[tor-bugs] #7992 [Tor bundles/installation]: Tor in Iran ( stuck in 25% Loading Network Stats Consensus) All versions!

2013-01-19 Thread Tor Bug Tracker Wiki
#7992: Tor in Iran ( stuck in 25% Loading Network Stats Consensus) All versions!
--+-
 Reporter:  urasilon  |  Owner:  erinn
 Type:  defect| Status:  new  
 Priority:  blocker   |  Milestone:   
Component:  Tor bundles/installation  |Version:   
 Keywords:| Parent:   
   Points:|   Actualpoints:   
--+-
 TOR network in IRAN/Tehran. It used to be working just yesterday . But
 today seems it is stuck in this

 step according to the LOG Files:

 25% Loading Network Stats Consensus

 according to TOR's Status:

 Loading Network Status

 is there any way to solve this problem ?
 Even bridges doesn't work.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7992
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7992 [Tor bundles/installation]: Tor in Iran ( stuck in 25% Loading Network Stats Consensus) All versions!

2013-01-19 Thread Tor Bug Tracker Wiki
#7992: Tor in Iran ( stuck in 25% Loading Network Stats Consensus) All versions!
--+-
 Reporter:  urasilon  |  Owner:  erinn
 Type:  defect| Status:  new  
 Priority:  blocker   |  Milestone:   
Component:  Tor bundles/installation  |Version:   
 Keywords:| Parent:   
   Points:|   Actualpoints:   
--+-

Comment(by asn):

 Which ISP?
 Check out this page:
 
https://trac.torproject.org/projects/tor/wiki/doc/OONI/censorshipwiki/CensorshipByCountry/Iran

 Also try these bundles:
 https://blog.torproject.org/blog/combined-flash-proxy-pyobfsproxy-browser-
 bundles
 they should work.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7992#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7993 [Ooni]: ooni frontpage points to wiki docs page, which very subtly points back to ooni docs page

2013-01-19 Thread Tor Bug Tracker Wiki
#7993: ooni frontpage points to wiki docs page, which very subtly points back to
ooni docs page
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 https://ooni.torproject.org/
 click on Documentation and you get to
 https://trac.torproject.org/projects/tor/wiki/doc/OONI
 apparently you're supposed to follow the really small link back to
 https://ooni.torproject.org/docs/

 Suggestion one would be to link from the ooni frontpage to the place you
 want people to go.

 Suggestion two would be to make the no, go to this page line on the wiki
 bigger.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7993
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7994 [Ooni]: ooni instructions don't say required libdnet and pypcap versions

2013-01-19 Thread Tor Bug Tracker Wiki
#7994: ooni instructions don't say required libdnet and pypcap versions
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 On https://github.com/hellais/ooni-probe#getting-started
 it says It's ideal to install these manually since the ones in debian or
 ubuntu are not up to date

 One day that statement will become false. Only you will know when that's
 the case. What is the version that you get from source right now? Is
 anything earlier than that acceptable?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7994
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7995 [Ooni]: ooni instructions say to use mkvirtualenv; wheezy doesn't easily have it

2013-01-19 Thread Tor Bug Tracker Wiki
#7995: ooni instructions say to use mkvirtualenv; wheezy doesn't easily have it
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 https://github.com/hellais/ooni-probe#getting-started
 says to apt-get install python-virtualenv virtualenvwrapper, and then has
 you run mkvirtualenv.

 Apparently there is some extra implicit step I'm supposed to do.

 At the least, your instructions should acknowledge that they won't work
 for wheezy users. Better is to make them work. :)

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7995
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7996 [Ooni]: scapy-based test example code has wrong example

2013-01-19 Thread Tor Bug Tracker Wiki
#7996: scapy-based test example code has wrong example
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 On (I think it was) https://ooni.torproject.org/docs/writing_tests.html
 there is some sample code using twisted.defer.inlineCallbacks() which
 calls
 {{{
 optParameters = [['target', 't', self.localOptions['target'], Specify the
 target to ping]]
 }}}

 Arturo thought part of this line was wrong -- self.localOptions should
 either be 127.0.0.1 or None.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7996
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7997 [Ooni]: Ooni documentation does not adequately explain Twisted

2013-01-19 Thread Tor Bug Tracker Wiki
#7997: Ooni documentation  does not adequately explain Twisted
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 Aaron says The OONI documentation is confusing because it doesn't explain
 Twisted.

 Isis says defer inline callbacks need to be explained, and maybe deferred
 lists too.

 Dominic suggests just a link to the Twisted documentation. Bonus points
 if you can find a fantastic twisted tutorial on the internet and link to
 it.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7997
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7997 [Ooni]: Ooni documentation does not adequately explain Twisted

2013-01-19 Thread Tor Bug Tracker Wiki
#7997: Ooni documentation  does not adequately explain Twisted
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---

Comment(by gsathya):

 Replying to [ticket:7997 arma]:
  Bonus points if you can find a fantastic twisted tutorial on the
 internet and link to it.
 http://krondo.com/?page_id=1327

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7997#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7998 [Ooni]: document user-agent randomization is enabled by default

2013-01-19 Thread Tor Bug Tracker Wiki
#7998: document user-agent randomization is enabled by default
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 user-agent randomization is enabled by default on the http test, and it's
 not mentioned anywhere in the documentation

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7998
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #7999 [Ooni]: Ooni: try inheriting from two templates at once

2013-01-19 Thread Tor Bug Tracker Wiki
#7999: Ooni: try inheriting from two templates at once
+---
 Reporter:  arma|  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---
 Dominic asks: Can I do a test that involves http and dns at once?

 If you bring in the http test template *and* the dns test template to do a
 test that involves both, will the keys in a given template clash in the
 resulting report? Does anything else fail in a surprising way?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7999
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7989 [Website]: revise OS X relay instructions

2013-01-19 Thread Tor Bug Tracker Wiki
#7989: revise OS X relay instructions
-+--
 Reporter:  phobos   |  Owner:  
 Type:  defect   | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Website  |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--
Changes (by mo):

  * status:  new = needs_review


Comment:

 I have committed a first version of the new instructions for Homebrew (rev
 26005). I don't own a Mac, so there are some sections I am unsure about
 (verification, uninstall, configuration location, sample config), but they
 should definitely be an improvement over the old useless instructions.

 Can someone fill me in on how to configure Tor to run as daemon?

 The document also states that at least 20kb/s are a good contribution as a
 relay. I don't think that's good advice nowadays.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7989#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8000 [TorBrowserButton]: Add interface to access HTTP(S) authenticated hidden services

2013-01-19 Thread Tor Bug Tracker Wiki
#8000: Add interface to access HTTP(S) authenticated hidden services
--+-
 Reporter:  lunar |  Owner:  mikeperry
 Type:  enhancement   | Status:  new  
 Priority:  normal|  Milestone:   
Component:  TorBrowserButton  |Version:   
 Keywords:| Parent:   
   Points:|   Actualpoints:   
--+-
 Tor support authenticated hidden services. Unfortunately, the easiest way
 to currently reach them is by modifying torrc.

 It would be great if the TorBrowser would offer an easier interface to
 reach HTTP(S) authenticated hidden services.

 A quick brainstorm lead to think that their could be two sides of this
 interface:

  * an option in the onion menu,
  * custom Unable to connect page for .onion that would say maybe this
 hidden service requires an auth cookie and a field to enter one.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8000
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8001 [Tor]: obfsproxy makes tor warn when one bridge is down

2013-01-19 Thread Tor Bug Tracker Wiki
#8001: obfsproxy makes tor warn when one bridge is down
+---
 Reporter:  arma|  Owner:
 Type:  defect  | Status:  new   
 Priority:  normal  |  Milestone:  Tor: 0.2.4.x-final
Component:  Tor |Version:
 Keywords:  tor-client  | Parent:
   Points:  |   Actualpoints:
+---
 When you run the fancy new flashproxy/obfsproxy bundle:
 https://blog.torproject.org/blog/combined-flash-proxy-pyobfsproxy-browser-
 bundles
 you get
 {{{
 Jan 19 15:09:17.120 [Warning] Proxy Client: unable to connect to
 208.79.90.242:55564 (server rejected connection)
 }}}

 That's because that bridge is down currently.

 When a bridge fails, we should probably only [warn] if no bridges have
 succeeded.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8001
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5662 [GetTor]: Add Obfsproxy TBB to GetTor

2013-01-19 Thread Tor Bug Tracker Wiki
#5662: Add Obfsproxy TBB to GetTor
---+
Reporter:  runa|   Owner:
Type:  task|  Status:  closed
Priority:  normal  |   Milestone:
   Component:  GetTor  | Version:
  Resolution:  fixed   |Keywords:
  Parent:  |  Points:
Actualpoints:  |  
---+
Changes (by kaner):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Ok, added asn's patch to GetTor. Added some help text about obfsproxy
 bundles to response mails, too. I'll open a ticket for the short user
 manual to add a section about obfsproxy.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5662#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8002 [Tor]: Mis-count of CPUs

2013-01-19 Thread Tor Bug Tracker Wiki
#8002: Mis-count of CPUs
-+--
 Reporter:  tmpname0901  |  Owner:
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:  Tor: 0.2.3.x-final
Component:  Tor  |Version:  Tor: 0.2.3.25 
 Keywords:  SMP  | Parent:
   Points:   |   Actualpoints:
-+--
 On start-up Tor v0.2.3.25/Linux says:

 [notice] Wow!  I detected that you have 64 CPUs. I will not autodetect
 any more than 16, though.  If you want to configure more, set NumCPUs in
 your torrc

 This is in a CentOS6/OpenVZ VPS with only a single virtual CPU.  Tor
 config param NumCPUs is not used.

 It turns out that OpenVZ, since version rhel6/042stab061.2, lists all the
 *host* CPUs in /sys/devices/system/cpu/.  It is this number of processors
 that is returned by the sysconf(_SC_NPROCESSORS_CONF) that Tor uses in
 ~/tor-0.2.3.25/src/common/compat.c to determine CPU count.

 From the command line:

 # getconf _NPROCESSORS_ONLN
 1

 Programmatically:

 $ /tmp/main
 sysconf() says: 64
 Wow, too many CPUs: 64

 I know that there's not much you can do about a sysconf() that lies.  I
 want to get this on the record, though, for the sake of Tor's future auto-
 scaling.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8002
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8003 [Quality Assurance and Testing]: Short user manual should add some text about obfsproxy bundles

2013-01-19 Thread Tor Bug Tracker Wiki
#8003: Short user manual should add some text about obfsproxy bundles
---+
 Reporter:  kaner  |  Owner:  cypherpunks
 Type:  enhancement| Status:  new
 Priority:  normal |  Milestone: 
Component:  Quality Assurance and Testing  |Version: 
 Keywords: | Parent: 
   Points: |   Actualpoints: 
---+
 The short user manual we send out with GetTor should add some text about
 the Tor Obfsproxy Bundle that just got added to GetTor.

 Assinging this to component Quality Assurance and Testing for lack of a
 better component.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8003
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5823 [Tor]: Remove dirreq-v2-* and dirreq-v?-share statistics

2013-01-19 Thread Tor Bug Tracker Wiki
#5823: Remove dirreq-v2-* and dirreq-v?-share statistics
+---
 Reporter:  karsten |  Owner:  karsten   
 Type:  enhancement | Status:  needs_review  
 Priority:  minor   |  Milestone:  Tor: 0.2.4.x-final
Component:  Tor |Version:
 Keywords:  easy tor-relay  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by karsten):

 Here's the `stats/dirreq-stats` file from my test relay written 24 hours
 after the relay was started:

 {{{
 dirreq-stats-end 2013-01-19 07:28:27 (86400 s)
 dirreq-v3-ips
 
it=16,us=16,br=8,ca=8,cz=8,de=8,eg=8,es=8,fr=8,gb=8,ie=8,il=8,ir=8,ng=8,nl=8,ru=8,sa=8,sd=8,sg=8,si=8,sy=8,tg=8,th=8,tr=8
 dirreq-v3-reqs
 
it=16,us=16,br=8,ca=8,cz=8,de=8,eg=8,es=8,fr=8,gb=8,ie=8,il=8,ir=8,ng=8,nl=8,ru=8,sa=8,sd=8,sg=8,si=8,sy=8,tg=8,th=8,tr=8
 dirreq-v3-resp ok=64,not-enough-sigs=0,unavailable=0,not-found=0,not-
 modified=16,busy=0
 dirreq-v3-direct-dl complete=0,timeout=0,running=0
 dirreq-v3-tunneled-dl
 
complete=60,timeout=4,running=0,min=2176,d1=20257,d2=31323,q1=39711,d3=45486,d4=62359,md=71595,d6=73982,d7=76214,q3=77018,d8=78153,d9=78977,max=81316
 }}}

 Everything looks good there.  That relay didn't publish a new extra-info
 descriptor with these statistics, but I don't see how that should fail.
 The relay was still running 30 hours after I started it, and now I shut it
 down.  Should be safe to merge my bug5823 branch.  Thanks!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5823#comment:10
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8004 [arm]: Saving log file to ~/foo.txt doesn't work as 'expected'

2013-01-19 Thread Tor Bug Tracker Wiki
#8004: Saving log file to ~/foo.txt doesn't work as 'expected'
-+--
 Reporter:  gsathya  |  Owner:  atagar
 Type:  enhancement  | Status:  new   
 Priority:  normal   |  Milestone:
Component:  arm  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
 When you save a log file to ~/foo.txt it creates a new folder called '~'
 in pwd and saves a 'foo.txt' log file in that folder.

 A more intuitive approach would be to expand '~' to the users $HOME dir.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8004
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8004 [arm]: Saving log file to ~/foo.txt doesn't work as 'expected'

2013-01-19 Thread Tor Bug Tracker Wiki
#8004: Saving log file to ~/foo.txt doesn't work as 'expected'
-+--
 Reporter:  gsathya  |  Owner:  atagar  
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  arm  |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--
Changes (by gsathya):

  * status:  new = needs_review


Comment:

 I have a patch for this on my bug8004 branch -
 https://github.com/gsathya/arm/compare/bug8004

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8004#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #5823 [Tor]: Remove dirreq-v2-* and dirreq-v?-share statistics

2013-01-19 Thread Tor Bug Tracker Wiki
#5823: Remove dirreq-v2-* and dirreq-v?-share statistics
+---
Reporter:  karsten  |   Owner:  karsten   
Type:  enhancement  |  Status:  closed
Priority:  minor|   Milestone:  Tor: 0.2.4.x-final
   Component:  Tor  | Version:
  Resolution:  implemented  |Keywords:  easy tor-relay
  Parent:   |  Points:
Actualpoints:   |  
+---
Changes (by nickm):

  * status:  needs_review = closed
  * resolution:  = implemented


Comment:

 Excellent; merging.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/5823#comment:11
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7907 [EFF-HTTPS Everywhere]: disable ruleset for dafont.com

2013-01-19 Thread Tor Bug Tracker Wiki
#7907: disable ruleset for dafont.com
-+--
Reporter:  cypherpunks   |   Owner:  pde   
Type:  task  |  Status:  closed
Priority:  normal|   Milestone:
   Component:  EFF-HTTPS Everywhere  | Version:
  Resolution:  fixed |Keywords:  httpse-ruleset-bug
  Parent:|  Points:
Actualpoints:|  
-+--
Changes (by cypherpunks):

  * status:  new = closed
  * resolution:  = fixed


Comment:

 The certificate was renewed on 15th january for 1 year. So I am closing
 this bug report.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7907#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8005 [Stem]: stem parse_file errors when using descriptor_type='server-descriptor 1.0'

2013-01-19 Thread Tor Bug Tracker Wiki
#8005: stem parse_file errors when using descriptor_type='server-descriptor 1.0'
-+--
 Reporter:  cypherpunks  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  Stem |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
 On a call like
   stem.descriptor.parse_file(f,'server-descriptor 1.0')
 the new parse_file() fails with an error like
   ValueError: Line contains invalid characters: @downloaded-at 2012-09-17
 17:44:50
 or
   ValueError: Line contains invalid characters: @type server-descriptor
 1.0
 when it encounters annotations in a descriptor file, and it fails with an
 error like
   ValueError: The 'router' entry can only appear once in a descriptor
 when there are no annotations but multiple router entries.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8005
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8006 [Torsocks]: Unnecessary test in torsocks script

2013-01-19 Thread Tor Bug Tracker Wiki
#8006: Unnecessary test in torsocks script
--+-
 Reporter:  dma   |  Owner: 
 Type:  defect| Status:  new
 Priority:  normal|  Milestone: 
Component:  Torsocks  |Version: 
 Keywords:| Parent: 
   Points:|   Actualpoints: 
--+-
 Torsocks suggests running with no arguments to start a shell, however the
 launcher script errors when no arguments are passed. Attached patch fixes
 this.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8006
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8006 [Torsocks]: Unnecessary test in torsocks script

2013-01-19 Thread Tor Bug Tracker Wiki
#8006: Unnecessary test in torsocks script
--+-
 Reporter:  dma   |  Owner:  
 Type:  defect| Status:  needs_review
 Priority:  normal|  Milestone:  
Component:  Torsocks  |Version:  
 Keywords:| Parent:  
   Points:|   Actualpoints:  
--+-
Changes (by dma):

  * status:  new = needs_review


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8006#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8007 [Vidalia]: Wingwn10.dll missing + 0xc00009

2013-01-19 Thread Tor Bug Tracker Wiki
#8007: Wingwn10.dll missing + 0xc9
+---
 Reporter:  tonyspa89   |  Owner:  chiiph   

 Type:  defect  | Status:  new  

 Priority:  major   |  Milestone:   

Component:  Vidalia |Version:  Tor: 
0.2.3.25
 Keywords:  Vidalia, Tor, 0xc906, Wingwm10.dll  | Parent:   

   Points:  |   Actualpoints:   

+---
 Downloaded TBB v.2.3.25-2 ran it .
 Start TorBrowser and got error: file Wingwm10.dll (vidalia.exe)is missing.
 Reran the exe file. File was present then.
 Start TorBrowser and got error: Error 0xc906 (vidalia.exe). Tried re-
 installing several times but can't get it to work.
 Help?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8007
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8006 [Torsocks]: Unnecessary test in torsocks script

2013-01-19 Thread Tor Bug Tracker Wiki
#8006: Unnecessary test in torsocks script
-+--
Reporter:  dma   |   Owner:
Type:  defect|  Status:  closed
Priority:  normal|   Milestone:
   Component:  Torsocks  | Version:
  Resolution:  wontfix   |Keywords:
  Parent:|  Points:
Actualpoints:|  
-+--
Changes (by dma):

  * status:  needs_review = closed
  * resolution:  = wontfix


Comment:

 better fix is already a pending change

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8006#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8007 [Vidalia]: Wingwn10.dll missing + 0xc00009

2013-01-19 Thread Tor Bug Tracker Wiki
#8007: Wingwn10.dll missing + 0xc9
+---
 Reporter:  tonyspa89   |  Owner:  chiiph   

 Type:  defect  | Status:  new  

 Priority:  major   |  Milestone:   

Component:  Vidalia |Version:  Tor: 
0.2.3.25
 Keywords:  Vidalia, Tor, 0xc906, Wingwm10.dll  | Parent:   

   Points:  |   Actualpoints:   

+---

Comment(by tonyspa89):

 Add:

 It was working fine the first time I installed it but then I turned off
 the computer and the next day I tried Start TorBrowser again and it showed
 these errors.
 I have Windows 7 64 bits

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8007#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8003 [Quality Assurance and Testing]: Short user manual should add some text about obfsproxy bundles

2013-01-19 Thread Tor Bug Tracker Wiki
#8003: Short user manual should add some text about obfsproxy bundles
---+
 Reporter:  kaner  |  Owner:  Runa
 Type:  enhancement| Status:  assigned
 Priority:  normal |  Milestone:  
Component:  Quality Assurance and Testing  |Version:  
 Keywords: | Parent:  
   Points: |   Actualpoints:  
---+
Changes (by kaner):

  * owner:  cypherpunks = Runa
  * status:  new = assigned


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8003#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8008 [Ooni]: exclude logs from git

2013-01-19 Thread Tor Bug Tracker Wiki
#8008: exclude logs from git
-+--
 Reporter:  dma  |  Owner:  hellais
 Type:  enhancement  | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Ooni |Version: 
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
 logs and yamloo outputs are being included in the local git view. They
 really shouldn't be. We do still want before_i_commit.log to be included
 though.

 Patch to .gitignore attached.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8008
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8009 [Ooni]: exclude logs from git

2013-01-19 Thread Tor Bug Tracker Wiki
#8009: exclude logs from git
-+--
 Reporter:  dma  |  Owner:  hellais
 Type:  enhancement  | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Ooni |Version: 
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
 logs and yamloo outputs are being included in the local git view. They
 really shouldn't be. We do still want before_i_commit.log to be included
 though.

 Patch to .gitignore attached.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8009
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8009 [Ooni]: exclude logs from git

2013-01-19 Thread Tor Bug Tracker Wiki
#8009: exclude logs from git
-+--
 Reporter:  dma  |  Owner:  hellais 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Ooni |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--
Changes (by dma):

  * status:  new = needs_review


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8009#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8010 [Ooni]: remove unnecessary imports

2013-01-19 Thread Tor Bug Tracker Wiki
#8010: remove unnecessary imports
+---
 Reporter:  dma |  Owner:  hellais
 Type:  defect  | Status:  new
 Priority:  normal  |  Milestone: 
Component:  Ooni|Version: 
 Keywords:  | Parent: 
   Points:  |   Actualpoints: 
+---


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8010
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8010 [Ooni]: remove unnecessary imports

2013-01-19 Thread Tor Bug Tracker Wiki
#8010: remove unnecessary imports
+---
 Reporter:  dma |  Owner:  hellais 
 Type:  defect  | Status:  needs_review
 Priority:  normal  |  Milestone:  
Component:  Ooni|Version:  
 Keywords:  | Parent:  
   Points:  |   Actualpoints:  
+---
Changes (by dma):

  * status:  new = needs_review


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8010#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8011 [Ooni]: add lua test

2013-01-19 Thread Tor Bug Tracker Wiki
#8011: add lua test
-+--
 Reporter:  dma  |  Owner:  hellais
 Type:  enhancement  | Status:  new
 Priority:  normal   |  Milestone: 
Component:  Ooni |Version: 
 Keywords:   | Parent: 
   Points:   |   Actualpoints: 
-+--
 Adding a new test case to spawn lua scripts and add their output to the
 result dict.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8011
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8011 [Ooni]: add lua test

2013-01-19 Thread Tor Bug Tracker Wiki
#8011: add lua test
-+--
 Reporter:  dma  |  Owner:  hellais 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Ooni |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--
Changes (by dma):

  * status:  new = needs_review


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8011#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8003 [Quality Assurance and Testing]: Short user manual should add some text about obfsproxy bundles

2013-01-19 Thread Tor Bug Tracker Wiki
#8003: Short user manual should add some text about obfsproxy bundles
---+
 Reporter:  kaner  |  Owner:  runa
 Type:  enhancement| Status:  assigned
 Priority:  normal |  Milestone:  
Component:  Quality Assurance and Testing  |Version:  
 Keywords: | Parent:  
   Points: |   Actualpoints:  
---+
Changes (by runa):

  * owner:  Runa = runa


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8003#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7990 [arm]: NameError: global name 'enumeration' is not defined

2013-01-19 Thread Tor Bug Tracker Wiki
#7990: NameError: global name 'enumeration' is not defined
+---
Reporter:  gsathya  |   Owner:  atagar
Type:  defect   |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  arm  | Version:
  Resolution:  fixed|Keywords:
  Parent:   |  Points:
Actualpoints:   |  
+---
Changes (by atagar):

  * status:  reopened = closed
  * resolution:  = fixed


Comment:

 Ok, stopped being lazy and reproed it this time. It should now be fixed
 for realz. :P

 
https://gitweb.torproject.org/arm.git/commitdiff/0d396cc60c710d8a7ecc726b7f7ea82900a0afa0

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7990#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7991 [arm]: IOError: 'module' object has no attribute 'controller'

2013-01-19 Thread Tor Bug Tracker Wiki
#7991: IOError: 'module' object has no attribute 'controller'
+---
Reporter:  gsathya  |   Owner:  atagar
Type:  defect   |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  arm  | Version:
  Resolution:  fixed|Keywords:
  Parent:   |  Points:
Actualpoints:   |  
+---
Changes (by atagar):

  * status:  new = closed
  * resolution:  = fixed


Comment:

 Doh, that was stupid of me. Fixed.

 
https://gitweb.torproject.org/arm.git/commitdiff/8400b655e160c8b17b03a93047e00834b222f95b

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7991#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8004 [arm]: Saving log file to ~/foo.txt doesn't work as 'expected'

2013-01-19 Thread Tor Bug Tracker Wiki
#8004: Saving log file to ~/foo.txt doesn't work as 'expected'
+---
Reporter:  gsathya  |   Owner:  atagar
Type:  enhancement  |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  arm  | Version:
  Resolution:  fixed|Keywords:
  Parent:   |  Points:
Actualpoints:   |  
+---
Changes (by atagar):

  * status:  needs_review = closed
  * resolution:  = fixed


Comment:

 Pushed. Thanks for the patch!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8004#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8012 [Tor]: tor current compile breakage compat_libevent.c

2013-01-19 Thread Tor Bug Tracker Wiki
#8012: tor current compile breakage compat_libevent.c
+---
 Reporter:  yancm   |  Owner:  
 Type:  defect  | Status:  new 
 Priority:  normal  |  Milestone:  Tor: unspecified
Component:  Tor |Version:  unspeficied 
 Keywords:  | Parent:  
   Points:  |   Actualpoints:  
+---
 With NetBSD 5_Stable (i386), libevent-2.0.21,
 tracking current tor.

 Even after 'make clean' and autogen/configure...
 I get:
CC   src/common/compat_libevent.o
   src/common/compat_libevent.c: In function 'tor_check_libevent_version':
   src/common/compat_libevent.c:424: error: 'version' undeclared (first use
 in this function)
   src/common/compat_libevent.c:424: error: (Each undeclared identifier is
 reported only once
   src/common/compat_libevent.c:424: error: for each function it appears
 in.)
   *** Error code 1
   Stop.

 Unable to continue...

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8012
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8012 [Tor]: tor current compile breakage compat_libevent.c

2013-01-19 Thread Tor Bug Tracker Wiki
#8012: tor current compile breakage compat_libevent.c
+---
 Reporter:  yancm   |  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.4.x-final
Component:  Tor |Version:  unspeficied   
 Keywords:  tor-client  | Parent:
   Points:  |   Actualpoints:
+---
Changes (by nickm_mobile):

  * keywords:  = tor-client
  * priority:  normal = major
  * milestone:  Tor: unspecified = Tor: 0.2.4.x-final


Comment:

 I could swear I fixed that. What exact version of the master branch do you
 have?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8012#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8012 [Tor]: tor current compile breakage compat_libevent.c

2013-01-19 Thread Tor Bug Tracker Wiki
#8012: tor current compile breakage compat_libevent.c
+---
 Reporter:  yancm   |  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.4.x-final
Component:  Tor |Version:  unspeficied   
 Keywords:  tor-client  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by yancm):

 How do I check? I just type git pull and believe I am getting the latest
 dev version...

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8012#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8012 [Tor]: tor current compile breakage compat_libevent.c

2013-01-19 Thread Tor Bug Tracker Wiki
#8012: tor current compile breakage compat_libevent.c
+---
 Reporter:  yancm   |  Owner:
 Type:  defect  | Status:  new   
 Priority:  major   |  Milestone:  Tor: 0.2.4.x-final
Component:  Tor |Version:  unspeficied   
 Keywords:  tor-client  | Parent:
   Points:  |   Actualpoints:
+---

Comment(by yancm):

 Sorry, I think it is: 0.2.4.9-alpha-dev

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8012#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8011 [Ooni]: add test that can run scripts through an interpreter (was: add lua test)

2013-01-19 Thread Tor Bug Tracker Wiki
#8011: add test that can run scripts through an interpreter
-+--
 Reporter:  dma  |  Owner:  hellais 
 Type:  enhancement  | Status:  needs_review
 Priority:  normal   |  Milestone:  
Component:  Ooni |Version:  
 Keywords:   | Parent:  
   Points:   |   Actualpoints:  
-+--

Comment(by dma):

 Added replacement 'script.patch' patch that extends this to allow other
 interpreters than lua.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8011#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7539 [EFF-HTTPS Everywhere]: Amazon Web Services rule prevents product images from loading

2013-01-19 Thread Tor Bug Tracker Wiki
#7539: Amazon Web Services rule prevents product images from loading
-+--
Reporter:  subsection1t  |   Owner:  pde   
Type:  defect|  Status:  closed
Priority:  normal|   Milestone:
   Component:  EFF-HTTPS Everywhere  | Version:
  Resolution:  fixed |Keywords:  httpse-ruleset-bug
  Parent:|  Points:
Actualpoints:|  
-+--
Changes (by pde):

  * status:  accepted = closed
  * resolution:  = fixed


-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7539#comment:5
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7777 [EFF-HTTPS Everywhere]: openoffice.org invalid security certificate

2013-01-19 Thread Tor Bug Tracker Wiki
#: openoffice.org invalid security certificate
-+--
Reporter:  cypherpunks   |   Owner:  pde   
Type:  defect|  Status:  closed
Priority:  normal|   Milestone:
   Component:  EFF-HTTPS Everywhere  | Version:  HTTPS-E 3.1   
  Resolution:  fixed |Keywords:  httpse-ruleset-bug
  Parent:|  Points:
Actualpoints:|  
-+--
Changes (by pde):

  * status:  new = closed
  * resolution:  = fixed


Comment:

 Fixed in 3.1.3

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7336 [EFF-HTTPS Everywhere]: [CHROME] Coursera.org assessment details page issues

2013-01-19 Thread Tor Bug Tracker Wiki
#7336: [CHROME] Coursera.org assessment details page issues
-+--
Reporter:  sofianeh  |   Owner:  pde
 
Type:  defect|  Status:  reopened   
 
Priority:  normal|   Milestone: 
 
   Component:  EFF-HTTPS Everywhere  | Version: 
 
  Resolution:|Keywords:  chrome, coursera, 
httpse-ruleset-bug
  Parent:|  Points: 
 
Actualpoints:|  
-+--
Changes (by pde):

  * keywords:  chrome, coursera = chrome, coursera, httpse-ruleset-bug


Comment:

 Can you see if this problem is persisting with the 2013.1.18 release?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7336#comment:7
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7855 [EFF-HTTPS Everywhere]: wouldMatch is not defined - cookies set in JS not secured

2013-01-19 Thread Tor Bug Tracker Wiki
#7855: wouldMatch is not defined - cookies set in JS not secured
-+--
Reporter:  cypherpunks   |   Owner:  pde  
Type:  defect|  Status:  closed   
Priority:  major |   Milestone:   
   Component:  EFF-HTTPS Everywhere  | Version:  HTTPS-E 3.1.2
  Resolution:  fixed |Keywords:   
  Parent:|  Points:   
Actualpoints:|  
-+--
Changes (by pde):

  * status:  accepted = closed
  * resolution:  = fixed


Comment:

 This should be fixed in 4.0development.5.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7855#comment:9
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7794 [EFF-HTTPS Everywhere]: [CHROME] HTTPS Everywhere breaks Sourceforge downloads

2013-01-19 Thread Tor Bug Tracker Wiki
#7794: [CHROME] HTTPS Everywhere breaks Sourceforge downloads
--+-
 Reporter:  cypherpunks   |  Owner:  pde
 Type:  defect| Status:  new
 Priority:  normal|  Milestone: 
Component:  EFF-HTTPS Everywhere  |Version: 
 Keywords:  httpse-ruleset-bug| Parent: 
   Points:|   Actualpoints: 
--+-
Changes (by pde):

  * keywords:  = httpse-ruleset-bug


Comment:

 Damn, missed this for the recent bugfix releases :/

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7794#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7794 [EFF-HTTPS Everywhere]: [CHROME] HTTPS Everywhere breaks Sourceforge downloads

2013-01-19 Thread Tor Bug Tracker Wiki
#7794: [CHROME] HTTPS Everywhere breaks Sourceforge downloads
-+--
Reporter:  cypherpunks   |   Owner:  pde   
Type:  defect|  Status:  closed
Priority:  normal|   Milestone:
   Component:  EFF-HTTPS Everywhere  | Version:
  Resolution:  fixed |Keywords:  httpse-ruleset-bug
  Parent:|  Points:
Actualpoints:|  
-+--
Changes (by pde):

  * status:  new = closed
  * resolution:  = fixed


Comment:

 Well, actually, that download seems to work for me in both Chrome and
 Firefox.  If anyone can sitll reproduce this, please reopen and we'll
 investigate further.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7794#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7745 [EFF-HTTPS Everywhere]: HTTPS-Everywhere 4.0dev3 breaks www.spotify.com/nl/

2013-01-19 Thread Tor Bug Tracker Wiki
#7745: HTTPS-Everywhere 4.0dev3 breaks www.spotify.com/nl/
-+--
Reporter:  cypherpunks   |   Owner:  pde   
Type:  defect|  Status:  closed
Priority:  normal|   Milestone:
   Component:  EFF-HTTPS Everywhere  | Version:  HTTPS-E 4.0dev3   
  Resolution:  fixed |Keywords:  httpse-ruleset-bug
  Parent:|  Points:
Actualpoints:|  
-+--
Changes (by pde):

  * status:  new = closed
  * resolution:  = fixed


Comment:

 I believe this should probably be fixed in 4.0dev5.  Please reopen if it
 isn't.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7745#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8005 [Stem]: stem parse_file errors when using descriptor_type='server-descriptor 1.0'

2013-01-19 Thread Tor Bug Tracker Wiki
#8005: stem parse_file errors when using descriptor_type='server-descriptor 1.0'
-+--
 Reporter:  cypherpunks  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  Stem |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--

Comment(by atagar):

  ValueError: Line contains invalid characters: @type server-descriptor
 1.0

 Oops! Sorry about that. Added a test to repro the issue and fixed...

 
https://gitweb.torproject.org/stem.git/commitdiff/3d3e69417975499fbe5d2a3eb591d808c6800874

  ValueError: Line contains invalid characters: @downloaded-at 2012-09-17
 17:44:50

 Hmmm, I'm not entirely sure about that one. Please attach a file that's
 causing this and the call you're using.

  ValueError: The 'router' entry can only appear once in a descriptor

 When I get the descriptor_type argument I'm treating it like a metrics
 archive. Maybe I should just drop the 'there's only one descriptor' check
 entirely. Please attach a small descriptor file that exemplifies this
 issue for me to use in the tests.

 Cheers! -Damian

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8005#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8013 [HTTPS Everywhere: Chrome]: Video in dailymail.co.uk broken

2013-01-19 Thread Tor Bug Tracker Wiki
#8013: Video in dailymail.co.uk broken
--+-
 Reporter:  NewEraCracker |  Owner:  pde
 Type:  defect| Status:  new
 Priority:  normal|  Milestone: 
Component:  HTTPS Everywhere: Chrome  |Version: 
 Keywords:| Parent: 
   Points:|   Actualpoints: 
--+-
 The video in the end of the following article is broken (loading forever)
 when HTTPS Everywhere is enabled in Chrome.

 http://www.dailymail.co.uk/sport/football/article-2263847/Cristiano-
 Ronaldo-appears-new-Nike-video.html

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8013
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7085 [Tor bundles/installation]: Integrate Cryptocat Browser Extension into Tor Browser Bundle

2013-01-19 Thread Tor Bug Tracker Wiki
#7085: Integrate Cryptocat Browser Extension into Tor Browser Bundle
--+-
 Reporter:  kaepora   |  Owner:  erinn  
  
 Type:  enhancement   | Status:  new
  
 Priority:  normal|  Milestone:  TorBrowserBundle 
2.2.x-stable
Component:  Tor bundles/installation  |Version:  Tor: unspecified   
  
 Keywords:| Parent: 
  
   Points:|   Actualpoints: 
  
--+-

Comment(by mikeperry):

 Unfortunately, putting Cryptocat into the default TBB is not zero
 cost/zero risk. Here's a list of things that would make me feel better
 about the decision.

 First and foremost, I'd want to be absolutely sure that it didn't
 potentially expose even users who didn't use it to XUL XSS bugs or other
 vulnerabilities. Related. I'd want to be sure the UI didn't confuse or
 distract users who didn't know what it was for.

 Second, I am very concerned that there were XUL XSS bugs in the chat
 windows. To me, that's a bad sign. Ideally, I'd like to see something on
 your side (ie a tag in your bugtracker or some other document you wrote)
 that enumerates the patches that resulted from your first audit.

 Third, while it does look like the audit was extremely thorough, I think
 I'd prefer a second one for this reason. XUL XSS is quite serious, and
 since you're writing a network-facing app with lots of user and network
 provided content, its critical that your code receives lots of this type
 of review. I also want to feel sure you understand the issues and
 vulnerability vectors here, so I can be confident they won't reappear in
 future versions as you add features.

 Fourth, I guess I am mildly concerned about the crypto security. I don't
 believe it's impossible to do crypto with JS, but I would prefer it if the
 underlying primitive implementations also had a chance for review,
 especially since our inclusion of this addon would probably be seen as
 endorsement of its crypto and security by many.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7085#comment:26
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #8014 [Tor]: nacl library not recognised during tor build

2013-01-19 Thread Tor Bug Tracker Wiki
#8014: nacl library not recognised during tor build
+---
 Reporter:  mr-4|  Owner:
 Type:  defect  | Status:  new   
 Priority:  normal  |  Milestone:
Component:  Tor |Version:  Tor: 0.2.4.8-alpha
 Keywords:  | Parent:
   Points:  |   Actualpoints:
+---
 during ./configure I get the following result:
 [...]
 checking whether we can use curve25519-donna-c64... no
 checking whether we can use curve25519 from nacl... no

 I do have nacl(-devel) installed on my machine. Closer inspection of
 config.log tells me that conftest.c has #include
 crypto_scalarmult_curve25519.h. That file is in /usr/include/nacl, so I
 had to add -I/usr/include/nacl for this particular error to pass.

 That didn't work though as I am now getting conftest.c:58:4: error:
 #error Hey, this is the reference implementation!. The conftest.c file
 itself has this:

 #include crypto_scalarmult_curve25519.h
 #ifdef crypto_scalarmult_curve25519_ref_BYTES
 #error Hey, this is the reference implementation!
 #endif

 crypto_scalarmult_curve25519_ref_BYTES is indeed defined in
 /usr/include/nacl/crypto_scalarmult_curve25519.h, so how am I supposed to
 satisfy this test then?

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8014
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #4379 [Vidalia]: workaround for setting socks port to 9050 on OS X does NOT work

2013-01-19 Thread Tor Bug Tracker Wiki
#4379: workaround for setting socks port to 9050 on OS X does NOT work
+---
Reporter:  lkasdfa  |   Owner:  chiiph   
Type:  defect   |  Status:  reopened 
Priority:  major|   Milestone:   
   Component:  Vidalia  | Version:  Tor: 0.2.2.34
  Resolution:   |Keywords:   
  Parent:   |  Points:   
Actualpoints:   |  
+---
Changes (by cypherpunks):

  * status:  closed = reopened
  * resolution:  fixed =


Comment:

 Hi,

 I'm a rather drunk mac user and I just spent (!) about ±30 minutes hacking
 this silly work around into your software. It sure was annoying and I
 almost feel like you don't use it very often. Please ship this fix
 already, how else are mac users to use say, Adium and Tor together on Mac
 OS X?

 Happy hacking!

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/4379#comment:6
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7085 [Tor bundles/installation]: Integrate Cryptocat Browser Extension into Tor Browser Bundle

2013-01-19 Thread Tor Bug Tracker Wiki
#7085: Integrate Cryptocat Browser Extension into Tor Browser Bundle
--+-
 Reporter:  kaepora   |  Owner:  erinn  
  
 Type:  enhancement   | Status:  new
  
 Priority:  normal|  Milestone:  TorBrowserBundle 
2.2.x-stable
Component:  Tor bundles/installation  |Version:  Tor: unspecified   
  
 Keywords:| Parent: 
  
   Points:|   Actualpoints: 
  
--+-

Comment(by kaepora):

 Replying to [comment:26 mikeperry]:

  Unfortunately, putting Cryptocat into the default TBB is not zero
 cost/zero risk. Here's a list of things that would make me feel better
 about the decision.
 
  First and foremost, I'd want to be absolutely sure that it didn't
 potentially expose even users who didn't use it to XUL XSS bugs or other
 vulnerabilities. Related. I'd want to be sure the UI didn't confuse or
 distract users who didn't know what it was for.
 
  Second, I am very concerned that there were XUL XSS bugs in the chat
 windows. To me, that's a bad sign. Ideally, I'd like to see something on
 your side (ie a tag in your bugtracker or some other document you wrote)
 that enumerates the patches that resulted from your first audit.

 The patches in which we fixed the audit bugs are enumerated (perhaps
 incompletely) in this [https://blog.crypto.cat/2012/11/security-update-
 our-first-full-audit/ blog post].

 
  Third, while it does look like the audit was extremely thorough, I think
 I'd prefer a second one for this reason. XUL XSS is quite serious, and
 since you're writing a network-facing app with lots of user and network
 provided content, its critical that your code receives lots of this type
 of review.

 Very well. Who would you recommend to perform the second audit? If you can
 give me a preferred auditor or a list of auditors that the Tor Project
 would feel comfortable with, I have no problem getting in touch with them.

  I also want to feel sure you understand the issues and vulnerability
 vectors here, so I can be confident they won't reappear in future versions
 as you add features.

 I can safely say that I strongly understand.

  Fourth, I guess I am mildly concerned about the crypto security. I don't
 believe it's impossible to do crypto with JS, but I would prefer it if the
 underlying primitive implementations also had a chance for review,
 especially since our inclusion of this addon would probably be seen as
 endorsement of its crypto and security by many.

 Our OTR implementation has been reviewed. If there is a specific type of
 further review you would wish to ask for, we can see it done.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7085#comment:27
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7797 [Tor]: tor DNS resolver unable to handle/return SRV type DNS records

2013-01-19 Thread Tor Bug Tracker Wiki
#7797: tor DNS resolver unable to handle/return SRV type DNS records
---+
 Reporter:  mr-4   |  Owner:
 Type:  defect | Status:  new   
 Priority:  normal |  Milestone:  Tor: unspecified  
Component:  Tor|Version:  Tor: 0.2.4.7-alpha
 Keywords:  tor-client dns needs-proposal  | Parent:
   Points: |   Actualpoints:
---+

Comment(by mr-4):

 I am going to attach 2 .spec files, new Makefile and ttdnsd.init files.

 They allow torsocks and ttdnsd to be nicely packaged in a rpm file
 (Fedora-based). The latter 2 files are for ttdnsd - the Makefile is a cut-
 down version of the original with a few modifications/improvements I've
 made to fit the standard directory hierarchy.

 The ttdnsd.init file is an improved and simplified version of the init.d
 script originally supplied in the ttdnsd.tar.gz archive.

 Hopefully this could be useful to the ttdnsd/torsocks devs. I am going to
 deploy torsocks/ttdnsd in the next few days to hopefully take advantage of
 its extended functionality and the ability to deal with SRV/NAPTR and
 other such record types.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7797#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8014 [Tor]: nacl library not recognised during tor build

2013-01-19 Thread Tor Bug Tracker Wiki
#8014: nacl library not recognised during tor build
+---
Reporter:  mr-4 |   Owner:
Type:  defect   |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  Tor  | Version:  Tor: 0.2.4.8-alpha
  Resolution:  invalid  |Keywords:
  Parent:   |  Points:
Actualpoints:   |  
+---
Changes (by rransom):

  * status:  new = closed
  * resolution:  = invalid


Comment:

 The Curve25519 implementations included with Tor are considerably faster
 than the reference implementation in NaCl.  Do not try to force Tor to
 link to a copy of NaCl whose build process chose the reference
 implementation of Curve25519.

 Also:
  * No one should be distributing binary packages of NaCl.  NaCl's build
 process chooses the fastest implementation of a cryptographic primitive
 which works on the processor and OS on which it was built; it can quite
 easily choose one that won't work or has poor performance on a different
 box.
  * No one should be distributing packages which claim to be NaCl but have
 some of the pieces removed -- that's a recipe for confusion.  Many of the
 cryptographic primitive implementations in NaCl (as of the last time I
 looked at it) do not come with source code; if your OS distribution has a
 policy against distributing such packages, they shouldn't ship a
 fake/mutilated NaCl package.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8014#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7085 [Tor bundles/installation]: Integrate Cryptocat Browser Extension into Tor Browser Bundle

2013-01-19 Thread Tor Bug Tracker Wiki
#7085: Integrate Cryptocat Browser Extension into Tor Browser Bundle
--+-
 Reporter:  kaepora   |  Owner:  erinn  
  
 Type:  enhancement   | Status:  new
  
 Priority:  normal|  Milestone:  TorBrowserBundle 
2.2.x-stable
Component:  Tor bundles/installation  |Version:  Tor: unspecified   
  
 Keywords:| Parent: 
  
   Points:|   Actualpoints: 
  
--+-

Comment(by kaepora):

 Replying to [comment:26 mikeperry]:

 I should also say something about your opening paragraphs:

  Unfortunately, putting Cryptocat into the default TBB is not zero
 cost/zero risk. Here's a list of things that would make me feel better
 about the decision.

 This is totally understood and agreed upon. I would really like to see
 Cryptocat included in TBB because of the benefits and the opportunity to
 deal with interesting problems, but I also quite aware of the risk and I
 plan to be very serious about addressing any issues or questions that may
 crop up. I don't think this kind of technology moves forward unless we
 push hard, but pushing hard comes with risk assessment and keeping both
 eyes opened and I fully acknowledge that.

  First and foremost, I'd want to be absolutely sure that it didn't
 potentially expose even users who didn't use it to XUL XSS bugs or other
 vulnerabilities. Related. I'd want to be sure the UI didn't confuse or
 distract users who didn't know what it was for.

 From an engineering perspective, I strongly do not believe that the plugin
 can expose even users who don't use it to XSS bugs. This is because unless
 activated, the only code that the plugin loads is the toolbar button, the
 addonbar button and the menu item. Clicking on any of these buttons
 launches a new tab which loads an HTML page inside. Everything happens
 inside that tab with no further interaction with Firefox internals except
 for a one-time seeding of the CSPRNG (using nsslib hooks.)  From this
 perspective, the plugin is very simple and it seems to me that it is very
 difficult for it to cause problems to those that do not use it.

 Concerning the issue of UI confusion, we've tried to make the purpose of
 our plugin as clear and concise as possible
 ([http://i.imgur.com/1wmepA2.png screenshot]). I should also mention that
 it's available in 32 languages.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7085#comment:28
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7929 [Stem]: ArchLinux Packaging

2013-01-19 Thread Tor Bug Tracker Wiki
#7929: ArchLinux Packaging
+---
 Reporter:  atagar  |  Owner:  atagar
 Type:  task| Status:  new   
 Priority:  normal  |  Milestone:
Component:  Stem|Version:
 Keywords:  | Parent:  #7905 
   Points:  |   Actualpoints:
+---

Comment(by atagar):

 Sjon has made an initial package...

 https://aur.archlinux.org/packages/stem-git/

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7929#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8014 [Tor]: nacl library not recognised during tor build

2013-01-19 Thread Tor Bug Tracker Wiki
#8014: nacl library not recognised during tor build
+---
Reporter:  mr-4 |   Owner:
Type:  defect   |  Status:  closed
Priority:  normal   |   Milestone:
   Component:  Tor  | Version:  Tor: 0.2.4.8-alpha
  Resolution:  invalid  |Keywords:
  Parent:   |  Points:
Actualpoints:   |  
+---

Comment(by mr-4):

 Replying to [comment:1 rransom]:
  The Curve25519 implementations included with Tor are considerably faster
 than the reference implementation in NaCl.  Do not try to force Tor to
 link to a copy of NaCl whose build process chose the reference
 implementation of Curve25519.
 I am not trying to force anything - I simply wanted to take advantage of
 nacl and wasn't aware that such implementation is included with tor.

 Perhaps the next time you guys type in your changelogs you should point
 this out and make it clear that nacl implementation *is* included with tor
 so that I (and others) won't try to make wild guesses.

 
  Also:
   * No one should be distributing binary packages of NaCl.  NaCl's build
 process chooses the fastest implementation of a cryptographic primitive
 which works on the processor and OS on which it was built; it can quite
 easily choose one that won't work or has poor performance on a different
 box.
 So, cross-compilation is out of the question then, even if it is done in
 chrooted environment (which 99% of all automated cross-compilation builds
 are)? Very wise indeed (not!). Whoever bright spark decided upon that
 deserves to be shot!

   * No one should be distributing packages which claim to be NaCl but
 have some of the pieces removed -- that's a recipe for confusion.  Many of
 the cryptographic primitive implementations in NaCl (as of the last time I
 looked at it) do not come with source code; if your OS distribution has a
 policy against distributing such packages, they shouldn't ship a
 fake/mutilated NaCl package.
 I have no idea whether the nacl package provided with my distro (Fedora)
 is mutilated or not - as far as I could tell, the source rpm consists of
 ... sources, there aren't any binaries. So I don't know where you've got
 that idea that my nacl distribution is mutilated.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8014#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7424 [Stem]: Piwik for stem's site

2013-01-19 Thread Tor Bug Tracker Wiki
#7424: Piwik for stem's site
+---
Reporter:  atagar   |   Owner:  atagar 
Type:  enhancement  |  Status:  closed 
Priority:  minor|   Milestone: 
   Component:  Stem | Version: 
  Resolution:  wontfix  |Keywords:  website
  Parent:   |  Points: 
Actualpoints:   |  
+---
Changes (by atagar):

  * status:  new = closed
  * resolution:  = wontfix


Comment:

 Closing. Piwik was ruled out pretty quickly and after a prolonged internal
 discussion I've been convinced to hold off on aggregate url referrals too
 (at least for now).

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7424#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7085 [Tor bundles/installation]: Integrate Cryptocat Browser Extension into Tor Browser Bundle

2013-01-19 Thread Tor Bug Tracker Wiki
#7085: Integrate Cryptocat Browser Extension into Tor Browser Bundle
--+-
 Reporter:  kaepora   |  Owner:  erinn  
  
 Type:  enhancement   | Status:  new
  
 Priority:  normal|  Milestone:  TorBrowserBundle 
2.2.x-stable
Component:  Tor bundles/installation  |Version:  Tor: unspecified   
  
 Keywords:| Parent: 
  
   Points:|   Actualpoints: 
  
--+-

Comment(by mikeperry):

 Replying to [comment:27 kaepora]:
  Replying to [comment:26 mikeperry]:
   Second, I am very concerned that there were XUL XSS bugs in the chat
 windows. To me, that's a bad sign. Ideally, I'd like to see something on
 your side (ie a tag in your bugtracker or some other document you wrote)
 that enumerates the patches that resulted from your first audit.
 
  The patches in which we fixed the audit bugs are enumerated (perhaps
 incompletely) in this [https://blog.crypto.cat/2012/11/security-update-
 our-first-full-audit/ blog post].

 This is great. You should show this to whoever you contact about further
 audit. Bugs tend to come in groups of similar nature, and seeing the types
 of mistakes you made will help the second auditor find more of them.

   Third, while it does look like the audit was extremely thorough, I
 think I'd prefer a second one for this reason. XUL XSS is quite serious,
 and since you're writing a network-facing app with lots of user and
 network provided content, its critical that your code receives lots of
 this type of review.
 
  Very well. Who would you recommend to perform the second audit? If you
 can give me a preferred auditor or a list of auditors that the Tor Project
 would feel comfortable with, I have no problem getting in touch with them.

 A quick search for Firefox extension XSS and related queries turns up
 Roee Hay and Roberto Liverani as previous folks who have done similar
 audits. I don't know these people, but I suppose an email couldn't hurt.

 You should also send Dan Veditz an email (dveditz at mozilla). He is a
 very Tor-friendly Mozilla security engineer. He might be too busy to give
 you a full review, but I bet if you also mention that integration with
 Mozilla's Social API is something you're considering, he might be able to
 justify devoting his time for such a review. Or at least point you in the
 right direction for getting a better understanding of the security issues
 the Social API team has had to deal with. I bet they are similar in
 nature.

 I can also do a review later, but for the next month or two I will be
 extremely busy trying to get TBB working with Firefox 17ESR. I also think
 the people I mentioned might actually be better at it than me (except
 perhaps for spotting potential proxy bypass issues). My approach with
 Torbutton has mostly been Zomg, don't ever interact with or display
 content window material in XUL. Sadly, even that failed me when
 implementing the content window JS hook injection. Luckily, Dan Veditz
 came to the rescue in that case :).

   Fourth, I guess I am mildly concerned about the crypto security. I
 don't believe it's impossible to do crypto with JS, but I would prefer it
 if the underlying primitive implementations also had a chance for review,
 especially since our inclusion of this addon would probably be seen as
 endorsement of its crypto and security by many.
 
  Our OTR implementation has been reviewed. If there is a specific type of
 further review you would wish to ask for, we can see it done.

 I think Nick is the person to best answer this. Or Ian himself. I also
 thought Moxie's observations on the website version were spot-on. Has he
 looked into the browser version?

 Things that come to my mind include:

 Is your implementation fully compatible with other OTR and MPOTR
 implementations? Verifying this to be the case can be one way to probe for
 implementation errors.

 One question academic researchers in need of racking up publication count
 will drool over is Can content window JS extract side channel info about
 your crypto operations? If the JS scheduling mechanism is
 predictable/discoverable and/or runs in the same thread, the answer here
 might actually be Yes. Very Yes.. Unfortunately, the publication bias in
 academia may very well cause them to structure their experiments such that
 the answer is Yes anyway regardless of threading model or content window
 JS timer resolution... :/

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/7085#comment:29
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list

[tor-bugs] #8015 [arm]: arm torrc parsing comments wrongly

2013-01-19 Thread Tor Bug Tracker Wiki
#8015: arm torrc parsing comments wrongly
-+--
 Reporter:  gsathya  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  arm  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
 I have this in my log -

 {{{
  08:55:41 [ARM_WARN] The torrc differs from what tor's using. You can
 issue a sighup to reload the torrc values by pressing x.
- torrc value differs on line: 117
 }}}

 and in my torrc -
 {{
  │ 115 ## Set a maximum of 4 gigabytes each way per period.
  │ 116 AccountingMax 1000 GB (1073741824000)
  │ 117 ## Each period starts daily at midnight (AccountingMax is per day)
 }}}

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8015
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8015 [arm]: arm torrc parsing comments wrongly

2013-01-19 Thread Tor Bug Tracker Wiki
#8015: arm torrc parsing comments wrongly
-+--
 Reporter:  gsathya  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  arm  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
Description changed by gsathya:

Old description:

 I have this in my log -

 {{{
  08:55:41 [ARM_WARN] The torrc differs from what tor's using. You can
 issue a sighup to reload the torrc values by pressing x.
- torrc value differs on line: 117
 }}}

 and in my torrc -
 {{
  │ 115 ## Set a maximum of 4 gigabytes each way per period.
  │ 116 AccountingMax 1000 GB (1073741824000)
  │ 117 ## Each period starts daily at midnight (AccountingMax is per day)
 }}}

New description:

 I have this in my log -

 {{{
  08:55:41 [ARM_WARN] The torrc differs from what tor's using. You can
 issue a sighup to reload the torrc values by pressing x.
- torrc value differs on line: 117
 }}}

 and in my torrc -
 {{{
  │ 115 ## Set a maximum of 4 gigabytes each way per period.
  │ 116 AccountingMax 1000 GB (1073741824000)
  │ 117 ## Each period starts daily at midnight (AccountingMax is per day)
 }}}

--

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8015#comment:1
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8015 [arm]: arm torrc parsing comments wrongly

2013-01-19 Thread Tor Bug Tracker Wiki
#8015: arm torrc parsing comments wrongly
-+--
 Reporter:  gsathya  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  arm  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--
Description changed by gsathya:

Old description:

 I have this in my log -

 {{{
  08:55:41 [ARM_WARN] The torrc differs from what tor's using. You can
 issue a sighup to reload the torrc values by pressing x.
- torrc value differs on line: 117
 }}}

 and in my torrc -
 {{{
  │ 115 ## Set a maximum of 4 gigabytes each way per period.
  │ 116 AccountingMax 1000 GB (1073741824000)
  │ 117 ## Each period starts daily at midnight (AccountingMax is per day)
 }}}

New description:

 I have this in my log -

 {{{
  08:55:41 [ARM_WARN] The torrc differs from what tor's using. You can
 issue a sighup to reload the torrc values by pressing x.
- torrc value differs on line: 117
 }}}

 and in my torrc -
 {{{
  │ 115 ## Set a maximum of 4 gigabytes each way per period.
  │ 116 AccountingMax 1000 GB (1073741824000)
  │ 117 ## Each period starts daily at midnight (AccountingMax is per day)
  │ 118 #AccountingStart day 00:00
 }}}

--

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8015#comment:2
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8015 [arm]: arm torrc parsing comments wrongly

2013-01-19 Thread Tor Bug Tracker Wiki
#8015: arm torrc parsing comments wrongly
-+--
 Reporter:  gsathya  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  arm  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--

Comment(by atagar):

 Please attach your full torrc.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8015#comment:3
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #8015 [arm]: arm torrc parsing comments wrongly

2013-01-19 Thread Tor Bug Tracker Wiki
#8015: arm torrc parsing comments wrongly
-+--
 Reporter:  gsathya  |  Owner:  atagar
 Type:  defect   | Status:  new   
 Priority:  normal   |  Milestone:
Component:  arm  |Version:
 Keywords:   | Parent:
   Points:   |   Actualpoints:
-+--

Comment(by gsathya):

 Replying to [comment:3 atagar]:
  Please attach your full torrc.

 Attached.

-- 
Ticket URL: https://trac.torproject.org/projects/tor/ticket/8015#comment:4
Tor Bug Tracker  Wiki https://trac.torproject.org/
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs