Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-21 Thread sajolida
Alan:
 On Thu, 19 Feb 2015 14:23:03 +
 sajolida sajol...@pimienta.org wrote:
 intrigeri:
 sajolida wrote (18 Feb 2015 11:32:17 GMT) :
 intrigeri:
 Alan wrote (12 Feb 2015 15:32:15 GMT) :
   - Ability to close a circuit manually.

 [...]
 = seems like we can address this corner case in a good-enough way
 without compromising security nor spending large amounts of energy on
 this topic.

 Fine with me. Still, we would need to have arm documented in the first
 place. And since I propose it to go in Advanced topics anyway we can
 explain the workaround there for now and create the upstream ticket that
 you mentioned as well.

 +1
 
 [About the green onion]

There's no green onion in the quoted emails above that. So I
understand that you're agreeing on having a green onion displayed
somewhere on the desktop once Tor is started. If not please clarify.

 And I'm fine with mimicking this behavior for a start if
 that's easier to implement (no regression), but I think this is buggy
 (the onion shouldn't be green if Tor is not in a working state anymore).
 I want to replace Vidalia to get rid of its bugs not to reimplement them :)

 but would it be conceivable to have Tor Monitor
 appear as green onion on the desktop as Vidalia does until now?

 I don't think it's the way to go:
 
 - I'd like Tor Monitor to stay a generic application, with a clear
   focus on being a monitor for Tor and showing whatever icon on the
   desktop doesn't look like the same task for me.

I beg to disagree. To me monitoring Tor also means being able to have
some clue at any time about whether it's been started or not, from the
desktop. So the green onion is part of monitoring Tor for me, it's
status icon. At least as far as we agree on keeping that green onion
(see the beginning of that mail).

 - System Tray Icons were deprecated in Gtk since 3.14. A proper
   implementation of this green onion for GNOME 3 desktop would be a
   (very simple) Shell extension, to which we (the NetworkManager
   hook) should send a DBus signal (or the opposite). That might be a
   tiny funny project.

If we agree on keeping the green onion then I don't care whether we have
one, two, or n pieces of software. I tend to believe that having one is
simpler than having two (when possible) but I don't know GNOME internals
as much as you do.

If the green onion needs to be a shell extension, then maybe Tor Monitor
should be part of that same shell extension.

This shell extension would appear as an icon on the desktop and have an
option to open a window with the details of the circuits. Like our
OpenPGP Applet does: you click on it, choose Encrypt Clipboard with
Public Keys, and it opens a window with a list of keys.

 Yes, and if I understood correctly Tor Monitor currently needs Tails
 Jessie. So an obvious roadmap would be to have a working replacement of
 Vidalia with Tor Monitor (without regressions) in Tails Jessie. Does
 that sound realistic? Then only we can work on making it better (eg.
 smarter onion status icon, progress bar while starting Tor, etc.).

 And if Tor Monitor is always running in the background, then maybe it
 could also provide information while Tor is starting and be the right
 tool to solve #7437 in the future?

 That's what I had hidden in the back of my head when asking this
 question initially :)
 
 I'm not opposed to exposing a DBus interface in a future version of
 TorMonitor to provide the green onion or other applications more
 information that our hooks could. But I'm not sure it is the right
 place to do it yet.

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-20 Thread Alan
Hi again,

On Thu, 19 Feb 2015 14:23:03 +
sajolida sajol...@pimienta.org wrote:
 intrigeri:
  sajolida wrote (18 Feb 2015 11:32:17 GMT) :
  intrigeri:
  Alan wrote (12 Feb 2015 15:32:15 GMT) :
- Ability to close a circuit manually.
 
[...]
  = seems like we can address this corner case in a good-enough way
  without compromising security nor spending large amounts of energy on
  this topic.
 
 Fine with me. Still, we would need to have arm documented in the first
 place. And since I propose it to go in Advanced topics anyway we can
 explain the workaround there for now and create the upstream ticket that
 you mentioned as well.
 
+1

[About the green onion]

  Now... does Vidalia really do that? In other words, does Vidalia's
  green onion really turn yellow or red or something whenever this
  happens? I don't think so: I *believe* that Vidalia's onion indicator,
  once it has turned green, only reflects the state of Vidalia's
  connection to the Tor control port, not the state of the tor daemon's
  connection to the Tor network. I don't remember seeing it change
  colors unless I e.g. restarted Tor. I'd be happy to be proven wrong,
  though :)
 
 Same for me, I'm pretty sure that Vidalia stays green forever once Tor
 is started.

...until Vidalia loose connection to the Tor daemon.

 And I'm fine with mimicking this behavior for a start if
 that's easier to implement (no regression), but I think this is buggy
 (the onion shouldn't be green if Tor is not in a working state anymore).
 I want to replace Vidalia to get rid of its bugs not to reimplement them :)
 
  but would it be conceivable to have Tor Monitor
  appear as green onion on the desktop as Vidalia does until now?
  
I don't think it's the way to go:

- I'd like Tor Monitor to stay a generic application, with a clear
  focus on being a monitor for Tor and showing whatever icon on the
  desktop doesn't look like the same task for me.
- System Tray Icons were deprecated in Gtk since 3.14. A proper
  implementation of this green onion for GNOME 3 desktop would be a
  (very simple) Shell extension, to which we (the NetworkManager
  hook) should send a DBus signal (or the opposite). That might be a
  tiny funny project.

[...]

 Yes, and if I understood correctly Tor Monitor currently needs Tails
 Jessie. So an obvious roadmap would be to have a working replacement of
 Vidalia with Tor Monitor (without regressions) in Tails Jessie. Does
 that sound realistic? Then only we can work on making it better (eg.
 smarter onion status icon, progress bar while starting Tor, etc.).
 
  And if Tor Monitor is always running in the background, then maybe it
  could also provide information while Tor is starting and be the right
  tool to solve #7437 in the future?
  
  That's what I had hidden in the back of my head when asking this
  question initially :)
  
I'm not opposed to exposing a DBus interface in a future version of
TorMonitor to provide the green onion or other applications more
information that our hooks could. But I'm not sure it is the right
place to do it yet.

  The main problem I see with this approach is: if we go this way, then
  either Tor Monitor stops being a generic tool, but becomes yet another
  Tails-specific thing, which would make me sad.
 
 Let's try to make it generic straight away! I'd love to have it on my
 regular Debian as well.
 
Me too! I'm not really into solving all the issues we have in this
application.

  I thought about it
  a bit harder, and now it's not obvious to me what we would gain by
  merging the two tools we need into a single one:
  
   * Tails could start the Tor bootstrap and time sync progress monitor.
 Upon completion, this piece of software would either just
 terminate, or (if we need a permanent indicator that's tight to the
 actual Tor status) start Tor Monitor --hide-in-taskbar, that would
 display some onion.
  
   * Anyone else would just use Tor Monitor.
  
  And then this topic becomes mostly orthogonal to the current
  discussion, I think :)
 
For the reasons I exposed before, I don't think it's the right
solution. But you can try to convince me...

Cheers
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-19 Thread sajolida
intrigeri:
 sajolida wrote (18 Feb 2015 11:32:17 GMT) :
 intrigeri:
 Alan wrote (12 Feb 2015 15:32:15 GMT) :
   - Ability to close a circuit manually.

 No idea what are the use case for this feature that we would want to
 support. If someone really wants it, better add it to arm IMO.

 Tor Monitor doesn't provide this feature yet. It would be very easy to
 add, even though I'm not sure I find it desirable: currently we only
 *monitor* Tor. Do we also really want to *control* it?

 Rather not IMO, but I guess everybody got that already :)

 I'd love to see Tails run no X application, except Tor Launcher, that
 is able to trivially deanonymize the user via the control port.
 
 Being able to close circuits could be useful to debug malicious exit
 nodes. For example, you get an unexpected HTTPS or SSH warning, write
 down the info about your exit node, and close that circuit to get a
 fresh one and confirm your suspicions.
 
 Good catch!
 
 How important would that be given it doesn't happen that often?
 On the other hand I understand the importance of not doing into
 controlling Tor.
 
 Indeed, I'm pretty sure that closing arbitrary circuits offers
 excellent avenues for de-anonymization attacks. It *might* be possible
 to mitigate this problem by strongly rate-limiting it, though. If it
 works, then this might be the easiest way out, but it would need
 a careful threat modeling and security discussion before I trust it.
 I think that would be the most elegant way to solve this problem.
 Everything that follows in this paragraph is just in case nobody works
 on this potential solution early enough.
 
 Do we think that the majority of users who can do this kind of
 analysis would suffer from having to do it in arm? If not, then the
 next step is to file a wishlist ticket about it in arm upstream.
 If yes, then it gets harder, but maybe there are good enough ways out
 for the users in the grey zone (skilled enough to conduct this
 analysis, not Unixist enough to be at ease in a terminal-based UI):
 
  * For HTTPS, one can already use Torbutton's New Identity feature to
achieve the same result. IIRC the upcoming Torbutton's per-tab
circuits viewer will have a New circuit for this tab feature,
that will make it even better.
 
  * For other kinds of connections (ssh, imaps, pop3s, etc.) then there
are two ways:
- either using arm to trigger a New Identity, which is not *that*
  crazy: close the software that initiated the connection, open
  a root terminal (which may be a blocker in itself), run arm,
  type m, down arrow then enter
- or restarting Tor, e.g. by disconnecting and reconnecting from
  the network using the NM applet
 
 = seems like we can address this corner case in a good-enough way
 without compromising security nor spending large amounts of energy on
 this topic.

Fine with me. Still, we would need to have arm documented in the first
place. And since I propose it to go in Advanced topics anyway we can
explain the workaround there for now and create the upstream ticket that
you mentioned as well.

  - Has there been any thought put already into how Tor Monitor would
integrate into #7437 (Add a progress indicator while establishing
a connection to Tor), or live aside of it? I was kinda hoping that
removing Vidalia would help consolidating the sources of
information we provide to the user about the network bootstrap
process: I bet the variety of such sources participate in confusing
users. So if Tor Monitor is meant to be an independent tool,
perhaps it's better if it does *not* start by default. Anyway, I'm
wandering a bit off-topic here, but you don't want me to wait
6 months before I ask this question, right?
 
 Right, there's definitely a UX side to this. The first thing I can think
 of is that people are going freak out if the green onion disappear as
 its currently the only indicator of the Tor state on the desktop. I'm
 not talking about the Tor is ready notification which is not an
 permanent indicator.
 
 I'm not sure that this green onion is actually an indicator of the
 Tor state, see below.
 
 We developers know that nothing can do wrong and everything that is not
 Tor would be blocked. But in term of usable security, I think it's
 important to have a visual indicator saying hey, everything is
 all-right.
 
 OK. If all we need is to convey the message that everything is
 configured to go through Tor, then we don't even need to talk to the
 control port: we can just display a green onion (once Tor has
 bootstrapped) and leave it there as long as the Tor service is
 running. I'm half-joking, but seriously, given we *know* that
 everything is alright, we can just say that in the way people want to
 hear it, which is apparently that green onion (I'll trust you on that
 one).
 
 And also how shall we let users know when their Internet
 connection is working but they loose their connection to Tor for some
 reason (say 

Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-18 Thread sajolida
Alan:
 I was thinking about an application that an user would only launch from
 the Applications menu/overview. I also thought about a button in the
 Tor is ready notification. But not launching Tor Monitor
 automatically means we *need* write access to the control port to list
 open circuit/streams.

I don't get that last sentence... Could you explain a bit more it maybe?
Are you saying that starting Tor Monitor automatically or not makes a
difference on the type of access (read-only or read-write) that we need
to its control port?

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-18 Thread intrigeri
sajolida wrote (18 Feb 2015 11:36:27 GMT) :
 Alan:
 I was thinking about an application that an user would only launch from
 the Applications menu/overview. I also thought about a button in the
 Tor is ready notification. But not launching Tor Monitor
 automatically means we *need* write access to the control port to list
 open circuit/streams.

 I don't get that last sentence... Could you explain a bit more it maybe?
 Are you saying that starting Tor Monitor automatically or not makes a
 difference on the type of access (read-only or read-write) that we need
 to its control port?

If I spotted the misunderstanding correctly (see the other email I've
just sent), and if I guess correctly, it could be that: when simply
reading from the control port, Tor Monitor gets notifications about
whatever streams and circuits Tor creates etc. But if Tor Monitor is
started after Tor has already opened streams and circuits, then it
needs to send a GETINFO (or whatever) command to get the list of
already existing circuits and streams.

Alan, did I guess it right?

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-18 Thread intrigeri
Alan wrote (14 Feb 2015 23:06:15 GMT) :
 I implemented an automatic reconnection mechanism, and then broke it
 when adding SOCKS support - but I thought about it?

\o/

 Do you now a list of other workarounds?

Not by heart. I suggest you:

 * look at the tickets we have open about Vidalia in Redmine
 * find+grep for vidalia in our source tree, there may be hacks around
   anywhere in there
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-18 Thread intrigeri
Alan wrote (12 Feb 2015 15:31:41 GMT) :
 Please clone the repo again, and from Tails/Jessie:

 sudo apt-get install python-stem python-pysocks
 sudo ./setup.py install
 sudo iptables -I OUTPUT 1 -p tcp --dport 9050 -d 127.0.0.1 -m owner
 \ --uid-owner vidalia -j ACCEPT
 sudo -u vidalia tormonitor

I've tried it, and it looks great, congrats!

A few UI remarks:

* I like it very much :)

* I'm not sure about the subtitle in the title bar, that reads
  Display Tor circuits and streams: maybe drop Display? Anyway,
  I'll let sajolida nitpick on such things :)

* Displaying circuits without any separator but a space between nodes
  is hard to read for me. Vidalia uses comma+space as a separator, and
  it's easier for me to read it this way.

* The Name header for the circuits list feels wrong. How about
  Path instead?

* I suspect the circuit status strings should be capitalized.

* When I disconnect from the network and then reconnect, Tor Monitor
  tells me it's going to try to reconnect to Tor, but clicking on the
  OK button doesn't trigger any visible action and the notification
  stays in place. Buggy thread/parallelism handling?

* When I disconnect from the network and then reconnect, Tor Monitor
  tells me it's going to try to reconnect to Tor, but it still lists
  a few circuits from the previous Tor session. Maybe the list should
  be emptied in such a case?

* Tor Monitor needs an icon to display in the task bar instead of the
  default one :)

Great job.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-18 Thread intrigeri
Hi,

Alan wrote (15 Feb 2015 00:42:34 GMT) :
 intrigeri intrig...@boum.org wrote:
 I'd love to understand why this would be more useful than some
 existing GNOME network monitor that we don't have to maintain, and so
 far I fail to. You find it desirable, so there's probably a good
 reason.

 As an example, when using a poor connection, I like to see if there is
 Tor traffic going on or not. I must admit I never tried to use GNOME
 System Monitor for that and that it may very well work (or not).

On Tails/Jessie, Applications - Utilities - System Monitor -
Ressources seems to address the need you're expressing. We ship it
already. Please try it out before writing code that duplicates this
existing functionality :)

 And now, I'll add another candidate feature:
 
  - Can access the Tor control port via a tight filtering proxy
 
I'm curious what kind of access the new thing needs.

 Tor monitor uses stem, and I didn't search about hidden things stem
 might need. I use methods that directly call:

 - GETINFO circuit-status
 - GETINFO stream-status
 - GETINFO ip-to-country

I guess the only way to know is to actually run Tor Monitor behind our
filtering proxy, have the latter log refused commands, append to the
whitelist until everything works, and then report back what the
whitelist is. Are you interested in doing this?

And forcibly keeping this access read-only tightens things a bit against
X11-based attacks.
 
 We need at least to query Tor for its open circuits and streams if we
 want to be able to start Tor Monitor after Tor. If we can ensure that
 Tor Monitor connects to Tor before Tor has open any circuit or stream,
 then it may be possible to have read only access if no command on the
 control port is needed to be notified of circuit or stream changes.

Everything that you're describing here sounds like read-only access to
me, so I don't understand what you mean. Does query[ing] Tor for its
open circuits and streams need anything else but read-only access?

Just to clarify: I count retrieving info about the Tor state (GETINFO)
as read-only access, even if technically this is wrong. Maybe that's
where the misunderstanding was. The security feature I'm asking for is
that Tor Monitor shouldn't be allowed to *configure* Tor, and it
should only be allowed to *retrieve* the info it really needs via
a GETINFO filter.

 And a few more questions:
 
  - Why does Tor Monitor need to use a Tor SOCKS port? Just curious :)

 To get details on a path. As Tor currently uses microdescriptors which
 contains very few information, I use stem remote descriptor downloader,
 which connects directly to Tor directory. Looking more deeply at what I
 can get directly from Tor, I just found that I can get the IP and other
 information missing in microdescriptors from Tor network status, so I'd
 only miss platform and uptime - which are not visible in Vidalia
 anymore.

I definitely wouldn't miss it if the platform and uptime info
disappeared, and we got tighter security as a result. Let's just do
that and get rid of the SOCKS port access requirement, then?

(The next question will be: what kind of data does it retrieve via
this port, how is it used and parsed, but for that I can probably
just look at the code.)
 
 I use stem.descriptor.remote.DescriptorDownloader.

That's the kind of answer I was hoping to get!

  - Has there been any thought put already into how Tor Monitor would
integrate into #7437 (Add a progress indicator while establishing
a connection to Tor), or live aside of it? I was kinda hoping that
removing Vidalia would help consolidating the sources of
information we provide to the user about the network bootstrap
process: I bet the variety of such sources participate in confusing
users. So if Tor Monitor is meant to be an independent tool,
perhaps it's better if it does *not* start by default. Anyway, I'm
wandering a bit off-topic here, but you don't want me to wait
6 months before I ask this question, right?
 
 I was thinking about an application that an user would only launch from
 the Applications menu/overview. I also thought about a button in the
 Tor is ready notification.

I like it this way.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-18 Thread intrigeri
Hi,

sajolida wrote (18 Feb 2015 11:32:17 GMT) :
 intrigeri:
 Alan wrote (12 Feb 2015 15:32:15 GMT) :
   - Ability to close a circuit manually.

 No idea what are the use case for this feature that we would want to
 support. If someone really wants it, better add it to arm IMO.

 Tor Monitor doesn't provide this feature yet. It would be very easy to
 add, even though I'm not sure I find it desirable: currently we only
 *monitor* Tor. Do we also really want to *control* it?
 
 Rather not IMO, but I guess everybody got that already :)
 
 I'd love to see Tails run no X application, except Tor Launcher, that
 is able to trivially deanonymize the user via the control port.

 Being able to close circuits could be useful to debug malicious exit
 nodes. For example, you get an unexpected HTTPS or SSH warning, write
 down the info about your exit node, and close that circuit to get a
 fresh one and confirm your suspicions.

Good catch!

 How important would that be given it doesn't happen that often?
 On the other hand I understand the importance of not doing into
 controlling Tor.

Indeed, I'm pretty sure that closing arbitrary circuits offers
excellent avenues for de-anonymization attacks. It *might* be possible
to mitigate this problem by strongly rate-limiting it, though. If it
works, then this might be the easiest way out, but it would need
a careful threat modeling and security discussion before I trust it.
I think that would be the most elegant way to solve this problem.
Everything that follows in this paragraph is just in case nobody works
on this potential solution early enough.

Do we think that the majority of users who can do this kind of
analysis would suffer from having to do it in arm? If not, then the
next step is to file a wishlist ticket about it in arm upstream.
If yes, then it gets harder, but maybe there are good enough ways out
for the users in the grey zone (skilled enough to conduct this
analysis, not Unixist enough to be at ease in a terminal-based UI):

 * For HTTPS, one can already use Torbutton's New Identity feature to
   achieve the same result. IIRC the upcoming Torbutton's per-tab
   circuits viewer will have a New circuit for this tab feature,
   that will make it even better.

 * For other kinds of connections (ssh, imaps, pop3s, etc.) then there
   are two ways:
   - either using arm to trigger a New Identity, which is not *that*
 crazy: close the software that initiated the connection, open
 a root terminal (which may be a blocker in itself), run arm,
 type m, down arrow then enter
   - or restarting Tor, e.g. by disconnecting and reconnecting from
 the network using the NM applet

= seems like we can address this corner case in a good-enough way
without compromising security nor spending large amounts of energy on
this topic.

 To go back to the information we should provide about the circuits:

 1. Be able to know the country of your exit node can be useful to
 understand some limitations it might have when trying to access some
 ressources (eg. YouTube in Germany).

Indeed, would be useful.

 2. We should have a look at what Tor is planning to integrate to their
 browser as they are already solving a similar problem. I think.

Full ACK. It'll be in Tor Browser 4.5a4, due in ~1 week, if I got
it clearly.

  - Has there been any thought put already into how Tor Monitor would
integrate into #7437 (Add a progress indicator while establishing
a connection to Tor), or live aside of it? I was kinda hoping that
removing Vidalia would help consolidating the sources of
information we provide to the user about the network bootstrap
process: I bet the variety of such sources participate in confusing
users. So if Tor Monitor is meant to be an independent tool,
perhaps it's better if it does *not* start by default. Anyway, I'm
wandering a bit off-topic here, but you don't want me to wait
6 months before I ask this question, right?

 Right, there's definitely a UX side to this. The first thing I can think
 of is that people are going freak out if the green onion disappear as
 its currently the only indicator of the Tor state on the desktop. I'm
 not talking about the Tor is ready notification which is not an
 permanent indicator.

I'm not sure that this green onion is actually an indicator of the
Tor state, see below.

 We developers know that nothing can do wrong and everything that is not
 Tor would be blocked. But in term of usable security, I think it's
 important to have a visual indicator saying hey, everything is
 all-right.

OK. If all we need is to convey the message that everything is
configured to go through Tor, then we don't even need to talk to the
control port: we can just display a green onion (once Tor has
bootstrapped) and leave it there as long as the Tor service is
running. I'm half-joking, but seriously, given we *know* that
everything is alright, we can just say that in the way people want to
hear it, which is 

Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-14 Thread intrigeri
Hi,

Alan wrote (12 Feb 2015 15:32:15 GMT) :
- Ability to close a circuit manually.
 
 No idea what are the use case for this feature that we would want to
 support. If someone really wants it, better add it to arm IMO.
 
 Tor Monitor doesn't provide this feature yet. It would be very easy to
 add, even though I'm not sure I find it desirable: currently we only
 *monitor* Tor. Do we also really want to *control* it?

Rather not IMO, but I guess everybody got that already :)

I'd love to see Tails run no X application, except Tor Launcher, that
is able to trivially deanonymize the user via the control port.

- Bandwidth Graph.
 
 Advanced feature IMO, already present in arm. If we care much about
 getting this info graphically, then I think some GNOME system monitor
 would be a better tool to satisfy the need (it would be a suitable
 replacement in the context of Tails, since we're routing almost
 everything through Tor).
 
 It would be possible (and I think desirable) [...]

I'd love to understand why this would be more useful than some
existing GNOME network monitor that we don't have to maintain, and so
far I fail to. You find it desirable, so there's probably a good
reason. Let me try harder to understand:

In which use cases is the Tor bandwidth traffic info more useful than
the overall system network traffic? (I can see the heavy I2P
+ Tor user one, but this can't be a good enough reason to write and
maintain this code given we have arm already, I guess.)

Or is it a matter of UX, as in users would find the tool more easily
if it was accessible from the Tor Monitor's interface? I've no idea,
and it might very well be the case. But then perhaps we can start
whatever network traffic monitor we want from Tor Monitor.


And now, I'll add another candidate feature:

 - Can access the Tor control port via a tight filtering proxy

   I'm curious what kind of access the new thing needs. And forcibly
   keeping this access read-only tightens things a bit against
   X11-based attacks.

And a few more questions:

 - Why does Tor Monitor need to use a Tor SOCKS port? Just curious :)
   (The next question will be: what kind of data does it retrieve via
   this port, how is it used and parsed, but for that I can probably
   just look at the code.)

 - Assuming it really does need access to a SOCKS port: how about
   using the SOCKS port meant for Tails-specific traffic, instead of
   the fallback one?

 - Has there been any thought put already into how Tor Monitor would
   integrate into #7437 (Add a progress indicator while establishing
   a connection to Tor), or live aside of it? I was kinda hoping that
   removing Vidalia would help consolidating the sources of
   information we provide to the user about the network bootstrap
   process: I bet the variety of such sources participate in confusing
   users. So if Tor Monitor is meant to be an independent tool,
   perhaps it's better if it does *not* start by default. Anyway, I'm
   wandering a bit off-topic here, but you don't want me to wait
   6 months before I ask this question, right?

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-13 Thread intrigeri
Alan wrote (09 Feb 2015 20:57:52 GMT) :
 Do we miss something else to replace Vidalia ?

It would make sense to look at the Vidalia bugs we've suffering from
for years, to ensure we can drop our workarounds. E.g. the fact
Vidalia doesn't auto-reconnect to Tor when the latter is restarted
(#7614).
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-12 Thread Alan
Hi,

sajolida sajol...@pimienta.org wrote:
 I cloned your repo, installed python-stem, tried to run setup.py and
 tormonitor.py and got errors for both.
 
 How can I test this from Tails?
 
 $ python setup.py
   File setup.py, line 10
 requires=['stem','gi']
^
 SyntaxError: invalid syntax
 
Sorry I messed up the initial commit. Please clone the repo again, and
from Tails/Jessie:

sudo apt-get install python-stem python-pysocks
sudo ./setup.py install
sudo iptables -I OUTPUT 1 -p tcp --dport 9050 -d 127.0.0.1 -m owner
\ --uid-owner vidalia -j ACCEPT
sudo -u vidalia tormonitor

For the rest of the questions see my other email in this thread.

Cheers
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-12 Thread Alan
Hi,

intrigeri intrig...@boum.org wrote:
 sajolida wrote (11 Feb 2015 15:12:02 GMT) :
  $ python tormonitor.py
  [Errno 13] Permission denied
  Traceback (most recent call last):
File tormonitor.py, line 346, in module
  app = TorMonitorApplication()
File tormonitor.py, line 316, in __init__
  message_format=_(Unable to connect to Tor daemon.))
 
 Seems that there's a bug in this code path.
 
I don't think that there is a bug in this code path. You need Gtk =
3.14 (basically Jessie). Please clone the repository again as I messed
up the initial commit.

 And/or maybe you're hitting this bug because you're running the code
 as the `amnesia' user, who cannot talk to the Tor control port. Try as
 the vidalia user?
 
The user running tormonitor must have access to Tor control socket
*and* to Tor SOCKS port. In Tails/Jessie:

sudo iptables -I OUTPUT 1 -p tcp --dport 9050 -d 127.0.0.1 -m owner
\ --uid-owner vidalia -j ACCEPT
sudo -u vidalia tormonitor

  Do we miss something else to replace Vidalia ?
 
[...]

- Info about relays in the circuits.
 
 Would be useful, but not a blocker IMO, since that's an advanced
 feature and is already provided by arm.
 
Tor Monitor provides this info.

- Ability to close a circuit manually.
 
 No idea what are the use case for this feature that we would want to
 support. If someone really wants it, better add it to arm IMO.
 
Tor Monitor doesn't provide this feature yet. It would be very easy to
add, even though I'm not sure I find it desirable: currently we only
*monitor* Tor. Do we also really want to *control* it?

- Ability to view logs from Tor without an
  administration password.
 
 Not sure what action one can easily take based on the info found in
 these logs, without an administration password. I say we can forget
 that one too. If someone really wants it, better add it to arm IMO.
 
That would be quite easy to add it there is a consensus that it is
useful.

- New identity (the one we have in Tor Browser does something
  different).
 
 We had plans (#5716) to hide this Vidalia feature, so I don't think we
 should add it to this new GUI. This feature is available in arm
 already anyway, for advanced users who know what they're doing, and
 for people who insist on shooting themselves in the foot.
 
Easy to add, even though I'm not convinced for the same reason as
Close circuit

- Bandwidth Graph.
 
 Advanced feature IMO, already present in arm. If we care much about
 getting this info graphically, then I think some GNOME system monitor
 would be a better tool to satisfy the need (it would be a suitable
 replacement in the context of Tails, since we're routing almost
 everything through Tor).
 
It would be possible (and I think desirable) to add a bandwidth graph to
Tor Monitor and I already thought about it. But I don't know how to
implement that in Gtk yet, and I'd better see this as a fun item than
as a required feature. Patches are welcome though, and if there is a
consensus that it is required I'll do it.

  Which one of those are you covering already or did you consider?
 
 IMO we should focus on the basic features we would strongly miss if we
 drop Vidalia, and leave anything more advanced to arm. This way, we
 keep our maintenance workload to the bare minimum, and provide
 a simpler GUI.
 
I agree on that. Currently Tor Monitor provides circuit and associated
streams, and infos on relays in a circuit. We could add the logs easily
and the bandwidth graph less easily to provide a nice monitor. I'm not
sure that the other features are desirable.

Cheers
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-11 Thread intrigeri
Hi,

sajolida wrote (11 Feb 2015 15:12:02 GMT) :
 $ python tormonitor.py
 [Errno 13] Permission denied
 Traceback (most recent call last):
   File tormonitor.py, line 346, in module
 app = TorMonitorApplication()
   File tormonitor.py, line 316, in __init__
 message_format=_(Unable to connect to Tor daemon.))

Seems that there's a bug in this code path.

And/or maybe you're hitting this bug because you're running the code
as the `amnesia' user, who cannot talk to the Tor control port. Try as
the vidalia user?

 Do we miss something else to replace Vidalia ?

 If I quickly go through what's left from the Vidalia interface and I
 could discuss the relevance of the following features:

Thanks for asking this question!

   - Info about relays in the circuits.

Would be useful, but not a blocker IMO, since that's an advanced
feature and is already provided by arm.

   - Ability to close a circuit manually.

No idea what are the use case for this feature that we would want to
support. If someone really wants it, better add it to arm IMO.

   - Ability to view logs from Tor without an
 administration password.

Not sure what action one can easily take based on the info found in
these logs, without an administration password. I say we can forget
that one too. If someone really wants it, better add it to arm IMO.

   - New identity (the one we have in Tor Browser does something
 different).

We had plans (#5716) to hide this Vidalia feature, so I don't think we
should add it to this new GUI. This feature is available in arm
already anyway, for advanced users who know what they're doing, and
for people who insist on shooting themselves in the foot.

   - Bandwidth Graph.

Advanced feature IMO, already present in arm. If we care much about
getting this info graphically, then I think some GNOME system monitor
would be a better tool to satisfy the need (it would be a suitable
replacement in the context of Tails, since we're routing almost
everything through Tor).

 Which one of those are you covering already or did you consider?

IMO we should focus on the basic features we would strongly miss if we
drop Vidalia, and leave anything more advanced to arm. This way, we
keep our maintenance workload to the bare minimum, and provide
a simpler GUI.

Cheers,
-- 
intrigeri
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


Re: [Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-11 Thread sajolida
Alan:
 Vidalia is unmaintained and we were looking for solutions to get rid of
 it[1]. It turned out that the main missing piece was a replacement to
 its Network Map[2].

Great, thanks a lot for moving this forward!

 I'm working on an GTK application that shows circuits and the streams
 that are attached to then, basically as the bottom left part of Vidalia's
 network map[3]. It is now usable so I propose that we get rid of Vidalia for
 tails/jessie.

I cloned your repo, installed python-stem, tried to run setup.py and
tormonitor.py and got errors for both.

How can I test this from Tails?

$ python setup.py
  File setup.py, line 10
requires=['stem','gi']
   ^
SyntaxError: invalid syntax

$ python tormonitor.py
[Errno 13] Permission denied
Traceback (most recent call last):
  File tormonitor.py, line 346, in module
app = TorMonitorApplication()
  File tormonitor.py, line 316, in __init__
message_format=_(Unable to connect to Tor daemon.))
  File /usr/lib/python2.7/dist-packages/gi/overrides/Gtk.py, line 485,
in __init__
**kwds)
  File /usr/lib/python2.7/dist-packages/gi/overrides/Gtk.py, line 418,
in __init__
if flags  Gtk.DialogFlags.MODAL:
TypeError: unsupported operand type(s) for : 'NoneType' and
'GtkDialogFlags'

 The network status would be provided by this new Tor Monitor.
 
 Do we miss something else to replace Vidalia ?

If I quickly go through what's left from the Vidalia interface and I
could discuss the relevance of the following features:

  - Info about relays in the circuits.
  - Ability to close a circuit manually.
  - Ability to view logs from Tor without an administration password.
  - New identity (the one we have in Tor Browser does something
different).
  - Bandwidth Graph.

Which one of those are you covering already or did you consider?

___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.


[Tails-dev] What do we miss to replace Vidalia [was: Getting rid of Vidalia]

2015-02-09 Thread Alan
Hi,

Vidalia is unmaintained and we were looking for solutions to get rid of
it[1]. It turned out that the main missing piece was a replacement to
its Network Map[2].

I'm working on an GTK application that shows circuits and the streams
that are attached to then, basically as the bottom left part of Vidalia's
network map[3]. It is now usable so I propose that we get rid of Vidalia for
tails/jessie.

The network status would be provided by this new Tor Monitor.

Do we miss something else to replace Vidalia ?

Cheers

[1]: https://labs.riseup.net/code/issues/6841
[2]: https://labs.riseup.net/code/issues/6842
[3]: http://git.tails.boum.org/alan/tor-monitor/
___
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.