Re: [tor-talk] Tor check not working or recognize TBB?

2018-07-02 Thread Joe

Thanks Tortilla.
I don't see how your reply answers the question - maybe it wasn't 
intended to.
It appears if the general.useragent.override string isn't the same as 
what ever / where ever check.torproject.org stores as a valid 
useragent.override value, it reports that you're not using TBB at all, 
which is not true.


Torproject of course wants everyone to report the same 
general.useragent.override sting - that's fine.
To report that it doesn't look like TorBrowser (at all) is misleading to 
users and not helpful.
Since they must be able to see the useragent string, they probably 
should report something about the useragent being wrong or not set to 
default settings.


Downloading & extracting the same version to the same path isn't going 
to fix the problem of the useragent string being accidentally changed.  
AFAIK, it won't over write your prefs, unless you extract it to a 
different path.
There's nothing helpful in the message, "It does not appear to be Tor 
Browser."


If it's smart enough to throw an error for a non-default useragent 
string, it should be able to tell you why it thinks you're not using ANY 
TBB version and give a clue about what to do, instead of the current 
message that doesn't help at all.


On 07/02/2018 06:27 PM, Tortilla wrote:

You only replied to me, so I'm re-involving the list.

re: point (B) check.torproject.org doesn't look at your browser's
configuration settings - it can't inspect that kind of thing.  It's just
looking at the user agent string your browser sends *as a result of* how
that setting is set.  How it got that way is another question.


On Mon, July 2, 2018 11:13 pm, Joe wrote:

I just did check.torproject.org and as far as I can tell, the site is
working properly.
I'm using the same version as you are but Tor Browser for windows.

I tried in Linux after an auto-update:
8.0a9 (based on Mozilla Firefox 60.1.0esr) (64-bit)

I got the same warning on check.torproject.org that I'm not using Tor
Browser.  I would guess it might be an altered signature (user agent or
accept languages or other?)



Then there must be a specific setting(s) or pref or user agent or
something that check.torproject.org looks for, that isn't in my install.
*Does anyone know* exactly what check.torproject.org looks for to
determine if you're using TorBrowser?

Knowing that would shorten the search for why it's failing (never
until 7.5.6 update).
Every different assigned circuit - exit relay, check.torproject
verifies I'm using Tor network, but it doesn't appear to "be Tor
Browser."  All of the same exit IPa's entered into
https://exonerator.torproject.org show I am using a Tor address, but
that site doesn't comment whether or not you're using TBB.

In Help/About, it shows TorBrowser 7.5.6, (based on Mozilla Firefox
52.9.0)  (64 bit).
But the general.useragent.override shows: "Mozilla/5.0 (Windows NT
6.1; rv:52.0) Gecko/20100101 Firefox/52.8.1"
Does that match with everyone's useragent string for TBB 7.5.6?  I
didn't / don't touch that pref, but it shows "user set."  As I said, the
check site only started failing after last update.
I don't think I ever changed that in TBB, so there's no reason it should
show "user set." Seems like it should've changed to 52.9 after last
update, but maybe won't if it's marked as user set.

However, the ua.override doesn't mention Tor Browser, so I don't know
why that would be used as a check.
Everywhere else inAbout:config  that mentions browser name  or version,
it shows TorBrowser and 7.5.6.

APPARENT FIX: Resetting the general.useragent.override pref to default,
which changed the value to: "Mozilla/5.0 (Windows NT 6.1; rv:52.0)
Gecko/20100101 Firefox/52.0"
seems to have fixed the false message on check.torproject.org: "However,
it does not appear to be Tor Browser".  I'm fairly sure I never altered
the useragent string, as that would *extinguish* me from the bulk of TBB
users.

There must be a better way than current to detect if the latest TBB is
in use.  Now, it gives false positives, as several people testified
under risk of perjury, they were using TBB but saw the mentioned false
message.

So what did we learn from this, boys and girls? (pick the best answer,
even if it seems undefiably wrong):
A) Since Tor is an acronym for The Onion Router, and most acronyms are
capitalized, it really should be written "TOR Browser."

B) check.torproject.org looks at the general.useragent.override pref
value and likely compares it to another value, somewhere, to decide if
you're using TBB - at all, not just if the latest version is being used.

C)  D. Trump is consulting with E. Snowden, Lt. Gen P. Nakasone and Kim
Jong-un to make TOR Browser the default browser in all public schools
and libraries in the U.S. and respective countries. (unconfirmed:
someone may or may not be a terrierist; we just don't know if they like
medium sized dogs).






--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to

Re: [tor-talk] Tor check not working or recognize TBB?

2018-07-02 Thread Tortilla
You only replied to me, so I'm re-involving the list.

re: point (B) check.torproject.org doesn't look at your browser's
configuration settings - it can't inspect that kind of thing.  It's just
looking at the user agent string your browser sends *as a result of* how
that setting is set.  How it got that way is another question.


On Mon, July 2, 2018 11:13 pm, Joe wrote:
>
 I just did check.torproject.org and as far as I can tell, the site is
 working properly.
 I'm using the same version as you are but Tor Browser for windows.
>>> I tried in Linux after an auto-update:
>>> 8.0a9 (based on Mozilla Firefox 60.1.0esr) (64-bit)
>>>
>>> I got the same warning on check.torproject.org that I'm not using Tor
>>> Browser.  I would guess it might be an altered signature (user agent or
>>> accept languages or other?)
>>>
>>>
>> Then there must be a specific setting(s) or pref or user agent or
>> something that check.torproject.org looks for, that isn't in my install.
>> *Does anyone know* exactly what check.torproject.org looks for to
>> determine if you're using TorBrowser?
>>
>> Knowing that would shorten the search for why it's failing (never
>> until 7.5.6 update).
>> Every different assigned circuit - exit relay, check.torproject
>> verifies I'm using Tor network, but it doesn't appear to "be Tor
>> Browser."  All of the same exit IPa's entered into
>> https://exonerator.torproject.org show I am using a Tor address, but
>> that site doesn't comment whether or not you're using TBB.
>>
>> In Help/About, it shows TorBrowser 7.5.6, (based on Mozilla Firefox
>> 52.9.0)  (64 bit).
>> But the general.useragent.override shows: "Mozilla/5.0 (Windows NT
>> 6.1; rv:52.0) Gecko/20100101 Firefox/52.8.1"
>> Does that match with everyone's useragent string for TBB 7.5.6?  I
>> didn't / don't touch that pref, but it shows "user set."  As I said, the
>> check site only started failing after last update.
>> I don't think I ever changed that in TBB, so there's no reason it should
>> show "user set." Seems like it should've changed to 52.9 after last
>> update, but maybe won't if it's marked as user set.
>>
>> However, the ua.override doesn't mention Tor Browser, so I don't know
>> why that would be used as a check.
>> Everywhere else inAbout:config  that mentions browser name  or version,
>> it shows TorBrowser and 7.5.6.
> APPARENT FIX: Resetting the general.useragent.override pref to default,
> which changed the value to: "Mozilla/5.0 (Windows NT 6.1; rv:52.0)
> Gecko/20100101 Firefox/52.0"
> seems to have fixed the false message on check.torproject.org: "However,
> it does not appear to be Tor Browser".  I'm fairly sure I never altered
> the useragent string, as that would *extinguish* me from the bulk of TBB
> users.
>
> There must be a better way than current to detect if the latest TBB is
> in use.  Now, it gives false positives, as several people testified
> under risk of perjury, they were using TBB but saw the mentioned false
> message.
>
> So what did we learn from this, boys and girls? (pick the best answer,
> even if it seems undefiably wrong):
> A) Since Tor is an acronym for The Onion Router, and most acronyms are
> capitalized, it really should be written "TOR Browser."
>
> B) check.torproject.org looks at the general.useragent.override pref
> value and likely compares it to another value, somewhere, to decide if
> you're using TBB - at all, not just if the latest version is being used.
>
> C)  D. Trump is consulting with E. Snowden, Lt. Gen P. Nakasone and Kim
> Jong-un to make TOR Browser the default browser in all public schools
> and libraries in the U.S. and respective countries. (unconfirmed:
> someone may or may not be a terrierist; we just don't know if they like
> medium sized dogs).
>


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor check not working or recognize TBB?

2018-07-02 Thread john doe

On 7/2/2018 7:47 AM, john doe wrote:

On 7/1/2018 11:22 PM, Joe wrote:

Yesterday, updated TBB (automatically) to 7.5.6 Linux x64.
Today, the default Tor check site (English language), 
https://check.torproject.org gave message:

"Congratulations. This browser is configured to use Tor.

Your IP address appears to be: *5.79.xxx.xxx*

However, it does not appear to be Tor Browser.
Click here to go to the download page"

 From the message, I assume the Tor devs want users to download, 
verify & reinstall TBB because one check failed?


Question: what is the check process looking for (and where) to verify 
this is TBB?  Just a list of exit relays?

I got a new identity & tried again - same message.

According to several sources, it's quite possible the 
check.torproject.org site is down or malfunctioning.


I just did check.torproject.org and as far as I can tell, the site is 
working properly.

I'm using the same version as you are but Tor Browser for windows.



It is also properly working on linux.

--
John Doe
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] New Report: The State of Internet Censorship in Egypt

2018-07-02 Thread Maria Xynou
Hello,

Today OONI and Egypt's AFTE published a joint research report on the
state of internet censorship in Egypt.

* Full report in English:
https://ooni.io/documents/Egypt-Internet-Censorship-AFTE-OONI-2018-07.pdf

* Full report in Arabic:
https://ooni.io/documents/Egypt-Internet-Censorship-AFTE-OONI-2018-07.AR.pdf

* Summary of the report in English:
https://ooni.io/post/egypt-internet-censorship/ &
https://blog.torproject.org/egypt-internet-censorship

* Summary of the report in Arabic:
https://ooni.io/documents/summary-egypt-internet-censorship-arabic.pdf

You may remember that AFTE previously reported on hundreds of websites
being blocked in Egypt.

OONI and AFTE have now joined forces. We conducted a comprehensive study
based on the analysis of OONI Probe measurements collected from multiple
local vantage points over the last year and a half.

More than 1,000 URLs presented signs of network interference, 178 of
which seem to most likely have been consistently blocked throughout the
testing period. The majority of these URLs include media websites, human
rights sites, circumvention tools and sites expressing political criticism.

More than 100 URLs that belong to media organizations were blocked, even
though Egyptian authorities have only officially ordered the blocking of
21 news websites. AFTE interviewed journalists working with Egyptian
media organizations whose websites got blocked to examine the impact of
censorship. Many Egyptian journalists reported that the censorship has
had a severe impact on their work and that some media organizations have
been forced to suspend their operations entirely as a result of
persisting internet censorship.

Egyptian ISPs primarily block sites through the use of Deep Packet
Inspection (DPI) technology that resets connections. In some cases,
instead of RST injection, ISPs drop packets, suggesting a variance in
filtering rules. In other cases, ISPs interfere with the SSL encrypted
traffic between Cloudflare's Point-of-Presence in Cairo and the backend
servers of sites (pshiphon.ca, purevpn.com and ultrasawt.com) hosted
outside of Egypt.

Egyptian ISPs also appear to apply "defense in depth" tactics for
network filtering by adding extra layers of censorship, making
circumvention harder. This is suggested by the blocking of Egypt's
Freedom and Justice Party's (FJP) site, which was blocked by two
different middleboxes, as well as by the blocking of numerous
circumvention tools.

Apart from pervasive levels of internet censorship, Egyptian ISPs were
found to hijack unencrypted HTTP connections and inject redirects to ads
and cryptocurrency mining scripts. We first detected this back in 2016,
when we reported that state-owned Telecom Egypt was hijacking
unencrypted connections to porn sites and redirecting them to ads. The
Citizen Lab significantly expanded upon this research in their latest
Sandvine report. Now, following the analysis of thousands of
measurements collected from the last year and a half, we have enough
evidence to believe that (many) Egyptian ISPs are carrying out an ad
campaign. The affected sites are diverse, including the sites of the
Palestinian Prisoner Society, the Women's Initiative for Gender Justice,
as well as a number of LGBTQI and Israeli sites. Even the sites of the
UN were affected by this ad campaign!

We will continue to monitor internet censorship in Egypt and around the
world. We therefore welcome any feedback you may have.

Thanks for reading!

All the best,

Maria.

-- 
Maria Xynou
Research and Partnerships Coordinator
Open Observatory of Network Interference (OONI)
https://ooni.torproject.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E




signature.asc
Description: OpenPGP digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor check not working or recognize TBB?

2018-07-02 Thread Nicolas Vigier
On Mon, 02 Jul 2018, Tortilla wrote:

> 
> 
> On Mon, July 2, 2018 5:47 am, john doe wrote:
> > On 7/1/2018 11:22 PM, Joe wrote:
> >> Yesterday, updated TBB (automatically) to 7.5.6 Linux x64.
> >> Today, the default Tor check site (English language),
> >> https://check.torproject.org gave message:
> >>> "Congratulations. This browser is configured to use Tor.
> >>>
> >>> Your IP address appears to be: *5.79.xxx.xxx*
> >>>
> >>> However, it does not appear to be Tor Browser.
> >>> Click here to go to the download page"
> >>>
> >>  From the message, I assume the Tor devs want users to download, verify
> >> & reinstall TBB because one check failed?
> >>
> >> Question: what is the check process looking for (and where) to verify
> >> this is TBB?  Just a list of exit relays?
> >> I got a new identity & tried again - same message.
> >>
> >> According to several sources, it's quite possible the
> >> check.torproject.org site is down or malfunctioning.
> >
> > I just did check.torproject.org and as far as I can tell, the site is
> > working properly.
> > I'm using the same version as you are but Tor Browser for windows.
> 
> I tried in Linux after an auto-update:
> 8.0a9 (based on Mozilla Firefox 60.1.0esr) (64-bit)
> 
> I got the same warning on check.torproject.org that I'm not using Tor
> Browser.  I would guess it might be an altered signature (user agent or
> accept languages or other?)

check.torproject.org does not recognize version 8.0a9 yet:
https://trac.torproject.org/projects/tor/ticket/26566

However, there should not be any issue to recognize version 7.5.6.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk