Re: [tor-bugs] #30920 [Core Tor/Tor]: Detect uint64 overflow in config_parse_units()

2019-09-22 Thread Tor Bug Tracker & Wiki
#30920: Detect uint64 overflow in config_parse_units()
---+
 Reporter:  nickm  |  Owner:  (none)
 Type:  defect | Status:  needs_revision
 Priority:  Low|  Milestone:  Tor: 0.4.3.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Minor  | Resolution:
 Keywords:  easy overflow  |  Actual Points:
Parent ID: | Points:
 Reviewer:  teor   |Sponsor:
---+
Changes (by teor):

 * status:  new => needs_revision
 * reviewer:   => teor


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #30920 [Core Tor/Tor]: Detect uint64 overflow in config_parse_units()

2019-09-22 Thread Tor Bug Tracker & Wiki
#30920: Detect uint64 overflow in config_parse_units()
---+
 Reporter:  nickm  |  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  Low|  Milestone:  Tor: 0.4.3.x-final
Component:  Core Tor/Tor   |Version:
 Severity:  Minor  | Resolution:
 Keywords:  easy overflow  |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+

Comment (by teor):

 Replying to [comment:15 guigom]:
 > The SSIZE_MAX part may be interfering with 64bit arithmetic in 32bit
 machines as seen in this error in AppVeyor build.
 >
 >
 
[https://ci.appveyor.com/project/torproject/tor/builds/27495711/job/049andnqliomgw0u#L6029]
 >
 > Tomorrow (CEST) I'll test with UINT64_MAX.

 You're right, SSIZE_MAX is 2^31^ on 32-bit platforms, which would be a
 valid value for bandwidth on 32-bit machines. And memory on machines that
 allow processes to take up more than 2 GB.

 Let's check that the value is less than INT64_MAX?
 And let's check the result of the float multiplication, *before* we cast
 it to a uint64_t.
 (We want to use a value that's significantly lower than UINT64_MAX, so
 that floating point calculations can't change the result.)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #19327 [Core Tor/Tor]: controller: expose fine-grained circuit detail.

2019-09-22 Thread Tor Bug Tracker & Wiki
#19327: controller: expose fine-grained circuit detail.
-+-
 Reporter:  nickm|  Owner:  (none)
 Type:  enhancement  | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-control isolation test-support   |  Actual Points:
  intro  |
Parent ID:  #17284   | Points:  2
 Reviewer:   |Sponsor:
 |  SponsorS-can
-+-
Changes (by teor):

 * status:  new => needs_review


Comment:

 Thanks!

 I'm marking this ticket as needs_review, so someone can review the
 proposed design.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31793 [Core Tor/Tor]: Bug: tor_addr_is_internal() called from src/feature/dirauth/process_descs.c:447 with a non-IP address of type 0

2019-09-22 Thread Tor Bug Tracker & Wiki
#31793: Bug: tor_addr_is_internal() called from
src/feature/dirauth/process_descs.c:447 with a non-IP address of type 0
-+-
 Reporter:  arma |  Owner:  teor
 Type:  defect   | Status:
 |  needs_review
 Priority:  High |  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  unspecified
 Severity:  Normal   | Resolution:
 Keywords:  master-regression ipv6 043-must  |  Actual Points:  0.4
  BugSmashFund   |
Parent ID:   | Points:  0.5
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * keywords:  master-regression ipv6 043-must => master-regression ipv6
 043-must BugSmashFund


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26543 [Circumvention/BridgeDB]: Provide a language switcher menu on BridgeDB

2019-09-22 Thread Tor Bug Tracker & Wiki
#26543: Provide a language switcher menu on BridgeDB
---+---
 Reporter:  teor   |  Owner:  (none)
 Type:  enhancement| Status:  assigned
 Priority:  Medium |  Milestone:
Component:  Circumvention/BridgeDB |Version:
 Severity:  Normal | Resolution:
 Keywords:  anti-censorship-roadmap-september  |  Actual Points:
Parent ID:  #31289 | Points:  3
 Reviewer: |Sponsor:
   |  Sponsor30-must
---+---
Changes (by phw):

 * points:  1 => 3


Comment:

 Ticket #9678 also proposed a language switcher. The ticket was closed
 because the work it would have taken to implement this wasn't worth the
 minor usability benefit we would get out of this. BridgeDB does support a
 `lang` argument that allows for language switching, e.g.,
 bridges.torproject.org?lang=de. We may be able to build this feature
 around this argument.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31408 [Core Tor/Tor]: torrc : ClientOnionAuthDir after include directives breaks client to v2 services

2019-09-22 Thread Tor Bug Tracker & Wiki
#31408: torrc : ClientOnionAuthDir after include directives breaks client to v2
services
-+-
 Reporter:  xaho |  Owner:  asn
 Type:  defect   | Status:
 |  merge_ready
 Priority:  Very High|  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.3.1.1-alpha
 Severity:  Normal   | Resolution:
 Keywords:  BugSmashFund tor-hs regression   |  Actual Points:  0.3
  042-must consider-backport-after-0423, |
  035-backport, 040-backport, 041-backport,  |
  042-backport   |
Parent ID:   | Points:  0.3
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * keywords:
 tor-hs regression 042-must 035-backport, 040-backport, 041-backport,
 042-backport
 =>
 BugSmashFund tor-hs regression 042-must consider-backport-after-0423,
 035-backport, 040-backport, 041-backport, 042-backport
 * status:  needs_review => merge_ready
 * points:   => 0.3
 * version:  Tor: 0.4.0.5 => Tor: 0.3.1.1-alpha
 * actualpoints:   => 0.3


Comment:

 Here is a backported pull request, with some changes file fixes:
 * 0.3.5: https://github.com/torproject/tor/pull/1348

 I added a conf regression test on master using the test framework from
 #31637:
 * master: https://github.com/torproject/tor/pull/1349

 The merge forward is clean, the test branches are here:
 * https://github.com/teor2345/tor/branches/all?query=31408

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31821 [Applications/Tor Browser]: reapply window.open() clamping

2019-09-22 Thread Tor Bug Tracker & Wiki
#31821: reapply window.open() clamping
---+--
 Reporter:  Thorin |  Owner:  tbb-team
 Type:  defect | Status:  new
 Priority:  Very High  |  Milestone:
Component:  Applications/Tor Browser   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tbb-fingerprinting-resolution  |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
Changes (by Thorin):

 * Attachment "previous-behavior.png" added.

 10px clamping

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31821 [Applications/Tor Browser]: reapply window.open() clamping

2019-09-22 Thread Tor Bug Tracker & Wiki
#31821: reapply window.open() clamping
-+-
 Reporter:  Thorin   |  Owner:  tbb-team
 Type:  defect   | Status:  new
 Priority:  Very High|  Component:  Applications/Tor
 |  Browser
  Version:   |   Severity:  Normal
 Keywords:  tbb-fingerprinting-  |  Actual Points:
  resolution |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
 In alpha we seem to have lost the 10px clamping for new windows (which are
 opened in a new tab: see #9881 )

 - See https://bugzilla.mozilla.org/show_bug.cgi?id=1556016
 - See https://ghacksuserjs.github.io/TorZillaPrint/TorZillaPrint.html -
 click the `new window` button

 Pic to follow: example of a user resizing the browser for more real
 estate: which we want to encourage for uptake and for the letterboxing
 buckets to be less FP'able (I assume).

 Would be good to upstream it

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31821 [Applications/Tor Browser]: reapply window.open() clamping

2019-09-22 Thread Tor Bug Tracker & Wiki
#31821: reapply window.open() clamping
---+--
 Reporter:  Thorin |  Owner:  tbb-team
 Type:  defect | Status:  new
 Priority:  Very High  |  Milestone:
Component:  Applications/Tor Browser   |Version:
 Severity:  Normal | Resolution:
 Keywords:  tbb-fingerprinting-resolution  |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
Changes (by Thorin):

 * Attachment "LB-bypass.png" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31192 [Applications/Tor Browser]: TBA - Support x86_64 target

2019-09-22 Thread Tor Bug Tracker & Wiki
#31192: TBA - Support x86_64 target
-+-
 Reporter:  cypherpunks  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, ff68-esr,   |  Actual Points:
  GeorgKoppen201907, TorBrowserTeam201909|
Parent ID:   | Points:  2
 Reviewer:   |Sponsor:
 |  Sponsor44-can
-+-
Changes (by sisbell):

 * status:  needs_revision => needs_review


Comment:

 I created a branch of tor-browser-build and verified that the apk from the
 build runs on x86_64 Android 9 image in an emulator.

 https://github.com/sisbell/tor-browser-
 build/commit/3129788f99f751f430e22fa5071e2ba6bde29075

 There is a change to tor-android-service project which updates the tor
 libraries to the latest (I'll open another bug for that). This is
 referenced off of my branch in the ''projects/tor-android-service/config''
 file.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #22029 [Core Tor/Tor]: Allow ed25519 keys to be banned in the approved-routers file

2019-09-22 Thread Tor Bug Tracker & Wiki
#22029: Allow ed25519 keys to be banned in the approved-routers file
-+-
 Reporter:  teor |  Owner:  neel
 Type:  enhancement  | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  034-triage-20180328, |  Actual Points:
  034-removed-20180328   |
Parent ID:   | Points:  1
 Reviewer:  nickm|Sponsor:
-+-
Changes (by neel):

 * status:  needs_revision => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31564 [Applications/Tor Browser]: Android bundles based on ESR 68 are not built reproducibly anymore

2019-09-22 Thread Tor Bug Tracker & Wiki
#31564: Android bundles based on ESR 68 are not built reproducibly anymore
-+-
 Reporter:  gk   |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_information
 Priority:  Very High|  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-9.0-must-alpha,  |  Actual Points:
  TorBrowserTeam201909R, GeorgKoppen201909   |
Parent ID:  #30324   | Points:  5
 Reviewer:   |Sponsor:
-+-

Comment (by sisbell):

 I wouldn't exactly call it a random file, as its maintained by the apktool
 project but if we are updating to buster, then we can remove this step.

 I did move forward with the buster approach. The issue I've run into is
 that openjdk-8 is not supported out of the box for buster. I'll need to
 download openjdk-8 and unpack it. I'm thinking of doing this within the
 android-toolchain project so we only have to download once.

 Replying to [comment:29 gk]:
 > Hm. So, I am not overly happy using some random .jar file from the
 Internet. Do you know whether version 2.3.4 would work here as well? We
 could then think to upgrade to Debian buster which comes with it (and
 which is a thing we want to do anyway, see: #31130). If it's just a matter
 of replacing "stretch" with "buster" and then using apktool 2.3.4 (and
 nothing else breaks) then that would be the better way to go I think.
 Could you test whether that is a workable solution?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31408 [Core Tor/Tor]: torrc : ClientOnionAuthDir after include directives breaks client to v2 services

2019-09-22 Thread Tor Bug Tracker & Wiki
#31408: torrc : ClientOnionAuthDir after include directives breaks client to v2
services
-+-
 Reporter:  xaho |  Owner:  asn
 Type:  defect   | Status:
 |  needs_review
 Priority:  Very High|  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.4.0.5
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs regression 042-must   |  Actual Points:
  035-backport, 040-backport, 041-backport,  |
  042-backport   |
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * keywords:  tor-hs regression 042-must =>
 tor-hs regression 042-must 035-backport, 040-backport, 041-backport,
 042-backport


Comment:

 This looks like a fix we should backport to 0.3.5 and later.

 I'll make branches for 0.3.5 and later, using git cherry-pick, and our
 git-merge-forward.sh test branch mode.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31408 [Core Tor/Tor]: torrc : ClientOnionAuthDir after include directives breaks client to v2 services

2019-09-22 Thread Tor Bug Tracker & Wiki
#31408: torrc : ClientOnionAuthDir after include directives breaks client to v2
services
+--
 Reporter:  xaho|  Owner:  asn
 Type:  defect  | Status:  needs_review
 Priority:  Very High   |  Milestone:  Tor:
|  0.4.2.x-final
Component:  Core Tor/Tor|Version:  Tor: 0.4.0.5
 Severity:  Normal  | Resolution:
 Keywords:  tor-hs regression 042-must  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by xaho):

 Thanks, and sorry for the confusion !  This statement of mine was bogus:

 > ''any'' file in torrc.d, with a single `#` char

 Indeed the filename also must be **last**, I just verified it.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31408 [Core Tor/Tor]: torrc : ClientOnionAuthDir after include directives breaks client to v2 services

2019-09-22 Thread Tor Bug Tracker & Wiki
#31408: torrc : ClientOnionAuthDir after include directives breaks client to v2
services
+--
 Reporter:  xaho|  Owner:  asn
 Type:  defect  | Status:  needs_review
 Priority:  Very High   |  Milestone:  Tor:
|  0.4.2.x-final
Component:  Core Tor/Tor|Version:  Tor: 0.4.0.5
 Severity:  Normal  | Resolution:
 Keywords:  tor-hs regression 042-must  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--
Changes (by Jigsaw52):

 * cc: danielpinto52@… (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31408 [Core Tor/Tor]: torrc : ClientOnionAuthDir after include directives breaks client to v2 services

2019-09-22 Thread Tor Bug Tracker & Wiki
#31408: torrc : ClientOnionAuthDir after include directives breaks client to v2
services
+--
 Reporter:  xaho|  Owner:  asn
 Type:  defect  | Status:  needs_review
 Priority:  Very High   |  Milestone:  Tor:
|  0.4.2.x-final
Component:  Core Tor/Tor|Version:  Tor: 0.4.0.5
 Severity:  Normal  | Resolution:
 Keywords:  tor-hs regression 042-must  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--
Changes (by Jigsaw52):

 * status:  assigned => needs_review


Comment:

 The cause of this problem is a bug in the processing of included folders
 containing files with only comments or whitespace. I was able to reproduce
 this problem with the following configuration:

 torrc:
 {{{
 %include /etc/tor/torrc.d/
 Log notice stderr # can be any valid option
 }}}

 /etc/tor/torrc.d/01_invalid:
 {{{
 InvalidOption
 }}}

 /etc/tor/torrc.d/02_comment:
 {{{
 # comment
 }}}

 Running tor --verify-config -f torrc will incorrectly identify this as a
 valid configuration despite the invalid option on
 /etc/tor/torrc.d/01_invalid.

 The bug is that any files on a %included folder where the last file
 contains only comments or whitespace are being ignored. Also the bug is
 only triggered if there is a valid option after the %include.

 The cause of this bug is that, when creating the list of configurations
 options from the included files, a pointer to the last element of the list
 is incorrectly set to NULL when processing a file with only comments or
 whitespace. This can cause the options list to be built incorrectly,
 causing this behaviour.

 I've made a pull request with a fix for this problem and a test case:
 https://github.com/torproject/tor/pull/1347

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31332 [Metrics/Relay Search]: Please update the FallbackDir flags in relay search

2019-09-22 Thread Tor Bug Tracker & Wiki
#31332: Please update the FallbackDir flags in relay search
--+--
 Reporter:  teor  |  Owner:  metrics-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Metrics/Relay Search  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by starlight):

 time to complete this -- 0.4.1 is out, new fallbacks live

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31798 [Applications/Tor Browser]: wipe all mentions of netflix, paypal, youtube, ... from noscript in Tor Browser

2019-09-22 Thread Tor Bug Tracker & Wiki
#31798: wipe all mentions of netflix, paypal, youtube, ... from noscript in Tor
Browser
--+--
 Reporter:  adrelanos |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by cypherpunks):

 Possibly related to #31580.

 It's also worth noting that `xss/Exceptions.js` contains exceptions for
 some websites like youtube too. `lib/restricted.js` looks like it contains
 exceptions for a few mozilla domains and `chrome.google.com`. It links to
 https://bugzilla.mozilla.org/show_bug.cgi?id=1415644

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31819 [Community/Translations]: Missing strings for translation on Transifex

2019-09-22 Thread Tor Bug Tracker & Wiki
#31819: Missing strings for translation on Transifex
+--
 Reporter:  Zarko_Gjurov|  Owner:  emmapeel
 Type:  defect  | Status:  new
 Priority:  High|  Milestone:
Component:  Community/Translations  |Version:
 Severity:  Normal  | Resolution:
 Keywords:  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by gk):

 See comment:1:ticket:31747 for the reason. We think about how to fix this.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31736 [Core Tor/Tor]: Stop using mutex_destroy(), when multiple threads can still access the mutex

2019-09-22 Thread Tor Bug Tracker & Wiki
#31736: Stop using mutex_destroy(), when multiple threads can still access the
mutex
-+-
 Reporter:  teor |  Owner:  teor
 Type:  defect   | Status:
 |  assigned
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.3.5.1-alpha
 Severity:  Normal   | Resolution:
 Keywords:  consider-backport-after-042-stable,  |  Actual Points:  0.2
  consider-backport-if-needed, diagnostics,  |
  042-should, 035-backport-maybe, 040-backport-  |
  maybe, 041-backport-maybe, regression, |
  BugSmashFund   |
Parent ID:  #31614   | Points:  0.2
 Reviewer:   |Sponsor:
-+-
Changes (by nickm):

 * owner:  (none) => teor
 * status:  needs_review => assigned


Comment:

 Hi!  This all looks plausible to me at first glance. Here's another
 question to check on, however:

  * Have you thought about what happens on re-initialization?

 (Ideally, if Tor finishes, and then is re-initialized in the same process,
 we would reuse the existing mutexes rather than creating new ones.  Is
 that achievable?)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31820 [Core Tor/Tor]: Drop support for OpenSSL < 1.1.1

2019-09-22 Thread Tor Bug Tracker & Wiki
#31820: Drop support for OpenSSL < 1.1.1
--+
 Reporter:  nickm |  Owner:  (none)
 Type:  task  | Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.4.3.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 As of 1 January 2020, there will be no supported OpenSSL version earlier
 than version 1.1.1.  (See
 https://www.openssl.org/policies/releasestrat.html)

 We can clean up our code by dropping backward-compatibility support for
 earlier versions.

 As we do this, we should test with supported versions of LibreSSL as well,
 since we try to support that too.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31819 [Community/Translations]: Missing strings for translation on Transifex

2019-09-22 Thread Tor Bug Tracker & Wiki
#31819: Missing strings for translation on Transifex
+--
 Reporter:  Zarko_Gjurov|  Owner:  emmapeel
 Type:  defect  | Status:  new
 Priority:  High|  Milestone:
Component:  Community/Translations  |Version:
 Severity:  Normal  | Resolution:
 Keywords:  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--
Changes (by nickm):

 * owner:  (none) => emmapeel
 * component:  Core Tor/Tor => Community/Translations


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31819 [Core Tor/Tor]: Missing strings for translation on Transifex

2019-09-22 Thread Tor Bug Tracker & Wiki
#31819: Missing strings for translation on Transifex
--+
 Reporter:  Zarko_Gjurov  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by Zarko_Gjurov):

 * Attachment "missing-strings.png" added.

 strings-missing

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31819 [Core Tor/Tor]: Missing strings for translation on Transifex

2019-09-22 Thread Tor Bug Tracker & Wiki
#31819: Missing strings for translation on Transifex
--+--
 Reporter:  Zarko_Gjurov  |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  High  |  Component:  Core Tor/Tor
  Version:|   Severity:  Normal
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
 Strings on the Welcome page for the left up sided text: "New to Tor
 Browser? Let's get started." are missing for translation for both final
 and alpha releases on Transifex.

 [[Image(https://i.imgur.com/wMhaip2.png)]]

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31818 [Circumvention/Snowflake]: Hello, today after about two hours, I can't open any webpage in Tor browser through Snowflake bridge.

2019-09-22 Thread Tor Bug Tracker & Wiki
#31818: Hello, today after about two hours, I can't open any webpage in Tor 
browser
through Snowflake bridge.
-+
 Reporter:  amiableclarity2011   |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Circumvention/Snowflake  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by amiableclarity2011):

 * Attachment "cached-descriptors.new" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31818 [Circumvention/Snowflake]: Hello, today after about two hours, I can't open any webpage in Tor browser through Snowflake bridge.

2019-09-22 Thread Tor Bug Tracker & Wiki
#31818: Hello, today after about two hours, I can't open any webpage in Tor 
browser
through Snowflake bridge.
-+
 Reporter:  amiableclarity2011   |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Circumvention/Snowflake  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by amiableclarity2011):

 * Attachment "cached-microdescs.new" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31818 [Circumvention/Snowflake]: Hello, today after about two hours, I can't open any webpage in Tor browser through Snowflake bridge.

2019-09-22 Thread Tor Bug Tracker & Wiki
#31818: Hello, today after about two hours, I can't open any webpage in Tor 
browser
through Snowflake bridge.
-+
 Reporter:  amiableclarity2011   |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Circumvention/Snowflake  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by amiableclarity2011):

 * Attachment "torrc" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31818 [Circumvention/Snowflake]: Hello, today after about two hours, I can't open any webpage in Tor browser through Snowflake bridge.

2019-09-22 Thread Tor Bug Tracker & Wiki
#31818: Hello, today after about two hours, I can't open any webpage in Tor 
browser
through Snowflake bridge.
-+
 Reporter:  amiableclarity2011   |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Circumvention/Snowflake  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by amiableclarity2011):

 * Attachment "state" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31818 [Circumvention/Snowflake]: Hello, today after about two hours, I can't open any webpage in Tor browser through Snowflake bridge.

2019-09-22 Thread Tor Bug Tracker & Wiki
#31818: Hello, today after about two hours, I can't open any webpage in Tor 
browser
through Snowflake bridge.
-+
 Reporter:  amiableclarity2011   |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Circumvention/Snowflake  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+
Changes (by amiableclarity2011):

 * Attachment "torrc-defaults" added.


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31818 [Circumvention/Snowflake]: Hello, today after about two hours, I can't open any webpage in Tor browser through Snowflake bridge.

2019-09-22 Thread Tor Bug Tracker & Wiki
#31818: Hello, today after about two hours, I can't open any webpage in Tor 
browser
through Snowflake bridge.
+-
 Reporter:  amiableclarity2011  |  Owner:  (none)
 Type:  defect  | Status:  new
 Priority:  Medium  |  Component:  Circumvention/Snowflake
  Version:  |   Severity:  Normal
 Keywords:  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+-
 Hello, today after about two hours, I can't open any webpage in Tor
 browser through Snowflake bridge. Today, at first, I can normally open
 webpages in Tor browser through Snowflake bridge. After about two hours, I
 can't open any webpage in Tor browser through Snowflake bridge. I don't
 know whether China's firewall can detect the Snowflake bridge that I use.
 I upload my state file and my torrc file. Thank you very much for your
 help. I really appreciate it.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs