Re: [tor-bugs] #18928 [Applications/Tor Browser]: Mac OS: alpha channel upgrade is not smooth

2016-05-02 Thread Tor Bug Tracker & Wiki
#18928: Mac OS: alpha channel upgrade is not smooth
-+-
 Reporter:  mcs  |  Owner:  tbb-team
 Type:  defect   | Status:
 Priority:  High |  needs_review
Component:  Applications/Tor Browser |  Milestone:
 Severity:  Normal   |Version:
 Keywords:  ff45-esr, TorBrowserTeam201605R  | Resolution:
Parent ID:   |  Actual Points:
 Reviewer:   | Points:
 |Sponsor:
-+-
Changes (by mcs):

 * status:  new => needs_review
 * keywords:  ff45-esr, TorBrowserTeam201605 => ff45-esr,
 TorBrowserTeam201605R


Comment:

 Here is our proposed fix:
 https://gitweb.torproject.org/user/brade/tor-
 browser.git/commit/?h=bug18928-01=c6c784310e523bb49db0e8231a578a921d7cf101

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18953 [Internal Services/Tor Sysadmin Team]: Switch from sergii to chiwui

2016-05-02 Thread Tor Bug Tracker & Wiki
#18953: Switch from sergii to chiwui
-+-
 Reporter:  arlolra  |  Owner:  tpa
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   |   Keywords:
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+-
 I think we're ready for this switch.

 Though, it may be prudent to keep sergii around for a little while just in
 case anything goes horribly wrong.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
-+-
 Reporter:  weasel   |  Owner:  yawning
 Type:  defect   | Status:
 Priority:  High |  needs_review
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Major|  0.2.8.x-final
 Keywords:  tor-core, crypto, TorCoreTeam201605  |Version:  Tor:
Parent ID:   |  0.2.8.2-alpha
 Reviewer:   | Resolution:
 |  Actual Points:
 | Points:  small-
 |  remaining
 |Sponsor:
-+-
Changes (by yawning):

 * status:  needs_revision => needs_review


Comment:

 ​https://git.schwanenlied.me/yawning/tor/src/bug18943_squashed

 Passes the sha3 tests on debian stable running in a ppc qemu VM, and even
 fixes cpunk's nitpicks which will probably be replaced with other
 nitpicks.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Re: [tor-bugs] #14881 [Core Tor/Tor]: incorrect defaults when producing bandwidth-weights line in directory footer

2016-05-02 Thread Tor Bug Tracker & Wiki
#14881: incorrect defaults when producing bandwidth-weights line in directory
footer
-+-
 Reporter:  robgjansen   |  Owner:
 Type:  defect   |  robgjansen
 Priority:  Medium   | Status:
Component:  Core Tor/Tor |  needs_revision
 Severity:  Normal   |  Milestone:  Tor:
 Keywords:  027-triaged-1-in, 028-triaged,   |  0.2.9.x-final
  pre028-patch, tor-sponsorU-orphan, |Version:  Tor:
  TorCoreTeam201605, TorCoreTeam-|  0.2.7
  postponed-201604   | Resolution:
Parent ID:   |  Actual Points:
 Reviewer:  mikeperry| Points:  medium
 |Sponsor:
 |  SponsorU-can
-+-

Comment (by robgjansen):

 My May has already become far too loaded. It's better that I be honest and
 say no rather than agreeing to it and then dropping it on the floor.
 Sorry!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18951 [Applications/Tor Browser]: Mac OS: HTTPS-E missing after update

2016-05-02 Thread Tor Bug Tracker & Wiki
#18951: Mac OS: HTTPS-E missing after update
--+--
 Reporter:  mcs   |  Owner:  tbb-team
 Type:  defect| Status:  needs_review
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  TorBrowserTeam201605R |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by mcs):

 * status:  new => needs_review
 * cc: brade (added)
 * keywords:   => TorBrowserTeam201605R


Comment:

 Here is a fix:
 https://gitweb.torproject.org/user/brade/tor-
 browser.git/commit/?h=bug18951-01=e51823989e0f57328f6b710e599ed3b564ac0c37

 We also need to decide if we want to do anything special to fix
 installations that have been affected by this bug. When we ship a new
 version of HTTPS-E, the incremental update will fail for such people
 (because the incremental MAR will try to patch files and find that they
 are missing) and things will be fixed when the full MAR is applied. But we
 could force an update of all of the HTTPS-E files to make the upgrade
 smoother and to avoid having to wait for a new HTTPS-E version. Kathy and
 I think it is OK to just let the fallback to a full update occur.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18952 [Applications/Torbutton]: Tor Browser without Tor

2016-05-02 Thread Tor Bug Tracker & Wiki
#18952: Tor Browser without Tor
+-
 Reporter:  cypherpunks |  Owner:
 Type:  defect  | Status:  new
 Priority:  Medium  |  Milestone:
Component:  Applications/Torbutton  |Version:
 Severity:  Major   |   Keywords:
Actual Points:  |  Parent ID:
   Points:  |   Reviewer:
  Sponsor:  |
+-
 In the past it was possible to remove Tor Launcher from TB and use TB for
 direct connection (no proxy). Now (5.5) Torbutton asks to be disabled to
 allow that.

 Moreover, with Torbutton disabled, TB with the no proxy setting is "unable
 to find the proxy server" when opening a website, though it does work with
 an HTTP proxy.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18933 [Core Tor/Tor]: Several problems with test-network Makefile target

2016-05-02 Thread Tor Bug Tracker & Wiki
#18933: Several problems with test-network Makefile target
+--
 Reporter:  isis|  Owner:  isis
 Type:  defect  | Status:  needs_review
 Priority:  Medium  |  Milestone:
Component:  Core Tor/Tor|Version:  Tor:
 Severity:  Normal  |  0.2.8.2-alpha
 Keywords:  TorCoreTeam201605 029-proposed  | Resolution:
Parent ID:  |  Actual Points:
 Reviewer:  nickm   | Points:  small
|Sponsor:  SponsorS
+--
Changes (by nickm):

 * reviewer:   => nickm


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18933 [Core Tor/Tor]: Several problems with test-network Makefile target

2016-05-02 Thread Tor Bug Tracker & Wiki
#18933: Several problems with test-network Makefile target
+--
 Reporter:  isis|  Owner:  isis
 Type:  defect  | Status:  needs_review
 Priority:  Medium  |  Milestone:
Component:  Core Tor/Tor|Version:  Tor:
 Severity:  Normal  |  0.2.8.2-alpha
 Keywords:  TorCoreTeam201605 029-proposed  | Resolution:
Parent ID:  |  Actual Points:
 Reviewer:  | Points:  small
|Sponsor:  SponsorS
+--
Changes (by nickm):

 * keywords:  TorCoreTeam201605 => TorCoreTeam201605 029-proposed


Comment:

 Guess I should consider this as `029-proposed`?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18941 [Internal Services/Tor Sysadmin Team]: nagios colchicifolium?

2016-05-02 Thread Tor Bug Tracker & Wiki
#18941: nagios colchicifolium?
-+-
 Reporter:  karsten  |  Owner:  tpa
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Internal Services/Tor Sysadmin Team  |Version:
 Severity:  Normal   | Resolution:
 Keywords:   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by karsten):

 I care most about disk usage notifications, but if it's easier to sign me
 up for all notification about that host, that's okay, too.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18951 [Applications/Tor Browser]: Mac OS: HTTPS-E missing after update

2016-05-02 Thread Tor Bug Tracker & Wiki
#18951: Mac OS: HTTPS-E missing after update
--+--
 Reporter:  mcs   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by mcs):

 * priority:  Medium => Very High


Comment:

 I noticed this problem while I was trying to reproduce #18947.  This one
 is caused by some code within the make_add_instruction function in tools
 /update-packaging/common.sh. It has some special handling for unpacked
 extensions that are located under distribution\/extensions. I do not know
 why, but instead of placing simple "add" instructions in the MAR file
 manifest it generates "add-if" instructions, e.g.,

 {{{
 add-if "Contents/Resources/distribution/extensions/https-everywhere-
 e...@eff.org" "Contents/Resources/distribution/extensions/https-everywhere-
 e...@eff.org/install.rdf"
 }}}

 Since Contents/Resources/distribution/extensions/https-everywhere-
 e...@eff.org does not exist in 6.0a4 or older releases, none of the files
 under https-everywhere-...@eff.org/ are added during the update.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18951 [Applications/Tor Browser]: Mac OS: HTTPS-E missing after update

2016-05-02 Thread Tor Bug Tracker & Wiki
#18951: Mac OS: HTTPS-E missing after update
--+--
 Reporter:  mcs   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 In the TB 6.0a5 installable packages (dmg files), HTTPS-E is included
 under TorBrowser.app/Contents/Resources/distribution/extensions as
 expected. But after completing an incremental update from TB 6.0a4 to
 6.0a5, the HTTPS-E extension is missing.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #15879 [Applications/TorBirdy]: Removing torbirdy

2016-05-02 Thread Tor Bug Tracker & Wiki
#15879: Removing torbirdy
---+--
 Reporter:  lyt108 |  Owner:  ioerror
 Type:  defect | Status:  closed
 Priority:  Medium |  Milestone:
Component:  Applications/TorBirdy  |Version:
 Severity:  Normal | Resolution:  user disappeared
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
Changes (by sukhbir):

 * status:  new => closed
 * resolution:   => user disappeared
 * severity:   => Normal


Comment:

 I am going to close this. If this is still an issue, please reopen.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #17426 [Applications/TorBirdy]: Please provide a way to make "IMAP vs POP3 as the default" configurable for preseeding

2016-05-02 Thread Tor Bug Tracker & Wiki
#17426: Please provide a way to make "IMAP vs POP3 as the default" configurable 
for
preseeding
---+--
 Reporter:  kytv   |  Owner:  ioerror, sukhbir
 Type:  enhancement| Status:  assigned
 Priority:  Medium |  Milestone:
Component:  Applications/TorBirdy  |Version:
 Severity:  Normal | Resolution:
 Keywords: |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--

Comment (by sukhbir):

 Fixed in
 
[https://gitweb.torproject.org/torbirdy.git/commit/?id=04fd3d875491a0fdcc598c43c53edc0eb384e4cf
 04fd3d].

 0 is for POP3 (default), 1 is for IMAP. This is configurable in
 `defaults/preferences/prefs.js` using this line:
 `pref("extensions.torbirdy.defaultprotocol", 0); // 0 - POP3, 1 - IMAP`.
 The value set here will reflect in the configuration window.

 (I will let you close it in case this is not what you were looking for.)

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18950 [Applications/Tor Browser]: Disable or audit Reader View in ESR 45

2016-05-02 Thread Tor Bug Tracker & Wiki
#18950: Disable or audit Reader View in ESR 45
-+-
 Reporter:  gk   |  Owner:  tbb-team
 Type:  task | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor |Version:
  Browser|   Keywords:  ff45-esr,
 Severity:  Normal   |  TorBrowserTeam201605
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+-
 Firefox ships with a new feature, Reader View (https://support.mozilla.org
 /en-US/kb/firefox-reader-view-clutter-free-web-pages). We should audit it
 or disable it for the time being if we don't get to that.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18921 [Core Tor/Tor]: Fix IPv6 bridge client directory address selection

2016-05-02 Thread Tor Bug Tracker & Wiki
#18921: Fix IPv6 bridge client directory address selection
-+-
 Reporter:  teor |  Owner:
 Type:  defect   | Status:
 Priority:  Medium   |  merge_ready
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Normal   |  0.2.8.x-final
 Keywords:  must-fix-before-028-rc,  |Version:  Tor:
  TorCoreTeam201605, TorCoreTeam-|  0.2.8.1-alpha
  postponed-201604   | Resolution:
Parent ID:  #18483   |  Actual Points:  1 hour
 Reviewer:  isis | Points:  small
 |Sponsor:
-+-

Comment (by nickm):

 This is kinda big for an rc/stable patch.  It looks okay and I think we
 need it and I'm okay with taking it anyway, but I'm also nominating it for
 my "I-told-you-so" award in case there is a bug here that none of us
 successfully found.

 Initial Questions:
   * e726459eaf57ffe98c36730af58287229c9531d6: Are we really really sure
 that every possible case of the big complicated function
 directory_fetches_from_authorities() should be replaced with
 !directory_must_use_begindir() ?
   * e155948d0ac54b3102d6efa3d4a689d8a177f0f4: This really really needs
 comments in the new code here.

 Okay, I need to come back and review the rest of this later.  Big branch!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18884 [Applications/Tor Browser]: Rip Firefox Hello Beta / Loop extension in ESR45 based Tor Browser

2016-05-02 Thread Tor Bug Tracker & Wiki
#18884: Rip Firefox Hello Beta / Loop extension in ESR45 based Tor Browser
+--
 Reporter:  gk  |  Owner:
 Type:  task|  arthuredelstein
 Priority:  High| Status:  assigned
Component:  Applications/Tor Browser|  Milestone:
 Severity:  Major   |Version:
 Keywords:  ff45-esr, TorBrowserTeam201605  | Resolution:
Parent ID:  |  Actual Points:
 Reviewer:  | Points:
|Sponsor:
+--
Changes (by arthuredelstein):

 * owner:  tbb-team => arthuredelstein
 * status:  new => assigned


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18920 [Core Tor/Tor]: Make consensus GETINFO return 551 when using microdescs

2016-05-02 Thread Tor Bug Tracker & Wiki
#18920: Make consensus GETINFO return 551 when using microdescs
-+-
 Reporter:  teor |  Owner:
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:  Tor:
Component:  Core Tor/Tor |  0.2.8.x-final
 Severity:  Minor|Version:  Tor:
 Keywords:  controller, microdesc,   |  0.2.2.6-alpha
  TorCoreTeam201605  | Resolution:  fixed
Parent ID:   |  Actual Points:  very
 Reviewer:   |  small
 | Points:  small
 |Sponsor:
-+-
Changes (by nickm):

 * status:  merge_ready => closed
 * resolution:   => fixed


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18920 [Core Tor/Tor]: Make consensus GETINFO return 551 when using microdescs

2016-05-02 Thread Tor Bug Tracker & Wiki
#18920: Make consensus GETINFO return 551 when using microdescs
-+-
 Reporter:  teor |  Owner:
 Type:  defect   | Status:
 Priority:  Medium   |  merge_ready
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Minor|  0.2.8.x-final
 Keywords:  controller, microdesc,   |Version:  Tor:
  TorCoreTeam201605  |  0.2.2.6-alpha
Parent ID:   | Resolution:
 Reviewer:   |  Actual Points:  very
 |  small
 | Points:  small
 |Sponsor:
-+-
Changes (by nickm):

 * actualpoints:   => very small


Comment:

 Merged to maint-0.2.8 as 054d9398531b148d8b41c382da36c83c0381e09e. Thanks!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18905 [Applications/Tor Browser]: Remove unused menu items from Tor Browser help menu

2016-05-02 Thread Tor Bug Tracker & Wiki
#18905: Remove unused menu items from Tor Browser help menu
+--
 Reporter:  arthuredelstein |  Owner:
 Type:  defect  |  arthuredelstein
 Priority:  Medium  | Status:
Component:  Applications/Tor Browser|  needs_revision
 Severity:  Normal  |  Milestone:
 Keywords:  ff45-esr, TorBrowserTeam201605  |Version:
Parent ID:  | Resolution:
 Reviewer:  |  Actual Points:
| Points:
|Sponsor:
+--

Comment (by arthuredelstein):

 Replying to [comment:7 gk]:
 > I think getting rid of the "Report Web Forgery..." one should be done,
 too, while we are at it. Otherwise I think doing this can't hurt.

 OK, here's a new version with "Report Web Forgery..." removed:
 
https://github.com/arthuredelstein/torbutton/commit/cbaa020a454f76e33e25d10952690b54b73eb97a

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #13239 [Core Tor/Tor]: Maybe we want three preemptive internal circs for hidden services?

2016-05-02 Thread Tor Bug Tracker & Wiki
#13239: Maybe we want three preemptive internal circs for hidden services?
-+-
 Reporter:  arma |  Owner:
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:  Tor:
Component:  Core Tor/Tor |  0.2.9.x-final
 Severity:  Normal   |Version:
 Keywords:  tor-client, tor-hs,  | Resolution:  fixed
  TorCoreTeam201605  |  Actual Points:
Parent ID:  #5271| Points:  small
 Reviewer:  asn  |Sponsor:
 |  SponsorR-can
-+-
Changes (by nickm):

 * status:  merge_ready => closed
 * resolution:   => fixed


Comment:

 Merged into master.

 I'd also like to see the magic numbers replaced with constants; I'm adding
 a note on that to #18873

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18873 [Core Tor/Tor]: Refactor circuit_predict_and_launch_new()

2016-05-02 Thread Tor Bug Tracker & Wiki
#18873: Refactor circuit_predict_and_launch_new()
--+--
 Reporter:  asn   |  Owner:
 Type:  defect| Status:  new
 Priority:  Low   |  Milestone:  Tor: 0.2.???
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  refactoring   |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by nickm):

 I'd particularly like to see the magic numbers replaced with `const int`
 or `#define` or something.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18240 [Core Tor/Tor]: 'make test-stem' yields No rule to make target '"./src/or/tor"'

2016-05-02 Thread Tor Bug Tracker & Wiki
#18240: 'make test-stem' yields No rule to make target '"./src/or/tor"'
-+-
 Reporter:  arma |  Owner:  nickm
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:  Tor:
Component:  Core Tor/Tor |  0.2.9.x-final
 Severity:  Normal   |Version:  Tor:
 Keywords:  tor-tests-integration, tor-tests-|  0.2.8.1-alpha
  stem, TorCoreTeam201605, TorCoreTeam-  | Resolution:  fixed
  postponed-201604   |  Actual Points:
Parent ID:   | Points:  small-
 Reviewer:  isis |  remaining
 |Sponsor:
 |  SponsorS-can
-+-
Changes (by nickm):

 * status:  merge_ready => closed
 * resolution:   => fixed


Comment:

 Squashed and merged!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17901, #13953, #18840, #18852

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #17901, #13953, #18840, #18852 by nickm:
keywords to 029-nickm-says-no

Comment:
Marking these tickets as ones I propose we do not include in 029.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18895, #18656, #18667, #18816, #18908, #18909, #18938

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18895, #18656, #18667, #18816, #18908, #18909, #18938 by 
nickm:
keywords to 029-nickm-unsure

Comment:
Marking these tickets as the ones I think I need more feedback about in order 
to figure out if I think it should go in 0.2.9.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #16702, #18857, #18888, #18889, #18897, #18901, #18906, #18907, #18934, #18839

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #16702, #18857, #1, #18889, #18897, #18901, #18906, 
#18907, #18934, #18839 by nickm:
keywords to 029-nickm-says-yes

Comment:
marking these as the tickets I am in favor of for 029, among the 029-proposed 
ones.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18823 [Core Tor/Tor]: Sanity check on the fallback dir torrc values

2016-05-02 Thread Tor Bug Tracker & Wiki
#18823: Sanity check on the fallback dir torrc values
--+
 Reporter:  dgoulet   |  Owner:
 Type:  enhancement   | Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Normal| Resolution:
 Keywords:  029-proposed  |  Actual Points:
Parent ID:| Points:  small
 Reviewer:|Sponsor:
--+

Comment (by nickm):

 What's the impact of doing/not-doing this?

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18896 [Core Tor/Tor]: Test supposedly constant-time crypto primitives to verify that they are in fact constant-time

2016-05-02 Thread Tor Bug Tracker & Wiki
#18896: Test supposedly constant-time crypto primitives to verify that they are 
in
fact constant-time
--+--
 Reporter:  nickm |  Owner:
 Type:  enhancement   | Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  029-proposed  |  Actual Points:
Parent ID:| Points:  medium
 Reviewer:|Sponsor:  SponsorS-can
--+--
Changes (by nickm):

 * points:   => medium


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18888 [Core Tor/Tor]: we should log an unmistakeable warning when --disable-asserts-in-tests is enabled

2016-05-02 Thread Tor Bug Tracker & Wiki
#1: we should log an unmistakeable warning when --disable-asserts-in-tests 
is
enabled
--+
 Reporter:  nickm |  Owner:
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Core Tor/Tor  |Version:
 Severity:  Normal| Resolution:
 Keywords:  029-proposed  |  Actual Points:
Parent ID:| Points:  very small
 Reviewer:|Sponsor:
--+
Changes (by nickm):

 * points:   => very small


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18840, #18852, #18857, #18906, #18907, #18908, #18909

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18840, #18852, #18857, #18906, #18907, #18908, #18909 by 
nickm:
points to small

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17901, #13953, #18816

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #17901, #13953, #18816 by nickm:
points to medium

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18897

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18897 by nickm:
points to small

--
Tickets URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18901, #18934, #18839

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18901, #18934, #18839 by nickm:
points to very-small

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #17150 [Core Tor/Tor]: Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from routerdesc"

2016-05-02 Thread Tor Bug Tracker & Wiki
#17150: Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from 
routerdesc"
--+--
 Reporter:  toralf|  Owner:  nickm
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.2.???
Component:  Core Tor/Tor  |Version:  Tor: 0.2.7
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:  small
 Reviewer:|Sponsor:
--+--
Changes (by nickm):

 * status:  needs_review => new


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #17150 [Core Tor/Tor]: Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from routerdesc"

2016-05-02 Thread Tor Bug Tracker & Wiki
#17150: Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from 
routerdesc"
--+--
 Reporter:  toralf|  Owner:  nickm
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.2.???
Component:  Core Tor/Tor  |Version:  Tor: 0.2.7
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:  small
 Reviewer:|Sponsor:
--+--
Changes (by nickm):

 * keywords:  TorCoreTeam201605 028-backport =>
 * priority:  High => Medium
 * milestone:  Tor: 0.2.8.x-final => Tor: 0.2.???


Comment:

 wait, no there isn't.  I think since the warning is already downgraded we
 can call this 0.2.???

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #13721 [Applications/TorBirdy]: TorBirdy 0.1.2 uses wrong locale

2016-05-02 Thread Tor Bug Tracker & Wiki
#13721: TorBirdy 0.1.2 uses wrong locale
---+-
 Reporter:  dkaeae |  Owner:  ioerror
 Type:  defect | Status:  closed
 Priority:  Medium |  Milestone:
Component:  Applications/TorBirdy  |Version:
 Severity:  Normal | Resolution:  fixed
 Keywords:  torbirdy-0.1.5 |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+-
Changes (by sukhbir):

 * status:  new => closed
 * resolution:   => fixed


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #13721 [Applications/TorBirdy]: TorBirdy 0.1.2 uses wrong locale

2016-05-02 Thread Tor Bug Tracker & Wiki
#13721: TorBirdy 0.1.2 uses wrong locale
---+-
 Reporter:  dkaeae |  Owner:  ioerror
 Type:  defect | Status:  new
 Priority:  Medium |  Milestone:
Component:  Applications/TorBirdy  |Version:
 Severity:  Normal | Resolution:
 Keywords:  torbirdy-0.1.5 |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+-
Changes (by sukhbir):

 * severity:   => Normal


Comment:

 Fixed in
 
[https://gitweb.torproject.org/torbirdy.git/commit/?id=3d625f36926b958dcaa23ea453d1d2b5a61edee4
 3d625f]. Thanks everyone!

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #14881 [Core Tor/Tor]: incorrect defaults when producing bandwidth-weights line in directory footer

2016-05-02 Thread Tor Bug Tracker & Wiki
#14881: incorrect defaults when producing bandwidth-weights line in directory
footer
-+-
 Reporter:  robgjansen   |  Owner:
 Type:  defect   |  robgjansen
 Priority:  Medium   | Status:
Component:  Core Tor/Tor |  needs_revision
 Severity:  Normal   |  Milestone:  Tor:
 Keywords:  027-triaged-1-in, 028-triaged,   |  0.2.9.x-final
  pre028-patch, tor-sponsorU-orphan, |Version:  Tor:
  TorCoreTeam201605, TorCoreTeam-|  0.2.7
  postponed-201604   | Resolution:
Parent ID:   |  Actual Points:
 Reviewer:  mikeperry| Points:  medium
 |Sponsor:
 |  SponsorU-can
-+-

Comment (by mikeperry):

 Rob, do you think you can merge my mock-up patch with the consensus method
 check and create a new proper patch? I am juggling a few too many things
 this week.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18934 [Core Tor/Tor]: test suite failures with expensive hardening.

2016-05-02 Thread Tor Bug Tracker & Wiki
#18934: test suite failures with expensive hardening.
--+
 Reporter:  weasel|  Owner:  nickm
 Type:  defect| Status:  accepted
 Priority:  Medium|  Milestone:  Tor: 0.2.9.x-final
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal| Resolution:
 Keywords:  029-proposed  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by nickm):

 * owner:   => nickm
 * status:  needs_review => accepted


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18934 [Core Tor/Tor]: test suite failures with expensive hardening.

2016-05-02 Thread Tor Bug Tracker & Wiki
#18934: test suite failures with expensive hardening.
--+
 Reporter:  weasel|  Owner:  nickm
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.2.9.x-final
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal| Resolution:
 Keywords:  029-proposed  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by nickm):

 * status:  accepted => needs_review


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #7144 [Core Tor/Tor]: Implement Bridge Guards and other anti-enumeration defenses

2016-05-02 Thread Tor Bug Tracker & Wiki
#7144: Implement Bridge Guards and other anti-enumeration defenses
-+-
 Reporter:  karsten  |  Owner:  isis
 Type:  project  | Status:
 Priority:  High |  needs_revision
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Normal   |  0.2.9.x-final
 Keywords:  SponsorZ, tor-bridge,|Version:
  027-triaged-1-out, 028-triage, 028-triaged,| Resolution:
  isis201604, isis201605, TorCoreTeam201605, |  Actual Points:
  TorCoreTeam-postponed-201604   | Points:  medium
Parent ID:   |Sponsor:
 Reviewer:   |  SponsorS-can
-+-
Changes (by isis):

 * keywords:
 SponsorZ, tor-bridge, 027-triaged-1-out, 028-triage, 028-triaged,
 isis201604, TorCoreTeam201605, TorCoreTeam-postponed-201604
 =>
 SponsorZ, tor-bridge, 027-triaged-1-out, 028-triage, 028-triaged,
 isis201604, isis201605, TorCoreTeam201605, TorCoreTeam-
 postponed-201604


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18934 [Core Tor/Tor]: test suite failures with expensive hardening. (was: test suite failures)

2016-05-02 Thread Tor Bug Tracker & Wiki
#18934: test suite failures with expensive hardening.
--+
 Reporter:  weasel|  Owner:
 Type:  defect| Status:  needs_review
 Priority:  Medium|  Milestone:  Tor: 0.2.9.x-final
Component:  Core Tor/Tor  |Version:  Tor: unspecified
 Severity:  Normal| Resolution:
 Keywords:  029-proposed  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by nickm):

 * status:  new => needs_review


Comment:

 The test_bt.sh part should be fixed (trivially) in
 b72aa18d73869563e88b85930408781495deed2c.

 There's a fix for the test-memwipe part as part of my ftrapv_v2 branch for
 #17983.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #17983 [Core Tor/Tor]: Build tor with -ftrapv by default

2016-05-02 Thread Tor Bug Tracker & Wiki
#17983: Build tor with -ftrapv by default
-+-
 Reporter:  teor |  Owner:  nickm
 Type:  enhancement  | Status:
 Priority:  High |  needs_review
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Normal   |  0.2.9.x-final
 Keywords:  tor-sponsorS-orphan, |Version:
  TorCoreTeam201605, TorCoreTeam-| Resolution:
  postponed-201604   |  Actual Points:
Parent ID:   | Points:  small
 Reviewer:   |Sponsor:
 |  SponsorS-can
-+-

Comment (by nickm):

 `ftrapv_v2` now works. And includes a real fix for the failure of test-
 memwipe under expensive hardening.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18947 [Applications/Tor Browser]: 6.0a5 is not starting on OS X if put into /Applications

2016-05-02 Thread Tor Bug Tracker & Wiki
#18947: 6.0a5 is not starting on OS X if put into /Applications
--+---
 Reporter:  gk|  Owner:  mcs
 Type:  defect| Status:  needs_information
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Critical  | Resolution:
 Keywords:  TorBrowserTeam201605  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---

Comment (by nickm):

 {{{
 [564]$ ls -l ~/Applications/TorBrowser.app
 ls: /Users/nickm/Applications/TorBrowser.app: No such file or directory
 [565]$ ls -l /Applications/TorBrowser.app/
 total 0
 drwxr-x---@ 7 nickm  admin  238 Apr 28 08:53 Contents
 [566]$ ls -l ~/Library/Application\ Support/TorBrowser-Data/
 total 0
 drwx--   5 nickm  staff  170 Apr 29 08:57 Browser
 drwx--  11 nickm  admin  374 Apr 29 08:30 Tor
 drwxr-xr-x   3 nickm  staff  102 Apr 29 08:57 UpdateInfo

 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18935 [Applications/Tor Browser]: MS bugs - Danger! Windows updates break everything on their way!

2016-05-02 Thread Tor Bug Tracker & Wiki
#18935: MS bugs - Danger! Windows updates break everything on their way!
--+--
 Reporter:  bugzilla  |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Critical  | Resolution:
 Keywords:  tbb-crash |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by bugzilla):

 And
 {{{
 Faulting application name: firefox.exe, version: 45.1.0.0, time stamp:
 0x
 Faulting module name: kernel32.dll, version: 6.1.7601.23392, time stamp:
 0x56eb2fb8
 Exception code: 0xc0fd
 Fault offset: 0x0004ce8d
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18949 [- Select a component]: Update BridgeDB's CI to run tests with next version of Twisted

2016-05-02 Thread Tor Bug Tracker & Wiki
#18949: Update BridgeDB's CI to run tests with next version of Twisted
-+-
 Reporter:  isis |  Owner:
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  - Select a   |Version:
  component  |   Keywords:  isis201605
 Severity:  Minor|  bridgedb-0.3.6
Actual Points:   |  Parent ID:
   Points:  small|   Reviewer:
  Sponsor:   |
-+-
 [https://travis-ci.org/isislovecruft/bridgedb/builds/127250227 BridgeDB's
 CI] is set up to run the tests several times, with the idea that it runs
 one time each with installed versions of Twisted and PyOpenSSL included in
 both Debian stable and testing (so that we always know that we can run on
 the next stable release). Since we recently upgraded to Debian jessie,
 these versions are now outdated.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18237 [Obfuscation/BridgeDB]: BridgeDB should clean up unparseable descriptor files at some regular interval

2016-05-02 Thread Tor Bug Tracker & Wiki
#18237: BridgeDB should clean up unparseable descriptor files at some regular
interval
---+--
 Reporter:  isis   |  Owner:  isis
 Type:  enhancement| Status:  needs_review
 Priority:  High   |  Milestone:
Component:  Obfuscation/BridgeDB   |Version:
 Severity:  Minor  | Resolution:
 Keywords:  isis201605 bridgedb-0.3.6  |  Actual Points:
Parent ID: | Points:
 Reviewer: |Sponsor:
---+--
Changes (by isis):

 * keywords:  isis201605 => isis201605 bridgedb-0.3.6
 * status:  accepted => needs_review


Comment:

 Patch in  my `fix/18237`
 [https://gitweb.torproject.org/user/isis/bridgedb.git/log/?h=fix/18237
 branch].

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18937 [Applications/Tor Browser]: What's new (bugs) in Tor Browser 6.0a5 -- April 28 2016

2016-05-02 Thread Tor Bug Tracker & Wiki
#18937: What's new (bugs) in Tor Browser 6.0a5 -- April 28 2016
--+--
 Reporter:  bugzilla  |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by bugzilla):

 Clean installation and everything is working t slow..
 +
 {{{
 14:44:19.094 A promise chain failed to handle a rejection. Did you forget
 to '.catch', or did you forget to 'return'?
 See
 
https://developer.mozilla.org/Mozilla/JavaScript_code_modules/Promise.jsm/Promise

 Date: Mon May 02 2016 14:44:14 GMT+ (UTC)
 Full Message: Component returned failure code: 0x80004005
 (NS_ERROR_FAILURE) [imgIRequest.image]
 Full Stack: JS frame :: chrome://browser/content/content.js ::
 PageInfoListener.serializeElementInfo :: line 1188
 JS frame :: chrome://browser/content/content.js ::
 PageInfoListener.getMediaNode/addImage :: line 1081
 JS frame :: chrome://browser/content/content.js ::
 PageInfoListener.getMediaNode :: line 1115
 JS frame :: chrome://browser/content/content.js ::
 PageInfoListener.processFrames :: line 1057
 JS frame :: resource://gre/modules/Task.jsm :: TaskImpl_run :: line 315
 JS frame :: resource://gre/modules/Task.jsm :: TaskImpl :: line 276
 JS frame :: resource://gre/modules/Task.jsm ::
 createAsyncFunction/asyncFunction :: line 250
 JS frame :: resource://gre/modules/Task.jsm :: Task_spawn :: line 164
 JS frame :: chrome://browser/content/content.js ::
 PageInfoListener.getMediaInfo :: line 1032
 JS frame :: chrome://browser/content/content.js ::
 PageInfoListener.receiveMessage :: line 9341 content.js:1188:0
 }}}
 in Page Info

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18948 [Applications/Tor Browser]: improve update notification UX

2016-05-02 Thread Tor Bug Tracker & Wiki
#18948: improve update notification UX
--+--
 Reporter:  mcs   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  tbb-usability |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * keywords:   => tbb-usability


Comment:

 Note, though, that we don't have updates for our nightly channel
 currently.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18948 [Applications/Tor Browser]: improve update notification UX

2016-05-02 Thread Tor Bug Tracker & Wiki
#18948: improve update notification UX
--+--
 Reporter:  mcs   |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 As discussed on IRC, it is a little irritating (and potentially confusing)
 that Tor Browser displays "WARNING: this browser is out of date" but then
 directs users to choose "Check for Tor Browser Update" (clearly, the
 browser already knows that there is an update available).

 We could change the text of that Torbutton menu item to "Update Tor
 Browser" in this situation or we could go even further and add an "Update
 Now" button to the about:tor page.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18935 [Applications/Tor Browser]: MS bugs - Danger! Windows updates break everything on their way!

2016-05-02 Thread Tor Bug Tracker & Wiki
#18935: MS bugs - Danger! Windows updates break everything on their way!
--+--
 Reporter:  bugzilla  |  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  High  |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Critical  | Resolution:
 Keywords:  tbb-crash |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--

Comment (by bugzilla):

 Well, fully updated system with EAF disabled brought us to:
 {{{
 Faulting application name: firefox.exe, version: 45.1.0.0, time stamp:
 0x
 Faulting module name: xul.dll, version: 45.1.0.0, time stamp: 0x
 Exception code: 0xc005
 Fault offset: 0x0003fb34
 }}}
 Seems opening a lot of Trac tickets in the background is a good stress-
 test.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18947 [Applications/Tor Browser]: 6.0a5 is not starting on OS X if put into /Applications

2016-05-02 Thread Tor Bug Tracker & Wiki
#18947: 6.0a5 is not starting on OS X if put into /Applications
--+---
 Reporter:  gk|  Owner:  mcs
 Type:  defect| Status:  needs_information
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Critical  | Resolution:
 Keywords:  TorBrowserTeam201605  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+---
Changes (by brade):

 * status:  new => needs_information


Comment:

 I cannot reproduce this with a clean install or an upgrade from 6.0a4 on
 the Mac OS 10.10.5 computer I have easy access to right now. Maybe
 something got corrupted in the browser profile during the upgrade (perhaps
 because of #18928).

 Nick, do either or both of the following directories exist? If so, what is
 in them?
  /Applications/TorBrowser.app/TorBrowser/
  ~/Library/Application Support/TorBrowser-Data/

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17291, #18668, #15055, #16794, #16698

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #17291, #18668, #15055, #16794, #16698 by nickm:
keywords to TorCoreTeam201605

Comment:
Give myself a few items for May. I hope I can do even more than this, but let's 
be careful.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #8185, #18402

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #8185, #18402 by nickm:
keywords to TorCoreTeam-postponed-201604

Comment:
These two weren't done in april. They *could* get done in May, if progress 
happens.

--
Tickets URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18639, #17284, #18240, #18921, #7478, #17983, #18363, #17101, #17158, #17799, #18365, #18616, #18749, #18761, #7144, #15588, #14881, #18803, #17280,

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18639, #17284, #18240, #18921, #7478, #17983, #18363, 
#17101, #17158, #17799, #18365, #18616, #18749, #18761, #7144, #15588, #14881, 
#18803, #17280, #17282 by nickm:
keywords to TorCoreTeam201605 TorCoreTeam-postponed-201604

Comment:
April is over; calling these april tickets postponed into may.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18686 [Core Tor/Tor]: tor port forwarding claims to kill long-dead forwarder

2016-05-02 Thread Tor Bug Tracker & Wiki
#18686: tor port forwarding claims to kill long-dead forwarder
---+
 Reporter:  chadmiller |  Owner:  nickm
 Type:  defect | Status:  needs_review
 Priority:  Medium |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor   |Version:  Tor: 0.2.7.6
 Severity:  Major  | Resolution:
 Keywords:  TorCoreTeam201605  |  Actual Points:
Parent ID: | Points:  small
 Reviewer: |Sponsor:
---+
Changes (by nickm):

 * points:   => small


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
-+-
 Reporter:  weasel   |  Owner:  yawning
 Type:  defect   | Status:
 Priority:  High |  needs_revision
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Major|  0.2.8.x-final
 Keywords:  tor-core, crypto, TorCoreTeam201605  |Version:  Tor:
Parent ID:   |  0.2.8.2-alpha
 Reviewer:   | Resolution:
 |  Actual Points:
 | Points:  small-
 |  remaining
 |Sponsor:
-+-
Changes (by nickm):

 * points:   => small-remaining


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18808 [Core Tor/Tor]: Check if connection is excess in connection_dir_finished_flushing

2016-05-02 Thread Tor Bug Tracker & Wiki
#18808: Check if connection is excess in connection_dir_finished_flushing
-+-
 Reporter:  teor |  Owner:  teor
 Type:  defect   | Status:
 Priority:  Medium   |  assigned
Component:  Core Tor/Tor |  Milestone:  Tor:
 Severity:  Normal   |  0.2.8.x-final
 Keywords:  must-fix-before-028-rc,  |Version:  Tor:
  TorCoreTeam201605  |  0.2.8.1-alpha
Parent ID:  #18809   | Resolution:
 Reviewer:   |  Actual Points:
 | Points:  small-
 |  remaining
 |Sponsor:
-+-
Changes (by nickm):

 * points:   => small-remaining


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #17150 [Core Tor/Tor]: Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from routerdesc"

2016-05-02 Thread Tor Bug Tracker & Wiki
#17150: Tor 0.2.7.3-rc: "Extrainfo digest did not match digest256 from 
routerdesc"
+--
 Reporter:  toralf  |  Owner:  nickm
 Type:  defect  | Status:  needs_review
 Priority:  High|  Milestone:  Tor:
Component:  Core Tor/Tor|  0.2.8.x-final
 Severity:  Normal  |Version:  Tor: 0.2.7
 Keywords:  TorCoreTeam201605 028-backport  | Resolution:
Parent ID:  |  Actual Points:
 Reviewer:  | Points:  small
|Sponsor:
+--
Changes (by nickm):

 * keywords:  TorCoreTeam201605 => TorCoreTeam201605 028-backport
 * status:  accepted => needs_review
 * points:   => small


Comment:

 hey, there's a patch here.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17150, #17621, #11966, #18808, #18812, #8051, #18920, #18921, #17158, #17905, #18312, #18483, #18616, #18686, #18710, #18749, #18761, #18809, #18929,

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #17150, #17621, #11966, #18808, #18812, #8051, #18920, 
#18921, #17158, #17905, #18312, #18483, #18616, #18686, #18710, #18749, #18761, 
#18809, #18929, #16645, #18943, #17853, #18849, #18930 by nickm:
keywords to TorCoreTeam201605

Comment:
Calling all non-needs_information tickets for May.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18947 [Applications/Tor Browser]: 6.0a5 is not starting on OS X if put into /Applications

2016-05-02 Thread Tor Bug Tracker & Wiki
#18947: 6.0a5 is not starting on OS X if put into /Applications
--+
 Reporter:  gk|  Owner:  mcs
 Type:  defect| Status:  new
 Priority:  Very High |  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Critical  |   Keywords:
Actual Points:|  TorBrowserTeam201605
   Points:|  Parent ID:
  Sponsor:|   Reviewer:
--+
 Nick reported that 6.0a5 on OS X is neither starting after an update nor
 after being freshly downloaded. The error message is: Tor launcher\n\nTor
 unexpectedly exited. This might be a bug in Tor itself...

 Running "tor.real" from the command line is starting it fine.

 After a bit of testing it turned out that putting it on the desktop is
 working fine, too. Just having it in /Applications produces the bug. I
 guess this is due to #13252.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  needs_revision
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by yawning):

 Addressed the warning in a fixup.  I'll deal with the other part of this
 later with a qemu ppc target.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18237 [Obfuscation/BridgeDB]: BridgeDB should clean up unparseable descriptor files at some regular interval

2016-05-02 Thread Tor Bug Tracker & Wiki
#18237: BridgeDB should clean up unparseable descriptor files at some regular
interval
--+--
 Reporter:  isis  |  Owner:  isis
 Type:  enhancement   | Status:  accepted
 Priority:  High  |  Milestone:
Component:  Obfuscation/BridgeDB  |Version:
 Severity:  Minor | Resolution:
 Keywords:  isis201605|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by isis):

 * keywords:   => isis201605
 * status:  new => accepted


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  needs_revision
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by yawning):

 * status:  needs_review => needs_revision


Comment:

 Replying to [comment:3 cypherpunks]:
 > According to [http://en.cppreference.com/w/c/language/identifier C11]
 identifiers that begin with an underscore are reserved.

 Don't care, it's macros swiped from `src/ext/csiphash.c`.  Abstracting it
 out into a common header file would be a good idea in the future, but is
 beyond the scope of this ticket.

 > Also i would move line 242 to line 246 so the change becomes similar to
 that of `foldP` and `setout` and the comment wouldn't need to be
 duplicated.

 Meh.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18946 [Applications/Tor Browser]: Investigate fingerprinting potential of enabling H.264 on Linux

2016-05-02 Thread Tor Bug Tracker & Wiki
#18946: Investigate fingerprinting potential of enabling H.264 on Linux
-+-
 Reporter:  gk   |  Owner:  tbb-
 Type:  defect   |  team
 Priority:  Medium   | Status:  new
Component:  Applications/Tor Browser |  Milestone:
 Severity:  Normal   |Version:
 Keywords:  ff45-esr, tbb-fingerprinting,| Resolution:
  TorBrowserTeam201605   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-

Comment (by cypherpunks):

 "Enable H.264 video for this site/URL bar domain?", cleared on new
 identity.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  needs_review
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by weasel):

 and
 {{{
 crypto/digests: OK
 crypto/sha3: [forking]
   FAIL ../src/test/test_crypto.c:506: assert(data == mem_op_hex_tmp):
 8456C1F3F441B8B700A83A83788821397AC2EE1FFF3905DE2F1B8A00718582E9 vs
 677035391CD3701293D385F037BA32796252BB7CE180B00B582DD9B20AAAD7F0
   [sha3 FAILED]
 crypto/sha3_xof: [forking]
   FAIL ../src/test/test_crypto.c:854: assert(out == mem_op_hex_tmp):
 
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
 77E467EA187484CBBFE228191F5
 vs
 
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
 BA01A11863AB2D1DFD16E3973D4
   [sha3_xof FAILED]
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  needs_review
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by weasel):

 on 0c95e52c17da1e11f131d00ea9f52e60a70a41c4:

 {{{
 gcc -DHAVE_CONFIG_H -I. -I..  -I../src/ext -Isrc/ext -I../src/ext/trunnel
 -I../src/trunnel -I../src/common -Isrc/common -I../src/ext/trunnel
 -I../src/trunnel -I../src/or -Isrc/or
 -DSHARE_DATADIR="\"/usr/local/share\""
 -DLOCALSTATEDIR="\"/usr/local/var\"" -DBINDIR="\"/usr/local/bin\""
 -I../src/common -g -O2 -D_FORTIFY_SOURCE=2 -fstack-protector-all
 -Wstack-protector -fwrapv --param ssp-buffer-size=1 -fPIE -fasynchronous-
 unwind-tables -Wall -fno-strict-aliasing -W -Wfloat-equal -Wundef
 -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wwrite-strings
 -Wredundant-decls -Wchar-subscripts -Wcomment -Wformat=2 -Wwrite-strings
 -Wmissing-declarations -Wredundant-decls -Wnested-externs -Wbad-function-
 cast -Wswitch-enum -Werror -Winit-self -Wmissing-field-initializers -Wold-
 style-definition -Waddress -Wmissing-noreturn -Wstrict-overflow=1
 -Wnormalized=id -Woverride-init -Wextra -Warray-bounds -Wlogical-op -MT
 src/ext/keccak-tiny/src_ext_keccak_tiny_libkeccak_tiny_a-keccak-tiny-
 unrolled.o -MD -MP -MF src/ext/keccak-tiny/.deps
 /src_ext_keccak_tiny_libkeccak_tiny_a-keccak-tiny-unrolled.Tpo -c -o
 src/ext/keccak-tiny/src_ext_keccak_tiny_libkeccak_tiny_a-keccak-tiny-
 unrolled.o `test -f 'src/ext/keccak-tiny/keccak-tiny-unrolled.c' || echo
 '../'`src/ext/keccak-tiny/keccak-tiny-unrolled.c
 ../src/ext/keccak-tiny/keccak-tiny-unrolled.c: In function 'hash':
 ../src/ext/keccak-tiny/keccak-tiny-unrolled.c:361:8: error: 's.delim' may
 be used uninitialized in this function [-Werror=maybe-uninitialized]
if (s->delim != KECCAK_DELIM_XOF)
 ^
 ../src/ext/keccak-tiny/keccak-tiny-unrolled.c:402:16: note: 's' was
 declared here
keccak_state s;
 ^
 cc1: all warnings being treated as errors
 Makefile:4433: recipe for target 'src/ext/keccak-tiny
 /src_ext_keccak_tiny_libkeccak_tiny_a-keccak-tiny-unrolled.o' failed
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18946 [Applications/Tor Browser]: Investigate fingerprinting potential of enabling H.264 on Linux

2016-05-02 Thread Tor Bug Tracker & Wiki
#18946: Investigate fingerprinting potential of enabling H.264 on Linux
-+-
 Reporter:  gk   |  Owner:  tbb-
 Type:  defect   |  team
 Priority:  Medium   | Status:  new
Component:  Applications/Tor Browser |  Milestone:
 Severity:  Normal   |Version:
 Keywords:  ff45-esr, tbb-fingerprinting,| Resolution:
  TorBrowserTeam201605   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by cypherpunks):

 * keywords:  ff45-esr, tbb-fingerprinting => ff45-esr, tbb-fingerprinting,
 TorBrowserTeam201605


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18946 [Applications/Tor Browser]: Investigate fingerprinting potential of enabling H.264 on Linux

2016-05-02 Thread Tor Bug Tracker & Wiki
#18946: Investigate fingerprinting potential of enabling H.264 on Linux
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  ff45-esr, tbb-fingerprinting  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by cypherpunks):

 * keywords:  ff45-esr, tbb-fingerprinting, TorBrowserTeam201605 =>
 ff45-esr, tbb-fingerprinting


Comment:

 A lot of Tor Browser users want H.264 support and don't mind if the 'cost'
 of it is revealing them to be wisely using Linux. In any case, it should
 be a choice.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18915, #13893, #18101, #15988, #17509, #18291

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18915, #13893, #18101, #15988, #17509, #18291 by gk:
keywords to GeorgKoppen201605

Comment:
Moving things for me to May.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18884, #15842, #15910, #16285, #18601, #18619, #18770, #18855, #18860, #18885, #18904, #18912, #18914, #18945, #18946

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18884, #15842, #15910, #16285, #18601, #18619, #18770, 
#18855, #18860, #18885, #18904, #18912, #18914, #18945, #18946 by gk:
keywords to TorBrowserTeam201605

Comment:
Dragging into May to have it on our 6.0 radar.

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18945 [Applications/Tor Browser]: Disable monitoring the connected state of Tor Browser users

2016-05-02 Thread Tor Bug Tracker & Wiki
#18945: Disable monitoring the connected state of Tor Browser users
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal| Resolution:
 Keywords:  ff45-esr  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+--
Changes (by gk):

 * keywords:  ff45esr => ff45-esr


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #18545, #18546, #18915, #13893, #16998, #18101, #18928, #15988, #16757, #17400, #17509, #17662, #17858, #18291, #18292, #18597, #18811, #18845, #18886

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #18545, #18546, #18915, #13893, #16998, #18101, #18928, 
#15988, #16757, #17400, #17509, #17662, #17858, #18291, #18292, #18597, #18811, 
#18845, #18886, #18925 by gk:
keywords to TorBrowserTeam201605

Comment:
Moving tickets

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18226 [Applications/Tor Browser]: Make sure our toolchains are ready for switching to Firefox ESR 45

2016-05-02 Thread Tor Bug Tracker & Wiki
#18226: Make sure our toolchains are ready for switching to Firefox ESR 45
-+-
 Reporter:  gk   |  Owner:  tbb-
 Type:  task |  team
 Priority:  Medium   | Status:  closed
Component:  Applications/Tor Browser |  Milestone:
 Severity:  Normal   |Version:
 Keywords:  ff45-esr, tbb-gitian,| Resolution:  fixed
  GeorgKoppen201604, TorBrowserTeam201604|  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 We are done here.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18291 [Applications/Tor Browser]: Don't use libfaketime anymore for building the Firefox part of Tor Browser

2016-05-02 Thread Tor Bug Tracker & Wiki
#18291: Don't use libfaketime anymore for building the Firefox part of Tor 
Browser
-+-
 Reporter:  gk   |  Owner:  tbb-
 Type:  defect   |  team
 Priority:  Medium   | Status:  new
Component:  Applications/Tor Browser |  Milestone:
 Severity:  Normal   |Version:
 Keywords:  tbb-gitian, ff45-esr,| Resolution:
  TorBrowserTeam201604, GeorgKoppen201604|  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+-
Changes (by gk):

 * parent:  #18226 =>


--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  needs_review
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+

Comment (by cypherpunks):

 According to [http://en.cppreference.com/w/c/language/identifier C11]
 identifiers that begin with an underscore are reserved.

 Also i would move line 242 to line 246 so the change becomes similar to
 that of `foldP` and `setout` and the comment wouldn't need to be
 duplicated.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18940 [- Select a component]: Danger : verifying digital certificate and fake response !

2016-05-02 Thread Tor Bug Tracker & Wiki
#18940: Danger : verifying digital certificate and  fake response !
--+-
 Reporter:  safeless  |  Owner:
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal| Resolution:  invalid
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-

Comment (by cypherpunks):

 Don't use Windows.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18944 [Applications/Tor Browser]: Remove block-malicious-sites-checkbox on TLS error page

2016-05-02 Thread Tor Bug Tracker & Wiki
#18944: Remove block-malicious-sites-checkbox on TLS error page
+--
 Reporter:  gk  |  Owner:  tbb-team
 Type:  defect  | Status:  new
 Priority:  Medium  |  Milestone:
Component:  Applications/Tor Browser|Version:
 Severity:  Normal  | Resolution:
 Keywords:  ff45-esr, TorBrowserTeam201605  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by gk):

 The first thing is We are not in the business of identifying and blocking
 malicious sites. We actually disabled that feature. Second, I see no
 reason why Mozilla should gather data related to a Tor Browser user.
 Third, this message is highly confusing in our context. Say, an exit node
 is MITMing a user. Why should the user report that to Mozilla in order to
 identify and block malicious sites? What is Mozilla supposed to do with
 that information?

 We can think about ways to deal with MITM attacks in Tor Browser but that
 would be another ticket and would need at least a repurposed checkbox.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18545 [Applications/Tor Browser]: Review Firefox Developer Docs and Undocumented bugs since FF38esr

2016-05-02 Thread Tor Bug Tracker & Wiki
#18545: Review Firefox Developer Docs and Undocumented bugs since FF38esr
+--
 Reporter:  gk  |  Owner:  tbb-team
 Type:  task| Status:  new
 Priority:  Very High   |  Milestone:
Component:  Applications/Tor Browser|Version:
 Severity:  Critical| Resolution:
 Keywords:  ff45-esr, TorBrowserTeam201604  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:  SponsorU
+--

Comment (by gk):

 Replying to [comment:20 brade]:
 > Kathy and I reviewed all of the release notes and developer docs for
 Firefox 39-45. We have not yet looked at the complete bug lists
 (comment:17).

 That's fine. I am halfway through and think having just one doing that is
 okay.

 > Here are some things that might be worth another look (some of these may
 have been looked at in more detail by gk already):

 Thanks for looking at it!

 > CacheStorage. It seems that this can be used by Web Workers and regular
 JS code (not just by Service Workers).
 > https://developer.mozilla.org/en-US/docs/Web/API/CacheStorage

 Do you have a bug indicating that? CacheStorage is part of the Service
 Workers spec and that whole MDN page indicates that, too.

 > Server logging. This is kind of a strange feature: server applications
 can return an X- HTTP header to cause items to be logged to the developer
 console. Maybe it is only done when the console is open and the user is
 monitoring network requests (I am not sure). Kathy and I do not like the
 idea that this is enabled, but it may be harmless.
 > https://developer.mozilla.org/en-
 US/docs/Tools/Web_Console/Console_messages#Server

 Hm. This is https://bugzilla.mozilla.org/show_bug.cgi?id=1168872. So what
 if we put that feature behind a pref? Disabling it by default in Tor
 Browser?

 > window.screen.orientation. This is possibly a fingerprinting vector
 unless it always returns "landscape-primary" on desktop Firefox (it may
 still be an issue for Orfox). Or did we decide that applications can
 derive this kind of info from the window size/aspect ratio anyway?
 > https://developer.mozilla.org/en-US/docs/Web/API/Screen/orientation

 #13025 did not solve this?

 > Navigator.onLine. This can be used to monitor the connected state of a
 user's computer. We can disable it by setting network.manage-offline-
 status = false.
 > https://developer.mozilla.org/en-US/docs/Web/API/NavigatorOnLine/onLine

 I definitely came across this one and was thinking about it but I am not
 sure anymore why I did not put it up in my review notes. I think flipping
 that pref back is a good option, #18945

 > Enable H.264 if system decoder is available (Linux). Kathy and I do not
 know enough about the world of video decoders to know if this could be a
 significant fingerprinting vector.
 > https://bugzilla.mozilla.org/show_bug.cgi?id=1213499

 We could investigate which Linux systems would be affected by this:
 #18946.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18946 [Applications/Tor Browser]: Investigate fingerprinting potential of enabling H.264 on Linux

2016-05-02 Thread Tor Bug Tracker & Wiki
#18946: Investigate fingerprinting potential of enabling H.264 on Linux
-+-
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor |Version:
  Browser|   Keywords:  ff45-esr, tbb-
 Severity:  Normal   |  fingerprinting
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+-
 On Linux H.264 is enabled as long as ffmpeg is available. This might be a
 fingerprinting vector. We should investigate whether this is actually the
 case.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18945 [Applications/Tor Browser]: Disable monitoring the connected state of Tor Browser users

2016-05-02 Thread Tor Bug Tracker & Wiki
#18945: Disable monitoring the connected state of Tor Browser users
--+--
 Reporter:  gk|  Owner:  tbb-team
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:
Component:  Applications/Tor Browser  |Version:
 Severity:  Normal|   Keywords:  ff45esr
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+--
 `network.manage-offline-status` should be set to `false` again in order to
 disable monitoring the connected state of users. (basically enabling the
 status quo ante).

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18944 [Applications/Tor Browser]: Remove block-malicious-sites-checkbox on TLS error page

2016-05-02 Thread Tor Bug Tracker & Wiki
#18944: Remove block-malicious-sites-checkbox on TLS error page
+--
 Reporter:  gk  |  Owner:  tbb-team
 Type:  defect  | Status:  new
 Priority:  Medium  |  Milestone:
Component:  Applications/Tor Browser|Version:
 Severity:  Normal  | Resolution:
 Keywords:  ff45-esr, TorBrowserTeam201605  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by cypherpunks):

 Of course this should only ever be conspicuously manual, never automatic.
 And not every MITM will be Tor-related.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18940 [- Select a component]: Danger : verifying digital certificate and fake response !

2016-05-02 Thread Tor Bug Tracker & Wiki
#18940: Danger : verifying digital certificate and  fake response !
--+-
 Reporter:  safeless  |  Owner:
 Type:  defect| Status:  closed
 Priority:  Medium|  Milestone:
Component:  - Select a component  |Version:
 Severity:  Normal| Resolution:  invalid
 Keywords:|  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+-
Changes (by yawning):

 * status:  new => closed
 * resolution:   => invalid


Comment:

 > Iran cyber Army can generate a fake response for this! (connections on
 port number 80 is not encrypted )

 a) "All definitive response messages SHALL be digitally signed."
 (https://tools.ietf.org/html/rfc6960)
 b) It's Microsoft's signature scheme, mechanism and implementation.  Go
 complain to them.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18944 [Applications/Tor Browser]: Remove block-malicious-sites-checkbox on TLS error page

2016-05-02 Thread Tor Bug Tracker & Wiki
#18944: Remove block-malicious-sites-checkbox on TLS error page
+--
 Reporter:  gk  |  Owner:  tbb-team
 Type:  defect  | Status:  new
 Priority:  Medium  |  Milestone:
Component:  Applications/Tor Browser|Version:
 Severity:  Normal  | Resolution:
 Keywords:  ff45-esr, TorBrowserTeam201605  |  Actual Points:
Parent ID:  | Points:
 Reviewer:  |Sponsor:
+--

Comment (by cypherpunks):

 Because... of privacy...?? Or because any MITM is likely not taking place
 near the site or its network? When you get MITMed, easily telling someone
 who can potentially take action about it is a useful feature. In Tor
 Browser's case the people to tell are those on the relevant list,
 optionally separated from other messages to that list in case of high
 volume or low quality.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  needs_review
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by yawning):

 * status:  assigned => needs_review


Comment:

 This *should* fix Big Endian targets.  Additionally while I'm here, the
 `xorin` call probably would have broken at a later date on ARM/PPC/etc
 when `src` isn't 8 byte aligned, so I addressed that as well (`dst` is
 fine assuming reasonable compiler behavior, the Keccak permutation code
 will also break if it's not properly aligned.).

 
https://git.schwanenlied.me/yawning/tor/commit/e662e6c0983bfc6c5b4370b8c0c06a900bc508d7

 AFAIK the only code that calls this as of yet is the unit tests, and
 everyone else doing development that uses SHA3/SHAKE (the rng branch and
 the prop 224 people) haven't merged yet and use Intel systems anyway...

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18944 [Applications/Tor Browser]: Remove block-malicious-sites-checkbox on TLS error page

2016-05-02 Thread Tor Bug Tracker & Wiki
#18944: Remove block-malicious-sites-checkbox on TLS error page
-+-
 Reporter:  gk   |  Owner:  tbb-team
 Type:  defect   | Status:  new
 Priority:  Medium   |  Milestone:
Component:  Applications/Tor |Version:
  Browser|   Keywords:  ff45-esr,
 Severity:  Normal   |  TorBrowserTeam201605
Actual Points:   |  Parent ID:
   Points:   |   Reviewer:
  Sponsor:   |
-+-
 If a secure connection failed the error page contains a checkbox stating
 "Report errors like this to help Mozilla identify and block malicious
 sites". We don't want to do this.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] [Tor Bug Tracker & Wiki] Batch modify: #17790, #18022, #18333, #18703, #18743

2016-05-02 Thread Tor Bug Tracker & Wiki
Batch modification to #17790, #18022, #18333, #18703, #18743 by gk:
keywords to TorBrowserTeam201605R

Comment:
Moving reviews over to May 2016

--
Tickets URL: 

Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18905 [Applications/Tor Browser]: Remove unused menu items from Tor Browser help menu

2016-05-02 Thread Tor Bug Tracker & Wiki
#18905: Remove unused menu items from Tor Browser help menu
+--
 Reporter:  arthuredelstein |  Owner:
 Type:  defect  |  arthuredelstein
 Priority:  Medium  | Status:
Component:  Applications/Tor Browser|  needs_revision
 Severity:  Normal  |  Milestone:
 Keywords:  ff45-esr, TorBrowserTeam201605  |Version:
Parent ID:  | Resolution:
 Reviewer:  |  Actual Points:
| Points:
|Sponsor:
+--
Changes (by gk):

 * keywords:  ff45-esr, TorBrowserTeam201604R => ff45-esr,
 TorBrowserTeam201605
 * status:  needs_review => needs_revision


Comment:

 I think getting rid of the "Report Web Forgery..." one should be done,
 too, while we are at it. Otherwise I think doing this can't hurt.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:  yawning
 Type:  defect| Status:  assigned
 Priority:  High  |  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Major | Resolution:
 Keywords:  tor-core, crypto  |  Actual Points:
Parent ID:| Points:
 Reviewer:|Sponsor:
--+
Changes (by yawning):

 * owner:   => yawning
 * keywords:   => tor-core, crypto
 * status:  new => assigned
 * severity:  Normal => Major
 * priority:  Medium => High


Comment:

 Yeah, the code is LE specific.  The two `xorin` calls (one from the
 `foldP` macro and the other in finalize) are the only places that need
 changes.  I'll deal with this after I wake up, though I do not have access
 to a non-LE target at the moment.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #18887 [Applications/Quality Assurance and Testing]: Update the marionette version we are using in Tor Browser test suite

2016-05-02 Thread Tor Bug Tracker & Wiki
#18887: Update the marionette version we are using in Tor Browser test suite
-+-
 Reporter:  boklm|  Owner:  boklm
 Type:  defect   | Status:  closed
 Priority:  Medium   |  Milestone:
Component:  Applications/Quality Assurance and   |Version:
  Testing| Resolution:  fixed
 Severity:  Normal   |  Actual Points:
 Keywords:   | Points:
Parent ID:   |Sponsor:
 Reviewer:   |
-+-
Changes (by boklm):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 This is fixed in commit 810b992c1d2f9338fdf18b3db618ea0748232d21.

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


[tor-bugs] #18943 [Core Tor/Tor]: sha3 testsuite fails on big endian hosts

2016-05-02 Thread Tor Bug Tracker & Wiki
#18943: sha3 testsuite fails on big endian hosts
--+
 Reporter:  weasel|  Owner:
 Type:  defect| Status:  new
 Priority:  Medium|  Milestone:  Tor: 0.2.8.x-final
Component:  Core Tor/Tor  |Version:  Tor: 0.2.8.2-alpha
 Severity:  Normal|   Keywords:
Actual Points:|  Parent ID:
   Points:|   Reviewer:
  Sponsor:|
--+
 Hi,

 looking at the current
 https://buildd.debian.org/status/package.php?p=tor=experimental, in
 particular at

 
https://buildd.debian.org/status/fetch.php?pkg=tor=mips=0.2.8.2-alpha-1=1461496211
 
https://buildd.debian.org/status/fetch.php?pkg=tor=powerpc=0.2.8.2-alpha-1=1461451662
 
https://buildd.debian.org/status/fetch.php?pkg=tor=s390x=0.2.8.2-alpha-1=1461436567

 suggests that the sha3 test suite fails on big-endian hosts.
 {{{
 crypto/sha3: [forking]
   FAIL ../src/test/test_crypto.c:506: assert(data == mem_op_hex_tmp):
 E241F247AF432EEDB73B6377C955F93F42B162AD7A2047E468381A59451EB178 vs
 677035391CD3701293D385F037BA32796252BB7CE180B00B582DD9B20AAAD7F0
   [sha3 FAILED]
 crypto/sha3_xof: [forking]
   FAIL ../src/test/test_crypto.c:854: assert(out == mem_op_hex_tmp):
 
62FBE70B8BA99C650A17E57A921F558D0D24DF1C960463DE4DEAB998B4287550F3B909E83FA6B202873F3DAF9AE3A816014814386C8534CAF25E828F80AB0B8E233D669CCC0C0A94213896DB9018714D096C82AF8B52D68906B28F636CDE99EC5C78C31D992A66E4D957C41AFBD27A776AD3F486728BE7B4AE5DBA090AA6B3D0B858E7730CF59727E505F757E8441BAD63639FABFB40AE3F647DECDB7AF60BC6B4A93C2F3300A97698BC84B0AAEDD8FC278CC1AF9C33B09712443CD5F1D4713582EA1E40C0F3C4F2D3D854747803EC55EAD1ED512E964053A193137EB9BC4DD97D619F679401AF7B152D264793E7F886C0FECA5F5D4C9F2AB01C66558256BC2FE8E322F3B8D159960E53B63D7EF207588B402018F0C1AA8CEEDDB44BA32071F5D3EBB426CFEC939462BCE590BE7CD968534552103A38C428B36F8E832F05C7BDFEC0935C2893C0D875C0A43089A484CF4F60E2A80434BBB90068870ACADCE6B59521B19ECECDD14B237D0E149FE40ABC2188DA16C0527A19FE9584BF925199CAB95B9504561E24D648F64A088C58A336D78111852C4F8782882D9F7D9AF7B82960D682D83DD5FD681DF07BD47B116393DFEDEBDCA3DB464B68CA9DBF6AD3756FCFAE3BBD7E4B4737D8556081C855414A722EDEB7FF4B31AF4F3FF5F65368A9CE2F7BAA3507CFAFBF455F164143BC6F5CE4554
 F695EFAD65513116C26BA915750
 vs
 
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
 BA01A11863AB2D1DFD16E3973D4
   [sha3_xof FAILED]
 }}}

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs


Re: [tor-bugs] #12535 [Obfuscation/Pluggable transport]: goptlib should expose a SOCKS5 server instead of SOCKS4a.

2016-05-02 Thread Tor Bug Tracker & Wiki
#12535: goptlib should expose a SOCKS5 server instead of SOCKS4a.
-+--
 Reporter:  yawning  |  Owner:  yawning
 Type:  defect   | Status:  assigned
 Priority:  Medium   |  Milestone:
Component:  Obfuscation/Pluggable transport  |Version:
 Severity:  Normal   | Resolution:
 Keywords:  goptlib, socks   |  Actual Points:
Parent ID:   | Points:
 Reviewer:   |Sponsor:
-+--
Changes (by dcf):

 * severity:   => Normal


Comment:

 I merged ​https://github.com/Yawning/goptlib/compare/bug12535_v2 at
 93bcaf4c7d5b8e3dc29142ca50f96197639c38cf and tagged goptlib
 [https://gitweb.torproject.org/pluggable-
 transports/goptlib.git/tag/?id=0.6 0.6].

--
Ticket URL: 
Tor Bug Tracker & Wiki 
The Tor Project: anonymity online
___
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs