Re: [Tails-dev] new features coming in to be aware of

2023-07-01 Thread micah anderson
On 2023-06-22 08:51:01, anonym wrote:
> On 20/06/2023 19.19, richard wrote:
>> Hi Tails devs,
>> 
>> So the legacy tor daemon recently got two new features in alpha you 
>> should be aware of, proof-of-work and conflux circuits:
>
> Thanks for the heads-up! This is very valuable!

[snip]

> Am I correct to assume that as long as we have a tor and Tor Browser 
> that supports this, and our Tor Browser's SocksPort has ExtendedErrors 
> enabled, then we are good to go for this feature, or is something more 
> needed?

Rather than answer your questions here, probably the best thing to do
here is to invite you to a small presentation that we are planning with
one of the implements of these features, so these questions can be asked
directly. Would you, and possibly other Tails folks, be able to make
something on July 6th?

-- 
micah
___
Tails-dev mailing list
Tails-dev@boum.org
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] non-anonymous ephemeral onion services with stem

2016-12-28 Thread Micah Lee
Oops, sorry, disregard! I meant to email this to tor-dev, not tails-dev.

On 12/28/2016 08:53 AM, Micah Lee wrote:
> The stem documentation for create_ephemeral_hidden_service [1] says:
> "Changed in version 1.5.0: Added support for non-anonymous services."
> 
> But I can't figure out to actually use this feature. There doesn't seem
> to be a new argument to say if you want your onion service to be
> non-anonymous.
> 
> It also says, "Changed in version 1.5.0: Added the basic_auth argument."
> But there's a new basic_auth argument you can pass into the function to
> use that.
> 
> [1]
> https://stem.torproject.org/api/control.html#stem.control.Controller.create_ephemeral_hidden_service
> 
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] non-anonymous ephemeral onion services with stem

2016-12-28 Thread Micah Lee
The stem documentation for create_ephemeral_hidden_service [1] says:
"Changed in version 1.5.0: Added support for non-anonymous services."

But I can't figure out to actually use this feature. There doesn't seem
to be a new argument to say if you want your onion service to be
non-anonymous.

It also says, "Changed in version 1.5.0: Added the basic_auth argument."
But there's a new basic_auth argument you can pass into the function to
use that.

[1]
https://stem.torproject.org/api/control.html#stem.control.Controller.create_ephemeral_hidden_service
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Redmine maintainence Oct. 28, 9:30am EST - Oct. 30

2015-10-22 Thread micah
sajolida <sajol...@pimienta.org> writes:

> BitingBird:
>> micah:
>>>
>>> Hello!
>>> [...]
>>> We came up with Oct. 28th (wednesday) at 9:30am eastern US time for
>>> starting the upgrade process. This was the best time for us to come
>>> together and work on this. We are expecting the work to not last very
>>> long, but with redmine we have found it best to expect the unexpected,
>>> so we want to schedule the outage for two days, through the 30th, to get
>>> everything worked out before we are done.
>>>
>>>  micah
>>>
>> Noted... and thanks very, very much to you and all the others riseup
>> birds for your amazing work!
>
> Yeap, thanks for the notice and for all the work!
>
> What's the preferred communication channel if we want to have updates on
> the process either to lurk or to give a hand? #riseup on
> irc.indymedia.org? or maybe you don't do that kind of stuff...

Usually when we have a work party, we will form a temporary channel
where we can spam each other, without disrupting the main #riseup
channel. But come there if you are interested, and we can hook you into
the right place!

micah
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] Redmine maintainence Oct. 28, 9:30am EST - Oct. 30

2015-10-21 Thread micah

Hello!

Over here at riseup we have been sad about the state of redmine, partly
because we know that you fine tails people are also sad about some bugs
in the current implementation. We have been trying to keep with the
Debian provided package of redmine for ease of maintenance, but the
current package doesn't solve the parenting problems that you are having
(among other problems), there isn't an easy way to bring the fixes in
From upstream, and there doesn't look like there will be a new version
in debian any time soon (even if we helped with that process).

So, with heavy hearts, we have decided to migrate from the debian
packaged redmine to the upstream release... and to do that, we need to
schedule some downtime.

We came up with Oct. 28th (wednesday) at 9:30am eastern US time for
starting the upgrade process. This was the best time for us to come
together and work on this. We are expecting the work to not last very
long, but with redmine we have found it best to expect the unexpected,
so we want to schedule the outage for two days, through the 30th, to get
everything worked out before we are done.

 micah


signature.asc
Description: PGP signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] Newer version of Tor in Tails

2015-09-09 Thread Micah Lee
On 09/09/2015 10:23 AM, Micah Lee wrote:
> I'm updating OnionShare to add support for ephemeral hidden services,
> which is available in Tor 0.2.7.1-alpha and newer and I'd like to test
> it in Tails to confirm that it works.
> 
> What's the easiest way for me to get a version of Tails that includes
> Tor 0.2.7.1+? Should I boot to Tails 1.5.1 and try to compile and
> install a newer version of Tor? Or is there an alpha version of Tails I
> could use instead?

Actually, nevermind. I realized I can just install the .deb from Tor's
experimental repo, and it seems to work.

-- 
Micah Lee



signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

[Tails-dev] Newer version of Tor in Tails

2015-09-09 Thread Micah Lee
I'm updating OnionShare to add support for ephemeral hidden services,
which is available in Tor 0.2.7.1-alpha and newer and I'd like to test
it in Tails to confirm that it works.

What's the easiest way for me to get a version of Tails that includes
Tor 0.2.7.1+? Should I boot to Tails 1.5.1 and try to compile and
install a newer version of Tor? Or is there an alpha version of Tails I
could use instead?

-- 
Micah Lee



signature.asc
Description: OpenPGP digital signature
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Re: [Tails-dev] OnionShare bug in Tails

2015-05-18 Thread Micah Lee
On 05/15/2015 11:21 AM, intrigeri wrote:
 Hi Micah,

 Micah Lee wrote (15 May 2015 00:11:53 GMT) :
 OnionShare recently stopped working in Tails
 Can you please be more specific wrt. what version of Tails worked for
 you, and what version stopped working?

I just tested a bunch of old versions of Tails in VMs and confirmed that
it last worked in 1.2.3 and stopped working in 1.3.


 Specifically, OnionShare is able to connect to the Tor control port, but
 when it tries to create a hidden service it now causes the entire tor
 process to crash, and it looks like this is related to Tor sandbox
 warnings. You can look at the issue on github to see the full tor logs,
 but basically there are a handful of sandbox_intern_string(): Bug: No
 interned sandbox parameter found for /var/lib/tor/tmpBuBZmk errors
 (/var/lib/tor/tmpBuBZmk being the hidden service dir), ending with a
 crash: (Sandbox) Caught a bad syscall attempt (syscall open).
 Looks like a bug in Tor sandbox rather than anything Tails-specific
 to me.

Agreed, but I haven't run into it anywhere except in Tails. Maybe this
is because all other platforms use the tor service from Tor Browser
rather than a system Tor, and that doesn't have sandboxing enabled or
something?

 So I can find very little information about what's causing this or how
 to fix it. Anyone here know?
 0. Make sure there are no AppArmor-related messages for Tor in `sudo
dmesg`. If there are, please report them to us.

There are no AppArmor errors.

 1. Try without Tor sandboxing (configuring a bridge as documented via
Tails Greeter + Tor Launcher should be enough, since we disable the
sandbox when special Tor config is requested).

When I enable a bridge it doesn't cause the tor crash. So I think this
is a Tor sandbox issue.

However, onionshare fails for some other reason when a bridge is
enabled. I think this is an entirely separate issue, but I'm looking
into it.

 2. If #1 confirmed that the only problem is caused by Tor sandboxing,
report a bug on the Tor bug tracker: we don't maintain the Tor
sandbox in Tails :)

Apparently tor immediately crashes in Tor Browser if you edit its torrc
and set Sandbox 1. So now I'm testing using a system Tor in Debian,
not Tails, and I can confirm that starting a hidden service causes a
crash. I'll try to make a simpler piece of code that reproduces it and
open a tor bug.

-- 
Micah Lee
OpenPGP: 0B1491929806596254700155FD720AD9EBA34B1C

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] OnionShare bug in Tails

2015-05-14 Thread Micah Lee
OnionShare recently stopped working in Tails and I'm trying to fix it.
Here is the issue:
https://github.com/micahflee/onionshare/issues/179

Specifically, OnionShare is able to connect to the Tor control port, but
when it tries to create a hidden service it now causes the entire tor
process to crash, and it looks like this is related to Tor sandbox
warnings. You can look at the issue on github to see the full tor logs,
but basically there are a handful of sandbox_intern_string(): Bug: No
interned sandbox parameter found for /var/lib/tor/tmpBuBZmk errors
(/var/lib/tor/tmpBuBZmk being the hidden service dir), ending with a
crash: (Sandbox) Caught a bad syscall attempt (syscall open).

While searching for how to solve this I've only found a small handful of
closed tor bugs that were all resolved with patches to tor itself, like:
https://trac.torproject.org/projects/tor/ticket/12041
https://trac.torproject.org/projects/tor/ticket/12035
https://trac.torproject.org/projects/tor/ticket/12064

So I can find very little information about what's causing this or how
to fix it. Anyone here know?

-- 
Micah Lee
OpenPGP: 0B1491929806596254700155FD720AD9EBA34B1C

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] Shared screen locking solution for live distributions in Debian

2015-01-13 Thread Micah Lee
On 01/12/2015 03:58 PM, Klaus Knopper wrote:
 Also, screen locking makes only sense if there is the apparent
 possibility that someone else has physical access to the computer while
 the user is not paying attention. Why would I lock the screen if I'm the
 only one using the computer in a safe environment, and shut it down and
 remove the live medium when I'm done with my work.

I outlined some reasons for it here [1], but TL;DR is so you can step
out of your office for a minute to refill your cup of coffee without
having to close all your work, tell everyone you're chatting with that
you'll brb, shut down your computer, and then boot it up again to get
back to work.

[1] https://labs.riseup.net/code/issues/5684#note-11

-- 
Micah Lee
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.