Re: [tor-bugs] #31088 [Core Tor/Tor]: Check IPv4 and IPv6 private addresses in descriptors, first hops, and extends

2019-08-18 Thread Tor Bug Tracker & Wiki
#31088: Check IPv4 and IPv6 private addresses in descriptors, first hops, and
extends
-+-
 Reporter:  teor |  Owner:  neel
 Type:  defect   | Status:
 |  needs_review
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.3.21-rc
 Severity:  Normal   | Resolution:
 Keywords:  ipv6, tor-relay, tor-client, tor-|  Actual Points:
  dirauth|
Parent ID:  #24403   | Points:
 Reviewer:  nickm, teor  |Sponsor:
-+-
Changes (by neel):

 * status:  needs_revision => needs_review


Comment:

 Made the changes requested.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31088 [Core Tor/Tor]: Check IPv4 and IPv6 private addresses in descriptors, first hops, and extends

2019-08-18 Thread Tor Bug Tracker & Wiki
#31088: Check IPv4 and IPv6 private addresses in descriptors, first hops, and
extends
-+-
 Reporter:  teor |  Owner:  neel
 Type:  defect   | Status:
 |  needs_revision
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor:
 |  0.2.3.21-rc
 Severity:  Normal   | Resolution:
 Keywords:  ipv6, tor-relay, tor-client, tor-|  Actual Points:
  dirauth|
Parent ID:  #24403   | Points:
 Reviewer:  nickm, teor  |Sponsor:
-+-
Changes (by teor):

 * status:  needs_review => needs_revision
 * version:   => Tor: 0.2.3.21-rc
 * milestone:  Tor: unspecified => Tor: 0.4.2.x-final


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31443 [Core Tor/Tor]: Rust's default allocator is the system allocator since rust 1.32 (was: Rusts default allocator is the system allocator since rust 1.32)

2019-08-18 Thread Tor Bug Tracker & Wiki
#31443: Rust's default allocator is the system allocator since rust 1.32
--+--
 Reporter:  Sebastian |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  rust  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31443 [Core Tor/Tor]: Rusts default allocator is the system allocator since rust 1.32

2019-08-18 Thread Tor Bug Tracker & Wiki
#31443: Rusts default allocator is the system allocator since rust 1.32
--+--
 Reporter:  Sebastian |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |Version:
 Severity:  Normal|   Keywords:  rust
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 We could remove some code and comments about allocator usage, which would
 hopefully make it seem less daunting to contribute some rust code :)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31390 [Core Tor/Tor]: --enable-rust with pre-downloaded Rust dependencies fails: no .cargo-checksum.json files

2019-08-18 Thread Tor Bug Tracker & Wiki
#31390: --enable-rust with pre-downloaded Rust dependencies fails: no .cargo-
checksum.json files
--+
 Reporter:  yurivict271   |  Owner:  (none)
 Type:  defect| Status:  needs_information
 Priority:  Medium|  Milestone:  Tor: 0.4.2.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.4.0.5
 Severity:  Normal| Resolution:
 Keywords:  rust, 041-should  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by teor):

 * cc: chelseakomlo (added)


Comment:

 Replying to [comment:7 teor]:
 > Based on
 https://github.com/torproject/tor/blob/master/doc/HACKING/GettingStartedRust.md
 , it looks like you might be missing a "crates" directory in
 TOR_RUST_DEPENDENCIES:
 > > TOR_RUST_DEPENDENCIES=`pwd`/src/ext/rust/crates ./configure --enable-
 rust
 >
 > If that doesn't work, please check that online mode works:
 > > ./configure --enable-rust --enable-cargo-online-mode

 I'm still struggling to work out what's going on here.

 It could be an issue with your environment.

 Or maybe cargo has a new requirement for `.cargo-checksum.json` and we
 need to update the tor rust dependencies repository with the latest
 version of cargo?

 I've cc'd komlo for advice.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31442 [Core Tor/Tor]: Raise rustc minimum version

2019-08-18 Thread Tor Bug Tracker & Wiki
#31442: Raise rustc minimum version
-+
 Reporter:  Sebastian|  Owner:  Sebastian
 Type:  defect   | Status:  needs_review
 Priority:  Medium   |  Milestone:  Tor: 0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor: unspecified
 Severity:  Normal   | Resolution:
 Keywords:  042-should, no-backport  |  Actual Points:
Parent ID:  #31238   | Points:
 Reviewer:   |Sponsor:  Sponsor31-can
-+
Changes (by teor):

 * status:  assigned => needs_review


Comment:

 We don't support Rust on older tor versions, so I'm not too worried about
 a backport.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31442 [Core Tor/Tor]: Raise rustc minimum version

2019-08-18 Thread Tor Bug Tracker & Wiki
#31442: Raise rustc minimum version
-+
 Reporter:  Sebastian|  Owner:  Sebastian
 Type:  defect   | Status:  assigned
 Priority:  Medium   |  Milestone:  Tor: 0.4.2.x-final
Component:  Core Tor/Tor |Version:  Tor: unspecified
 Severity:  Normal   | Resolution:
 Keywords:  042-should, no-backport  |  Actual Points:
Parent ID:  #31238   | Points:
 Reviewer:   |Sponsor:  Sponsor31-can
-+
Changes (by teor):

 * status:  needs_review => assigned
 * parent:   => #31238
 * cc: gaba (added)
 * keywords:   => 042-should, no-backport
 * sponsor:   => Sponsor31-can
 * milestone:   => Tor: 0.4.2.x-final
 * owner:  (none) => Sebastian


Comment:

 We need to fix this issue as part of #31238

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31442 [Core Tor/Tor]: Raise rustc minimum version

2019-08-18 Thread Tor Bug Tracker & Wiki
#31442: Raise rustc minimum version
--+--
 Reporter:  Sebastian |  Owner:  (none)
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by Sebastian):

 * status:  new => needs_review


Comment:

 Bugfix in branch bug31442 in my tor repo

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31442 [Core Tor/Tor]: Raise rustc minimum version

2019-08-18 Thread Tor Bug Tracker & Wiki
#31442: Raise rustc minimum version
--+--
 Reporter:  Sebastian |  Owner:  (none)
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 We're using features from at least Rust 1.28, so let's not pretend we can
 work with something earlier.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #30972 [Core Tor/Fallback Scripts]: 0-1. Run an opt-in process for relay operators to become fallbacks in 2019-2020

2019-08-18 Thread Tor Bug Tracker & Wiki
#30972: 0-1. Run an opt-in process for relay operators to become fallbacks in
2019-2020
---+
 Reporter:  teor   |  Owner:  (none)
 Type:  task   | Status:  new
 Priority:  Medium |  Milestone:
Component:  Core Tor/Fallback Scripts  |Version:
 Severity:  Normal | Resolution:
 Keywords:  fallback   |  Actual Points:
Parent ID:  #30971 | Points:  1
 Reviewer: |Sponsor:
---+

Comment (by teor):

 An operator asked us to remove 8456DFA94161CDD99E480C2A2992C366C6564410 -
 ip 62.210.254.132 from the list:
 https://lists.torproject.org/pipermail/tor-relays/2019-August/017631.html

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31441 [Applications/Tor Browser]: protonmail

2019-08-18 Thread Tor Bug Tracker & Wiki
#31441: protonmail
--+--
 Reporter:  readyoh   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by readyoh):

 I may be all set. I used that 'change circuit' feature and the one above
 it in the tool bar and the service seems to be working faster. If you have
 any additional suggestions let me know and thank you.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31352 [Core Tor/Tor]: Jenkins failure on windows: ENETUNREACH undeclared.

2019-08-18 Thread Tor Bug Tracker & Wiki
#31352: Jenkins failure on windows: ENETUNREACH undeclared.
--+
 Reporter:  nickm |  Owner:  nickm
 Type:  defect| Status:
  |  merge_ready
 Priority:  Medium|  Milestone:  Tor:
  |  0.4.2.x-final
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  dgoulet-merge regression windows  |  Actual Points:  0.1
Parent ID:| Points:
 Reviewer:  asn   |Sponsor:
--+
Changes (by nickm):

 * keywords:  regression windows => dgoulet-merge regression windows


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31175 [Core Tor/Tor]: Teach practracker to apply separate rules for C headers

2019-08-18 Thread Tor Bug Tracker & Wiki
#31175: Teach practracker to apply separate rules for C headers
-+-
 Reporter:  nickm|  Owner:  nickm
 Type:  enhancement  | Status:
 |  merge_ready
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  network-team-roadmap-august  |  Actual Points:  .1
  dgoulet-merge  |
Parent ID:  #29746   | Points:  1
 Reviewer:  asn  |Sponsor:
 |  Sponsor31-can
-+-
Changes (by nickm):

 * keywords:  network-team-roadmap-august => network-team-roadmap-august
 dgoulet-merge


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #26294 [Core Tor/Tor]: attacker can force intro point rotation by ddos

2019-08-18 Thread Tor Bug Tracker & Wiki
#26294: attacker can force intro point rotation by ddos
-+-
 Reporter:  arma |  Owner:  asn
 Type:  defect   | Status:
 |  merge_ready
 Priority:  Medium   |  Milestone:  Tor:
 |  0.4.2.x-final
Component:  Core Tor/Tor |Version:
 Severity:  Normal   | Resolution:
 Keywords:  tor-hs, tor-dos, network-team-   |  Actual Points:  6
  roadmap-august |
Parent ID:  #2   | Points:  7
 Reviewer:  dgoulet  |Sponsor:
 |  Sponsor27-must
-+-

Comment (by nickm):

 IIRC, the problem would be if an attacker found an introduce cell that
 they were very interested in, and replayed it a lot in order to see which
 rendezvous point got a bunch of retries.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31441 [Applications/Tor Browser]: protonmail

2019-08-18 Thread Tor Bug Tracker & Wiki
#31441: protonmail
--+--
 Reporter:  readyoh   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by nickm):

 * owner:  (none) => tbb-team
 * component:  - Select a component => Applications/Tor Browser


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #31030 [Core Tor/Tor]: Coverity: Several warnings from test code

2019-08-18 Thread Tor Bug Tracker & Wiki
#31030: Coverity: Several warnings from test code
+
 Reporter:  nickm   |  Owner:  nickm
 Type:  defect  | Status:  merge_ready
 Priority:  Medium  |  Milestone:  Tor: 0.4.2.x-final
Component:  Core Tor/Tor|Version:
 Severity:  Normal  | Resolution:
 Keywords:  coverity asn-merge  |  Actual Points:  .1
Parent ID:  | Points:
 Reviewer:  dgoulet |Sponsor:
+

Comment (by nickm):

 No worries; I would rather have false positives about bugs than false
 negatives. :)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

[tor-bugs] #31441 [- Select a component]: protonmail

2019-08-18 Thread Tor Bug Tracker & Wiki
#31441: protonmail
-+--
 Reporter:  readyoh  |  Owner:  (none)
 Type:  defect   | Status:  new
 Priority:  Medium   |  Component:  - Select a component
  Version:   |   Severity:  Normal
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--
 i can enter my login user id and password but it never loads and opens my
 email

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #15949 [Internal Services/Service - git]: Can we migrate internal SVN to a document store, wiki, or set of git repositories?

2019-08-18 Thread Tor Bug Tracker & Wiki
#15949: Can we migrate internal SVN to a document store, wiki, or set of git
repositories?
-+-
 Reporter:  nickm|  Owner:  tor-gitadm
 Type:  defect   | Status:
 |  needs_information
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Service - git  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by ln5):

 A separate NextCloud instance maybe. With only those users registered that
 need access. And configured to not allow sharing of documents outside of
 the instance, including webdav links. I have not verified that this is
 possible without making changes to NextCloud.

 This puts a lot of trust in the NextCloud code being sane, at least
 authentication and document permission handling. And probably more that I
 don't understand. There's a web server there too.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs