiki
#25552: prop224: Onion service rev counters are useless and actually harmful for
scalability
---+---
 Reporter:  asn|  Owner:  dgoulet
 Type:  defect | Status:
   |  needs_review
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.5.x-final
Component:  Core Tor/Tor   |Version:  Tor:
   |  0.3.1.9
 Severity:  Normal | Resolution:
 Keywords:  tor-hs prop224 034-roadmap-master  |  Actual Points:
Parent ID: | Points:  6+++
 Reviewer:  dgoulet|Sponsor:
---+---
Changes (by asn):

 * status:  needs_revision => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26227 [Core Tor/Stem]: Review existing stem.client code

2018-06-23 Thread Tor Bug Tracker & Wiki
#26227: Review existing stem.client code
---+-
 Reporter:  dmr|  Owner:  dmr
 Type:  task   | Status:  closed
 Priority:  Medium |  Milestone:
Component:  Core Tor/Stem  |Version:
 Severity:  Normal | Resolution:  implemented
 Keywords:  client |  Actual Points:
Parent ID: | Points:
 Reviewer:  atagar |Sponsor:
---+-
Changes (by atagar):

 * status:  needs_review => closed
 * resolution:   => implemented


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26227 [Core Tor/Stem]: Review existing stem.client code

2018-06-23 Thread Tor Bug Tracker & Wiki
#26227: Review existing stem.client code
---+--
 Reporter:  dmr|  Owner:  dmr
 Type:  task   | Status:  needs_review
 Priority:  Medium |  Milestone:
Component:  Core Tor/Stem  |Version:
 Severity:  Normal | Resolution:
 Keywords:  client |  Actual Points:
Parent ID: | Points:
 Reviewer:  atagar |Sponsor:
---+--

Comment (by atagar):

 Hi Dave, sorry about the delay! **Finally** done chewing through these and
 merged.

 Work looks great! Many thanks for the pull request. Opted to pass on three
 of the smaller commits...

 * **Commit 8353d83 (Remove redundant content-length checks):** Think I'd
 prefer to pass on this one. Those conditionals are there so we provide
 callers with nicer error messages. True, they might not be necessary but
 not spotting a need to drop 'em.

 * **Commit 819c1a2 (Refactor fixed_cell_len determination into a
 @staticmethod):** No longer necessary due to the LinkProtocol class
 addition.

 * **Commit 79396f5 (Add TODO notes for Cell types without a unit test
 definition):** Eh. Happy to add TODOs but these didn't add much.

 Everything else has been merged. Feel free to reopen if there's anything I
 missed here.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #25552 [Core Tor/Tor]: prop224: Onion service rev counters are useless and actually harmful for scalability

2018-06-23 Thread Tor Bug Tracker & Wiki
#25552: prop224: Onion service rev counters are useless and actually harmful for
scalability
---+---
 Reporter:  asn|  Owner:  dgoulet
 Type:  defect | Status:
   |  needs_revision
 Priority:  Medium |  Milestone:  Tor:
   |  0.3.5.x-final
Component:  Core Tor/Tor   |Version:  Tor:
   |  0.3.1.9
 Severity:  Normal | Resolution:
 Keywords:  tor-hs prop224 034-roadmap-master  |  Actual Points:
Parent ID: | Points:  6+++
 Reviewer:  dgoulet|Sponsor:
---+---

Comment (by asn):

 Replying to [comment:34 dgoulet]:
 > Left comments on the PR. No show stoppper but a couple comments I would
 like to see answered or/and addressed. Thanks!

 Thanks for the review David. I pushed two fixups that should address your
 comments.

 Let me know if you like them and I'm gonna rebase everything into a proper
 branch.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26379 [Core Tor/Tor]: Rend-spec isn't clear about role of first layer of descriptor encryption

2018-06-23 Thread Tor Bug Tracker & Wiki
#26379: Rend-spec isn't clear about role of first layer of descriptor encryption
--+-
 Reporter:  sjmurdoch |  Owner:  (none)
 Type:  defect| Status:  merge_ready
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Minor | Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-
Changes (by asn):

 * status:  new => merge_ready


Comment:

 Please see branch `bug26379` for a well-needed patch here:
 https://github.com/torproject/torspec/pull/16

 Thanks for making a ticket, Steven!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26473 [Applications/Tor Browser]: Tor Browser high CPU usage while browsing Facebook

2018-06-23 Thread Tor Bug Tracker & Wiki
#26473: Tor Browser high CPU usage while browsing Facebook
--+--
 Reporter:  uzi   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 Forgot to mention: not just on facebook, but on many other sites EVEN WITH
 THE SAFEST SECURITY SETTING which normally keeps the hungry JS in its
 cage.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26473 [Applications/Tor Browser]: Tor Browser high CPU usage while browsing Facebook

2018-06-23 Thread Tor Bug Tracker & Wiki
#26473: Tor Browser high CPU usage while browsing Facebook
--+--
 Reporter:  uzi   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 I'm also seeing high CPU usage on facebookCoreWWWi.onion (facebook's onion
 service), so much in fact that it started boiling my stomach from the cpu
 overheating... I have the latest HTTPS-E (with the fix), and on Linux...

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26473 [Applications/Tor Browser]: Tor Browser high CPU usage while browsing Facebook

2018-06-23 Thread Tor Bug Tracker & Wiki
#26473: Tor Browser high CPU usage while browsing Facebook
--+--
 Reporter:  uzi   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by uzi):

 * Attachment "Sysinternals.png" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26473 [Applications/Tor Browser]: Tor Browser high CPU usage while browsing Facebook

2018-06-23 Thread Tor Bug Tracker & Wiki
#26473: Tor Browser high CPU usage while browsing Facebook
--+--
 Reporter:  uzi   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major |   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 Hi,
 Tor Browser with a single page open - facebook, after scrolling a little
 CPU usage jumps to more than 60% of my fast notebook CPU.

 See stack details in attachment.

 Reproducibility: 100%

 Tor Browser 7.5.5 (based on Mozilla Firefox 52.8.1) (32-bit)
 Windows 10

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26472 [Applications/Tor Browser]: Generating incremental mars for tbb-8.0a9-build2 fails

2018-06-23 Thread Tor Bug Tracker & Wiki
#26472: Generating incremental mars for tbb-8.0a9-build2 fails
--+
 Reporter:  boklm |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal|   Keywords:
  |  TorBrowserTeam201806
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 Generating incremental mars for tbb-8.0a9-build2 fails with the following
 error:
 {{{
 $ make incrementals-alpha
 git submodule update --init
 ./rbm/rbm build release --step update_responses_config --target alpha
 --target create_unsigned_incrementals
 tools/update-responses/download_missing_versions alpha
 MAR_OLD_FORMAT=1 tools/update-responses/gen_incrementals alpha
 Starting tor-browser-linux32-8.0a8-8.0a9_ru.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_nl.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_en-US.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_zh-CN.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_it.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_fa.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_pl.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_vi.incremental.mar
 Starting tor-browser-linux32-8.0a8-8.0a9_pt-BR.incremental.mar
 Error: making incremental mar:

 Error: Error creating tor-browser-linux32-8.0a8-8.0a9_en-
 US.incremental.mar
 Makefile:120: recipe for target 'incrementals-alpha' failed
 make: *** [incrementals-alpha] Error 1
 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.

 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.

 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.

 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.

 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.

 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.

 Error: making incremental mar:
 Can't exec "make_incremental_update.sh": No such file or directory at
 /usr/share/perl5/IO/CaptureOutput.pm line 73.
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26319 [Applications/Tor Browser]: Don't package up the whole Tor Browser in the `mach package` step

2018-06-23 Thread Tor Bug Tracker & Wiki
#26319: Don't package up the whole Tor Browser in the `mach package` step
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_revision
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201806,  |  Actual Points:
  tbb-rbm|
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * status:  needs_review => needs_revision
 * keywords:  ff60-esr, TorBrowserTeam201806R, tbb-rbm => ff60-esr,
 TorBrowserTeam201806, tbb-rbm


Comment:

 It seems we do not need my workaround for the .dmg case either anymore? If
 so, could you get rid of that in the patch for this bug as well?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26470 [Core Tor/Tor]: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n" WARN: connection_mark_unattached_ap_(): Bug: stream (marked at src/or/connection_edge.c:2551) sending two s

2018-06-23 Thread Tor Bug Tracker & Wiki
#26470: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n"  WARN:
connection_mark_unattached_ap_(): Bug: stream (marked at
src/or/connection_edge.c:2551) sending two socks replies? (on Tor
0.3.3.5-rc 81d71f0d41adf0d8)
--+
 Reporter:  Tai683|  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by Dbryrtfbcbhgf):

 * component:  - Select a component => Core Tor/Tor


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26470 [- Select a component]: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n" WARN: connection_mark_unattached_ap_(): Bug: stream (marked at src/or/connection_edge.c:2551) sendi

2018-06-23 Thread Tor Bug Tracker & Wiki
#26470: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n"  WARN:
connection_mark_unattached_ap_(): Bug: stream (marked at
src/or/connection_edge.c:2551) sending two socks replies? (on Tor
0.3.3.5-rc 81d71f0d41adf0d8)
--+
 Reporter:  Tai683|  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by Dbryrtfbcbhgf):

 Can you post the complete bug log?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26471 [- Select a component]: Tor bug

2018-06-23 Thread Tor Bug Tracker & Wiki
#26471: Tor bug
--+-
 Reporter:  Tai683|  Owner:  (none)
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal| Resolution:  invalid
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-
Changes (by Dbryrtfbcbhgf):

 * status:  new => closed
 * resolution:   => invalid


Comment:

 Empty bug report, looks like spam.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26471 [- Select a component]: Tor bug

2018-06-23 Thread Tor Bug Tracker & Wiki
#26471: Tor bug
--+
 Reporter:  Tai683|  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26470 [- Select a component]: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n" WARN: connection_mark_unattached_ap_(): Bug: stream (marked at src/or/connection_edge.c:2551) sending t

2018-06-23 Thread Tor Bug Tracker & Wiki
#26470: WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n"  WARN:
connection_mark_unattached_ap_(): Bug: stream (marked at
src/or/connection_edge.c:2551) sending two socks replies? (on Tor
0.3.3.5-rc 81d71f0d41adf0d8)
--+
 Reporter:  Tai683|  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 WARN: Saying "HTTP/1.0 405 Method Not Allowed\r\n\r\n"
 WARN: connection_mark_unattached_ap_(): Bug: stream (marked at
 src/or/connection_edge.c:2551) sending two socks replies? (on Tor
 0.3.3.5-rc 81d71f0d41adf0d8)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #15618 [Core Tor/Tor]: Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending)

2018-06-23 Thread Tor Bug Tracker & Wiki
#15618: Tried to establish rendezvous on non-OR circuit with purpose Acting as
rendevous (pending)
-+-
 Reporter:  asn  |  Owner:  dgoulet
 Type:  defect   | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs needs-insight needs-  |  Actual Points:
  diagnosis  |
Parent ID:   | Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by s7r):

 @dgoulet @asn are we still hunting this? Or should we make this a protocol
 warning?

 The Exit relay where I have received so many of these warnings was taken
 offline for few weeks for the reason of changing office location. I have
 started it again something like little over 24 hours ago and after it got
 measured and left the Unmeasured state it generated about 190 of these
 warnings in less than 8 hours. Same story, just a relay (no client, no
 SocksPort, no onion service hosted).

 {{{
 Jun 23 14:35:07.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 14:36:45.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 14:39:28.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 14:45:32.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 14:48:14.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 14:51:14.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 14:57:34.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 }}}

 It is running something recent of course: 0.3.5.0-alpha-dev (git-
 946428d27382fdd0+c46a0a06f).


 I was able to catch one debug log that contains at least one line of the
 warning, but i am not sure they will be different than the ones I have
 sent you last time. I have checked:

 {{{
 Jun 23 13:24:09.000 [debug] connection_edge_process_relay_cell(): Now seen
 825381 relay cells here (command 33, stream 0).
 Jun 23 13:24:09.000 [info] rend_mid_establish_rendezvous(): Received an
 ESTABLISH_RENDEZVOUS request on circuit 2529036982
 Jun 23 13:24:09.000 [warn] Tried to establish rendezvous on non-OR circuit
 with purpose Acting as rendezvous (pending)
 Jun 23 13:24:09.000 [debug] circuit_get_by_circid_channel_impl():
 circuit_get_by_circid_channel_impl() returning circuit 0x5618a4022540 for
 circ_id 2529036982, channel ID 7143 (0x5618a3108570)
 Jun 23 13:24:09.000 [info] circuit_mark_for_close_(): Circuit 0 (id: 0)
 marked for close at ../src/or/rendmid.c:286 (orig reason: 1, new reason:
 1)
 Jun 23 13:24:09.000 [debug] connection_or_process_cells_from_inbuf(): 103:
 starting, inbuf_datalen 0 (0 pending in tls object).
 Jun 23 13:24:09.000 [debug] circuit_get_by_circid_channel_impl():
 circuit_get_by_circid_channel_impl() returning circuit 0x5618a4022540 for
 circ_id 2529036982, channel ID 7143 (0x5618a3108570)
 Jun 23 13:24:09.000 [debug] circuitmux_append_destroy_cell(): Cmux at
 0x5618a307d130 queued a destroy for circ 2529036982, cmux counter is now
 1, global counter is now 1
 Jun 23 13:24:09.000 [debug] circuitmux_append_destroy_cell(): Primed a
 buffer.
 }}}

 email me directly for the complete file if you need it.

 I don't see what could be so special about this relay and why is it
 logging this so so much. It's not even an ultra fast one with huge
 consensus weight.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26469 [Core Tor/Tor]: tor on SunOS: [err] Error from libevent: evport.c:425: Assertion evpd->ed_pending[i] == fd failed in evport_del

2018-06-23 Thread Tor Bug Tracker & Wiki
#26469: tor on SunOS: [err] Error from libevent: evport.c:425: Assertion
evpd->ed_pending[i] == fd failed in evport_del
+--
 Reporter:  ruebezahl   |  Owner:  (none)
 Type:  defect  | Status:  new
 Priority:  Medium  |  Milestone:
Component:  Core Tor/Tor|Version:  Tor: 0.3.3.7
 Severity:  Critical| Resolution:
 Keywords:  libevent crash  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--
Changes (by ruebezahl):

 * component:  - Select a component => Core Tor/Tor


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26469 [- Select a component]: tor on SunOS: [err] Error from libevent: evport.c:425: Assertion evpd->ed_pending[i] == fd failed in evport_del

2018-06-23 Thread Tor Bug Tracker & Wiki
#26469: tor on SunOS: [err] Error from libevent: evport.c:425: Assertion
evpd->ed_pending[i] == fd failed in evport_del
--+
 Reporter:  ruebezahl |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:  Tor: 0.3.3.7
 Severity:  Critical  |   Keywords:  libevent crash
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 {{{
 Tor 0.3.3.7 (git-035a35178c92da94) running on SunOS with Libevent
 2.1.8-stable, OpenSSL 1.0.2o, Zlib 1.2.11, Liblzma N/A, and Libzstd N/A.
 }}}
 (this error was also observed under tor 0.3.3.6 for about two weeks, no
 change with updating to 0.3.3.7)

 every 10-20 minutes (sometimes longer) the process crashes with:


 {{{
 [err] Error from libevent: evport.c:425: Assertion evpd->ed_pending[i] ==
 fd failed in evport_del
 }}}
 Contrary to tor crashes no libevent stacktrace is provided in default
 output.

 The OS-Project under which the Service is running should have sufficent
 fd-ulimits:


 {{{
 ulimit -n
 65536
 }}}

 Service privileges for the running User are pretty standard:

 {{{
 privileges='basic,net_privaddr'
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26430 [Applications/Tor Browser]: New torbutton icons

2018-06-23 Thread Tor Bug Tracker & Wiki
#26430: New torbutton icons
--+--
 Reporter:  arthuredelstein   |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam201806R |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by arthuredelstein):

 * status:  needs_revision => needs_review
 * keywords:  TorBrowserTeam201806 => TorBrowserTeam201806R


Comment:

 Replying to [comment:6 gk]:
 > It seems those .svg files still contain metadata? See your comment:1.

 Yeah, I did remove what I thought was metadata of any significance. But
 now I have removed the rest. :)

 https://github.com/arthuredelstein/torbutton/commit/26430+1

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23664 [Applications/Tor Browser]: Deal with UUID for content sandbox temp folder on Windows and Mac

2018-06-23 Thread Tor Bug Tracker & Wiki
#23664: Deal with UUID for content sandbox temp folder on Windows and Mac
-+--
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:  new
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Major| Resolution:
 Keywords:  tbb-security, tbb-disk-leak  |  Actual Points:
Parent ID:  #23658   | Points:
 Reviewer:   |Sponsor:
-+--

Comment (by cypherpunks):

 Nothing to say when we still have web-visible UUID if
 https://bugzilla.mozilla.org/show_bug.cgi?id=1374721#c5

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23661 [Applications/Tor Browser]: Set content sandbox for Tor Browser on Windows to level 2

2018-06-23 Thread Tor Bug Tracker & Wiki
#23661: Set content sandbox for Tor Browser on Windows to level 2
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:  wontfix
 Keywords:  tbb-security  |  Actual Points:
Parent ID:  #23658| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 Yay! ļ˜

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23661 [Applications/Tor Browser]: Set content sandbox for Tor Browser on Windows to level 2

2018-06-23 Thread Tor Bug Tracker & Wiki
#23661: Set content sandbox for Tor Browser on Windows to level 2
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:  wontfix
 Keywords:  tbb-security  |  Actual Points:
Parent ID:  #23658| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * status:  new => closed
 * resolution:   => wontfix


Comment:

 Yep.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26429 [Applications/Tor Browser]: Add native OnionShare support

2018-06-23 Thread Tor Bug Tracker & Wiki
#26429: Add native OnionShare support
--+--
 Reporter:  sysrqb|  Owner:  tbb-team
 Type:  enhancement   | Status:  reopened
 Priority:  Low   |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 How about this
 https://trac.torproject.org/projects/tor/ticket/18608#comment:3

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23664 [Applications/Tor Browser]: Deal with UUID for content sandbox temp folder on Windows and Mac

2018-06-23 Thread Tor Bug Tracker & Wiki
#23664: Deal with UUID for content sandbox temp folder on Windows and Mac
-+--
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:  new
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Major| Resolution:
 Keywords:  tbb-security, tbb-disk-leak  |  Actual Points:
Parent ID:  #23658   | Points:
 Reviewer:   |Sponsor:
-+--

Comment (by cypherpunks):

 Replying to [ticket:23664 gk]:
 > Maybe a first start is to set the pref, so that every Windows user has
 the same sandbox temp dir name.
 Do at least that. No improvements found in ESR60.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23661 [Applications/Tor Browser]: Set content sandbox for Tor Browser on Windows to level 2

2018-06-23 Thread Tor Bug Tracker & Wiki
#23661: Set content sandbox for Tor Browser on Windows to level 2
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Major | Resolution:
 Keywords:  tbb-security  |  Actual Points:
Parent ID:  #23658| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 Level 5 for ESR60.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23660 [Applications/Tor Browser]: Handle exceptions in content sandboxing code for Tor Browser on Windows properly

2018-06-23 Thread Tor Bug Tracker & Wiki
#23660: Handle exceptions in content sandboxing code for Tor Browser on Windows
properly
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-security  |  Actual Points:
Parent ID:  #23658| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 ticket:16010#comment:62 from #23659.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26310 [Core Tor/Tor]: Refusing to apply consensus diff because the base consensus doesn't match the digest as found in the consensus diff header.

2018-06-23 Thread Tor Bug Tracker & Wiki
#26310: Refusing to apply consensus diff because the base consensus doesn't 
match
the digest as found in the consensus diff header.
--+--
 Reporter:  Logforme  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:  Tor: 0.3.3.6
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by Logforme):

 It happened again yesterday and today.
 What I noticed is that during this period the amount of directory traffic
 written grew dramatically until it pegged my BW:

 {{{
 BWHistoryWriteValues , BWHistoryDirWriteValues , Fraction
 (normal)
 1617398577152 , 53699181568 , "3,32 %"
 1120145275904 , 49430052864 , "4,41 %"
 1645068781568 , 69187794944 , "4,21 %"
 (event)
 1735882629120 , 162891137024 , "9,38 %"
 2220831149056 , 767522828288 , "34,56 %"
 }}}
 This could be a cause (attack?) or an effect (clients re-read?)

 During this period my BW looked like the attached image:
 
[https://trac.torproject.org/projects/tor/attachment/ticket/26310/DirTraffic.JPG]

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26310 [Core Tor/Tor]: Refusing to apply consensus diff because the base consensus doesn't match the digest as found in the consensus diff header.

2018-06-23 Thread Tor Bug Tracker & Wiki
#26310: Refusing to apply consensus diff because the base consensus doesn't 
match
the digest as found in the consensus diff header.
--+--
 Reporter:  Logforme  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:  Tor: 0.3.3.6
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by Logforme):

 * Attachment "DirTraffic.JPG" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #14520 [Applications/Tor Browser]: Update arrow makes Tor Browser version not fully readable in RTL locales

2018-06-23 Thread Tor Bug Tracker & Wiki
#14520: Update arrow makes Tor Browser version not fully readable in RTL locales
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Low   |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-torbutton |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Description changed by gk:

Old description:

> If the arrow on the about:tor page is showing up indicating that your Tor
> Browser is out-of-date then it makes the Tor Browser version not fully
> readable in RTL locales. See the attacked screenshot. We should probably
> move the version information to the left side in these locales.

New description:

 If the arrow on the about:tor page is showing up indicating that your Tor
 Browser is out-of-date then it makes the Tor Browser version not fully
 readable in RTL locales. See the attached screenshot. We should probably
 move the version information to the left side in these locales.

--

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26323 [Applications/Tor Browser]: Build 32bit Linux bundles on 64bit systems

2018-06-23 Thread Tor Bug Tracker & Wiki
#26323: Build 32bit Linux bundles on 64bit systems
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  task  | Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-rbm   |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by gk):

 https://convolv.es/blog/2017/08/25/building-firefox-for-linux-32-bit/ has
 some information, although it eventually got a `chroot` approach used.

 FWIW: We might actually not need that for the ESR 60 cycle and could get
 away with adding `-Wl,--reduce-memory-overheads` and `-Wl,--no-keep-
 memory` to `LDFLAGS` as glandium suggests in
 https://bugzilla.mozilla.org/show_bug.cgi?id=1401093.

 But probably sooner than later we have to bite that bullet.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26430 [Applications/Tor Browser]: New torbutton icons

2018-06-23 Thread Tor Bug Tracker & Wiki
#26430: New torbutton icons
--+
 Reporter:  arthuredelstein   |  Owner:  tbb-team
 Type:  defect| Status:  needs_revision
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam201806  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by gk):

 * keywords:  TorBrowserTeam201806R => TorBrowserTeam201806
 * status:  needs_review => needs_revision


Comment:

 It seems those .svg files still contain metadata? See your comment:1.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26468 [Applications/Tor Browser]: Compiling rustc on a 32bit Linux leads to segfault on some machines

2018-06-23 Thread Tor Bug Tracker & Wiki
#26468: Compiling rustc on a 32bit Linux leads to segfault on some machines
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:  new
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, tbb-rbm,   |  Actual Points:
  TorBrowserTeam201806, GeorgKoppen201806|
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Description changed by gk:

Old description:

> On one of my build machines I can't compile the Rust compiler for Linux
> 32bit. Rather, I get a segfault in stage0:
> {{{
> error: Could not compile `rustc`.
>
> Caused by:
>   process didn't exit successfully:
> `/var/tmp/build/rustc-1.26.1-src/build/build/bootstrap/debug/rustc
> --crate-name rustc librustc/lib.rs --error-format json --crate-type dylib
> --emit=dep-info,link -C prefer-dynamic -C opt-level=2 -C
> metadata=62da728f128af3fa -C extra-filename=-62da728f128af3fa --out-dir
> /var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps --target i686
> -unknown-linux-gnu -L
> dependency=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps -L
> dependency=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/release/deps --extern
> syntax_pos=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libsyntax_pos-
> 956e46049acbb600.so --extern
> rustc_back=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/librustc_back-
> d5f9039f91fa232f.so --extern
> flate2=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-
> gnu/release/deps/libflate2-06a170b7b78daff3.rlib --extern
> serialize=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libserialize-
> be5d856205d3af9f.so --extern
> serialize=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libserialize-
> be5d856205d3af9f.rlib --extern
> rustc_const_math=/var/tmp/build/rustc-1.26.1-src/build/build/i686
> -unknown-linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
> /librustc_const_math-1a374f4e5cd0912b.so --extern
> backtrace=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libbacktrace-
> cbe0b3a6423ab494.rlib --extern
> lazy_static=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
> /liblazy_static-674a88edfbfebb58.rlib --extern
> graphviz=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libgraphviz-
> 8ccf05007c6f4e63.so --extern
> rustc_errors=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
> /librustc_errors-1dfae20cf97cb076.so --extern
> byteorder=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libbyteorder-
> c95b5065cc316357.rlib --extern
> syntax=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libsyntax-
> bd1a771ca7a469d4.so --extern
> tempdir=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libtempdir-
> 713a439227f6e59f.rlib --extern
> bitflags=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libbitflags-
> 5ec3c7f454c41b77.rlib --extern
> arena=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libarena-
> 3efd8026fabf93e2.so --extern
> rustc_apfloat=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
> /librustc_apfloat-4ae4d4d739a0e47d.rlib --extern
> log=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
> gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/liblog-
> ecf25297be670426.rlib --extern
> fmt_macros=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
> linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libfmt_macros-
> 

[tor-bugs] #26468 [Applications/Tor Browser]: Compiling rustc on a 32bit Linux leads to segfault on some machines

2018-06-23 Thread Tor Bug Tracker & Wiki
#26468: Compiling rustc on a 32bit Linux leads to segfault on some machines
-+-
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:  new
 Priority:  High |  Milestone:
Component:  Applications/Tor |Version:
  Browser|   Keywords:  ff60-esr, tbb-rbm,
 Severity:  Normal   |  TorBrowserTeam201806,
 |  GeorgKoppen201806
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+-
 On one of my build machines I can't compile the Rust compiler for Linux
 32bit. Rather, I get a segfault in stage0:
 {{{
 error: Could not compile `rustc`.

 Caused by:
   process didn't exit successfully:
 `/var/tmp/build/rustc-1.26.1-src/build/build/bootstrap/debug/rustc
 --crate-name rustc librustc/lib.rs --error-format json --crate-type dylib
 --emit=dep-info,link -C prefer-dynamic -C opt-level=2 -C
 metadata=62da728f128af3fa -C extra-filename=-62da728f128af3fa --out-dir
 /var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps --target i686
 -unknown-linux-gnu -L
 dependency=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps -L
 dependency=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/release/deps --extern
 syntax_pos=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libsyntax_pos-
 956e46049acbb600.so --extern
 rustc_back=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/librustc_back-
 d5f9039f91fa232f.so --extern
 flate2=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-
 gnu/release/deps/libflate2-06a170b7b78daff3.rlib --extern
 serialize=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libserialize-
 be5d856205d3af9f.so --extern
 serialize=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libserialize-
 be5d856205d3af9f.rlib --extern
 rustc_const_math=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
 linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
 /librustc_const_math-1a374f4e5cd0912b.so --extern
 backtrace=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libbacktrace-
 cbe0b3a6423ab494.rlib --extern
 lazy_static=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
 linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/liblazy_static-
 674a88edfbfebb58.rlib --extern
 graphviz=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libgraphviz-
 8ccf05007c6f4e63.so --extern
 rustc_errors=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
 linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
 /librustc_errors-1dfae20cf97cb076.so --extern
 byteorder=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libbyteorder-
 c95b5065cc316357.rlib --extern
 syntax=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libsyntax-
 bd1a771ca7a469d4.so --extern
 tempdir=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libtempdir-
 713a439227f6e59f.rlib --extern
 bitflags=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libbitflags-
 5ec3c7f454c41b77.rlib --extern
 arena=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libarena-
 3efd8026fabf93e2.so --extern
 rustc_apfloat=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-
 linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
 /librustc_apfloat-4ae4d4d739a0e47d.rlib --extern
 log=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/liblog-
 ecf25297be670426.rlib --extern
 fmt_macros=/var/tmp/build/rustc-1.26.1-src/build/build/i686-unknown-linux-
 gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps/libfmt_macros-
 a9f532f6a542c80f.so --extern
 rustc_data_structures=/var/tmp/build/rustc-1.26.1-src/build/build/i686
 -unknown-linux-gnu/stage0-rustc/i686-unknown-linux-gnu/release/deps
 /librustc_data_structures-98fca6e9d8caf27c.so --extern
 

Re: [tor-bugs] #17965 [Applications/Tor Browser]: Isolate HPKP and HSTS to url bar domain

2018-06-23 Thread Tor Bug Tracker & Wiki
#17965: Isolate HPKP and HSTS to url bar domain
-+-
 Reporter:  mikeperry|  Owner:  tbb-
 |  team
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  tbb-linkability, |  Actual Points:
  TorBrowserTeam201804, ff60-esr-will-have   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by cypherpunks):

 Yay!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26466 [Applications/Tor Launcher]: Tor Launcher start dialog is broken with sv-SE bundle

2018-06-23 Thread Tor Bug Tracker & Wiki
#26466: Tor Launcher start dialog is broken with sv-SE bundle
-+-
 Reporter:  gk   |  Owner:  brade
 Type:  defect   | Status:  closed
 Priority:  High |  Milestone:
Component:  Applications/Tor Launcher|Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  TorBrowserTeam201806,|  Actual Points:
  GeorgKoppen201806  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by mcs):

 Looks good to me. Thanks for taking care of this issue.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26460 [Core Tor/Tor]: All autoconf tests that include studio.h fail with a missing ssp.h on cygwin

2018-06-23 Thread Tor Bug Tracker & Wiki
#26460: All autoconf tests that include studio.h fail with a missing ssp.h on
cygwin
--+
 Reporter:  teor  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.3.4.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.3.3.1-alpha
 Severity:  Normal| Resolution:
 Keywords:  regression, 033-backport  |  Actual Points:
Parent ID:  #26356| Points:
 Reviewer:|Sponsor:
--+

Comment (by rolex0815):

 Just adding, file is present:

 me@i7t /usr/local/lib/gcc/x86_64-unknown-cygwin/8.1.0/include/ssp
 $ ll
 total 20K
 -rw-r--r-- 1 me Kein 2.4K May 21 17:11 ssp.h
 -rw-r--r-- 1 me Kein 3.4K May 21 17:11 stdio.h
 -rw-r--r-- 1 me Kein 5.6K May 21 17:11 string.h
 -rw-r--r-- 1 me Kein 2.8K May 21 17:11 unistd.h

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26467 [Core Tor/Tor]: Coverity issues for week 25

2018-06-23 Thread Tor Bug Tracker & Wiki
#26467: Coverity issues for week 25
--+--
 Reporter:  ahf   |  Owner:  (none)
 Type:  defect| Status:  needs_review
 Priority:  High  |  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by ahf):

 * status:  new => needs_review


Comment:

 Patches in the following branches:

 - https://github.com/ahf/tor/tree/maint-0.2.9
 - https://github.com/ahf/tor/tree/maint-0.3.0
 - https://github.com/ahf/tor/tree/maint-0.3.1
 - https://github.com/ahf/tor/tree/maint-0.3.2

 We still need to solve the issue with the defects around the HS `service`
 variable and the `if (BUG(x == NULL)) { ...; return y; }` situation.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26467 [Core Tor/Tor]: Coverity issues for week 25

2018-06-23 Thread Tor Bug Tracker & Wiki
#26467: Coverity issues for week 25
--+--
 Reporter:  ahf   |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 - CID 1437460: Fixed: Patch in commit
 e13eac62357d810996a53ff1b5c3532096935833 in the branch coverity-
 week-25-maint-0.3.1.
 - CID 1437459: Not fixed: Odd issue: `if (BUG(x == NULL)) { ... x leaks
 here? ...; return y; }`
 - CID 1437458: Not fixed: Odd issue: `if (BUG(x == NULL)) { ... x leaks
 here? ...; return y; }`
 - CID 1437457: Not fixed: The service variable is free'd in hs_free_all()
 - is this to "deeply" hidden away from Coverity to spot? Calling
 `hs_service_free(service)` before the `hs_free_all()` leads to a segfault.
 - CID 1437456: Fixed: Should be fixed by the changes made for CID 1437460.
 - CID 1437455: Not fixed: Same problem as in 1437457, but for
 `test_desc_reupload_logic()`.
 - CID 1437454: Fixed: Patch in commit
 a2d6e0b16a254913275f4536e2796ac5a59d2fee in the branch coverity-
 week-25-maint-0.3.3.
 - CID 1437453: Fixed: Patch in commit
 1724f995c71502977c79343922ab50fc2403284f in the branch coverity-
 week-25-maint-0.2.9. Note that this have existed for longer, but 0.2.9 is
 our oldest maintained version of Tor.
 - CID 1437452: Not fixed: Same problem as in 1437457, but for
 `test_service_event()`.
 - CID 1437451: Fixed: Patch in commit
 3525267b83fd0030929c407ff94f30dbd5b4bd9f in the branch coverity-
 week-25-maint-0.2.9.
 - CID 1437450: Fixed: This should be fixed by the patch for CID 14377460
 in commit e13eac62357d810996a53ff1b5c3532096935833, but needs to be ported
 to the maint-0.3.2 branch.
 - CID 1437449: Fixed: Patch in commit
 ce5d055ed7e4d8e5d1c0b0b922738c87b6a8da1c in the branch coverity-
 week-25-maint-0.3.2.
 - CID 1437448: Fixed: Patch in commit
 dc2384da30cae716f512dedef37d27f00c43f29d in the branch coverity-
 week-25-maint-0.3.1.
 - CID 1437447: Fixed: Patch in commit
 d86c45bf5cc75a526b884a754d72ef4d11aa0693 in the branch coverity-
 week-25-maint-0.3.1.
 - CID 1437446: Not fixed. Same problem as in 1437457, but for
 `test_closing_intro_circs()`.
 - CID 1437445: Fixed: Patch in commit
 8e805bf0f65ffd137a6c9ed89be060e5d9ba317d in the branch coverity-
 week-25-maint-0.3.2.
 - CID 1437444: Not fixed: Odd issue: `if (BUG(x == NULL)) { ... x leaks
 here? ...; return y; }`
 - CID 1437443: Not fixed. Same problem as in 1437457, but for
 `test_introduce2()`.
 - CID 1437442: Not fixed: Same issue as with the `service` variables, but
 with a channel_listener_t.
 - CID 1437441: Fixed: Patch in commit
 f57789c994a499fbb9bb1bb8f37599abe297 in the branch coverity-
 week-25-maint-0.2.9.
 - CID 1437440: Fixed: Patch in commit
 b35fc51a2e6bd72707c88fa5067ab90e837b0c03 in the branch coverity-
 week-25-maint-0.2.9.
 - CID 1437439: Not fixed: Odd issue: `if (BUG(x == NULL)) { ... x leaks
 here? ...; return y; }`
 - CID 1437438: Fixed: Patch in commit
 d8230d8ba2f11bc060862f88efd49ae3178c3c5a in the branch coverity-
 week-25-maint-0.3.3.
 - CID 1437437: Fixed: Patch in commit
 3d80c086bea3b0d93327c30ac620740b629cb294 in the branch coverity-
 week-25-maint-0.3.0.
 - CID 1437436: Fixed: Patch in commit
 3b6c93782d97839ced3f57d0cea3904c200da6ed in the branch coverity-
 week-25-maint-0.3.3.
 - CID 1437435: Not fixed. Same problem as in 1437457, but for
 `test_closing_intro_circs()`.
 - CID 1437434: Fixed: Patch in commit
 c997d49ad6e6a360323311444eed1dbee785aea4 in the branch coverity-
 week-25-maint-0.3.0.
 - CID 1437433: Not fixed: Odd issue: `if (BUG(x == NULL)) { ... x leaks
 here? ...; return y; }`
 - CID 1437432: Not fixed. Same problem as in 1437457, but for
 `test_helper_functions()`.
 - CID 1437431: Fixed: Patch in commit
 8550016e6f5e2780259f5073e34e67708e4e87ff in the branch coverity-
 week-25-maint-0.3.1.
 - CID 1437430: Not fixed. Same problem as in 1437457, but for
 `test_rotate_descriptors()`.
 - CID 1437429: Fixed: Should be fixed by the patch for CID 1437454.
 - CID 1437428: Not fixed. Same problem as in 1437457, but for
 `test_build_update_descriptors()`.
 - CID 1437427: Fixed: patch in commit
 a2e623f631a63f041f76b79e554b01bbf62748b8 in the branch coverity-
 week-25-maint-0.3.2.
 - CID 1437426: Not fixed. Same problem as in 1437457, but for
 `test_intro_established()`.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26463 [Applications/Tor Browser]: IndexedDB doesn't work in TorBrowser

2018-06-23 Thread Tor Bug Tracker & Wiki
#26463: IndexedDB doesn't work in TorBrowser
--+--
 Reporter:  luka-magnotta |  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  invalid
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by luka-magnotta):

 Replying to [comment:1 teor]:
 > Tor Browser runs all windows in private browsing mode by default.
 >
 > So IndexedDB probably needs to get fixed in Firefox before it will be
 fixed in TBB. Even then, TBB will need to make sure that it respects
 domain isolation.

 I see, thanks for clearing this up.

 Replying to [comment:2 gk]:
 > Indeed, see: https://bugzilla.mozilla.org/show_bug.cgi?id=781982.

 Right, I'll keep a close eye on that ticket.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #24263 [Applications/Tor Browser]: Tor Browser 7.0.9 doesn't run background scripts from Web Extensions

2018-06-23 Thread Tor Bug Tracker & Wiki
#24263: Tor Browser 7.0.9 doesn't run background scripts from Web Extensions
--+--
 Reporter:  sajolida  |  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  fixed
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 This should be fixed in Tor Browser 8.0a9.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #24243 [Applications/Tor Browser]: Tor Browser only render HTML for local pages via file://, no images/CSS

2018-06-23 Thread Tor Bug Tracker & Wiki
#24243: Tor Browser only render HTML for local pages via file://, no images/CSS
--+--
 Reporter:  anonym|  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  fixed
 Keywords:  AffectsTails  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 This should be fixed in Tor Browser 8.0a9.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #24136 [Applications/Tor Browser]: After loading file:// URLs clicking on links is broken on OS X and Linux

2018-06-23 Thread Tor Bug Tracker & Wiki
#24136: After loading file:// URLs clicking on links is broken on OS X and Linux
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  fixed
 Keywords:  TorbrowserTeam201806  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * keywords:   => TorbrowserTeam201806
 * status:  new => closed
 * resolution:   => fixed


Comment:

 This will be fixed in Tor Browser 8.0a9.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #17965 [Applications/Tor Browser]: Isolate HPKP and HSTS to url bar domain

2018-06-23 Thread Tor Bug Tracker & Wiki
#17965: Isolate HPKP and HSTS to url bar domain
-+-
 Reporter:  mikeperry|  Owner:  tbb-
 |  team
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  tbb-linkability, |  Actual Points:
  TorBrowserTeam201804, ff60-esr-will-have   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * status:  needs_revision => closed
 * resolution:   => fixed


Comment:

 That's available starting with Tor Browser 8.0a9.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26189 [Applications/Tor Browser]: Remove our content policy hack for #8725

2018-06-23 Thread Tor Bug Tracker & Wiki
#26189: Remove our content policy hack for #8725
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  task | Status:  new
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, tbb-torbutton, |  Actual Points:
  TorBrowserTeam201806   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * cc: vanowm (added)
 * priority:  Medium => High
 * keywords:  ff60-esr, tbb-torbutton => ff60-esr, tbb-torbutton,
 TorBrowserTeam201806


Comment:

 Resolved #24948 as duplicate.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26189 [Applications/Tor Browser]: Remove our content policy hack for #8725

2018-06-23 Thread Tor Bug Tracker & Wiki
#26189: Remove our content policy hack for #8725
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  task  | Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  ff60-esr, tbb-torbutton   |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by gk):

 Marked #22525 as duplicate as the fix in this ticket is essentially one
 for that problem as well.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22525 [Applications/Tor Browser]: content policy filter does not handle relative Locations

2018-06-23 Thread Tor Bug Tracker & Wiki
#22525: content policy filter does not handle relative Locations
-+-
 Reporter:  mcs  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-torbutton,   |  duplicate
  TorBrowserTeam201804, ff60-esr-will-have   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * status:  new => closed
 * resolution:   => duplicate


Comment:

 This still happens with an esr60-based Tor Browser, fwiw. I think we
 should dupe this over to #26189 as that bug will take care of that.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #24948 [Applications/Tor Browser]: Defense against resource:// and chrome:// fingerprinting breaks other addons

2018-06-23 Thread Tor Bug Tracker & Wiki
#24948: Defense against resource:// and chrome:// fingerprinting breaks other
addons
---+---
 Reporter:  vanowm |  Owner:  tbb-team
 Type:  defect | Status:  closed
 Priority:  Medium |  Milestone:
Component:  Applications/Tor Browser   |Version:
 Severity:  Normal | Resolution:  duplicate
 Keywords:  tbb-torbutton, ff60-esr-will-have  |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+---
Changes (by gk):

 * status:  new => closed
 * resolution:   => duplicate


Comment:

 Duping this over to #26189 as the fix is to remove our hack.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #23659 [Applications/Tor Browser]: Clean-up content sandboxing code for Tor Browser on Windows

2018-06-23 Thread Tor Bug Tracker & Wiki
#23659: Clean-up content sandboxing code for Tor Browser on Windows
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  task  | Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  fixed
 Keywords:  tbb-security, ff60-esr-will-have  |  Actual Points:
Parent ID:  #23658| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 tjr cleaned most of it up and we got essentially everything landed on
 mozilla-central. Thus, WORKSFORME.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26429 [Applications/Tor Browser]: Add native OnionShare support

2018-06-23 Thread Tor Bug Tracker & Wiki
#26429: Add native OnionShare support
--+--
 Reporter:  sysrqb|  Owner:  tbb-team
 Type:  enhancement   | Status:  reopened
 Priority:  Low   |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 People all talking about backdoors need to PoC or STHU.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26039 [Applications/Tor Browser]: /preferences/extension-overrides.js will not be loaded in ESR 60

2018-06-23 Thread Tor Bug Tracker & Wiki
#26039: /preferences/extension-overrides.js will not be loaded in 
ESR
60
+--
 Reporter:  mcs |  Owner:  pospeselr
 Type:  defect  | Status:
|  needs_revision
 Priority:  Very High   |  Milestone:
Component:  Applications/Tor Browser|Version:
 Severity:  Normal  | Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201806  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by gk):

 I pushed a fixup commit (commit c21b1a526ac1e10496c234532ed309b6209e),
 as the macOS bundling was broken without it.

 One additional thought I had was that `PTConfigs` does not seem to be the
 right place for putting the `extension-overrides.js` file. Dealing e.g.
 with pdf.js settings has nothing to do with PT configs.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26186 [Applications/Tor Browser]: Replace usage of `intl.locale.matchOS` in tor-browser's build script

2018-06-23 Thread Tor Bug Tracker & Wiki
#26186: Replace usage of `intl.locale.matchOS` in tor-browser's build script
-+--
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  ff60-esr, TorBrowserTeam201806R  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--
Changes (by gk):

 * status:  needs_review => closed
 * resolution:   => fixed


Comment:

 Looks good to me. Merged in to `master` with commit
 552dcb823fa523449d4aa5022e1cf70fe785b8e0.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26458 [Applications/Tor Browser]: Even more locales for Tor Browser

2018-06-23 Thread Tor Bug Tracker & Wiki
#26458: Even more locales for Tor Browser
--+--
 Reporter:  arthuredelstein   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * cc: mcs, brade (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26458 [Applications/Tor Browser]: Even more locales for Tor Browser

2018-06-23 Thread Tor Bug Tracker & Wiki
#26458: Even more locales for Tor Browser
--+--
 Reporter:  arthuredelstein   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by gk):

 I actually had to remove `bn-BD` again as there is an XML entity error in
 browser.xul (1404:3) related to `appMenu-iĆ¼date-available-notification`. I
 did not figure out in the little time I had why this only affects `bn-BD`
 nor how to route around it. But I removed the locale in commit
 bff4fd1fe7a4e1f105973e9af217b8fefc3db392 from `master` in `tor-browser-
 build`.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26465 [Applications/Tor Browser]: Localized bundles are only showing en-US text

2018-06-23 Thread Tor Bug Tracker & Wiki
#26465: Localized bundles are only showing en-US text
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:  closed
 Priority:  Very High|  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  TorBrowserTeam201806,|  Actual Points:
  GeorgKoppen201806  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * keywords:  TorBrowserTeam201806 => TorBrowserTeam201806,
   GeorgKoppen201806
 * status:  new => closed
 * resolution:   => fixed


Comment:

 I pushed a fixup commit to `tor-browser-60.1.0esr-8.0-1` for now to
 unblock our builds (commit a0efd2fcd6e945919b46c9204846b14cdcc188bb). Let
 me know if I messed up. I'll file a follow-up ticket for work on a better
 solution.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26465 [Applications/Tor Browser]: Localized bundles are only showing en-US text

2018-06-23 Thread Tor Bug Tracker & Wiki
#26465: Localized bundles are only showing en-US text
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam201806  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by gk):

 Actually, Mozilla provides signed language packs. The problem is that we
 modify them during the bundling step:
 {{{
 # Prepare our language packs for using the proper search engines and embed
 # our default bookmarks. See bugs 18915 and 21879 for more details.
 }}}
 I guess what we need at the end is signing the lang packs we ship with our
 own key, *sigh*.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26466 [Applications/Tor Launcher]: Tor Launcher start dialog is broken with sv-SE bundle

2018-06-23 Thread Tor Bug Tracker & Wiki
#26466: Tor Launcher start dialog is broken with sv-SE bundle
-+-
 Reporter:  gk   |  Owner:  brade
 Type:  defect   | Status:  closed
 Priority:  High |  Milestone:
Component:  Applications/Tor Launcher|Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  TorBrowserTeam201806,|  Actual Points:
  GeorgKoppen201806  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * keywords:   => TorBrowserTeam201806, GeorgKoppen201806
 * status:  new => closed
 * resolution:   => fixed


Comment:

 I fixed that with commit 300d8921fe752e3168e7071bf2506762e96f10d7. Let me
 know whether that's the correct fix.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26321 [Applications/Tor Browser]: Circuit display - Let's remove link from the Tor Button

2018-06-23 Thread Tor Bug Tracker & Wiki
#26321: Circuit display - Let's remove link from the Tor Button
-+-
 Reporter:  antonela |  Owner:  tbb-
 |  team
 Type:  enhancement  | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-torbutton, tbb-circuit-display,  |  Actual Points:
  TorBrowserTeam201806R  |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by arthuredelstein):

 * keywords:  tbb-torbutton, tbb-circuit-display, TorBrowserTeam201806 =>
 tbb-torbutton, tbb-circuit-display, TorBrowserTeam201806R
 * status:  new => needs_review


Comment:

 Two patches for review:

 * https://github.com/arthuredelstein/tor-browser/commit/26321
 * https://github.com/arthuredelstein/torbutton/commit/26321

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26466 [Applications/Tor Launcher]: Tor Launcher start dialog is broken with sv-SE bundle

2018-06-23 Thread Tor Bug Tracker & Wiki
#26466: Tor Launcher start dialog is broken with sv-SE bundle
---+---
 Reporter:  gk |  Owner:  brade
 Type:  defect | Status:  new
 Priority:  High   |  Milestone:
Component:  Applications/Tor Launcher  |Version:
 Severity:  Normal |   Keywords:
Actual Points: |  Parent ID:
   Points: |   Reviewer:
  Sponsor: |
---+---
 Fixing bug #20628 adds support for five new locales among others `sv-SE`.
 However, in the `sv-SE` case this breaks the Tor Launcher wizard because
 `sv-SE` is basically not translated while `sv` is. As the bundle name
 contains `sv-SE` the former is used.

 We should remove it and let the browser fall back to `sv`.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #26465 [Applications/Tor Browser]: Localized bundles are only showing en-US text

2018-06-23 Thread Tor Bug Tracker & Wiki
#26465: Localized bundles are only showing en-US text
--+
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal|   Keywords:
  |  TorBrowserTeam201806
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 All of our localized bundles are broken with the switch to Firefox 60.1.0
 ESR. Once a localized bundle is starting up only en-US text is shown.
 Looking at the language packs state in `about:addons` it shows that it got
 disabled as it is unsigned. I suspect this is due to
 https://bugzilla.mozilla.org/show_bug.cgi?id=1454141. So, it seems Mozilla
 is not providing signed language packs in their candidate builds right
 now. :(

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26464 [Core Tor/Tor]: Static cross-compiling for Windows is broken

2018-06-23 Thread Tor Bug Tracker & Wiki
#26464: Static cross-compiling for Windows is broken
--+--
 Reporter:  Hello71   |  Owner:  Hello71
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * component:  - Select a component => Core Tor/Tor


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26463 [Applications/Tor Browser]: IndexedDB doesn't work in TorBrowser

2018-06-23 Thread Tor Bug Tracker & Wiki
#26463: IndexedDB doesn't work in TorBrowser
--+--
 Reporter:  luka-magnotta |  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  invalid
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * owner:  (none) => tbb-team
 * status:  new => closed
 * component:  - Select a component => Applications/Tor Browser
 * resolution:   => invalid


Comment:

 Replying to [comment:1 teor]:
 > Replying to [ticket:26463 luka-magnotta]:
 > > So, I've read #16528 and #1633, but I'm still unclear if the current
 state of IndexedDB being broken is intended or not.
 > >
 > > Just to be clear: TB 7.5.5 (FF 52.8.1), IndexedDB doesn't work at all.
 It exhibits symptoms similar to vanilla FF in Private Mode -- the API
 appears to exist, but the first call to "open" fails with
 InvalidStateError.
 >
 > Tor Browser runs all windows in private browsing mode by default.
 >
 > So IndexedDB probably needs to get fixed in Firefox before it will be
 fixed in TBB.

 Indeed, see: https://bugzilla.mozilla.org/show_bug.cgi?id=781982.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26186 [Applications/Tor Browser]: Replace usage of `intl.locale.matchOS` in tor-browser's build script

2018-06-23 Thread Tor Bug Tracker & Wiki
#26186: Replace usage of `intl.locale.matchOS` in tor-browser's build script
-+-
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201806R  |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * keywords:  ff60-esr => ff60-esr, TorBrowserTeam201806R


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26251 [Applications/Tor Browser]: Adapt macOS snowflake compilation to new toolchain

2018-06-23 Thread Tor Bug Tracker & Wiki
#26251: Adapt macOS snowflake compilation to new toolchain
+--
 Reporter:  gk  |  Owner:  tbb-team,
|  sukhbir
 Type:  task| Status:  needs_review
 Priority:  Medium  |  Milestone:
Component:  Applications/Tor Browser|Version:
 Severity:  Normal  | Resolution:
 Keywords:  tbb-rbm, TorBrowserTeam201806R  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--
Changes (by gk):

 * keywords:  tbb-rbm => tbb-rbm, TorBrowserTeam201806R


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26319 [Applications/Tor Browser]: Don't package up the whole Tor Browser in the `mach package` step

2018-06-23 Thread Tor Bug Tracker & Wiki
#26319: Don't package up the whole Tor Browser in the `mach package` step
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  High |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  ff60-esr, TorBrowserTeam201806R, |  Actual Points:
  tbb-rbm|
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * keywords:  ff60-esr, TorBrowserTeam201806, tbb-rbm => ff60-esr,
 TorBrowserTeam201806R, tbb-rbm


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26461 [Applications/Tor Browser]: Generating incrementals fails if the release/signed or alpha/signed directory doesn't exist

2018-06-23 Thread Tor Bug Tracker & Wiki
#26461: Generating incrementals fails if the release/signed or alpha/signed
directory doesn't exist
--+--
 Reporter:  boklm |  Owner:  tbb-team
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:  fixed
 Keywords:  TorBrowserTeam201806R |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * status:  needs_review => closed
 * resolution:   => fixed


Comment:

 Looks good. Merged to `master` (comit
 fd92d4d0b055f14763d925305e93f78fa4b3146d) and cherry-picked to `maint-7.5`
 (commit b4ceb77a9a481f3770129959e899f5866f049c7a).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26462 [Applications/Tor Browser]: Build of firefox 60.1.0 fails on linux32

2018-06-23 Thread Tor Bug Tracker & Wiki
#26462: Build of firefox 60.1.0 fails on linux32
-+-
 Reporter:  boklm|  Owner:  tbb-
 |  team
 Type:  defect   | Status:  closed
 Priority:  Very High|  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:  fixed
 Keywords:  ff60-esr, tbb-rbm,   |  Actual Points:
  TorBrowserTeam201806R, GeorgKoppen201806   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * status:  needs_review => closed
 * resolution:   => fixed


Comment:

 Fixed and merged to `master` (commit
 7dc74d1652c560e193d1a4c3331efcfb08ee67b0).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs