{5} Accepted, Active Tickets by Owner (Full Description) (83 matches)

List tickets accepted, group by ticket owner. This report demonstrates the use of full-row display.

Cthulhu (2 matches)

Ticket Summary Component Milestone Type Created
Description
#13421 GoodBadISP's Revamp Wiki project Oct 15, 2014

Following a discussion on the mailing list [1] the GoodBadISP page could do with some updating and proper arranging.

Some of the categories I have in mind to make available in the table format are as follows: Country, Company Name, ASN, Bridges Allowed, Relays Allowed, Exits Allowed, Last Updated, Correspondence.

Would "Bridges Allowed" be a redundant measure since they won't be in the public sphere?

Moritz @ Torservers already has done a fair deal of work, some is outdated or could use an update though but it's a good place to start our focus and give inspiration where needed. [2] [3] [4]

[1] https://lists.torproject.org/pipermail/tor-relays/2014-October/005493.html

[2] https://www.torservers.net/wiki/hoster/experience

[3] https://www.torservers.net/wiki/hoster/inquiry

[4] https://www.torservers.net/wiki/hoster/index

Note: Those wishing to assist on this project please feel free to CC yourself in and keep an eye on the child tickets. I can be found under the pseudonym "TheCthulhu" on IRC or contacted at thecthulhu <at> riseup <dot> net if you wish to ask me directly what to work on next. If this is the first time you've assisted using Trac or the Tor Wiki, don't hesitate to ask for help.


#13473 Sort Existing GoodBadISP page into tables Wiki task Oct 19, 2014

The existing GoodBadISP tables need sorting into the new format. All opinions, feedback and communications to that ISP must go in the correct section on ISPCorrespondence page to keep the primary page clean and to the point since it will grow substantially over time.

The new format should be available soon after this ticket is posted as it will be done for the US hosts (good experiences).


JacobHenner (1 match)

Ticket Summary Component Milestone Type Created
Description
#8177 Vidalia Help Documentation Out of Date Vidalia defect Feb 6, 2013

In the most recent release of the Tor Browser Bundle, the help documentation bundled with Vidalia (accessed by selecting Help) is out of date. A search of GeoIP will confirm this, as the documentation still lists the GeoIP lookup server at geoip.vidalia-project.net, which has not been maintained since 2010.


MB (1 match)

Ticket Summary Component Milestone Type Created
Description
#9328 o2online.de Live Check not working with enabled SSL strictness EFF-HTTPS Everywhere defect Jul 25, 2013

With enabled HTTPS Everywhere, http://www.o2online.de/microsite/o2-netz/live-check/ does not load additional JavaScript from a non-SSL CDN


Sherief (1 match)

Ticket Summary Component Milestone Type Created
Description
#12236 Don't display the full URL in token table Tor Support enhancement Jun 9, 2014

I'm interesting in the token full URL only when I create a new token so I give it to the user. The rest of the time, I don't really care to see the full thing, only the hash, maybe. That could reduce the table width.

So this change needs also a change to the token creation action to display a big fat URL that I can easily get into the clipboard.


StalkR (1 match)

Ticket Summary Component Milestone Type Created
Description
#2862 T-Shirt uptime is absolute, not considering tiny interruptions Tor Weather defect Apr 6, 2011

I've been running my non-exit Tor relay for many months now and for the last 3-4 months unthrottled. It averaged well above 500 Kilobyte/s. Since I signed up for Tor Weather earlier, I assumed I would receive the "get your shirt!" mail some day. But now it has been so long and I still did not get it.

My router has not been running without interruptions. I sometimes updated Tor, sometimes other things required me to stop it for short periods. I assumed Tor Weather would take that in mind.

I read https://gitweb.torproject.org/weather.git/blob?f=doc/design.txt#l42 and also asked in IRC:

<me> hm, according to the https://gitweb.torproject.org/weather.git/blob?f=doc/design.txt i need to run it uninterrupted for the timespan <Sebastian> that sounds not what the intention of our tshirt giveaway is <Sebastian> because a node can become unavailable through no fault of the operator for a short period of time <Sebastian> please definitely file that bug now

So here it is! And I will send a mail to the donations address about the shirt. :-)


anadahz (2 matches)

Ticket Summary Component Milestone Type Created
Description
#14094 Can not install ooni on Debian 8 Jessie amd64 Ooni defect Jan 3, 2015

Hello Next version of Debian Stable is under freeze for 2 months. Final release may be ready in two or three months. I am using it. On 30th December 2014 I have done git clone https://git.torproject.org/ooni-probe.git and tried to use it. Firstly I did: ./setup-dependencies.sh -p then python setup.py install After each command I had errors. I will provide full log.


#14047 Ooni installation fails on linux mint (rebecca) Ooni defect Dec 30, 2014

Hi,

just tried to install ooni via install.sh (https://ooni.torproject.org/install.sh). Got error message: "It appears that you are using an unsupported OS - please tell us"

Using Linux Mint 17.1 (rebecca).

Just added the output of "lsb_release -cs" to line 1929:

case $DISTRO_VERSION in
lucid|natty|jessie|wheezy|squeeze|precise|n/a|raring|saucy|trusty|''[changeset:ebecca rebecca]'')

asn (1 match)

Ticket Summary Component Milestone Type Created
Description
#4626 Very high cpu usage for gabelmoo running with renegotiation-limiting code Tor Tor: unspecified defect Dec 1, 2011

Hey there,

gabelmoo is seeing almost full cpu utilization lately. I'm running openssl1 and libevent master. Traffic is at around 200KB/s, so not very much. Here's a profile for everything over 0.5%:

samples  %        image name               app name                 symbol name
397332   26.8226  libc.so.6                libc.so.6                /home/karsten/debug/libc.so.6
210739   14.2263  libpthread.so.0          libpthread.so.0          __pthread_mutex_unlock_usercnt
157849   10.6559  libpthread.so.0          libpthread.so.0          pthread_mutex_lock
62969     4.2508  tor                      tor                      connection_handle_write
56998     3.8477  tor                      tor                      _openssl_locking_cb
44452     3.0008  tor                      tor                      assert_connection_ok
38146     2.5751  tor                      tor                      connection_bucket_write_limit
37917     2.5597  [vdso] (tgid:17627 range:0x7fffb85ff000-0x7fffb8600000) tor                      [vdso] (tgid:17627 range:0x7fffb85ff000-0x7fffb8600000)
32683     2.2063  tor                      tor                      flush_buf_tls
29224     1.9728  tor                      tor                      connection_is_rate_limited
28245     1.9067  tor                      tor                      connection_bucket_round_robin
25259     1.7052  tor                      tor                      tor_tls_get_error
22309     1.5060  tor                      tor                      tor_tls_write
21562     1.4556  tor                      tor                      assert_buf_ok
20642     1.3935  tor                      tor                      get_options_mutable
19521     1.3178  tor                      tor                      approx_time
19272     1.3010  tor                      tor                      _check_no_tls_errors
19108     1.2899  tor                      tor                      conn_write_callback
18312     1.2362  tor                      tor                      tor_addr_is_internal
14932     1.0080  tor                      tor                      tor_tls_get_forced_write_size
14237     0.9611  tor                      tor                      tor_gettimeofday_cache_clear
12501     0.8439  librt.so.1               librt.so.1               /home/karsten/debug/librt.so.1
11918     0.8045  tor                      tor                      tor_mutex_acquire
11907     0.8038  tor                      tor                      tor_mutex_release
11376     0.7680  tor                      tor                      connection_bucket_refill
9770      0.6595  tor                      tor                      connection_is_listener
9582      0.6468  tor                      tor                      connection_is_reading
9493      0.6408  tor                      tor                      tor_tls_state_changed_callback
9087      0.6134  tor                      tor                      connection_is_writing
8689      0.5866  tor                      tor                      TO_OR_CONN
7890      0.5326  tor                      tor                      connection_state_is_connecting

boklm (2 matches)

Ticket Summary Component Milestone Type Created
Description
#11508 Test that about:tor page is properly loaded Quality Assurance and Testing enhancement Apr 14, 2014

During the last beta release we realized that some translators translate "about:tor" which breaks it. We should write a test that checks this crucial page is working in built bundles.


#11509 Make sure search engine strings are not translated Quality Assurance and Testing enhancement Apr 14, 2014

Bug #11236 is caused by translated search engine strings. We should make sure those strings are not translated.


danieleweber7624 (1 match)

Ticket Summary Component Milestone Type Created
Description
#8915 Cannot spoof useragent and vendor Tor Browser TorBrowserBundle 2.3.x-stable defect May 20, 2013

Can add any way to chage vendor to firefox via general.useragent.vendor?

Seems this only work in firefox 3 or older

Also firefox 17 not update the pref general.useragent.override without restarting the browser, this is actually same bug for newest vesions of firefox.


dgoulet (1 match)

Ticket Summary Component Milestone Type Created
Description
#13483 rend_consider_services_upload() sets initial next_upload_time which is clobbered when first intro point established? Tor Tor: 0.2.7.x-final defect Oct 20, 2014

In rend_consider_services_upload(), if (!service->next_upload_time), it sets

      /* The fixed lower bound of 30 seconds ensures that the descriptor
       * is stable before being published. See comment below. */
      service->next_upload_time =
        now + 30 + crypto_rand_int(2*rendpostperiod);

which sure seems to a casual reader like Tor initializes its first upload for the hidden service descriptor to be 30 seconds + a random fraction of twice the RendPostPeriod. So, an hour give or take.

But then right below that we check

        (service->desc_is_dirty &&
         service->desc_is_dirty < now-30)) {

and the service gets dirty whenever an intro point is established, which presumably happens soon after you start up your Tor.

We should verify that this behavior is what I think it is, and then we should at the least fix all the comments to be more accurate, and probably we should get rid of the "up to 2 hours" part of the code since it isn't working anyway.


erinn (3 matches)

Ticket Summary Component Milestone Type Created
Description
#12820 Test+Recommend Tor Browser with Enhanced Mitigation Experience Toolkit Tor bundles/installation project Aug 7, 2014

The Enhanced Mitigation Experience Tookit is a Microsoft tool for further hardening selected applications against exploitation. We should test it with Tor Browser to see if it impacts functionality in any way, and if not, we should consider recommending it somewhere prominently for our Windows users.

https://support.microsoft.com/kb/2458544


#1873 Automate RPM package builds RPM packaging Deliverable-December2010 task Aug 26, 2010

Currently we distribute RPMs for vidalia and tor in our repositories. Building these is a lot less pleasant, and much slower, than building debs because of the overhead involved in launching VirtualBox VMs. This process needs to be streamlined first, either by finding a new solution to deal with RPM-based distributions, or VB needs to stop being recalcitrant and let me launch VMs headlessly.

The Tor spec file in my packaging-improvements branch (https://gitweb.torproject.org/erinn/tor.git/shortlog/refs/heads/packaging-improvements) has been generalized enough that it now builds on all of the distributions without any manual fiddling, but the init script still needs to be improved. When I add those, I'll move this to needs_review so it can be merged into Tor master which will streamline the autobuild process as well.


#1877 Create repository and package signing keys Tor bundles/installation Deliverable-December2010 task Aug 26, 2010

If we're going to be offering users nightly/weekly package builds, we want to offer them some modicum of proof that they came from us, and are what they claim to be, to the best of a robot's ability to verify them. The current plan is that all release builds/packages will be signed by hand, but for the nightlies/weeklies/whateverlies we need to create signing keys that can sign things automatically.


feynman (1 match)

Ticket Summary Component Milestone Type Created
Description
#9022 Create an XMPP pluggable transport Pluggable transport task Jun 5, 2013

We should look into XMPP pluggable transports. There are many public XMPP services that see widespread use even from censored countries.


ficus (3 matches)

Ticket Summary Component Milestone Type Created
Description
#3664 Tor web interface for the DreamPlug Torouter task Jul 29, 2011

We need a Tor web interface for the DreamPlug, as discussed at the Tor dev meeting in Waterloo, Canada earlier this week.


#6686 torouter IPv6 support Torouter enhancement Aug 24, 2012

This is a placeholder/discussion ticket for IPv6 support with torouter. IPv6 support is not a blocker or high priority at this time, and there is some concern about trusting "new" IPv6 daemons and code paths (citation needed!).

One way way IPv6 would work is that "downstream" devices connecting to the torouter (over the open wifi network or the local ethernet port) would auto-configure addresses from a site-local prefix (not globaly routed) and the torouter (via tsocks) would effectively provide NAT. With this scheme it would be possible to enable "downstream" IPv6 connectivity without proper "upstream" support (or vica versa).

"Upstream" IPv6 would require at least:

  • tor network and daemon support (roadmap)
  • ntp client support
  • automatic SLAAC/DHCPv6 configuration

Presumably SLAAC would use a randomized address (not based on the ethernet MAC address). Bootstrap upstream DNS could go straight to global DNS servers known to return both AAAA records and reply to requests over IPv6.

"Downstream" IPv6 would require at least:

  • a (hardened?) radvd
  • IPv6 configuration and support of the onboard recursive DNS servers (ttdnsd, unbound, dnsmasq)
  • support in tsocks
  • appropriate firewall rules
  • extension of the web interface to display and configure IPv6 options

In either case, kernel and iptable support would need to be enabled and the web interface extended to display and configure IPv6 options.


#6687 torouter dreamplug update to debian wheezy and 3.2 kernel Torouter enhancement Aug 24, 2012

wheezy (debian testing) probably be released in the next few months, so it seems reasonable to develop torouter for that target to ensure stability over the next few years. Also, several DreamPlug-specific changes were upstreamed into the mainline kernel and are present in wheezy.

AFAIK the required code changes would be updating the freedom-maker folder in torouter.git to a more recent version (either directly from b'dale or from nickdaly's version on github), redo source.list entries (backports not necessary?), and test that all required packages exist and function as expected under wheezy.

One road-blocker is that the more recent kernel seems to require an updated version of the u-boot bootloader on the DreamPlug, and the upgrade process requires the

The WiFi chipset still requires some third-party firmware and kernel module compilation (uap8xxx.ko == libertas_uap) with the 3.2 kernel.

Thoughts?


hellais (3 matches)

Ticket Summary Component Milestone Type Created
Description
#14060 Problem with install on Debian Wheezy (XEN-VirtuaMachine) Ooni defect Dec 31, 2014
  1. created xen machine with: xen-create-image --hostname ooni --dhcp --size=10Gb --swap=1Gb --memory=1024Mb --arch=amd64 --role=udev --dir=/home/xen (dhcp on WAN-Side NIC)
  1. Logged in
  1. apt-get install git vim sudo lsb-release && git clone https://github.com/thetorproject/ooni-probe
  1. ./setup-dependencies.sh -p

First Crash:


Running:

sudo pip install setuptools --no-use-wheel --upgrade

FAIL COMBINED STDOUT/STDERR OUTPUT OF FAILED COMMAND: Downloading/unpacking setuptools from https://pypi.python.org/packages/source/s/setuptools/setuptools-10.0.1.tar.gz#md5=abaf3b5d654eb525b9ca67c6d4522292

Running setup.py (path:/tmp/pip_build_root/setuptools/setup.py) egg_info for package setuptools


-->removed --no-use-wheel parameter -> works

  1. rerun ./setup-dependencies.sh -p

Second Crash


gcc -pthread -fno-strict-aliasing -DNDEBUG -g -fwrapv -O2 -Wall -Wstrict-prototypes -fPIC -I/usr/include/python2.7 -c dnet/dnet.c -o build/temp.linux-x86_64-2.7/dnet/dnet.o

In file included from dnet/dnet.c:22:0:

dnet/dnet.h:1:18: fatal error: dnet.h: No such file or directory

compilation terminated.

error: command 'gcc' failed with exit status 1


->apt-get install libdumbnet-dev -> works

  1. mkdir /root/.ooni
  1. cp /root/ooni-probe/data/ooniprobe.conf.sample ~/.ooni/
  1. python setup.py install -> seems to work
  1. the deck generation and testing seems to work too

oonideckgen --country-code=CH -o /root/.ooni/ ooniprobe -i /root/.ooni/deck-ch/0.0.1-ch-user-deck

  1. "not sure" if result really uploaded :) isn't there any message?

Doing the test lookups on www.yola.com Doing the test lookups on www.netaddress.com Doing the test lookups on www.outlook.com Doing the test lookups on www.paypal.com Starting factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x3718248> Starting factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x4a5d3b0> Starting factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x489fd88> Doing the test lookups on www.torproject.org Doing the test lookups on www.transferbigfiles.com Doing the test lookups on www.tumblr.com Doing the test lookups on www.yola.com Starting factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x46eb098> Checking for tampering on http://4.71.251.156:81

total: False request_line_capitalization: False header_name_capitalization: False header_field_value: False header_field_number: False

Doing the test lookups on www.torproject.org Doing the test lookups on www.transferbigfiles.com Doing the test lookups on www.tumblr.com Doing the test lookups on www.yola.com Stopping factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x3718248> Stopping factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x4a5d3b0> Stopping factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x489fd88> Stopping factory <ooni.templates.tcpt.TCPSenderFactory instance at 0x46eb098> Main loop terminated.



#12823 Design and implement new deck format Ooni enhancement Aug 7, 2014

The current test deck format has some limitations.

These are namely:

1) There is no way of making an input be part of the test deck itself

2) The format is too verbose and contains redundant information (all of the ooniprobe command line options need to be explicitly specified)

For this reason I think we should have a new format that makes it possible to include inputs as part of the test deck. The test deck should therefore be a compressed container (tar and gzip seem to be good candidates as they are well supported in python).

It should then be possible to reference input files that are part of the test deck itself.


#12904 ooniprobe doesn't work on Gentoo Ooni enhancement Aug 20, 2014

Trying to run ooniprobe from git: $ ./setup-dependencies.sh -u It appears that you are using an unsupported OS - please tell us by filing a bug: https://trac.torproject.org/projects/tor/newticket

I suppose it's documented behavior (from https://pypi.python.org/pypi/ooniprobe: "We believe that ooniprobe runs reasonably well on Debian GNU/Linux wheezy as well as versions of Ubuntu"...), but since it says to fill a bug report...


hiviah (1 match)

Ticket Summary Component Milestone Type Created
Description
#13915 Tor no longer requires openssl on el7 RPM packaging defect Dec 8, 2014

The openssl libraries have been removed from the openssl package in el7. They are now in openssl-libs. The el7 rpms published in the Tor repo at https://deb.torproject.org/torproject.org/rpm/el/7/ are still configured to require "openssl >= 0.9.8". This forces openssl to be installed on systems that don't actually need it.


ioerror (1 match)

Ticket Summary Component Milestone Type Created
Description
#1988 Add pupnp support to tor-fw-helper Tor Tor: unspecified enhancement Oct 1, 2010

We should add pupnp support to tor-fw-helper; it's the main shipping upnp library on Ubuntu as well as other platforms: http://pupnp.sourceforge.net/


irl (2 matches)

Ticket Summary Component Milestone Type Created
Description
#7414 Test helper for Two Way traceroute Ooni enhancement Nov 8, 2012

When a client requests a two way traceroute test helper a traceroute from the collector to the client should be initiated.


#14355 SimpleHTTPChannel for HTTP test helpers should be generalised Ooni task Jan 25, 2015

Currently SimpleHTTPChannel in http_helpers.py implements the http-return-json-headers test helper directly. As this test helper runs on port 80, the SimpleHTTP channel protocol should be generalised to allow for using the request line as a selector for other tests.

No existing implemented tests in ooni-probe request a resource other than the root resource ("/") and so the use of a selector will not mean changes are required to the implementation of those tests and this is also compatible with the specification of the http-return-json-headers helper.


isis (1 match)

Ticket Summary Component Milestone Type Created
Description
#12802 BridgeDB needs Nagios checks for the Email Distributor BridgeDB enhancement Aug 6, 2014

BridgeDB needs Nagios checks that the Email Distributor is working. The best way to do this would be to send an email to bridges@… which say "get help".


iwakeh (1 match)

Ticket Summary Component Milestone Type Created
Description
#15753 add performance tests to Onionoo's project structure and add the corresponding Ant task Onionoo enhancement Apr 21, 2015

Make room for performance tests somewhere in src/ and write a separate Ant task to run them. (see parent #13616)


kaner (2 matches)

Ticket Summary Component Milestone Type Created
Description
#2467 torweather refuses to accept the fingerprint of my relay. Tor Weather defect Jan 31, 2011

When i try and register my relay at https://weather.torproject.org/subscribe/ I get the message We could not locate a Tor node with that fingerprint.

4AC95D85CA324AD71E30F1D8C681D1DF6DAEDA8A is in /var/lib/tor/fingerprint the nickname is murble42 (http://torstatus.blutmagie.de/router_detail.php?FP=4ac95d85ca324ad71e30f1d8c681d1df6daeda8a)

This relay was previously a bridge if that is in any way related.


#7035 tor weather new relay script misinterprets emails addresses with dots in the name Tor Weather defect Oct 3, 2012

A relay oper sets up "user dot name AT example dot com" (user.name@…) for contact info in their contact line for their relay. tor weather inteprets this as name@…, missing the "user." part of the address.


karsten (4 matches)

Ticket Summary Component Milestone Type Created
Description
#15798 details document differences: empty list shown differently Onionoo defect Apr 24, 2015

Karsten asked me to open a ticket for this, so I do.

Torprojects instance says: "flags":[] cthulhu's instance says: "flags":[""]


#8374 Ship list of fallback directory mirrors on long-term fixed IPv6 addresses Tor bundles/installation enhancement Mar 1, 2013

#6027 enables clients which cannot talk to IPv4 relays to use fallback directory mirrors with IPv6 addresses and ORPorts. It's going to get merged into 0.2.5.x.

Assuming this code is in tor, how would we ship an up-to-date list of long-term fixed directory mirror IPv6 addresses with bundles? I think I can provide a simple script or set up a service generating this list. But what's the easiest way to include the step "Grab new IPv6 addresses file and put it into all bundles" in the process of making bundles? There's no code written yet, so please say what's most convenient for bundle makers.


#14862 agregate *BSD in relays by platform (and future bandwidth by platform) Metrics Website enhancement Feb 11, 2015

Hi,

the metrics page currently shows the following platforms on the relay by platform graph:

  • Linux
  • Darvin
  • Windows
  • FreeBSD
  • Other

https://metrics.torproject.org/platforms.html

What do you think about chaning this to

  • Linux
  • Darvin
  • Windows
  • *BSD (includes: FreeBSD, OpenBSD, NetBSD, DragonFlyBSD)
  • Other (which would be SunOS + the ones that have an unknown platform)

current numbers for *BSD: FreeBSD: 204 OpenBSD: 60 NetBSD: 8 DragonFlyBSD: 2

(Background for this feature is that I would like to increase platform diversity by adding *BSD boxes and if they are agregated than they might be even noticable in the graphs.)


#6856 new graph: bandwidth by major Tor version and bandwidth by recommended flag Metrics Website enhancement Sep 15, 2012

It would be nice to have a graph similar to [1] but replacing the number of relays with overall traffic share.

example (numbers completely made up): 0.2.4 is handling 15% of the traffic 0.2.3 is handling 40% of the traffic ...

[1] https://metrics.torproject.org/network.html#versions


lunar (6 matches)

Ticket Summary Component Milestone Type Created
Description
#10755 Provide support through webchat Tor Support task Jan 27, 2014

When doing support, there are some situation where it would be better to switch to a communication medium with lower latency than email. Having a way to do text based chats with our users sounds like a good idea.

This will be implemented by using an XMPP server allowing anonymous connections from a web interface on one side, and have the support team get accounts.

Users will be given access to chat-based support on an invitation basis. Support assistants will be able to create invitation “tokens” and will give out URLs to users when they need to.

This is part of SponsorO's deliverables.


#10890 Redirect “get bridges” messages automatically Tor Support task Feb 11, 2014

Users keep sending messages with “get bridges” to the help desk instead of sending them to BridgeDB. It's painful.

It would be best to automatically detect such emails and bounce them to BridgeDB without human intervention.

“Scrip” will need to be written in RT. Interesting bits of the documentation: http://requesttracker.wikia.com/wiki/WriteCustomAction http://requesttracker.wikia.com/wiki/ReplyBasedUponContent http://requesttracker.wikia.com/wiki/SendEmailAction


#10936 Document support policy about “rejected” tickets Tor Support task Feb 18, 2014

Karen would be happy if we can give stats regarding tickets we can't answer because users are asking to help them with illegal matters. “rejected” sounds like a good status for those. Let's talk and document this.


#10966 Define a process on how new support assistants can be accepted in the team Tor Support task Feb 20, 2014

The switch from having a single person handling all support request to a team was made through recruiting support assistants as a contracting position. It would be good to define a process on how new people can get accepted in the team. It's mostly a question of trust and probably we need to define a vouching process and a set of people that need to ack the decision.


#11177 Extract “time to reply” from the RT database Tor Support task Mar 10, 2014

In order to show nice charts to the sponsor, it would be good if we could extract from the RT database the time between a new message arrives on the help desk and the time to a reply.

Ideally, this should then be broken by ranges: eg. x% under 1 hour, y% 1-2 hours, etc.


#11355 Provide obfsproxy nightlies in our debian repositories Obfsproxy task Mar 28, 2014

People are asking for obfsproxy nightlies (#10954). It would be brilliant if people could add our debian repo, and get the latest obfsproxy master through it.

How can I help you do this?

No hurry on this one. I mainly made this ticket because #10954 was not very specific.

Thanks!


mikeperry (1 match)

Ticket Summary Component Milestone Type Created
Description
#2161 Allow subscription to external rule feeds EFF-HTTPS Everywhere enhancement Nov 6, 2010

The ultimate direction we want to go is towards an adblock plus model, where people can subscribe to rule feeds that are relevant to them, maintained by third parties. This involves both altering our XML schema to include a 'rulefeed' envelope tag, and adding a bit of UI to add and manage subscription urls.

It also depends upon a few enhancements being completed first. These are in the child ticket list below:


n8fr8 (8 matches)

Ticket Summary Component Milestone Type Created
Description
#2424 Android purges firewall rules after network disable/airplane mode. Orbot defect Jan 22, 2011

Setting my phone to disable data access and/or enable airplane mode seems to cause the transproxy iptables rules created by OrBot to get silently flushed. After re-enabling, all apps access everything without tor, until I go into the orbot config screen to cause it to reapply them.

OrBot should listen for these network disable/loss/disconnect events if possible, and reinstate the iptables rules after this happens.

Someone should also test if switching from cell data to+from wifi also triggers this iptables reset. I have not tested that yet.


#2761 Orbot Service not shutting down Orbot defect Mar 15, 2011

Behaviour: When closing tor network with big Button and exiting Orbot after tor is "deactivated", privoxy is still running and the Orbot service is not stopped.

Actions:

  • Killing Privoxy from shell stops the privoxy process (OK)
  • Killing Orbot process simply restarts the process (BAD)

Env:

  • Running Orbot v1.0.4.1
  • Android Froyo 2.2.1 speedmod kernel
  • Samsung Galaxy

#3595 Connections with IPv4-mapped IPv6 addresses bypass transproxy Orbot defect Jul 14, 2011

A user (DEplan on #guardianproject) reported that Gibberbot was using his real IP despite Orbot's transproxy being turned on; further research led to the conclusion that recent releases of Android seem to use IPv4-mapped IPv6 adresses for a large portion of connections. For examples, please see http://pastebin.com/Z4KDDq40. These connections completely bypass transproxy.

I am not yet sure about the circumstances under which Android employs these addresses.

The problems in finding a solution are that Android usually does not include ip6tables (though Orbot could simply package that) and kernels do usually not include IPv6 netfilter modules. The latter is a major issue, since Orbot can't package modules for every single kernel a user might be running.

As a side note, IPv6 does not support NAT (which is what transproxying is based on).

I'll try to figure out what triggers this behaviour of Android and find possible solutions (using sysctl to disable IPv6 does not solve it).


#5393 orbot relay bug - orbot is not setting the relay values into torrc properly causing orbot to not work when set as relay Orbot defect Mar 15, 2012

This is about the bug discussed with 'n8fr8' on #guardianproject at freenode. So, the relay functionality you said was broken and needs to be fixed for 'orbot' on smartphones. I checked with the orbot version '0.2.3.10-alpha-orbot-1.0.7-FINAL' and you have checked with the 'dev branch of the code' as you said (i suppose that means you have checked with latest version of code by compiling and running the latest updated version from git; i will do it too and let you know again). But none seemed to work. In fact, you said you were getting a more significant crash, when you enabled relaying on smartphone for dev branch of code. You also thought if the problem is: whether the Relay conflict is with transproxying/root or with Tor client connection in general. But, i'm not sure if it later seemed not to be the problem. Then, you told me to change the torrc file on my android phone, as you said that orbot is not setting the relay values properly which might be the reason for orbot not working as a relay on smartphone. So, I will do that and let you know about it. I will also keep checking 'https://guardianproject.info/builds/Orbot/' to see if any new dev/debug release is posted. Thankyou so very much for all your help, Mr.Nathan.


#3775 Permission error on Orbot Orbot defect Aug 21, 2011

There's some kind of problem with permissions in Orbot. I'm not sure if this happens only to me, but when I try to start Tor, it cannot access cache/control_auth_cookie. I can chmod it every time, but it is a bit annoying.


#5469 Orbot: can't specify node restrictions Orbot defect Mar 24, 2012

I'm using Orbot (v0.2.3.10-alpha-1.0.7-FINAL, on Android ICS v4.0.1) and I can't seem to get the exit node I request. In the Exit and Entrance Node fields I have "{us}" entered, yet sometimes I get IP's outside the US. Yesterday I got a UK ip.

Also, at random (usually after 30 minutes or so) I seem to lose connection to the Tor network without Orbot notifying me. I'm using Pandora from Canada.


#6123 Unable to start Tor Orbot defect Jun 11, 2012

Tor is unable to start when I press the start button. The command is not run successfully according to a log.


#5700 Make/modify VoIP applications to work better on Tor Analysis project Apr 30, 2012

Depending on how hard it will be to make Tor handle VoIP applications people already want to use (#5699), we should explore how much mileage we can get out of making our own or modifying existing VoIP applications to work better on Tor. One example here is Roger's "push to talk" not-actually-realtime-but-close VoIP wishlist item that Nathan is working on.


nickm (9 matches)

Ticket Summary Component Milestone Type Created
Description
#4588 Tor + bufferevents hang on with cpu at 100% Tor Tor: unspecified defect Nov 27, 2011

Hi,

After the last Tor update yesterday, Tor hang on with all cpu's at 100%. It look like that this problem appear after a couple hours and make the relay out of consensus too.

Tor version : "0.2.3.8-alpha-dev (git-58d1aa44023e8b45)" Libevent git version: commit f3b89dec9eac2cf4000c8dc9467abdbf27121674 I running Kubuntu Lucid 10.02.4 LTS bufferevents enabled vidalia 0.31-git OpenSSL 1.0.0e 6 Sep 2011

This problem was never appear before

Best Regards

SwissTorExit


#1749 Split relay and link crypto across multiple CPU cores Tor Tor: unspecified project Jul 29, 2010

Right now, Tor does nearly all of its work in one main thread. We have a basic "CPUWorker" implementation that we use for doing server-side onionskin crypto in a separate thread, but thanks to improvements long ago, server-side onionskin crypto on longer dominates. If we could split the work of relay AES-CTR crypto and SSL crypto across multiple threads, that would be pretty helpful in letting high-performance servers saturate their connections. (Blutmagie has wanted this for some while.)

Child Tickets:

#1760
Parallel Crypto: Design a good crypto parallelization plan and architecture
#7572
Make relay crypto run on multiple CPU cores


#3428 Control port may emit log messages in the middle of another event/reply Tor Tor: unspecified defect Jun 18, 2011

If the following call to connection_printf_to_buf in handle_control_getinfo in src/or/control.c fails, it may emit a LOG control-port event in the middle of a reply:

    if (!strchr(v, '\n') && !strchr(v, '\r')) {
      connection_printf_to_buf(conn, "250-%s=", k);
      connection_write_str_to_buf(v, conn);
      connection_write_str_to_buf("\r\n", conn);
    } else {

I expect that other output functions can emit log messages in the middle of a control port event or reply, too. We should make sure that never happens, by making all control-port code build each complete reply/event in a separate buffer before writing any of it out, and adding an event/reply queue to the control_connection_t structure.


#6836 Chop functionality out of routerlist.c Tor Tor: 0.2.??? enhancement Sep 13, 2012

In my branch "split_routerlist.c", I have the start of some work on dividing routerlist.c into more sensible pieces. I've chopped out routerset_t, killed a couple of functions, and moved most of the node manipulation pieces into nodelist.c

I'd still like to chop out more: the trusted_dir_server_t logic and the node-selection logic don't belong there any more. Nor does the authority certificate code. Nor does the hidden service directory stuff, nor does the hexdigest stuff.

In the longer term, I want routerlist.c to basically just not get invoked when you're not touching routerinfos.


#8018 path-spec does not discuss guard rotation Tor Tor: 0.2.??? enhancement Jan 20, 2013

It is known (http://cacr.uwaterloo.ca/techreports/2012/cacr2012-11.pdf) that clients rotate their guard sets every 30-60 days (length randomly chosen). This behavior is not discussed in the path specification (torspec.git/path-spec.txt). This is important for users and researchers to understand security.


#449 dns failures prevent legitimate options being set Tor Tor: unspecified defect Jun 9, 2007

Outright hostname lookup failures for previously configured hidden services prevent other options being set while DNS is down.

For example, I configure a hidden service redirecting to google.com while DNS is working. DNS subsequently stops working, e.g. nameserver becomes completely unreachable. If I then attempt to set a config option using the controller, it will not get set as long as tor cannot resolve the hidden service name.

Rejection of hidden service configurations (and hence any subsequent or unrelated config change) made while tor is running needs to be more tolerant of lookup failures.

The following attempts to validate the hidden service config currently in use (and previously validated when DNS was working). If the validation fails, it must be because DNS is down, so the existing config is retained. If the user was attempting to add a new hidden service config, then it doesn't get added.

Index: src/or/config.c =================================================================== --- src/or/config.c (revision 10545) +++ src/or/config.c (working copy) @@ -963,10 +963,15 @@

}

}

  • if (running_tor && rend_config_services(options, 0)<0) {
  • log_warn(LD_BUG,
  • "Previously validated hidden services line could not be added!");
  • return -1;

+ if (running_tor && rend_config_services(options, 1)<0) { + log_warn(LD_CONFIG, + "Previously validated hidden services line no longer valid! Retaining existing hidden services config if there is one."); + }else{ + if (rend_config_services(options, 0)<0){ + log_warn(LD_BUG, + "Previously validated hidden services line could not be added!"); + return -1; + }

}

if (running_tor) {

@@ -2920,9 +2925,10 @@

}

}

+/*

if (rend_config_services(options, 1) < 0)

REJECT("Failed to configure rendezvous options. See logs for details.");

- +*/

if (parse_virtual_addr_network(options->VirtualAddrNetwork, 1, NULL)<0)

return -1;

[Automatically added by flyspray2trac: Operating System: All]


#4373 When we close a conn due to bad CERTS cell, we complain about stuff in our outbuf Tor Tor: unspecified defect Nov 1, 2011

While looking at bug #4371, here's what my client said:

Nov 01 04:30:45.000 [warn] Certificate not yet valid: is your system clock set incorrectly?
Nov 01 04:30:45.000 [warn] (certificate lifetime runs from Nov  1 12:15:08 2011 GMT through Oct 31 12:15:08 2012 GMT. Your time is Nov 01 08:30:45 2011 GMT.)
Nov 01 04:30:45.000 [notice] We stalled too much while trying to write 512 bytes to address "120.50.40.184".  If this happens a lot, either something is wrong with your network connection, or something is wrong with theirs. (fd 14, type OR, state 7, marked at command.c:995).

Looks like we had already written our netinfo cell to the outbuf, but hadn't flushed it. Since I'm a client and this was an OR connection, it gets to be severity notice. Fun.

For the client side, I think this bug might be resolved by the proposed fix to #4361.

But my directory authority experiences something similar: Nov 01 06:04:10.000 [info] conn_close_if_marked(): Conn (addr "120.50.40.184", fd 1609, type OR, state 7) marked, but wants to flush 916 bytes. (Marked at command.c:995) Nov 01 06:04:10.000 [info] conn_close_if_marked(): We stalled too much while trying to write 916 bytes to address "120.50.40.184". If this happens a lot, either something is wrong with your network connection, or something is wrong with theirs. (fd 1609, type OR, state 7, marked at command.c:995). I wonder what's sitting in its outbuf.


#7869 ntor-onion-key is padded with an equal sign Tor Tor: unspecified defect Jan 5, 2013

Replying to sonu:

ntor-onion-key Od2Sj3UXFyDjwESLXk6fhatqW9z/oBL/vAKJ+tbDqUU=

The unnecessary “=” at the end of that string needs to go away now, or every Tor client will have to download a thousand or so of them every week forever.


#14987 Settle on a name for descriptors Tor Tor: 0.2.??? defect Feb 22, 2015

As discussed on #14784 we call self-published descriptors quite a few things...

  • 'GETINFO desc/*' and Stem call the main self-published descriptors server descriptors. Metrics also uses a "server-descriptor 1.0" annotation for them.
  • The dir-spec calls them router descriptors... usually. It opts for 'server descriptor' in section 6.2.
  • CollecTor calls them relay descriptors.

Having three different names is confusing for new contributors and... well, us too. We should standardize on a name.

This primarily straddles Tor's spec, Stem, and CollecTor. Personally I'd like for us to standardize on server descriptors because it's codified in the Metrics annotation and classes Stem vends.

Karsten, Nick: any objections? If not then I'm happy to provide a spec patch and file a CollecTor ticket for this.


nito (1 match)

Ticket Summary Component Milestone Type Created
Description
#3663 Fatal error on Mixminion Mixminion-Client defect Jul 29, 2011

Error message coming up for all commands. Below a couple I get

Traceback (most recent call last):

File "mixminion.py", line 25, in ? File "mixminion\Main.pyc", line 333, in main File "mixminion\ClientMain.pyc", line 1208, in runClient File "mixminion\ClientMain.pyc", line 960, in init File "mixminion\ClientDirectory.pyc", line 116, in init File "mixminion\ClientDirectory.pyc", line 369, in load File "mixminion\Common.pyc", line 604, in readPickled

AttributeError: 'module' object has no attribute 'CachingDescriptorSource'

Traceback (most recent call last):

File "mixminion.py", line 25, in ? File "mixminion\Main.pyc", line 333, in main File "mixminion\Main.pyc", line 279, in commandShell File "mixminion\Main.pyc", line 333, in main File "mixminion\ClientMain.pyc", line 1872, in cleanQueue File "mixminion\ClientUtils.pyc", line 730, in getHandlesByAge File "mixminion\ClientUtils.pyc", line 867, in loadMetadata File "mixminion\Filestore.pyc", line 397, in loadAllMetadata File "mixminion\Filestore.pyc", line 420, in getMetadata

EOFError


pde (6 matches)

Ticket Summary Component Milestone Type Created
Description
#3777 Should not generate mixed-content warnings if rewriting all http to https EFF-HTTPS Everywhere defect Aug 21, 2011

As far as I can tell, Firefox produces mixed-content warnings on an https page that references resources (images, scripts, etc) via http, even if HTTPS Everywhere can rewrite all of those http URLs to use https. (HTTPS Everywhere does rewrite resource requests, right?)

Ideally, if HTTPS Everywhere successfully rewrites every http request from a page to an https request, the page should not generate a mixed content warning. (Though I'd still like to see some indication that the page was only secure due to HTTPS Everywhere, so I know to report the insecure resources to the site owner.)


#4122 Google Translate breakage EFF-HTTPS Everywhere defect Sep 28, 2011

Google Translate for whole webpages is broken again. (HTTPS-Everywhere 1.0.3, FF 8) Instead of the translation, you get multiple copies of the Google translate header underneath each other.


#4278 MSDN navigation breakage (due to Origin: header omission?) EFF-HTTPS Everywhere defect Oct 20, 2011

Reported here: https://bugzilla.mozilla.org/show_bug.cgi?id=694611

Test case:

Clicking on the fold-out tabs on the left of this page produces no results:

http://msdn.microsoft.com/en-ca/subscriptions/downloads/default.aspx


#6276 Hiding the context menu button breaks the Tools->HTTPS Everywhere menu EFF-HTTPS Everywhere defect Jul 2, 2012

When you drag the httpse icon from the urlbar to 'menu_bar.view.toolbars.customize' window you lose the 'menu_bar.tools.https_everywhere' drop down menu content for httpse, though the menu item itself is still there. At that point, the only way to configure httpse is via 'about:addons'. Or of course to restore the icon to the urlbar.

Seems to me the drop down menu content should remain regardless of where the icon is, or is not.

FF 10.0.3 ESR HTTPS-E v2.1


#6592 HTTPS Everywhere Causes WordPress.com Zemanta Media Gallery To Not Work EFF-HTTPS Everywhere defect Aug 11, 2012

Hello,

Every version of HTTPS Everywhere that I have tested has caused a problem with at least one of the common websites that I visit, so I finally am reporting one of these problems.

When using WordPress.com with Zemanta enable, the Media Gallery/Recommended Images show up, but the hover feature that allow you to preview images does not work and clicking images to add them to your post does not work when HTTPS Everywhere is installed.

Here is an example of what Zemanta looks like on WordPress.com:

http://en.support.files.wordpress.com/2010/08/zemanta_before.png

I am using HTTPS Everywhere in the latest Firefox and have had this problem in other versions of Firefox, and with various versions of HTTPS Everywhere.

I think this problem happens even if HTTPS Everywhere is disabled, but once uninstalled the problem stops, but I could be wrong.

Thank you, -John Jr :)


#7454 Active rules list doesn't indicate effects of securecookie if no URL rewrite took place EFF-HTTPS Everywhere defect Nov 12, 2012

We just had a bug reported about a securecookie rule that applied to all of MIT (including pages that don't support HTTPS at all!) and was breaking logins.

However, the ruleset in question didn't appear in the active rules menu, because no rewrite rule was triggered on the page in question -- only a securecookie. This made the problem take slightly longer to debug and made it harder for affected users to work around. The existing logic for deciding which rules are "active" on the current pages seems to be triggered solely by rewrite rules.

Since securecookie rules affect page rendering and can even break it, rulesets containing them should also show up in the active rules menu when they were applied to a resource on the current page.


phobos (3 matches)

Ticket Summary Component Milestone Type Created
Description
#11678 integrate stripe into the donations page Ponies Website Donations Enhancement defect May 2, 2014

Add our stripe account to the donate wml.


#10022 We need a new blogging system Blog 2014 Tor Blog Replacement enhancement Oct 24, 2013

The current blogging system is based on Drupal 5 and heavily hacked up to remove lots of surface area for classes of attacks. However, it doesn't work so much years later. The search functionality is broken. Lots of the admin functionality is broken as well. I've resorted to using raw SQL queries to manage the system. This is less than optimal.

Options I see are:

  1. Do nothing and let the blog further degrade.
  2. Migrate to a static blog generator like jekyll.
  3. Migrate to modern drupal in the debian repos.
  4. Use RedTeam's WordPress system for a more secure wordpress installation.
  5. Host it somewhere else and let them worry about it, so long as we can get our data out daily.

#10338 [hw14] Upgrade Tor's virtual machine infrastructure Tor Sysadmin Team Upgrade Tor's VM Infrastructure project Dec 10, 2013

We need to upgrade our infrastructure to build a ganetti cluster out of new hardware to handle the increased load and demand for VM space.

These are the tickets tracking https://trac.torproject.org/projects/tor/wiki/org/projects/2013InfrastructureUpgrade


phoul (2 matches)

Ticket Summary Component Milestone Type Created
Description
#13951 Add EFF technologists as maintainers for the HTTPS Everywhere transifex strings Translations defect Dec 12, 2014

I think I used to have the ability to edit all of our translated strings, but it now says, "to translate you need to be logged in and a members of the $LANG team" (I am logged in).

EFF technologists we should add:

pde schoen jsha jgillula cooperq


#11123 Setup Nagios probes for the webchat support system Tor Support defect Mar 3, 2014

The webchat support system needs to be monitored by our Nagios installation.

This will require help from the TSA, but we should tell us exactly what to setup and eventually write complementary probes.


rl1987 (5 matches)

Ticket Summary Component Milestone Type Created
Description
#13827 Cell handling code duplication in channel.c Tor Tor: unspecified defect Nov 23, 2014

In 336c856e52d211aad6b40d29986264f3277a1327 :

  • channel_get_var_cell_handler() and channel_get_cell_handler() looks very similar
  • channel_write_cell(), channel_write_packed_cell() and channel_write_var_cell() is mostly duplicated code.
  • so are channel_queue_cell() and channel_queue_var_cell()

We should refactor to reduce the code duplication.


#14958 address/get_if_addrs_ifaddrs and address/get_if_addrs_ioctl fail in FreeBSD jails Tor Tor: 0.2.??? defect Feb 19, 2015

When running Tor 2.6.3-alpha tests on FreeBSD 10.1 (inside a jail) I receive two FAILs.

http://pastebin.com/74nXVS7e

Verbose output:

$ ./src/test/test --verbose --info address/get_if_addrs_ifaddrs
Feb 19 22:41:59.715 [info] int crypto_early_init()(): OpenSSL version matches version from headers (100010af: OpenSSL 1.0.1j-freebsd 15 Oct 2014).
Feb 19 22:41:59.715 [info] int crypto_strongest_rand(uint8_t *, size_t)(): Reading entropy from "/dev/urandom"
Feb 19 22:41:59.715 [info] int crypto_global_init(int, const char *, const char *)(): NOT using OpenSSL engine support.
Feb 19 22:41:59.715 [info] int evaluate_evp_for_aes(int)(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
Feb 19 22:41:59.715 [info] int crypto_strongest_rand(uint8_t *, size_t)(): Reading entropy from "/dev/urandom"
address/get_if_addrs_ifaddrs: [forking] 
  	 OK src/test/test_address.c:227: assert(smartlist_len(results) >= 1): 1 vs 1
  FAIL src/test/test_address.c:228: assert(smartlist_contains_localhost_tor_addr(results))
  [get_if_addrs_ifaddrs FAILED]
1/1 TESTS FAILED. (0 skipped)
./src/test/test --verbose --info address/get_if_addrs_ioctl
Feb 19 22:44:26.198 [info] int crypto_early_init()(): OpenSSL version matches version from headers (100010af: OpenSSL 1.0.1j-freebsd 15 Oct 2014).
Feb 19 22:44:26.199 [info] int crypto_strongest_rand(uint8_t *, size_t)(): Reading entropy from "/dev/urandom"
Feb 19 22:44:26.199 [info] int crypto_global_init(int, const char *, const char *)(): NOT using OpenSSL engine support.
Feb 19 22:44:26.199 [info] int evaluate_evp_for_aes(int)(): This version of OpenSSL has a known-good EVP counter-mode implementation. Using it.
Feb 19 22:44:26.199 [info] int crypto_strongest_rand(uint8_t *, size_t)(): Reading entropy from "/dev/urandom"
address/get_if_addrs_ioctl: [forking] 
    OK src/test/test_address.c:440: assert(result)
  	 OK src/test/test_address.c:441: assert(smartlist_len(result) >= 1): 1 vs 1
  FAIL src/test/test_address.c:443: assert(smartlist_contains_localhost_tor_addr(result))
  [get_if_addrs_ioctl FAILED]
1/1 TESTS FAILED. (0 skipped)

#3029 We should save received documents before parsing them Tor Tor: unspecified enhancement Apr 28, 2011

We should have an option to make Tor save every document it receives from the network before it tries to parse it. That way, if we crash while we're handling the document, we can know what crashed us.

Also, everything that stores an unparseable/unreadable thingy should be able to save more than one of them.


#3272 There should be a way to undo TAKEOWNERSHIP Tor Tor: unspecified enhancement May 23, 2011

It seems like it would be neat to have a way for a controller that has called TAKEOWNERSHIP to later relinquish "ownership" and tell a Tor process that it should not, in fact, exit if the controller exits.

I'm leaving this in the "Unspecified" milestone for now, since despite the fact that it seems we should obviously want this, I can't think of an actual usecase.


#15554 Put some actual hsdescs in the unit tests for parsing Tor Tor: 0.2.??? enhancement Apr 2, 2015

Right now our test_rend_fns() function in src/test/test.c builds a "rend_service_descriptor_t *generated", and then it encodes it, and then it parses it, to make sure it gets the expected descriptor back. That's a great start.

But there are now several different versions of the descriptor format in play, and our unit tests by definition only test the one that the current Tor version generates.

Also, it would be easier to play around with "how Tor handles it if you take that stanza out of the descriptor" experiments, if there are some actual descriptors in the unit tests.

Good idea / bad idea?


rransom (1 match)

Ticket Summary Component Milestone Type Created
Description
#3459 Expose information about dir conns to controllers Tor Tor: unspecified enhancement Jun 24, 2011

Currently, we do not expose any information about non-tunneled directory connections to controllers. Should we?


saint (2 matches)

Ticket Summary Component Milestone Type Created
Description
#14569 Download-Easy page don't make other languages obvious Website defect Jan 31, 2015

dcf and mrphs brought up that the language select section is really small when not using javascript -- most people probably scroll right past it. In tutorials, people are using English-language screenshots, which is kind of interesting.

Proposed fix is to increase the font size to 1.1em. Long-term, it would be great to remove all javascript from these pages.


#13154 Debian's "popularity contest" package as threat vector? Tor bundles/installation enhancement Sep 13, 2014

I am wondering whether to force-uninstall Debian's popularity-contest package as part of Stormy's installation process. It would be good to have an idea how popular Stormy is, but on the other hand, I'm not sure how anonymous the reporting is on Debian's end.

This is also relevant for users of the tor package, who might also be at mild risk (though far less so because the number of users is so high, and doesn't reveal location of location-hidden services).

Anyone have opinions on this? I'm leaning towards checking if popularity-contest is installed and then asking if the user would like it to be removed.

EDIT: We should also discuss whether to remove it as part of Tor's installation process overall.


sukhbir (1 match)

Ticket Summary Component Milestone Type Created
Description
#15152 can't delete account Tor Messenger defect Mar 4, 2015

If an xmpp account is created with a username without an @ symbol, the account can't be deleted afterwards.

I guess that's upstream?


ultrasandwich (2 matches)

Ticket Summary Component Milestone Type Created
Description
#10479 Export blog posts from current blog Blog 2014 Tor Blog Replacement task Dec 23, 2013

Export everything in some sane format for future imports (html vs. markdown?)


#10480 Export comments from current blog Blog 2014 Tor Blog Replacement task Dec 23, 2013

Export comments from current blog in some sane format and some ability to import the threads, etc. into a new system.


weasel (1 match)

Ticket Summary Component Milestone Type Created
Description
#15228 Identify candidates for FallbackDir, and ship with a list of them Tor Tor: 0.2.7.x-final defect Mar 11, 2015

Back long ago, we added a feature to allow torrc to list a bunch of FallbackDir entries. These tell a client where to look for consensus directory documents, so that the clients don't just load the authorities down.

It would be good if we shipped with such a list.

One idea has been to identify directories that have:

  • a stable IP:Port over a long time,
  • reasonably good uptime (as a fraction)
  • good bandwidth
  • a contact address.

Then, contact the admins of these directory caches and ask them for permission to put them on a list.

(See also #8374)


Note: See TracReports for help on using and creating reports.