Hi, anonym wrote (03 Dec 2013 00:33:43 GMT) : >> * remaining coding blockers
> Most coding is done. See in particular commit 7ead3ed for the fail-safe > (as an early Christmas gift for you, I gettext:ised it (commit 6c6604a) > even before you asked for it :)))), which I pushed in a hurry without > any mention a few days ago. There's also a new TG in the APT suite, and > both the feature branch and the APT suite were merged > into experimental. Cool. Added a typo fix commit on top. You'll want to merge the current devel branch into feature/spoof-mac, resolving any conflicts introduced by commit d28ac88. > Two things that remain comes to mind (although I promise to scan this > thread for more loose ends): > * Perhaps checking the return status of tails-unblock-network in TG's > post-login script? If it fails due to `set -e`, NM may not start, > leaving the user without networking. Yet another notification? At least logging something on failure would seem useful. > * Investigate the NM passive probe fingerprinting issue. This is not > strictly coding, but it very well may turn into coding, which scares > me a bit since you in an earlier email thought it had to be > "addressed in the first released iteration of this work". IMHO, let's > at least not require that for the beta, so we can get it out there > faster just to see if in particular the network blocking and > unblocking isn't causing large-scale disasters. And the by-default > enabled MAC spoofing, of course... Do you really mean "active" here? If so, then I think we can allow ourselves to ship feature/spoof-mac without the NM active probing issue resolved, but I'd like to see clear plans about this topic (even if it is "it looks too hard, let's file a wishlist and email a few people asking if they want to implement it for us") first. > Definitely. I'll return to this post in a few days (when I have more > time on my hands) with more affirmative answers + proper bugs/tasks. See > this post more as a heads up. :) Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc _______________________________________________ tails-dev mailing list [email protected] https://mailman.boum.org/listinfo/tails-dev
