Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 Progress!

 I don't need TBB. I can run my Tor with an open control port, and then
 connect a Vidalia to it and it dies. Consistently. Now I can run my own
 Tor.

 But if I break on pt_prepare_proxy_list_for_config_read(), it won't die.
 Fun.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by karsten):

 I just updated my heartbeat_uniqueips branch with a minor clarification of
 the log message.  Still needs review.  Thanks!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5098 [Obfsproxy]: obfsproxy src/main.h has prototype for tor_main

2012-02-12 Thread Tor Bug Tracker Wiki
#5098: obfsproxy src/main.h has prototype for tor_main
---+
 Reporter:  rransom|  Owner:  asn
 Type:  defect | Status:  new
 Priority:  minor  |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+
 This prototype does not belong in obfsproxy's src/main.h:
 {{{
 int tor_main(int argc, char *argv[]);
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5098
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5099 [Tor Client]: When ServerTransportPlugin specifies a non-existent file, there's only a debug log

2012-02-12 Thread Tor Bug Tracker Wiki
#5099: When ServerTransportPlugin specifies a non-existent file, there's only a
debug log
+---
 Reporter:  Sebastian   |  Owner:
 Type:  defect  | Status:  new   
 Priority:  normal  |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Client  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
 Instead we should warn the user about it. This is a very easy to make
 mistake, and the error messages that follow don't make sense.

 The debug message you'd have to parse is:

 [Debug] handle_proxy_line(): Got a line from managed proxy: ERR: Failed to
 spawn background process - code  9/2

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5099
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5097 [Tor Bridge]: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”

2012-02-12 Thread Tor Bug Tracker Wiki
#5097: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”
+---
 Reporter:  rransom |  Owner:
 Type:  defect  | Status:  new   
 Priority:  blocker |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by Sebastian):

 branch bug5097 in my obfsproxy repository

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5097#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5097 [Tor Bridge]: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”

2012-02-12 Thread Tor Bug Tracker Wiki
#5097: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”
+---
 Reporter:  rransom |  Owner:
 Type:  defect  | Status:  needs_review  
 Priority:  blocker |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
Changes (by Sebastian):

  * status:  new = needs_review


Comment:

 branch bug5097 in rransom's tor repository

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5097#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 (gdb) print (char *)*(*(managed_proxy_t
 *)*managed_proxy_list-list)-transports-list
 $4 = 0x234c010 obfs2

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:6
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 Vidalia is doing two setconfs in quick succession.

 The first one causes pt_kickstart_proxy() to find that mp-got_hup and
 mp-marked_for_removal are true, so it increments unconfigured_proxies_n
 to 1. The second one finds unconfigured_proxies_n to still be 1, yet the
 mp in the list has conf_state PT_PROTO_COMPLETED so it doesn't call
 managed_proxy_destroy() on it, and then triggers the assert since it
 finished going through the list yet unconfigured_proxies_n is still 1.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:7
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 Ok, I don't even need vidalia to trigger the assert.

 Run your Tor, connect to the control port, authenticate, then paste
 setconf socksport=9050 twice in quick succession.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:8
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 Or just hup it twice in quick succession.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:9
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5100 [Obfsproxy]: Add notice log level to obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5100: Add notice log level to obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn
 Type:  enhancement  | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Obfsproxy|Version: 
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
 While working on heartbeat log messages (#5083) I was wondering which log
 level I should use.  info doesn't make much sense if we're logging
 sensitive information to info.  warn doesn't make sense, because a
 heartbeat message shouldn't make operators think something's wrong.
 Having a notice log level and making it the new default might be useful.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5100
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5100 [Obfsproxy]: Add notice log level to obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5100: Add notice log level to obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--
Changes (by karsten):

  * status:  new = needs_review


Comment:

 Please review branch noticelogs in my public repository.  (When merging
 this branch and #5083 shortly after, please change the heartbeat log
 message level to notice, too.)

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5100#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
Description changed by arma:

Old description:

 Tor dies with
 {{{
 Feb 11 08:34:46.668 [Error] pt_prepare_proxy_list_for_config_read(): Bug:
 transports.c:1221: pt_prepare_proxy_list_for_config_read: Assertion
 unconfigured_proxies_n == 0 failed; aborting.
 }}}

 Steps to reproduce:
 1) grab your favorite obfsproxy tbb from the download section on
 https://www.torproject.org/projects/obfsproxy
 2) unpack it and start it
 3) click on settings in vidalia, then click ok.

New description:

 Tor dies with
 {{{
 Feb 11 08:34:46.668 [Error] pt_prepare_proxy_list_for_config_read(): Bug:
 transports.c:1221: pt_prepare_proxy_list_for_config_read: Assertion
 unconfigured_proxies_n == 0 failed; aborting.
 }}}

 Steps to reproduce:
 1) configure your tor to use a managed ClientTransportPlugin, e.g.
 {{{
 ClientTransportPlugin obfs2 exec /path/to/obfsproxy --managed
 }}}
 2) hup your Tor twice in quick succession

--

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:10
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5047 [Obfsproxy]: Implement basic usage statistics in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5047: Implement basic usage statistics in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  karsten 
 Type:  enhancement  | Status:  assigned
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by atagar):

 Took a quick scan and looks good to me.

  locale_to_reqs[locale] = 8 * (int((len(locale_to_ip[locale]) + 7) / 8))

 Is the extra int conversion really necessary? int / int = int

 {{{
  foo = [1, 2, 3, 4, 5, 6, 7, 8, 9]
  len(foo) / 8
 1
  type(len(foo) / 8)
 type 'int'
 }}}

  print hashed-fingerprint %s % sha1(a2b_hex(fingerprint)).hexdigest()

 Is this right? The fingerprint arg is already equal to...

 {{{
 fingerprint = sha1(a2b_hex(m.group(1))).hexdigest()
 }}}

  ccnn = []

 I haven't a clue what 'ccnn' stands for. It might be the convention with
 some languages to abbreviate variables to cryptic and largely un-guessable
 acronyms, but with python it's preferable to spell it out.

 Cheers! -Damian

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5047#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #4342 [Company]: move gettor to a tpo machine

2012-02-12 Thread Tor Bug Tracker Wiki
#4342: move gettor to a tpo machine
-+--
 Reporter:  erinn|  Owner:  phobos  
 Type:  task | Status:  accepted
 Priority:  normal   |  Milestone:  
Component:  Company  |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by kaner):

 I can do steps 2 and 3. [3 should actually be a matter of configuration]

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/4342#comment:19
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5088 [Metrics Website]: CVS with platform strings of currently running relays can't be downloaded.

2012-02-12 Thread Tor Bug Tracker Wiki
#5088: CVS with platform strings of currently running relays can't be 
downloaded.
+---
Reporter:  bastik   |   Owner:  
Type:  defect   |  Status:  closed  
Priority:  normal   |   Milestone:  
   Component:  Metrics Website  | Version:  
  Resolution:  wontfix  |Keywords:  CVS platform strings
  Parent:   |  Points:  
Actualpoints:   |  
+---
Changes (by karsten):

  * status:  new = closed
  * resolution:  = wontfix


Comment:

 You're right, that URL doesn't work so well anymore since we partitioned
 the statusentry table in the database.  I tried to tweak the query, but
 the fix that worked elsewhere didn't work here.  I'm going to take the CSV
 file off the metrics website.  It's a job for TorStatus, not for Metrics
 anyway.

 Here's a workaround: Download the JSON file of running relays and bridges
 from [https://github.com/kloesing/Onionoo Onionoo], strip off bridges, and
 grep for platform lines:

 {{{
 $ curl http://85.214.195.203/details/running  running
 $ sed '/bridges_published/q' running | grep platform | less
 }}}

 So, I'm not fixing this bug.  Thanks for reporting it anyway!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5088#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5047 [Obfsproxy]: Implement basic usage statistics in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5047: Implement basic usage statistics in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  karsten 
 Type:  enhancement  | Status:  assigned
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by karsten):

 Thanks for all the suggestions!  I added a branch log2stats to my public
 obfsproxy repository that has an updated log2stats.py script.  (Good catch
 with the int conversion and hashed fingerprints; I didn't implement the
 tuple-sorting thing, and I left ccnn unchanged.)

 It's still unclear if we should ask obfsproxy operators to log on info
 level and use this script, or if they should rather send us their
 heartbeat log messages (#5083).  Let's not add this script to obfsproxy
 until we have a decision there.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5047#comment:6
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5102 [Tor Bridge]: segfault in entry_guard_register_connect_status on tor bridge running obfsproxy on openbsd

2012-02-12 Thread Tor Bug Tracker Wiki
#5102: segfault in entry_guard_register_connect_status on tor bridge running
obfsproxy on openbsd
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
 I am running a tor bridge on openbsd (uname -a output is OpenBSD
 [REDACTED] 5.1 GENERIC.MP#2 i386). It is statically linked and runs in a
 chroot. Here's the output when it's started not in the chroot:

 {{{
 Feb 12 05:53:04.331 [notice] Tor v0.2.3.11-alpha running on OpenBSD i386.
 Feb 12 05:53:04.331 [notice] Tor can't help you if you use it wrong! Learn
 how to be safe at https://www.torproject.org/download/download#warning
 Feb 12 05:53:04.331 [notice] This version is not a stable Tor release.
 Expect more bugs than usual.
 Feb 12 05:53:04.347 [notice] Configuration file /usr/local/etc/tor/torrc
 not present, using reasonable defaults.
 Feb 12 05:53:04.349 [warn] It's a little hard to tell, but you seem to
 have Libevent 1.4.0-beta header files, whereas you have linked against
 Libevent 1.4.14b-stable.  This will probably make Tor crash.
 Feb 12 05:53:04.349 [notice] Initialized libevent version 1.4.14b-stable
 using method kqueue. Good.
 Feb 12 05:53:04.349 [notice] Opening Socks listener on 127.0.0.1:9050
 Feb 12 05:53:04.000 [notice] Parsing GEOIP file
 /usr/local/share/tor/geoip.
 Feb 12 05:53:04.000 [notice] No AES engine found; using AES_* functions.
 Feb 12 05:53:04.000 [notice] This OpenSSL has a good implementation of
 counter mode; using it.
 Feb 12 05:53:04.000 [notice] OpenSSL OpenSSL 1.0.0f 4 Jan 2012 looks like
 version 0.9.8m or later; I will try SSL_OP to enable renegotiation
 Feb 12 05:53:04.000 [notice] Reloaded microdescriptor cache.  Found 3404
 descriptors.
 Feb 12 05:53:05.000 [notice] We now have enough directory information to
 build circuits.
 Feb 12 05:53:05.000 [notice] Bootstrapped 80%: Connecting to the Tor
 network.
 Feb 12 05:53:06.000 [notice] Heartbeat: Tor's uptime is 0:00 hours, with 2
 circuits open. I've sent 0 kB and received 0 kB.
 Feb 12 05:53:06.000 [notice] Bootstrapped 85%: Finishing handshake with
 first hop.
 Feb 12 05:53:07.000 [notice] Bootstrapped 90%: Establishing a Tor circuit.
 Feb 12 05:53:09.000 [notice] Tor has successfully opened a circuit. Looks
 like client functionality is working.
 Feb 12 05:53:09.000 [notice] Bootstrapped 100%: Done.
 ^CFeb 12 05:56:54.000 [notice] Interrupt: exiting cleanly.
 }}}

 When run in the chroot (with chroot -u _tor -g _tor /home/chrooted/tor
 /bin/tor -f /etc/tor/torrc-relay), it runs for a bit, then crashes without
 leaving anything in the logfile. It dumps a core. Here's the output of bt
 from gdb:
 {{{
  gdb mytor mycore
 GNU gdb 6.3
 Copyright 2004 Free Software Foundation, Inc.
 GDB is free software, covered by the GNU General Public License, and you
 are
 welcome to change it and/or distribute copies of it under certain
 conditions.
 Type show copying to see the conditions.
 There is absolutely no warranty for GDB.  Type show warranty for
 details.
 This GDB was configured as i386-unknown-openbsd5.0...
 Core was generated by `tor'.
 Program terminated with signal 11, Segmentation fault.
 #0  0x1c07b57b in entry_guard_register_connect_status ()
 (gdb) bt
 #0  0x1c07b57b in entry_guard_register_connect_status ()
 #1  0x1c0ba387 in connection_or_set_state_open ()
 #2  0x1c08bea5 in command_process_netinfo_cell ()
 #3  0x1c08988d in command_process_cell ()
 #4  0x1c0baa51 in connection_or_process_cells_from_inbuf ()
 #5  0x1c0b7578 in connection_or_process_inbuf ()
 #6  0x1c0a91db in connection_process_inbuf ()
 #7  0x1c0a6e7a in connection_handle_read_impl ()
 #8  0x1c0a6f94 in connection_handle_read ()
 #9  0x1c001cb0 in conn_read_callback ()
 #10 0x1c137b35 in event_base_loop (base=0x83cda000, flags=0) at
 /usr/src/lib/libevent/event.c:402
 #11 0x1c0045e7 in do_main_loop ()
 #12 0x1c005cf7 in tor_main ()
 #13 0x1c000406 in main ()
 (gdb)
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5102
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5102 [Tor Bridge]: segfault in entry_guard_register_connect_status on tor bridge running obfsproxy on openbsd

2012-02-12 Thread Tor Bug Tracker Wiki
#5102: segfault in entry_guard_register_connect_status on tor bridge running
obfsproxy on openbsd
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--

Comment(by therealditzydoo):

 Here is the output after being compiled with -g -O0:

 {{{
 GNU gdb 6.3
 Copyright 2004 Free Software Foundation, Inc.
 GDB is free software, covered by the GNU General Public License, and you
 are
 welcome to change it and/or distribute copies of it under certain
 conditions.
 Type show copying to see the conditions.
 There is absolutely no warranty for GDB.  Type show warranty for
 details.
 This GDB was configured as i386-unknown-openbsd5.0...
 Core was generated by `tor'.
 Program terminated with signal 11, Segmentation fault.
 #0  0x1c07b57b in entry_guard_register_connect_status (digest=0x7d0e9b68
 %ֲ$ⲯ�0370s-[, succeeded=1,
 mark_relay_status=0, now=1329059709) at circuitbuild.c:3909
 3909  SMARTLIST_FOREACH(entry_guards, entry_guard_t *, e,
 (gdb) bt
 #0  0x1c07b57b in entry_guard_register_connect_status (digest=0x7d0e9b68
 %ֲ$ⲯ�0370s-[, succeeded=1,
 mark_relay_status=0, now=1329059709) at circuitbuild.c:3909
 #1  0x1c0ba387 in connection_or_set_state_open (conn=0x7d0e9b00) at
 connection_or.c:1700
 #2  0x1c08bea5 in command_process_netinfo_cell (cell=0xcfbc0620,
 conn=0x7d0e9b00) at command.c:916
 #3  0x1c08988d in command_process_cell (cell=0xcfbc0620, conn=0x7d0e9b00)
 at command.c:201
 #4  0x1c0baa51 in connection_or_process_cells_from_inbuf (conn=0x7d0e9b00)
 at connection_or.c:1832
 #5  0x1c0b7578 in connection_or_process_inbuf (conn=0x7d0e9b00) at
 connection_or.c:390
 #6  0x1c0a91db in connection_process_inbuf (conn=0x7d0e9b00,
 package_partial=1) at connection.c:3760
 #7  0x1c0a6e7a in connection_handle_read_impl (conn=0x7d0e9b00) at
 connection.c:2656
 #8  0x1c0a6f94 in connection_handle_read (conn=0x7d0e9b00) at
 connection.c:2697
 #9  0x1c001cb0 in conn_read_callback (fd=97, event=2, _conn=0x7d0e9b00) at
 main.c:702
 #10 0x1c137b35 in event_base_loop (base=0x87c47800, flags=0) at
 /usr/src/lib/libevent/event.c:402
 #11 0x1c0045e7 in do_main_loop () at main.c:1924
 #12 0x1c005cf7 in tor_main (argc=3, argv=0xcfbc0cc4) at main.c:2619
 #13 0x1c000406 in main (argc=Cannot access memory at address 0x0
 ) at tor_main.c:30
 (gdb)
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5102#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by asn):

 OK, as you have noticed, the SIGHUP code of src/or/transports.c is not
 elegant. If you can find a better logic for it, I'd be very glad. The
 current logic is the best I could think of when I was writing it.

 This bug has to do with the way we count unconfigured proxies between
 config reads.

 In the first SIGHUP, the managed proxy is already launched and configured.
 During the SIGHUP, we re-parse the config, find the proxy line and give it
 to  pt_kickstart_proxy()`. In `pt_kickstart_proxy()`, we go into the
 {{{
 } else { /* known proxy. add its transport to its transport list */
 }}}
 branch, since we've already parsed this managed proxy when we launched
 tor. The proxy was there from before the SIGHUP, so it's already marked
 with `got_hup` and `marked_for_removal`. So we go into the next two `if`
 blocks and end up incrementing `unconfigured_proxies_n`. We need to do
 that, so that in the next `run_scheduled_events()` tick, we execute
 `pt_configure_remaining_proxies()` and examine if the proxy needs to be
 restarted or not. In this case, the proxy wouldn't need to be restarted,
 `proxy_needs_restart()` would have returned False, and
 `unconfigured_proxies_n` would have been reduced back to 0. Meanwhile,,
 the proxy has been in the `PT_PROTO_COMPLETED` state, since it was spawned
 and configured back when we launched tor.

 So in this bug, we never do another tick of `run_scheduled_events()`, and
 instead we do a second SIGHUP. This means that we re-read the config, and
 call `pt_prepare_proxy_list_for_config_read()`. In this code,
 `unconfigured_proxies_n == 1` from the previous SIGHUP, and since the
 proxy is in `PT_PROTO_COMPLETED` we don't decrement
 `unconfigured_proxies_n`. Instead, we reach the bottom of the function and
 hit the assert with `1 != 0`.

 

 Notice how `unconfigured_proxies_n` is only actually used in
 `pt_proxies_configuration_pending()`, to see whether we should configure
 managed proxies in `run_scheduled_events()`. It's also used in some logs,
 and to assert that the code does what I expect it to do.

 My original stupid fix idea, was to remove `unconfigured_proxies_n--;`
 from `pt_prepare_proxy_list_for_config_read()` and simply set
 `unconfigured_proxies_n` to 0 in the end of the function, since we are
 planning on re-parsing the config file anyway. That might have worked.

 Maybe a cleaner solution, would be to remove the `unconfigured_proxies_n`
 logic completely, and instead use a boolean, named `need_to_configure_pt`
 or something, for  pt_proxies_configuration_pending()`. This might be
 cleaner, and still not too radical.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:11
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5088 [Metrics Website]: CVS with platform strings of currently running relays can't be downloaded.

2012-02-12 Thread Tor Bug Tracker Wiki
#5088: CVS with platform strings of currently running relays can't be 
downloaded.
+---
Reporter:  bastik   |   Owner:  
Type:  defect   |  Status:  closed  
Priority:  normal   |   Milestone:  
   Component:  Metrics Website  | Version:  
  Resolution:  wontfix  |Keywords:  CVS platform strings
  Parent:   |  Points:  
Actualpoints:   |  
+---

Comment(by bastik):

 Thank you. Apparently no fix needed.

 As assumed no windows relay has picked up the latest alpha. Most
 certainly, due to the lack of compiling tools, as there are none included.

 Windows doesn't know grep, but thankfully there's a windows version of it.

 I'm confused.
 Onionoo is (...) to learn about currently running Tor relays and bridges

 From what I can tell, the IP addresses are modified. At least the first
 part.
 I can't read code well enough to figure out how it's modified. Also I'm
 unable to figure out what's the hashed fingerprint unless there's some
 kind of salt involved.

 I'm unable to find a currently running bridge I know of (IP:PORT and
 fingerprint), which wasn't my goal. I looked for it because the JSON might
 include it.

 Is there anything to read about Onionoo? (This is not the right place to
 talk about it.) Please don't write any long explanations I don't wanna
 waste your time. (It's not worth the time)

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5088#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5088 [Metrics Website]: CVS with platform strings of currently running relays can't be downloaded.

2012-02-12 Thread Tor Bug Tracker Wiki
#5088: CVS with platform strings of currently running relays can't be 
downloaded.
+---
Reporter:  bastik   |   Owner:  
Type:  defect   |  Status:  closed  
Priority:  normal   |   Milestone:  
   Component:  Metrics Website  | Version:  
  Resolution:  wontfix  |Keywords:  CVS platform strings
  Parent:   |  Points:  
Actualpoints:   |  
+---

Comment(by karsten):

 You can learn more about sanitized bridge descriptors with their hashed
 fingerprints and 10.x.x.x IP addresses
 [https://metrics.torproject.org/formats.html#bridgedesc here].

 More information about Onionoo is available
 [http://kloesing.github.com/Onionoo/ here] and
 [http://kloesing.github.com/Onionoo/protocol.html here].

 If you have more questions feel free to ask on #tor-dev or mail to tor-
 assista...@lists.torproject.org.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5088#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5102 [Tor Bridge]: segfault in entry_guard_register_connect_status on tor bridge running obfsproxy on openbsd

2012-02-12 Thread Tor Bug Tracker Wiki
#5102: segfault in entry_guard_register_connect_status on tor bridge running
obfsproxy on openbsd
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--

Comment(by therealditzydoo):

 I'm using the script shown below to auto-restart tor so there isn't much
 downtime on my host:

 {{{
 #!/bin/sh
 while true;
 do true
 sleep 1
 if ! ps aux|grep [t]orrc-relay  /dev/null
 then
 echo -n RESPAWNING AT
 date
 chroot -u _tor -g _tor /home/chrooted/tor /bin/tor -f /etc/tor/torrc-relay
 fi

 done
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5102#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn   
 Type:  enhancement  | Status:  needs_revision
 Priority:  normal   |  Milestone:
Component:  Obfsproxy|Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
Changes (by asn):

  * status:  needs_review = needs_revision


Comment:

 Thanks for all the code, karsten!

 I skimmed over the code while I was in the subway, here is a quick and
 dirty code review:

 The check
 {{{
   p = strrchr(addrport, ':');
   if (p  0)
 return;
 }}}
  in `status_note_connection()` seems wrong. `strrchr()` returns a pointer,
 so `if (!p)` is probably better than `if (p  0)`. I wonder if we should
 use `strchr()` like `util.c:resolve_address_port()` does; but it probably
 doesn't really matter.

 b) Should we use a hash table or something to query whether a connection
 has been seen before? It seems that `smartlist_string_isin()` does a
 linear search over a smartlist, and some obfsproxy bridge operators are
 currently seeing 1500~ or so unique IPs. I'm not sure if that would cause
 lots of load, but a hash table (I think that's a `strmap_t` in
 `container.c`) might be better.

 c) Are unique IPs and connections information useful/meaningful in the
 case of obfsproxy clients?

 Thanks for the code again!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:6
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5103 [Tor Bridge]: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt which doesn't exist

2012-02-12 Thread Tor Bug Tracker Wiki
#5103: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt 
which
doesn't exist
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
 CFLAGS= -g -O0 ./configure --with-libevent-dir=/home/SCRUBBED/lib
 --prefix=/ --enable-static-tor fails with
 {{{
 checking for libevent directory... configure: WARNING: Could not find a
 linkable libevent.  If you have it installed somewhere unusual, you can
 specify an explicit path using --with-libevent-dir
 }}}
 Looking at the config.log we see:
 {{{
 configure:6383: gcc -o conftest  -g -O0 -static -I/home/irene/lib
 -I${top_srcdir}/src/common -L/home/SCRUBBED/lib  conftest.c -lpthread
 -levent  -lrt   5
 /usr/bin/ld: cannot find -lrt
 }}}
 which causes the error, because there isn't a librt on openbsd. Indeed,
 removing the  -lrt in configure makes all work.
 {{{
 STATIC_LIBEVENT_FLAGS=
 if test $enable_static_libevent = yes; then
 if test $have_rt = yes; then
   STATIC_LIBEVENT_FLAGS= -lrt
 fi
 fi
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5103
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn   
 Type:  enhancement  | Status:  needs_revision
 Priority:  normal   |  Milestone:
Component:  Obfsproxy|Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--

Comment(by karsten):

 Replying to [comment:6 asn]:
  The check
  {{{
p = strrchr(addrport, ':');
if (p  0)
  return;
  }}}
   in `status_note_connection()` seems wrong. `strrchr()` returns a
 pointer, so `if (!p)` is probably better than `if (p  0)`. I wonder if we
 should use `strchr()` like `util.c:resolve_address_port()` does; but it
 probably doesn't really matter.

 Ah, there's the code I was looking for.  I'm going to steal it from there.

  b) Should we use a hash table or something to query whether a connection
 has been seen before? It seems that `smartlist_string_isin()` does a
 linear search over a smartlist, and some obfsproxy bridge operators are
 currently seeing 1500~ or so unique IPs. I'm not sure if that would cause
 lots of load, but a hash table (I think that's a `strmap_t` in
 `container.c`) might be better.

 Oh.  You're right.  strmap_t it is.

  c) Are unique IPs and connections information useful/meaningful in the
 case of obfsproxy clients?

 They're the most basic statistics that we have about obfsproxy usage.  I'd
 prefer having a GeoIP database in obfsproxy and resolve both connections
 and unique addresses to country codes.  But that requires more coding,
 reviewing, and time that we don't have.

  Thanks for the code again!

 Thanks for the review!  I'll make the changes hopefully later today,
 otherwise tomorrow morning.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:7
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5068 [Obfsproxy]: memory leak in obfsproxy when using weird args

2012-02-12 Thread Tor Bug Tracker Wiki
#5068: memory leak in obfsproxy when using weird args
---+
 Reporter:  arma   |  Owner:  asn 
 Type:  defect | Status:  needs_review
 Priority:  normal |  Milestone:  
Component:  Obfsproxy  |Version:  
 Keywords: | Parent:  
   Points: |   Actualpoints:  
---+
Changes (by blackpaw):

  * status:  new = needs_review


Comment:

 I wrote one line of code and now Valgrind has no complaints.

 valgrind --leak-check=yes ./obfsproxy obfs2 --log-file=logfile
 --dest=!127.0.0.1:9009 server !0.0.0.0:1051




 {{{
 ==11227==
 2012-02-12 12:22:48 [warn] obfs2: Unknown argument '--log-file=logfile'.
 2012-02-12 12:22:48 [warn] You failed at creating a correct obfs2 line.
 ...
 ==11227==
 ==11227== HEAP SUMMARY:
 ==11227== in use at exit: 0 bytes in 0 blocks
 ==11227==   total heap usage: 13 allocs, 13 frees, 3,197 bytes allocated
 ==11227==
 ==11227== All heap blocks were freed -- no leaks are possible
 ==11227==
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5068#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn   
 Type:  enhancement  | Status:  needs_revision
 Priority:  normal   |  Milestone:
Component:  Obfsproxy|Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--

Comment(by asn):

 Replying to [comment:7 karsten]:
  Replying to [comment:6 asn]:
   c) Are unique IPs and connections information useful/meaningful in the
 case of obfsproxy clients?
 
  They're the most basic statistics that we have about obfsproxy usage.
 I'd prefer having a GeoIP database in obfsproxy and resolve both
 connections and unique addresses to country codes.  But that requires more
 coding, reviewing, and time that we don't have.
 

 Hm, when I said 'obfsproxy clients', I meant 'obfsproxy configured as a
 client'. We don't seem to count outgoing connections when we are in SOCKS
 mode (since we use `open_outbound_hostname()` there), so an obfsproxy
 configured with:
 {{{
 obfsproxy obfs2 socks 127.0.0.1:
 }}}
 will probably say we saw 0 connections from 0 unique addresses. all the
 time.

 I think, we should only call `status_note_connection()` if we are a
 server, and we should only mention connection information in the heartbeat
 message if we are a server.

 Karsten, if you cba to do this, I think me or Nick can handle it.

 BTW, there is something fishy with the address copying in
 `status_note_connection()` it seems like you are using `strcpy()` and try
 to copy the whole `addrport` which is bigger than `p - addrport` bytes
 since it also contains the TCP port.
 Maybe something like this:
 {{{
 delim = strchr(s, ':');
 if (!delim)
return; /* bug of conn-peername? */
 tor_assert(delim = s);
 addr = xstrndup(s, delim-s);
 }}}
 could work.

 If you are bored, Nick or me can probably handle this too!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:8
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5103 [Tor Bridge]: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt which doesn't exist

2012-02-12 Thread Tor Bug Tracker Wiki
#5103: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt 
which
doesn't exist
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--

Comment(by Sebastian):

 Looks like the problem exists because we do
 AC_SEARCH_LIBS([clock_gettime], [rt], [have_rt=yes]). librt isn't
 available on openbsd, but clock_gettime is, so have_rt is set to yes and
 later we add -lrt

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5103#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5009 [Obfsproxy]: obfsproxy does not build from instructions on debian squeeze

2012-02-12 Thread Tor Bug Tracker Wiki
#5009: obfsproxy does not build from instructions on debian squeeze
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by koolfy):

 On old debian/ubuntu distributions, libssl might not be recent enough
 for libevent (dep is = 0.9.8m-1)

 The easiest and most user-frienly workaround for now is to wget and sudo
 dpkg -i one of those :
 http://packages.ubuntu.com/oneiric/i386/libssl0.9.8/download

 As it's 0.9.8o the dep will be met and the build environment can therefore
 be installed with the dget described here
 (https://trac.torproject.org/projects/tor/ticket/5009#comment:9) and the
 sudo dpkg -i discribed there
 (https://trac.torproject.org/projects/tor/ticket/5009#comment:22)

 As opposed to building those manually and adding non-user-friendly and
 error-prone steps to the process described here
 (https://www.torproject.org/projects/obfsproxy-instructions.html.en)

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5009#comment:30
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5102 [Tor Bridge]: segfault in entry_guard_register_connect_status on tor bridge running obfsproxy on openbsd

2012-02-12 Thread Tor Bug Tracker Wiki
#5102: segfault in entry_guard_register_connect_status on tor bridge running
obfsproxy on openbsd
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--

Comment(by therealditzydoo):

 Still fails when running with a recent libevent:

 {{{
 GNU gdb 6.3
 Copyright 2004 Free Software Foundation, Inc.
 GDB is free software, covered by the GNU General Public License, and you
 are
 welcome to change it and/or distribute copies of it under certain
 conditions.
 Type show copying to see the conditions.
 There is absolutely no warranty for GDB.  Type show warranty for
 details.
 This GDB was configured as i386-unknown-openbsd5.0...

 warning: exec file is newer than core file.
 Core was generated by `tor'.
 Program terminated with signal 11, Segmentation fault.
 #0  0x1c07347f in entry_guard_register_connect_status (digest=0x7cd57e68
 001\030���bR7@\202�TPa�\177, succeeded=1,
 mark_relay_status=0, now=1329073119) at circuitbuild.c:3909
 3909  SMARTLIST_FOREACH(entry_guards, entry_guard_t *, e,
 (gdb) bt
 #0  0x1c07347f in entry_guard_register_connect_status (digest=0x7cd57e68
 001\030���bR7@\202�TPa�\177, succeeded=1,
 mark_relay_status=0, now=1329073119) at circuitbuild.c:3909
 #1  0x1c0b228b in connection_or_set_state_open (conn=0x7cd57e00) at
 connection_or.c:1700
 #2  0x1c083da9 in command_process_netinfo_cell (cell=0xcfbda160,
 conn=0x7cd57e00) at command.c:916
 #3  0x1c081791 in command_process_cell (cell=0xcfbda160, conn=0x7cd57e00)
 at command.c:201
 #4  0x1c0b2955 in connection_or_process_cells_from_inbuf (conn=0x7cd57e00)
 at connection_or.c:1832
 #5  0x1c0af47c in connection_or_process_inbuf (conn=0x7cd57e00) at
 connection_or.c:390
 #6  0x1c0a10df in connection_process_inbuf (conn=0x7cd57e00,
 package_partial=1) at connection.c:3760
 #7  0x1c09ed7e in connection_handle_read_impl (conn=0x7cd57e00) at
 connection.c:2656
 #8  0x1c09ee98 in connection_handle_read (conn=0x7cd57e00) at
 connection.c:2697
 #9  0x1c001cb0 in conn_read_callback (fd=216, event=2, _conn=0x7cd57e00)
 at main.c:702
 #10 0x1c133a4a in event_base_loop (base=0x7cb8d000, flags=0) at
 event.c:1340
 #11 0x1c0045e7 in do_main_loop () at main.c:1924
 #12 0x1c005cff in tor_main (argc=3, argv=0xcfbda820) at main.c:2619
 #13 0x1c000406 in main (argc=Cannot access memory at address 0x501
 ) at tor_main.c:30
 (gdb)
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5102#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by karsten):

 Replying to [comment:8 asn]:
  Replying to [comment:7 karsten]:
   Replying to [comment:6 asn]:
c) Are unique IPs and connections information useful/meaningful in
 the case of obfsproxy clients?
  
   They're the most basic statistics that we have about obfsproxy usage.
 I'd prefer having a GeoIP database in obfsproxy and resolve both
 connections and unique addresses to country codes.  But that requires more
 coding, reviewing, and time that we don't have.
  
 
  Hm, when I said 'obfsproxy clients', I meant 'obfsproxy configured as a
 client'. We don't seem to count outgoing connections when we are in SOCKS
 mode (since we use `open_outbound_hostname()` there), so an obfsproxy
 configured with:
  {{{
  obfsproxy obfs2 socks 127.0.0.1:
  }}}
  will probably say we saw 0 connections from 0 unique addresses. all
 the time.

 You're right.  We shouldn't say that as a client.

  I think, we should only call `status_note_connection()` if we are a
 server, and we should only mention connection information in the heartbeat
 message if we are a server.
 
  Karsten, if you cba to do this, I think me or Nick can handle it.

 To be honest, I don't know where in obfsproxy I'd learn whether we're a
 client or a server.  If you don't mind too much, would you fix that?  Your
 suggestion to only call status_note_connection() as a server and not
 mention connection information as a client sounds perfectly fine to me.

  BTW, there is something fishy with the address copying in
 `status_note_connection()` it seems like you are using `strcpy()` and try
 to copy the whole `addrport` which is bigger than `p - addrport` bytes
 since it also contains the TCP port.
  Maybe something like this:
  {{{
  delim = strchr(s, ':');
  if (!delim)
 return; /* bug of conn-peername? */
  tor_assert(delim = s);
  addr = xstrndup(s, delim-s);
  }}}
  could work.
 
  If you are bored, Nick or me can probably handle this too!

 Right, the fishy address copying was indeed fishy.  That should now be
 fixed in the new status_note_connection().

 Thanks again for the very helpful review!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:10
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5079 [Obfsproxy]: obfsproxy: scrub IPs before displaying them in logs

2012-02-12 Thread Tor Bug Tracker Wiki
#5079: obfsproxy: scrub IPs before displaying them in logs
---+
 Reporter:  asn|  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by cjbprime):

 The attached patch implements this feature.  I'm pasting the output of two
 runs below, one with scrubbing on and one with scrubbing off via --no-
 safe-logging.

 The scrubbing implemented here goes farther than Tor, in that it scrubs
 the client addresses too, to avoid putting live obfsproxy bridge addresses
 in the log.  As a side effect, protocol traffic between obfsproxy and Tor
 is no longer logged.  Safe logging is turned on by default, in main.c.

 With scrubbing turned on:
 {{{
 2012-02-12 15:11:46 [info] Starting.
 2012-02-12 15:11:46 [debug] Proxy environment:
 state_loc: './Data/Tor/pt_state/'
 conf_proto_version: '1'
 transports: 'obfs2'
 2012-02-12 15:11:46 [debug] Now listening on 127.0.0.1:0 for protocol
 obfs2.
 2012-02-12 15:12:07 [debug] [scrubbed]: new connection from [scrubbed] (1
 total)
 2012-02-12 15:12:07 [debug] [scrubbed]: socks client connection
 2012-02-12 15:12:07 [debug] [scrubbed]: setup complete
 2012-02-12 15:12:07 [debug] [scrubbed]: socks_read_cb
 2012-02-12 15:12:07 [debug] Got version 4
 2012-02-12 15:12:07 [info] [scrubbed]: socks: trying to connect to
 [scrubbed]:80
 2012-02-12 15:12:07 [debug] [scrubbed]: new connection from [scrubbed] (3
 total)
 2012-02-12 15:12:07 [debug] [scrubbed]: socks client connection
 2012-02-12 15:12:07 [debug] [scrubbed]: setup complete
 2012-02-12 15:12:07 [debug] [scrubbed]: socks_read_cb
 2012-02-12 15:12:07 [debug] Got version 4
 2012-02-12 15:12:07 [info] [scrubbed]: socks: trying to connect to
 [scrubbed]:80
 2012-02-12 15:12:07 [debug] [scrubbed]: pending_socks_cb
 2012-02-12 15:12:07 [debug] We connected to our SOCKS destination!
 Replacing peername '[scrubbed]' with '[scrubbed]'
 2012-02-12 15:12:07 [debug] [scrubbed]: Successful outbound connection to
 [scrubbed]
 2012-02-12 15:12:07 [debug] obfs2_handshake: initiator queued 7033 bytes
 2012-02-12 15:12:07 [debug] [scrubbed]: upstream_read_cb, 336 bytes
 available
 2012-02-12 15:12:07 [debug] obfs2_send: handshake incomplete, queueing 336
 bytes.
 2012-02-12 15:12:07 [debug] [scrubbed]: transmitted 0 bytes
 2012-02-12 15:12:07 [debug] [scrubbed]: pending_socks_cb
 2012-02-12 15:12:07 [debug] We connected to our SOCKS destination!
 Replacing peername '[scrubbed]' with '[scrubbed]'
 2012-02-12 15:12:07 [debug] [scrubbed]: Successful outbound connection to
 [scrubbed]
 2012-02-12 15:12:07 [debug] obfs2_handshake: initiator queued 3240 bytes
 2012-02-12 15:12:07 [debug] [scrubbed]: downstream_read_cb, 1448 bytes
 available
 2012-02-12 15:12:07 [debug] [scrubbed]: error during receive.
 2012-02-12 15:12:07 [debug] Closing connection with [scrubbed]; 3
 remaining
 2012-02-12 15:12:07 [debug] Closing connection with [scrubbed]; 2
 remaining
 2012-02-12 15:12:07 [debug] [scrubbed]: downstream_read_cb, 808 bytes
 available
 2012-02-12 15:12:07 [debug] [scrubbed]: error during receive.
 2012-02-12 15:12:07 [debug] Closing connection with [scrubbed]; 1
 remaining
 2012-02-12 15:12:07 [debug] Closing connection with [scrubbed]; 0
 remaining
 2012-02-12 15:12:08 [debug] [scrubbed]: new connection from [scrubbed] (1
 total)
 2012-02-12 15:12:08 [debug] [scrubbed]: socks client connection
 2012-02-12 15:12:08 [debug] [scrubbed]: setup complete
 2012-02-12 15:12:08 [debug] [scrubbed]: socks_read_cb
 2012-02-12 15:12:08 [debug] Got version 4
 2012-02-12 15:12:08 [info] [scrubbed]: socks: trying to connect to
 [scrubbed]:80
 2012-02-12 15:12:08 [debug] [scrubbed]: new connection from [scrubbed] (3
 total)
 2012-02-12 15:12:08 [debug] [scrubbed]: socks client connection
 2012-02-12 15:12:08 [debug] [scrubbed]: setup complete
 2012-02-12 15:12:08 [debug] [scrubbed]: socks_read_cb
 2012-02-12 15:12:08 [debug] Got version 4
 2012-02-12 15:12:08 [info] [scrubbed]: socks: trying to connect to
 [scrubbed]:80
 2012-02-12 15:12:08 [debug] [scrubbed]: pending_socks_cb
 2012-02-12 15:12:08 [debug] We connected to our SOCKS destination!
 Replacing peername '[scrubbed]' with '[scrubbed]'
 2012-02-12 15:12:08 [debug] [scrubbed]: Successful outbound connection to
 [scrubbed]
 2012-02-12 15:12:08 [debug] obfs2_handshake: initiator queued 580 bytes
 2012-02-12 15:12:08 [debug] [scrubbed]: upstream_read_cb, 340 bytes
 available
 2012-02-12 15:12:08 [debug] obfs2_send: handshake incomplete, queueing 340
 bytes.
 2012-02-12 15:12:08 [debug] [scrubbed]: transmitted 0 bytes
 2012-02-12 15:12:08 [debug] [scrubbed]: pending_socks_cb
 2012-02-12 15:12:08 [debug] We connected to our SOCKS destination!
 Replacing 

Re: [tor-bugs] #5094 [Obfsproxy]: What's with the extra blank line when exiting?

2012-02-12 Thread Tor Bug Tracker Wiki
#5094: What's with the extra blank line when exiting?
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  minor  |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by cjbprime):

 (Odd, can't reproduce this here.)

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5094#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5059 [Pluggable transport]: Organize an obfsproxy/PTTB test run

2012-02-12 Thread Tor Bug Tracker Wiki
#5059: Organize an obfsproxy/PTTB test run
+---
Reporter:  asn  |   Owner:  asn   
Type:  task |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  Pluggable transport  | Version:
  Resolution:  implemented  |Keywords:
  Parent:  #5038|  Points:
Actualpoints:   |  
+---
Changes (by rransom):

  * status:  new = closed
  * resolution:  = implemented


Comment:

 We're having a test run now!  (Too bad we didn't get to organize it.)

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5059#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5101 [Obfsproxy]: obfsproxy: trying to connect to 1.2.3.4:5678 message is confusing

2012-02-12 Thread Tor Bug Tracker Wiki
#5101: obfsproxy: trying to connect to 1.2.3.4:5678 message is confusing
---+
 Reporter:  torland|  Owner:  asn 
 Type:  defect | Status:  needs_review
 Priority:  normal |  Milestone:  
Component:  Obfsproxy  |Version:  
 Keywords: | Parent:  #5080   
   Points: |   Actualpoints:  
---+
Changes (by asn):

  * status:  new = needs_review
  * parent:  = #5080


Comment:

 Sounds like something we should do as part of #5080, indeed.

 Please see branch `bug5101` in
 `https://git.gitorious.org/obfsproxy/obfsproxy.git`.

 This will break the current #5047 script.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5101#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5047 [Obfsproxy]: Implement basic usage statistics in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5047: Implement basic usage statistics in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  karsten 
 Type:  enhancement  | Status:  assigned
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by asn):

 If #5101 gets merged, it will break the current version of the python
 script. It changes:
 {{{
 2012-02-10 22:37:00 [info] 89.78.67.56:1234 (obfs2): trying to connect to
 127.0.0.1:5001
 }}}
 to
 {{{
 2012-02-10 22:37:00 [info] 89.78.67.56:1234 (obfs2): Successful outbound
 connection to '127.0.0.1:5001'.
 }}}

 BTW, the new log line will only appear when the connection is successful.
 When the connection fails we still get:
 {{{
 89.78.67.56:1234: connection to 127.0.0.1:5001 failed: Connection timeout
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5047#comment:7
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5098 [Obfsproxy]: obfsproxy src/main.h has prototype for tor_main

2012-02-12 Thread Tor Bug Tracker Wiki
#5098: obfsproxy src/main.h has prototype for tor_main
---+
 Reporter:  rransom|  Owner:  asn 
 Type:  defect | Status:  needs_review
 Priority:  minor  |  Milestone:  
Component:  Obfsproxy  |Version:  
 Keywords:  easy   | Parent:  
   Points: |   Actualpoints:  
---+
Changes (by asn):

  * status:  new = needs_review
  * keywords:  = easy


Comment:

 Please see branch `bug5098` in
 `https://git.gitorious.org/obfsproxy/obfsproxy.git`.
 It simply removes the line from src/main.h.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5098#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5098 [Obfsproxy]: obfsproxy src/main.h has prototype for tor_main

2012-02-12 Thread Tor Bug Tracker Wiki
#5098: obfsproxy src/main.h has prototype for tor_main
---+
 Reporter:  rransom|  Owner:  asn 
 Type:  defect | Status:  needs_review
 Priority:  minor  |  Milestone:  
Component:  Obfsproxy  |Version:  
 Keywords:  easy   | Parent:  
   Points: |   Actualpoints:  
---+

Comment(by rransom):

 Replying to [comment:1 asn]:
  Please see branch `bug5098` in
 `https://git.gitorious.org/obfsproxy/obfsproxy.git`.
  It simply removes the line from src/main.h.

 Should there be a prototype for `obfs_main`?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5098#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5104 [Tor Bridge]: Tor should give managed proxies its ORListenAddress

2012-02-12 Thread Tor Bug Tracker Wiki
#5104: Tor should give managed proxies its ORListenAddress
+---
 Reporter:  rransom |  Owner: 
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Tor Bridge  |Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 koolfy tried to set up a managed obfsproxy on an instance of one of our
 EC2 bridge images.  It didn't work:

 {{{
 14:52  koolfy obfsproxy says
 14:52  koolfy 2012-02-12 22:50:13 [debug] error_cb for 127.0.0.1:443:
 what=0x0020 errno=111
 14:52  koolfy 2012-02-12 22:50:13 [warn] Error talking to 127.0.0.1:443:
 Connection refused
 }}}

 {{{
 14:55  koolfy # What port to advertise for Tor connections.
 14:56  koolfy ORPort 443
 14:56  koolfy # advertise 443 but bind to 9001).
 14:56  koolfy ORListenAddress 0.0.0.0:9001
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5104
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5097 [Tor Bridge]: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”

2012-02-12 Thread Tor Bug Tracker Wiki
#5097: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”
+---
 Reporter:  rransom |  Owner:
 Type:  defect  | Status:  needs_review  
 Priority:  blocker |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by rransom):

 Replying to [comment:4 Sebastian]:
  branch bug5097 in rransom's tor repository

 I've pushed another commit, because I missed the Windows version of that
 function the first time.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5097#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5097 [Tor Bridge]: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”

2012-02-12 Thread Tor Bug Tracker Wiki
#5097: “TOR_PT_EXTENDED_SERVER_PORT=127.0.0.1:4200”
---+
Reporter:  rransom |   Owner:
Type:  defect  |  Status:  closed
Priority:  blocker |   Milestone:  Tor: 0.2.3.x-final
   Component:  Tor Bridge  | Version:
  Resolution:  fixed   |Keywords:
  Parent:  |  Points:
Actualpoints:  |  
---+
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Seriouly, git commit messages like Fix #5097 are not what we do.

 Fixed the commit message and merged.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5097#comment:6
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5101 [Obfsproxy]: obfsproxy: trying to connect to 1.2.3.4:5678 message is confusing

2012-02-12 Thread Tor Bug Tracker Wiki
#5101: obfsproxy: trying to connect to 1.2.3.4:5678 message is confusing
--+-
Reporter:  torland|   Owner:  asn   
Type:  defect |  Status:  closed
Priority:  normal |   Milestone:
   Component:  Obfsproxy  | Version:
  Resolution:  fixed  |Keywords:
  Parent:  #5080  |  Points:
Actualpoints: |  
--+-
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Looks fine; merged it.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5101#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5105 [Tor Bridge]: set_managed_proxy_environment should be OS-independent

2012-02-12 Thread Tor Bug Tracker Wiki
#5105: set_managed_proxy_environment should be OS-independent
+---
 Reporter:  rransom |  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
 At least two people have been confused by the fact that there are two
 copies of `set_managed_proxy_environment` (one for Windows, and one for
 Unixoids), and that confusion has come close to producing at least two
 bugs.  Time to refactor it to produce a smartlist on all OSes.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5105
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5079 [Obfsproxy]: obfsproxy: scrub IPs before displaying them in logs

2012-02-12 Thread Tor Bug Tracker Wiki
#5079: obfsproxy: scrub IPs before displaying them in logs
---+
 Reporter:  asn|  Owner:  asn 
 Type:  defect | Status:  needs_review
 Priority:  normal |  Milestone:  
Component:  Obfsproxy  |Version:  
 Keywords: | Parent:  
   Points: |   Actualpoints:  
---+

Comment(by nickm):

 Looks good, except for the function name.  By the Tor convention, I think
 this should just be safe_str: obfsproxy doesn't have a separate notion
 of my activities as a client and my activities as a server.

 This is pretty easy to fix with perl, though.  I'll tweak the patch and
 merge it.  Thanks!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5079#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5079 [Obfsproxy]: obfsproxy: scrub IPs before displaying them in logs

2012-02-12 Thread Tor Bug Tracker Wiki
#5079: obfsproxy: scrub IPs before displaying them in logs
--+-
Reporter:  asn|   Owner:  asn   
Type:  defect |  Status:  closed
Priority:  normal |   Milestone:
   Component:  Obfsproxy  | Version:
  Resolution:  fixed  |Keywords:
  Parent: |  Points:
Actualpoints: |  
--+-
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = fixed


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5079#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5098 [Obfsproxy]: obfsproxy src/main.h has prototype for tor_main

2012-02-12 Thread Tor Bug Tracker Wiki
#5098: obfsproxy src/main.h has prototype for tor_main
--+-
Reporter:  rransom|   Owner:  asn   
Type:  defect |  Status:  closed
Priority:  minor  |   Milestone:
   Component:  Obfsproxy  | Version:
  Resolution:  fixed  |Keywords:  easy  
  Parent: |  Points:
Actualpoints: |  
--+-
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Merged

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5098#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5102 [Tor Bridge]: segfault in entry_guard_register_connect_status on tor bridge running obfsproxy on openbsd

2012-02-12 Thread Tor Bug Tracker Wiki
#5102: segfault in entry_guard_register_connect_status on tor bridge running
obfsproxy on openbsd
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--

Comment(by nickm):

 I'm turning that SMARTLIST_FOREACH into a SMARTLIST_FOREACH_BEGIN/END pair
 in 61452299d1067298a2865deb6398b1fb269b2a81; that should make the line
 number a tiny bit easier to find.

 If you can find the value of the local variable e at the point of the
 crash, as well as the values of *e, entry_guards, and *entry_guards, that
 would be great.

 But looking at the code, it seems the only possibilities are:
   * one of the entries in entry_guards has become null, or corrupt, or
 something like that.
   * The entry_guards smartlist itself has somehow gotten messed up.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5102#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5103 [Tor Bridge]: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt which doesn't exist

2012-02-12 Thread Tor Bug Tracker Wiki
#5103: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt 
which
doesn't exist
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  needs_review   
 Priority:  normal   |  Milestone: 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
Changes (by nickm):

  * status:  new = needs_review


Comment:

 Branch bug5103 in my public tor repository may fix this.  Please
 test/review?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5103#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5059 [Pluggable transport]: Organize an obfsproxy/PTTB test run

2012-02-12 Thread Tor Bug Tracker Wiki
#5059: Organize an obfsproxy/PTTB test run
+---
Reporter:  asn  |   Owner:  asn   
Type:  task |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  Pluggable transport  | Version:
  Resolution:  implemented  |Keywords:
  Parent:  #5038|  Points:
Actualpoints:   |  
+---

Comment(by nickm):

 After the test run is done, we should do a quick pass over pluggable
 transports need XYZ tickets and obfsproxy needs XYZ tickets, to see
 which of them turned out to actually be not so crucial as expected.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5059#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5047 [Obfsproxy]: Implement basic usage statistics in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5047: Implement basic usage statistics in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  karsten 
 Type:  enhancement  | Status:  assigned
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by nickm):

 Replying to [comment:7 asn]:
  If #5101 gets merged, it will break the current version of the python
 script.

 #5101 got merged; the script will need tweaking.  Also, IPs are now
 scrubbed by default; the script will need to handle that if it doesn't
 already.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5047#comment:8
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5053 [Tor Bridge]: Fix IPv6 implementation for bridge statistics

2012-02-12 Thread Tor Bug Tracker Wiki
#5053: Fix IPv6 implementation for bridge statistics
+---
 Reporter:  karsten |  Owner:
 Type:  defect  | Status:  needs_revision
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
Changes (by nickm):

  * status:  needs_review = needs_revision


Comment:

 I think that the return value for geop_get_country_by_addr() is wrong: -1
 means we have no geoip file loaded, not country unknown.  The unknown
 country is 0, right?

 Note to self: When I merge this, I should also change clientmap_entry_hash
 so that it considers the 'action' field as well.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5053#comment:9
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by nickm):

 Reviewing the whole series as one diff...

 Why strmap_set_lc, and not strmap_set?

 Should connections be static?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:11
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5093 [Obfsproxy]: Mysterious Resource temporarily unavailable errors

2012-02-12 Thread Tor Bug Tracker Wiki
#5093: Mysterious Resource temporarily unavailable errors
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by nickm):

 Replying to [comment:10 therealditzydoo]:
  I am now running libevent-2.0.17-stable (the latest version) and still
 get these errors. Here is some example output at debug level.
 

 I'm not seeing any Resource temporarily available instances in those
 logs.  Are they showing up in a different section, or am I missing
 something here?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5093#comment:11
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5093 [Obfsproxy]: Mysterious Resource temporarily unavailable errors

2012-02-12 Thread Tor Bug Tracker Wiki
#5093: Mysterious Resource temporarily unavailable errors
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by nickm):

 Replying to [comment:8 arma]:
  I'm seeing it on moria1 too, with libevent 2.0.16. EAGAIN accounts for
 the majority of the errnos that I see, actually.

 Can you paste some of those?  It is okay for errno=EAGAIN to be set, so
 long as the BEV_EVENT_ERROR flag is not set.  If there is no
 BEV_EVENT_ERROR, then a socket error hasn't occurred (it's probably just
 an eof or timeout), and so it is okay for errno to be whatever it wants to
 be.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5093#comment:12
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5093 [Obfsproxy]: Mysterious Resource temporarily unavailable errors

2012-02-12 Thread Tor Bug Tracker Wiki
#5093: Mysterious Resource temporarily unavailable errors
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by arma):

 Replying to [comment:11 nickm]:
  Replying to [comment:10 therealditzydoo]:
   I am now running libevent-2.0.17-stable (the latest version) and still
 get these errors. Here is some example output at debug level.
  
 
  I'm not seeing any Resource temporarily available instances in those
 logs.  Are they showing up in a different section, or am I missing
 something here?

 Errno 35 is EAGAIN on openbsd.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5093#comment:13
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5093 [Obfsproxy]: Mysterious Resource temporarily unavailable errors

2012-02-12 Thread Tor Bug Tracker Wiki
#5093: Mysterious Resource temporarily unavailable errors
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by nickm):

 Replying to [comment:13 arma]:
  Replying to [comment:11 nickm]:
   Replying to [comment:10 therealditzydoo]:
I am now running libevent-2.0.17-stable (the latest version) and
 still get these errors. Here is some example output at debug level.
   
  
   I'm not seeing any Resource temporarily available instances in those
 logs.  Are they showing up in a different section, or am I missing
 something here?
 
  Errno 35 is EAGAIN on openbsd.

 But those have what=0x0011 errno=35 ; 0x11 is
 BEV_EVENT_READING|BEV_EVENT_EOF.  There's no error there.  As noted above,
 unless BEV_EVENT_ERROR (0x20) is set in the what argument, the value of
 errno is unlikely to be meaningful.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5093#comment:14
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5093 [Obfsproxy]: Mysterious Resource temporarily unavailable errors

2012-02-12 Thread Tor Bug Tracker Wiki
#5093: Mysterious Resource temporarily unavailable errors
--+-
Reporter:  arma   |   Owner:  asn   
Type:  defect |  Status:  closed
Priority:  normal |   Milestone:
   Component:  Obfsproxy  | Version:
  Resolution:  not a bug  |Keywords:
  Parent: |  Points:
Actualpoints: |  
--+-
Changes (by nickm):

  * status:  new = closed
  * resolution:  = not a bug


Comment:

 Sounds like a reasonable change.  Done in
 9fe5f1c79b0161a6aecfa3dc7c80204fe9ddfee1. Closing.  Thanks for being
 patient here!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5093#comment:16
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5053 [Tor Bridge]: Fix IPv6 implementation for bridge statistics

2012-02-12 Thread Tor Bug Tracker Wiki
#5053: Fix IPv6 implementation for bridge statistics
+---
 Reporter:  karsten |  Owner:
 Type:  defect  | Status:  needs_revision
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 Replying to [comment:9 nickm]:
  I think that the return value for geop_get_country_by_addr() is wrong:
 -1 means we have no geoip file loaded, not country unknown.  The
 unknown country is 0, right?

 Well, we don't have any geoip information about ipv6 addresses loaded. So
 I think it could count as ambiguous.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5053#comment:10
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5082 [Tor Client]: Tor cleans out environment before launching obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5082: Tor cleans out environment before launching obfsproxy
+---
 Reporter:  Sebastian   |  Owner:
 Type:  task| Status:  needs_review  
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Client  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by arma):

 Replying to [comment:7 arma]:
  I also tested it and it works.

 For posterity, here was my obfsproxy patch for testing it:
 {{{
 diff --git a/src/managed.c b/src/managed.c
 index 01814f8..ffa40a8 100644
 --- a/src/managed.c
 +++ b/src/managed.c
 @@ -26,6 +26,9 @@

  #include container.h

 +#include unistd.h
 +extern char **environ;
 +
  #include event2/event.h
  #include event2/listener.h

 @@ -430,6 +433,12 @@ handle_environment(managed_proxy_t *proxy)
char *tmp;
enum env_parsing_status status=ST_ENV_SMOOTH;

 +  char **environ_tmp = environ;
 +  while (*environ_tmp) {
 +log_info(env: %s, *environ_tmp);
 +environ_tmp++;
 +  }
 +
tmp = getenv(TOR_PT_STATE_LOCATION);
if (!tmp) {
  status = ST_ENV_FAIL_STATE_LOC;
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5082#comment:11
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5053 [Tor Bridge]: Fix IPv6 implementation for bridge statistics

2012-02-12 Thread Tor Bug Tracker Wiki
#5053: Fix IPv6 implementation for bridge statistics
+---
 Reporter:  karsten |  Owner:
 Type:  defect  | Status:  needs_revision
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by nickm):

 Replying to [comment:10 arma]:
  Replying to [comment:9 nickm]:
   I think that the return value for geop_get_country_by_addr() is wrong:
 -1 means we have no geoip file loaded, not country unknown.  The
 unknown country is 0, right?
 
  Well, we don't have any geoip information about ipv6 addresses loaded.
 So I think it could count as ambiguous.

 If we want to count ipv6 as ??, then the answer must be unknown
 country.  If we return -1, then we won't count it.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5053#comment:11
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  needs_review  
 Priority:  critical|  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
Changes (by nickm):

  * status:  new = needs_review


Comment:

 My public branch bug5084 works for armadev.  It should get squashed and
 merged.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:13
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5065 [Tor Client]: Executable paths for shasum/openssl not protected against whitespace

2012-02-12 Thread Tor Bug Tracker Wiki
#5065: Executable paths for shasum/openssl not protected against whitespace
---+
Reporter:  Sebastian   |   Owner:
Type:  defect  |  Status:  closed
Priority:  major   |   Milestone:  Tor: 0.2.2.x-final
   Component:  Tor Client  | Version:
  Resolution:  fixed   |Keywords:
  Parent:  |  Points:
Actualpoints:  |  
---+
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Merged into 0.2.2 and master.  Cherry-picked the checkspaces thing.
 Thanks!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5065#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5084 [Tor Bridge]: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n == 0 failed

2012-02-12 Thread Tor Bug Tracker Wiki
#5084: pt_prepare_proxy_list_for_config_read: Assertion unconfigured_proxies_n 
==
0 failed
---+
Reporter:  arma|   Owner:
Type:  defect  |  Status:  closed
Priority:  critical|   Milestone:  Tor: 0.2.3.x-final
   Component:  Tor Bridge  | Version:
  Resolution:  fixed   |Keywords:
  Parent:  |  Points:
Actualpoints:  |  
---+
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Merging; thanks for the help here, everybody!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5084#comment:14
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5103 [Tor Bridge]: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt which doesn't exist

2012-02-12 Thread Tor Bug Tracker Wiki
#5103: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt 
which
doesn't exist
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  needs_review   
 Priority:  normal   |  Milestone:  Tor: 0.2.2.x-final 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
Changes (by nickm):

  * milestone:  = Tor: 0.2.2.x-final


Comment:

 Whoops; this should go onto 0.2.2.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5103#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5085 [Obfsproxy]: managed obfsproxy does not quit if tor dies

2012-02-12 Thread Tor Bug Tracker Wiki
#5085: managed obfsproxy does not quit if tor dies
---+
 Reporter:  arma   |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  minor  |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+

Comment(by arma):

 I think it's not urgent to get a fix for this in, if it involves a whole
 lot of code, assuming it really only happens when Tor crashes. We should
 fix the Tor crashes in that case.

 Apparently twilde saw it happen on a normal Tor exit though? If that's the
 case then there's a Tor bug there too.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5085#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5106 [Obfsproxy]: Clarify obfsproxy proposal wrt use of TOR_PT_EXTENDED_SERVER_PORT env variable

2012-02-12 Thread Tor Bug Tracker Wiki
#5106: Clarify obfsproxy proposal wrt use of TOR_PT_EXTENDED_SERVER_PORT env
variable
---+
 Reporter:  Sebastian  |  Owner:  asn
 Type:  defect | Status:  new
 Priority:  normal |  Milestone: 
Component:  Obfsproxy  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+
 In #5097 we made some changes, and then made some more changes in Tor on
 top of rransom's 5097 branches. We should extend the spec to say that if
 Tor sets an empty env variable, that means tor doesn't use the extended
 orport functionality.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5106
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5104 [Tor Bridge]: Tor should give managed proxies its ORListenAddress

2012-02-12 Thread Tor Bug Tracker Wiki
#5104: Tor should give managed proxies its ORListenAddress
+---
 Reporter:  rransom |  Owner: 
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Tor Bridge  |Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---

Comment(by nickm):

 I think this is related to, or a duplicate of, #4865.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5104#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5103 [Tor Bridge]: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt which doesn't exist

2012-02-12 Thread Tor Bug Tracker Wiki
#5103: --enable-static-tor barfs on openbsd 'cause it tries to link in -lrt 
which
doesn't exist
-+--
 Reporter:  therealditzydoo  |  Owner: 
 Type:  defect   | Status:  needs_review   
 Priority:  normal   |  Milestone:  Tor: 0.2.2.x-final 
Component:  Tor Bridge   |Version:  Tor: 0.2.3.11-alpha
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--

Comment(by Sebastian):

 Currently failing to get --enable-static-tor to work on debian without the
 patch, so testing isn't exactly trivial. I think we should postpone this
 here, because there's a workaround and building completely static tor
 isn't exactly standard

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5103#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5087 [Obfsproxy]: configure should realize libssl-dev is missing

2012-02-12 Thread Tor Bug Tracker Wiki
#5087: configure should realize libssl-dev is missing
-+--
 Reporter:  Monotoko |  Owner:  asn  
 Type:  defect   | Status:  new  
 Priority:  normal   |  Milestone:   
Component:  Obfsproxy|Version:   
 Keywords:  make, openssl, implicit declaration  | Parent:  #5009
   Points:   |   Actualpoints:   
-+--
Changes (by Sebastian):

  * priority:  major = normal


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5087#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #4566 [Obfsproxy]: Make Tor work with obfsproxy and obfs2

2012-02-12 Thread Tor Bug Tracker Wiki
#4566: Make Tor work with obfsproxy and obfs2
---+
 Reporter:  karsten|  Owner:  asn 
 Type:  project| Status:  new 
 Priority:  normal |  Milestone:  Sponsor G: June 30, 2012
Component:  Obfsproxy  |Version:  
 Keywords: | Parent:  
   Points: |   Actualpoints:  
---+

Comment(by Sebastian):

 Users are doing obfs2. Does that count already?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/4566#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #4566 [Obfsproxy]: Make Tor work with obfsproxy and obfs2

2012-02-12 Thread Tor Bug Tracker Wiki
#4566: Make Tor work with obfsproxy and obfs2
---+
 Reporter:  karsten|  Owner:  asn 
 Type:  project| Status:  new 
 Priority:  normal |  Milestone:  Sponsor G: June 30, 2012
Component:  Obfsproxy  |Version:  
 Keywords: | Parent:  
   Points: |   Actualpoints:  
---+

Comment(by arma):

 Yes, I think it counts.

 We even have a bundle, in the hands of thousands of users, so we've gone
 beyond the milestone.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/4566#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5068 [Obfsproxy]: memory leak in obfsproxy when using weird args

2012-02-12 Thread Tor Bug Tracker Wiki
#5068: memory leak in obfsproxy when using weird args
--+-
Reporter:  arma   |   Owner:  asn   
Type:  defect |  Status:  closed
Priority:  normal |   Milestone:
   Component:  Obfsproxy  | Version:
  Resolution:  fixed  |Keywords:
  Parent: |  Points:
Actualpoints: |  
--+-
Changes (by arma):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Merged. Thanks!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5068#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5053 [Tor Bridge]: Fix IPv6 implementation for bridge statistics

2012-02-12 Thread Tor Bug Tracker Wiki
#5053: Fix IPv6 implementation for bridge statistics
+---
 Reporter:  karsten |  Owner:
 Type:  defect  | Status:  needs_revision
 Priority:  major   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor Bridge  |Version:
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by karsten):

 Replying to [comment:11 nickm]:
  Replying to [comment:10 arma]:
   Replying to [comment:9 nickm]:
I think that the return value for geop_get_country_by_addr() is
 wrong: -1 means we have no geoip file loaded, not country unknown.
 The unknown country is 0, right?
  
   Well, we don't have any geoip information about ipv6 addresses loaded.
 So I think it could count as ambiguous.
 
  If we want to count ipv6 as ??, then the answer must be unknown
 country.  If we return -1, then we won't count it.

 I was wondering about -1 vs. 0, too.  I picked -1 here because we have no
 geoip file loaded is the correct answer and because all places calling
 geoip_get_country_by_ip() check for country_idx  0 and set it to 0 if
 they want to treat both cases as country unknown.  Now, I'm not sure if
 that's the cleanest approach, but I didn't want to touch it.

 Linus and I are going to test this patch today.  We're going to check
 whether IPv6 addresses are counted as ?? with the -1 result.

 But if you like 0 better, I don't mind at all changing that.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5053#comment:12
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5107 [Vidalia]: Usability problem: if you add a bridge and click ok, but didn't click +, you don't add the bridge

2012-02-12 Thread Tor Bug Tracker Wiki
#5107: Usability problem: if you add a bridge and click ok, but didn't click +,
you don't add the bridge
-+--
 Reporter:  arma |  Owner:  chiiph
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  Vidalia  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
 Go to settings-network, have some bridges already, paste a new onto the
 bridge text box, then click ok. You don't end up using the bridge.

 This is related to #4290, but is even more subtle since if your other
 bridges work you'll never even notice you didn't add this one.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5107
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5107 [Vidalia]: Usability problem: if you add a bridge and click ok, but didn't click +, you don't add the bridge

2012-02-12 Thread Tor Bug Tracker Wiki
#5107: Usability problem: if you add a bridge and click ok, but didn't click +,
you don't add the bridge
-+--
 Reporter:  arma |  Owner:  chiiph
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  Vidalia  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--

Comment(by arma):

 Maybe the right fix is for the 'ok' button to notice that there's text in
 the bridge text box, and automatically do the equivalent of clicking + for
 it? Are there any downsides to that approach?

 That would probably also be a better fix for mikeperry's bug in #4290 than
 git commit e46a569dd, since it would do-what-he-meant rather than tell-
 him-it-didn't-do-what-he-meant.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5107#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #4898 [Vidalia]: Build Korean TBB

2012-02-12 Thread Tor Bug Tracker Wiki
#4898: Build Korean TBB
-+--
 Reporter:  runa |  Owner:  chiiph  
 Type:  task | Status:  assigned
 Priority:  normal   |  Milestone:  
Component:  Vidalia  |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--
Changes (by runa):

  * status:  new = assigned
  * owner:  erinn = chiiph
  * component:  Tor bundles/installation = Vidalia


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/4898#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #5108 [Tor Check]: Enable Korean for Tor Check

2012-02-12 Thread Tor Bug Tracker Wiki
#5108: Enable Korean for Tor Check
---+
 Reporter:  runa   |  Owner:  nickm
 Type:  task   | Status:  new  
 Priority:  normal |  Milestone:   
Component:  Tor Check  |Version:   
 Keywords: | Parent:   
   Points: |   Actualpoints:   
---+
 The Korean translation of the Tor Check page is done, please enable it.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5108
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5083 [Obfsproxy]: Implement heartbeat message in obfsproxy

2012-02-12 Thread Tor Bug Tracker Wiki
#5083: Implement heartbeat message in obfsproxy
-+--
 Reporter:  karsten  |  Owner:  asn 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Obfsproxy|Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by karsten):

 Replying to [comment:11 nickm]:
  Reviewing the whole series as one diff...
 
  Why strmap_set_lc, and not strmap_set?

 I was thinking of two IPv6 addresses with uppercase and lowercase hex
 characters that should be considered equal.  If we're sure that doesn't
 happen, strmap_set should be fine.

  Should connections be static?

 Yes!  Fixed in the updated heartbeat_uniqueips branch.

 I also found another problem with strmap_t not liking NULL values, even
 though we don't care about values.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5083#comment:12
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs