[tor-bugs] #33495 [Applications/Tor Browser]: resolution check for small screen

2020-03-01 Thread Tor Bug Tracker & Wiki
#33495: resolution check for small screen
--+--
 Reporter:  cypherpunks   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Component:  Applications/Tor Browser
  Version:  Tor: unspecified  |   Severity:  Normal
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
 I am using android torbrowser 9.0.5 on a samsung galaxy ring which is a
 small 4" phone. When i check the fpcentral site or panopticlick.eff.org, i
 am seen as unique with the panopticlick site showing ~1/45,000 because of
 the 3 resolution factors: screen width, screen height, and color
 resolution - 320, 508, 24 - and ~1/250,000 overall. I have read that
 torbrowser is supposed to give a certain resolution of a set of proscribed
 general resolutions, to anonymize the user, depending on the size of the
 actual screen. However, in my case, the screen resolution is specific, and
 the small screen is a giveaway too. The developers at the torproject have
 to take this into account and set the screen resolution of such a small
 screen ti spoof a larger one and larger, more ubiquitous phones.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33430 [Applications/Tor Browser]: Disable downloadable fonts on Safest security level

2020-03-01 Thread Tor Bug Tracker & Wiki
#33430: Disable downloadable fonts on Safest security level
--+--
 Reporter:  dcent |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam202002R |  Actual Points:
Parent ID:| Points:
 Reviewer:  acat  |Sponsor:
--+--

Comment (by dcent):

 Thanks, ma1, and thank *you* too.

 Today I discovered this problem goes beyond fonts.

 On [this page](https://archive.org/details/JFKTo911) there are two
 instances of gifs being encoded and five instances of image/svg+xml, shown
 below.
 ```
 .ui-menu .ui-menu-item {
  margin:0;
  cursor:pointer;
  list-style-
 
image:url("data:image/gif;base64,R0lGODlhAQABAIAAAP///yH5BAEALAABAAEAAAIBRAA7")
 }

 .ui-progressbar .ui-progressbar-overlay {
 
background:url("data:image/gif;base64,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
 
SObE+ZgRl1BHFZNr7pRCavZ5BW2142hY3AN/zWtsmf12p9XxxFl2lpLn1rseztfXZjdIWIf2s5dItwjYKBgo9yg5pHgzJXTEeGlZuenpyPmpGQoKOWkYmSpaSnqKileI2FAAACH5BAkBAAEALAAoACgAAAKVjB+gu+jG4kORTVrVhRlsnn2dJ3ZleFaptFrb+CXmO9OozeL5VfP99HvAWhpiUdcwkpBH3825AwYdU8xTqlLGhtCosArKMpvfa1mMRae9VvWZfeB2XfPkeLmm18lUcBj+p5dnN8jXZ3YIGEhYuOUn45aoCDkp16hl5IjYJvjWKcnoGQpqyPlpOhr3aElaqrq56Bq7VAAAOw==");
  height:100%;
  filter:alpha(opacity=25);
  opacity:.25
 }

 .pagination-arrow.left {
  left:0;
  background-
 
image:url("data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0NCIgaGVpZ2h0PSI0NCIgdmlld0JveD0iMCAwIDE1IDI3Ij48cG9seWxpbmUgZmlsbD0ibm9uZSIgc3Ryb2tlPSIjNEE0QTRBIiBzdHJva2Utd2lkdGg9IjIiIHBvaW50cz0iMTkgMTQgMTkgMzEgMzYgMzEiIHRyYW5zZm9ybT0icm90YXRlKDQ1IDMxLjM2NCAxLjEpIi8+PC9zdmc+");
  background-repeat:no-repeat;
  background-position:50%;
  background-size:contain
 }
 .pagination-arrow.left:hover {
  background-
 
image:url("data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0NCIgaGVpZ2h0PSI0NCIgdmlld0JveD0iMCAwIDE1IDI3Ij48cG9seWxpbmUgZmlsbD0ibm9uZSIgc3Ryb2tlPSIjRkZGIiBzdHJva2VXaWR0aD0iMiIgcG9pbnRzPSIxOSAxNCAxOSAzMSAzNiAzMSIgdHJhbnNmb3JtPSJyb3RhdGUoNDUgMzEuMzY0IDEuMSkiIC8+PC9zdmc+")
 }
 .pagination-arrow.right {
  right:-1rem;
  background-
 
image:url("data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIHdpZHRoPSI0NCIgaGVpZ2h0PSI0NCIgdmlld0JveD0iMCAwIDE1IDI3Ij48cG9seWxpbmUgZmlsbD0ibm9uZSIgc3Ryb2tlPSIjNEE0QTRBIiBzdHJva2Utd2lkdGg9IjIiIHBvaW50cz0iMTkgMTQgMTkgMzEgMzYgMzEiIHRyYW5zZm9ybT0ic2NhbGUoLTEgMSkgcm90YXRlKDQ1IDIzLjg2NCAtMTcuMDA2KSIvPjwvc3ZnPg==");
  background-repeat:no-repeat;
  background-position:50%;
  background-size:contain
 }
 .pagination-arrow.right:hover {
  background-
 

Re: [tor-bugs] #33219 [Circumvention/Censorship analysis]: Tor in China (Android) stops at 5%

2020-03-01 Thread Tor Bug Tracker & Wiki
#33219: Tor in China (Android) stops at 5%
---+---
 Reporter:  TiC|  Owner:  (none)
 Type:  defect | Status:
   |  needs_information
 Priority:  Medium |  Milestone:
Component:  Circumvention/Censorship analysis  |Version:
 Severity:  Normal | Resolution:
 Keywords:  cn |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+---

Comment (by TiC):

 I would like to try it, but I am unsure how to do that. For an android
 phone which file should I choose? I just saw Linux and win, but no apk or
 something I know (sorry, not very advanced in installing on Android)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #28766 [Applications/Tor Browser]: Tor Build for Android

2020-03-01 Thread Tor Bug Tracker & Wiki
#28766: Tor Build for Android
-+-
 Reporter:  sisbell  |  Owner:  sisbell
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, tbb-parity, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by sisbell):

 * cc: hans@… (removed)
 * cc: sysrqb, boklm (added)


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #28766 [Applications/Tor Browser]: Tor Build for Android

2020-03-01 Thread Tor Bug Tracker & Wiki
#28766: Tor Build for Android
-+-
 Reporter:  sisbell  |  Owner:  sisbell
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, tbb-parity, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:  1
 Reviewer:   |Sponsor:
-+-
Changes (by sisbell):

 * keywords:  tbb-mobile, tbb-rbm, tbb-parity, TorBrowserTeam202002 => tbb-
 mobile, tbb-rbm, tbb-parity, TorBrowserTeam202003R
 * status:  needs_revision => needs_review


Comment:

 I added the configure_opt_project var to the build

 https://github.com/sisbell/tor-browser-build/commits/bug-28766-2

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32992 [Applications/Tor Browser]: TBB Project for LZMA

2020-03-01 Thread Tor Bug Tracker & Wiki
#32992: TBB Project for LZMA
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202002   |
Parent ID:  #28704   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by sisbell):

 Moved the gpg key to keyring directory

 Added the configure_opt_project variable that uses common CC and host
 fields.

 https://github.com/sisbell/tor-browser-build/commits/bug-32992b

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32992 [Applications/Tor Browser]: TBB Project for LZMA

2020-03-01 Thread Tor Bug Tracker & Wiki
#32992: TBB Project for LZMA
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by sisbell):

 * status:  needs_revision => needs_review
 * keywords:  tbb-mobile, tbb-rbm, TorBrowserTeam202002 => tbb-mobile, tbb-
 rbm, TorBrowserTeam202003R


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32992 [Applications/Tor Browser]: TBB Project for LZMA

2020-03-01 Thread Tor Bug Tracker & Wiki
#32992: TBB Project for LZMA
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202002   |
Parent ID:  #28704   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by sisbell):

 I see my mistake. I have the keyring in wrong location.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32992 [Applications/Tor Browser]: TBB Project for LZMA

2020-03-01 Thread Tor Bug Tracker & Wiki
#32992: TBB Project for LZMA
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202002   |
Parent ID:  #28704   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by sisbell):

 Replying to [comment:13 boklm]:


 > Replying to [comment:12 sisbell]:
 >
 > > Replying to [comment:10 boklm]:
 > >
 > > > Replying to [comment:7 sisbell]:
 > > >
 > > >
 > > > >
 > > > > And then building the project, I get an error
 > > > >
 > > > > {{{
 > > > > Error: v5.2.4 is not a signed tag
 > > > > }}}
 > > > >
 > > > > Any ideas on what is going wrong?
 > > > >
 > > > >
 > > >
 > > > I have no idea what's going wrong. Do you have a branch with the
 changes you tried so I can investigate the issue?
 > > >
 > > I created a branch with the key and config that I was using when I
 encountered the errors. I'll do some more testing as well on this
 > >
 > > https://github.com/sisbell/tor-browser-build/commits/bug-32992a
 > >
 >
 >
 > So it seems the issue is that `keyring/xz.gpg` does not contain any key.
 This command outputs nothing:
 > {{{
 > $ gpg --no-default-keyring --keyring keyring/xz.gpg --list-keys
 > }}}
 >
 > And the size of the file is only 32 bytes.

 On my system, I'm seeing

 {{{
 -rw-r--r--   1 shane shane 6513 Mar  1 19:01 xz.gpg
 }}}

 and
 {{{
 $ gpg --no-default-keyring --keyring ./xz.gpg --list-keys
 ./xz.gpg
 
 pub   rsa4096 2010-10-24 [SC] [expires: 2020-12-22]
   3690C240CE51B4670D30AD1C38EE757D69184620
 uid   [ unknown] Lasse Collin 
 sub   rsa4096 2010-10-24 [E] [expires: 2020-12-22]
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32088 [Core Tor/Tor]: Proposal 308 - choose guards in sampled order

2020-03-01 Thread Tor Bug Tracker & Wiki
#32088: Proposal 308 - choose guards in sampled order
--+
 Reporter:  Jaym  |  Owner:  (none)
 Type:  enhancement   | Status:  needs_revision
 Priority:  Medium|  Milestone:  Tor: 0.4.4.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-spec prop271 prop308  |  Actual Points:
Parent ID:| Points:
 Reviewer:  nickm |Sponsor:
--+
Changes (by teor):

 * status:  reopened => needs_revision


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32088 [Core Tor/Tor]: Proposal 308 - choose guards in sampled order (was: Proposal 271 - straightforward improvements)

2020-03-01 Thread Tor Bug Tracker & Wiki
#32088: Proposal 308 - choose guards in sampled order
--+
 Reporter:  Jaym  |  Owner:  (none)
 Type:  enhancement   | Status:  reopened
 Priority:  Medium|  Milestone:  Tor: 0.4.4.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-spec prop271 prop308  |  Actual Points:
Parent ID:| Points:
 Reviewer:  nickm |Sponsor:
--+
Changes (by teor):

 * status:  closed => reopened
 * priority:  High => Medium
 * milestone:  Tor: 0.4.3.x-final => Tor: 0.4.4.x-final
 * keywords:  tor-spec prop271 => tor-spec prop271 prop308
 * resolution:  implemented =>


Comment:

 I did a small review on this code.

 I've looked at entry_guard_parse_from_state(), and I can't work out where
 we create a dense set of indexes on load. (But I can see where we do it on
 save.)

 Creating a dense set of indexes on load is important, because qsort() is
 not stable. Therefore, the first time a legacy state is loaded, the guards
 will be sorted in arbitrary order. And the order may change, every time
 the sort is performed.

 I also wonder if we need to sort the guard list every time we select a
 guard. Instead, can we keep the list sorted when we add or delete guards?
 Appending guards to the end of the list is just smartlist_add(). We have
 the smartlist_del_keeporder() to remove guards from the list.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #30899 [Core Tor/sbws]: Include the commit hash in the sbws version

2020-03-01 Thread Tor Bug Tracker & Wiki
#30899: Include the commit hash in the sbws version
---+---
 Reporter:  teor   |  Owner:  (none)
 Type:  enhancement| Status:  closed
 Priority:  High   |  Milestone:  sbws: 1.1.x-final
Component:  Core Tor/sbws  |Version:
 Severity:  Major  | Resolution:  fixed
 Keywords:  sbws-roadmap   |  Actual Points:
Parent ID: | Points:  1
 Reviewer:  ahf|Sponsor:
---+---

Comment (by teor):

 Thanks for this change, it's really helpful for diagnosing issues. Great
 work!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31011 [Core Tor/Tor]: Make the bridge authority reject private PT addresses when DirAllowPrivateAddresses is 0

2020-03-01 Thread Tor Bug Tracker & Wiki
#31011: Make the bridge authority reject private PT addresses when
DirAllowPrivateAddresses is 0
--+
 Reporter:  teor  |  Owner:  cjb
 Type:  defect| Status:  needs_revision
 Priority:  Medium|  Milestone:  Tor: 0.4.4.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tor-pt|  Actual Points:
Parent ID:  #31009| Points:  1
 Reviewer:  ahf   |Sponsor:  Sponsor28-can
--+

Comment (by teor):

 Replying to [comment:26 cjb]:
 > Thank you!  I think the line is just named `transport` in the extra-info
 doc, and there can be 0-to-many of them.  So it sounds like a new
 `transports` field in the `extrainfo_t` struct should be a smartlist of
 `transport` line `char *`s, do you agree?  And then as the bridgeauth we
 reject the entire descriptor during parsing if a single `transport` line
 contains an internal address?

 Yes, I think that's our standard design for lists of strings.

 > (If this takes me a while, perhaps it might make sense to split out the
 bridge-side change from the bridgeauth-side change and merge them
 independently?)

 Splitting changes is usually helpful. Particularly when they need to be
 merged to separate repositories.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32621 [Core Tor/Tor]: Add automated checks to make sure man page options stay in alphabetical order

2020-03-01 Thread Tor Bug Tracker & Wiki
#32621: Add automated checks to make sure man page options stay in alphabetical
order
-+-
 Reporter:  teor |  Owner:  (none)
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.3.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  documentation tor-client manpage |  Actual Points:
  easy 043-can   |
Parent ID:  #4310| Points:  1
 Reviewer:   |Sponsor:
-+-

Comment (by teor):

 Replying to [comment:5 atagar]:
 > Hi teor. Sorry, unsure I follow - if a stem integ test it would be
 included under tor's stem testing target.

 Yes, that's true, we run the stem tests in Tor's CI.

 But we don't run them during "make check".

 > Alphabetisation doesn't seem critical enough to warrant the hassle of a
 pre-commit hook but up to you folks.

 We have an existing pre-commit hook that runs most of our simple checks.

 The final design is totally up to the author and reviewer. I think
 catalyst has been doing some work here, so I'm happy to leave it to them.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33375 [Core Tor/Tor]: Stop advertising an IPv6 exit policy when DNS is broken for IPv6

2020-03-01 Thread Tor Bug Tracker & Wiki
#33375: Stop advertising an IPv6 exit policy when DNS is broken for IPv6
-+-
 Reporter:  teor |  Owner:  neel
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.4.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.9.14
 Severity:  Normal   | Resolution:
 Keywords:  ipv6, tor-client, tor-exit, tor- |  Actual Points:
  dns, extra-review, no-backport |
Parent ID:  #24833   | Points:
 Reviewer:  teor |Sponsor:
-+-
Changes (by teor):

 * keywords:  ipv6, tor-client, tor-exit, tor-dns => ipv6, tor-client, tor-
 exit, tor-dns, extra-review, no-backport
 * reviewer:   => teor
 * milestone:  Tor: unspecified => Tor: 0.4.4.x-final


Comment:

 Historically, exit code has been risky, and had bugs that we didn't find
 until much later,

 So I'm marking this ticket for extra review, and ai don't think we should
 backport.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #33494 [- Select a component]: Installers Languages

2020-03-01 Thread Tor Bug Tracker & Wiki
#33494: Installers Languages
---+--
 Reporter:  smaragdus  |  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  Medium |  Component:  - Select a component
  Version: |   Severity:  Normal
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
 I downloaded the English installers of '''Tor Browser''' version
 '''9.0.5''':

  * torbrowser-install-9.0.5_en-US.exe
  * torbrowser-install-win64-9.0.5_en-US.exe

 and while the '''x64''' version shows all languages, screen:

 [[Image(https://images2.imgbox.com/fe/53/rasDMGLm_o.png)]]

 the '''x32 '''version shows only several languages, screen:

 [[Image(https://images2.imgbox.com/b5/79/g4IjdUzh_o.png)]]

 I don't know whether this bug has already been reported but as I
 encountered it I decided to open a new ticket.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32991 [Applications/Tor Browser]: TBB Project For ZSTD

2020-03-01 Thread Tor Bug Tracker & Wiki
#32991: TBB Project For ZSTD
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by sisbell):

 * keywords:  tbb-mobile, tbb-rbm, TorBrowserTeam202002R => tbb-mobile, tbb-
 rbm, TorBrowserTeam202003R


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33375 [Core Tor/Tor]: Stop advertising an IPv6 exit policy when DNS is broken for IPv6

2020-03-01 Thread Tor Bug Tracker & Wiki
#33375: Stop advertising an IPv6 exit policy when DNS is broken for IPv6
-+-
 Reporter:  teor |  Owner:  neel
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:  Tor:
 |  unspecified
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.9.14
 Severity:  Normal   | Resolution:
 Keywords:  ipv6, tor-client, tor-exit, tor-dns  |  Actual Points:
Parent ID:  #24833   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by teor):

 * status:  needs_review => needs_revision


Comment:

 We have a policy that new code needs tests, even if old code doesn't have
 them.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #28764 [Applications/Tor Browser]: OpenSSL Build for Android

2020-03-01 Thread Tor Bug Tracker & Wiki
#28764: OpenSSL Build for Android
-+-
 Reporter:  sisbell  |  Owner:  sisbell
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, tbb-parity, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:  0.5
 Reviewer:  sysrqb, boklm|Sponsor:
-+-
Changes (by sisbell):

 * keywords:  tbb-mobile, tbb-rbm, tbb-parity, TorBrowserTeam202002R => tbb-
 mobile, tbb-rbm, tbb-parity, TorBrowserTeam202003R


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #28765 [Applications/Tor Browser]: LibEvent Build for Android

2020-03-01 Thread Tor Bug Tracker & Wiki
#28765: LibEvent Build for Android
-+-
 Reporter:  sisbell  |  Owner:  sisbell
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, tbb-parity, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:  0.25
 Reviewer:  sysrqb, boklm|Sponsor:
-+-
Changes (by sisbell):

 * keywords:  tbb-mobile, tbb-rbm, tbb-parity, TorBrowserTeam202002 => tbb-
 mobile, tbb-rbm, tbb-parity, TorBrowserTeam202003R
 * status:  needs_revision => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #28765 [Applications/Tor Browser]: LibEvent Build for Android

2020-03-01 Thread Tor Bug Tracker & Wiki
#28765: LibEvent Build for Android
-+-
 Reporter:  sisbell  |  Owner:  sisbell
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, tbb-parity, |  Actual Points:
  TorBrowserTeam202002   |
Parent ID:  #28704   | Points:  0.25
 Reviewer:  sysrqb, boklm|Sponsor:
-+-

Comment (by sisbell):

 #31499 now includes the version change for libevent (I sitll need to test
 this for non-android platforms)

 #33216 contains the CC=clang and host info

 This commit now includes using a configure_opt_project variable. I
 verified this is building correctly for android. Again I still need to
 test with #31499 to verify all platforms.

 !https://github.com/sisbell/tor-browser-build/commits/bug-28765a

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #33493 [Metrics/Relay Search]: Encourage operators to ignore bridge flags on relay search

2020-03-01 Thread Tor Bug Tracker & Wiki
#33493: Encourage operators to ignore bridge flags on relay search
--+--
 Reporter:  teor  |  Owner:  metrics-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Metrics/Relay Search  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 The bridge flags on relay search confuse some bridge operators:
 https://lists.torproject.org/pipermail/tor-
 relays/2020-February/018188.html

 Can we grey them out, or otherwise indicate that they're not used by
 clients?

 Can we change the mouseover help message on the "flags" heading for
 bridges?

 Can we also change the definition of Flags, and the Bridge Descriptors
 definition, so they talk about bridge flags?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33216 [Applications/Tor Browser]: Add Android Host and ABI Info to RBM.conf

2020-03-01 Thread Tor Bug Tracker & Wiki
#33216: Add Android Host and ABI Info to RBM.conf
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:
 Reviewer:  boklm|Sponsor:
-+-

Comment (by sisbell):

 I also added the configure_opt including CC and host info for Android into
 rbm.conf. The other projects will use it rather than specifying it in each
 file.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33216 [Applications/Tor Browser]: Add Android Host and ABI Info to RBM.conf

2020-03-01 Thread Tor Bug Tracker & Wiki
#33216: Add Android Host and ABI Info to RBM.conf
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202002   |
Parent ID:  #28704   | Points:
 Reviewer:  boklm|Sponsor:
-+-

Comment (by sisbell):

 To provide some context on this issue

 For clang60 in android NDK 17, we see


 {{{
 Dynamic section at offset 0x3940a18 contains 33 entries:
   TagType Name/Value
  0x0001 (NEEDED) Shared library: [libpthread.so.0]
  0x0001 (NEEDED) Shared library: [librt.so.1]
  0x0001 (NEEDED) Shared library: [libdl.so.2]
  0x0001 (NEEDED) Shared library: [libtinfo.so.5]
  0x0001 (NEEDED) Shared library: [libz.so.1]
  0x0001 (NEEDED) Shared library: [libm.so.6]
  0x0001 (NEEDED) Shared library: [libc++.so.1]
  0x0001 (NEEDED) Shared library: [libgcc_s.so.1]
  0x0001 (NEEDED) Shared library: [libc.so.6]
 }}}

 Google changed this to optional in NDK 18 (which we haven't upgraded to).

 More info: https://github.com/android/ndk/issues/574

 We can solve this by installing libtinfo5 as a dependency. This appears to
 have not worked for tor project since the var/deps in the tor/config file
 (which did not contain the libtinfo5 dep) were not merging with the dep
 section in rbm.conf which did contain the libtinfo5 dep. At least this is
 how I'm interpreting the results based on multiple builds.

 I'll fix this by removing the soft link in rbm.conf and adding the
 libtinfo5 dep in the tor config file.

 https://github.com/sisbell/tor-browser-build/tree/bug-33216a

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33216 [Applications/Tor Browser]: Add Android Host and ABI Info to RBM.conf

2020-03-01 Thread Tor Bug Tracker & Wiki
#33216: Add Android Host and ABI Info to RBM.conf
-+-
 Reporter:  sisbell  |  Owner:  tbb-
 |  team
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor Browser |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tbb-mobile, tbb-rbm, |  Actual Points:
  TorBrowserTeam202003R  |
Parent ID:  #28704   | Points:
 Reviewer:  boklm|Sponsor:
-+-
Changes (by sisbell):

 * status:  needs_revision => needs_review
 * keywords:  tbb-mobile, tbb-rbm, TorBrowserTeam202002 => tbb-mobile, tbb-
 rbm, TorBrowserTeam202003R


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #32088 [Core Tor/Tor]: Proposal 271 - straightforward improvements

2020-03-01 Thread Tor Bug Tracker & Wiki
#32088: Proposal 271 - straightforward improvements
--+
 Reporter:  Jaym  |  Owner:  (none)
 Type:  enhancement   | Status:  closed
 Priority:  High  |  Milestone:  Tor: 0.4.3.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:  implemented
 Keywords:  tor-spec prop271  |  Actual Points:
Parent ID:| Points:
 Reviewer:  nickm |Sponsor:
--+

Comment (by Jaym):

 https://github.com/torproject/tor/pull/1773

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33430 [Applications/Tor Browser]: Disable downloadable fonts on Safest security level

2020-03-01 Thread Tor Bug Tracker & Wiki
#33430: Disable downloadable fonts on Safest security level
--+--
 Reporter:  dcent |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam202002R |  Actual Points:
Parent ID:| Points:
 Reviewer:  acat  |Sponsor:
--+--

Comment (by ma1):

 This should work as expected in Please check
 https://noscript.net/getit#devel, thanks.

 v 11.0.15rc1
 
 x Fixed CapsCSP bug allowing data: URLs to bypass font
   blocking (thanks dcent and skriptimaahinen)
 x [XSS] Prevent DOS detection from being triggered for
   already aborted requests (thanks therube)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33491 [Core Tor/Tor]: tor_bug_occurred_: Bug: src/core/or/dos.c:697: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed. (Future instances of this warning will be silence

2020-03-01 Thread Tor Bug Tracker & Wiki
#33491: tor_bug_occurred_: Bug: src/core/or/dos.c:697: dos_new_client_conn: Non-
fatal assertion !(entry == NULL) failed. (Future instances of this warning
will be silenced.) (on Tor 0.4.2.6 )
--+-
 Reporter:  sjcjonker |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:  0.4.2.6
 Severity:  Normal| Resolution:
 Keywords:  FreeBSD   |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-
Changes (by arma):

 * cc: dgoulet (added)


Comment:

 cc'ing dgoulet as the fixer of the previous bug

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33491 [Core Tor/Tor]: tor_bug_occurred_: Bug: src/core/or/dos.c:697: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed. (Future instances of this warning will be silence

2020-03-01 Thread Tor Bug Tracker & Wiki
#33491: tor_bug_occurred_: Bug: src/core/or/dos.c:697: dos_new_client_conn: Non-
fatal assertion !(entry == NULL) failed. (Future instances of this warning
will be silenced.) (on Tor 0.4.2.6 )
--+-
 Reporter:  sjcjonker |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:  0.4.2.6
 Severity:  Normal| Resolution:
 Keywords:  FreeBSD   |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-

Comment (by arma):

 See #25223 for a previous backtrace that looks awfully similar (but was
 supposedly fixed in 0.3.3.3-alpha).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #33491 [Core Tor/Tor]: tor_bug_occurred_: Bug: src/core/or/dos.c:697: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed. (Future instances of this warning will be silenced.)

2020-03-01 Thread Tor Bug Tracker & Wiki
#33491: tor_bug_occurred_: Bug: src/core/or/dos.c:697: dos_new_client_conn: Non-
fatal assertion !(entry == NULL) failed. (Future instances of this warning
will be silenced.) (on Tor 0.4.2.6 )
---+--
 Reporter:  sjcjonker  |  Owner:  (none)
 Type:  defect | Status:  new
 Priority:  Medium |  Component:  Core Tor/Tor
  Version:  0.4.2.6|   Severity:  Normal
 Keywords:  FreeBSD|  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
 Hi there,

 Receiving the below report, searched for 'src/core/or/dos.c:697' no hits,
 so opening ticket, please let me know if further info is needed to
 troubleshoot.

 FreeBSD <> 12.1-RELEASE-p2 FreeBSD 12.1-RELEASE-p2 GENERIC
 amd64


 {{{

 Mar  1 13:53:33 <> Tor[86742]: tor_bug_occurred_: Bug:
 src/core/or/dos.c:697: dos_new_client_conn: Non-fatal assertion !(entry ==
 NULL) failed. (Future instances of this warning will be silenced.) (on Tor
 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: Tor 0.4.2.6: Non-fatal
 assertion !(entry == NULL) failed in dos_new_client_conn at
 src/core/or/dos.c:697. Stack trace: (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x12f4acc
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x12f0b76
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x118d9a5
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x118d88e
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x1191a57
  at /usr/local/bin/tor (on
 Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x1144946
  at /usr/local/bin/tor (on Tor 0.4.2.6
 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x11923ee
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x1140d52
  at /usr/local/bin/tor (on Tor 0.4.2.6
 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x114ddad
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x119e3ee
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x8013d72b3
  at /usr/local/lib/libevent-2.1.so.7
 (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x8013d318f
  at /usr/local/lib/libevent-2.1.so.7 (on Tor
 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x11a0881
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x113de68
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x113c656
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:53:33 <> Tor[86742]: Bug: 0x113c309  at
 /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: tor_bug_occurred_: Bug:
 src/core/or/dos.c:697: dos_new_client_conn: Non-fatal assertion !(entry ==
 NULL) failed. (Future instances of this warning will be silenced.) (on Tor
 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: Tor 0.4.2.6: Non-fatal
 assertion !(entry == NULL) failed in dos_new_client_conn at
 src/core/or/dos.c:697. Stack trace: (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x12f4acc
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x12f0b76
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x118d9a5
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x118d88e
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x1191a57
  at /usr/local/bin/tor (on
 Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x1144946
  at /usr/local/bin/tor (on Tor 0.4.2.6
 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x11923ee
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x1140d52
  at /usr/local/bin/tor (on Tor 0.4.2.6
 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x114ddad
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x119e3ee
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x8013d72b3
  at /usr/local/lib/libevent-2.1.so.7
 (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x8013d318f
  at /usr/local/lib/libevent-2.1.so.7 (on Tor
 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x11a0881
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x113de68
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x113c656
  at /usr/local/bin/tor (on Tor 0.4.2.6 )
 Mar  1 13:54:37 <> Tor[86742]: Bug: 0x113c309  at
 /usr/local/bin/tor (on Tor 0.4.2.6 )

 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org

Re: [tor-bugs] #32418 [Applications/Tor Browser]: Torbrowser tells on every start, that it can't update although it is newest

2020-03-01 Thread Tor Bug Tracker & Wiki
#32418: Torbrowser tells on every start, that it can't update although it is 
newest
--+---
 Reporter:  Yeti  |  Owner:  tbb-team
 Type:  defect| Status:  needs_information
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-update|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---

Comment (by Yeti):

 Status "needs_information"... which information is needed exactly?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #33430 [Applications/Tor Browser]: Disable downloadable fonts on Safest security level

2020-03-01 Thread Tor Bug Tracker & Wiki
#33430: Disable downloadable fonts on Safest security level
--+--
 Reporter:  dcent |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam202002R |  Actual Points:
Parent ID:| Points:
 Reviewer:  acat  |Sponsor:
--+--

Comment (by Yeti):

 See https://forums.informaction.com/viewtopic.php?p=101745
 Seems, there's no need to change something in TB.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs