Tor Browser should eventually update you to the latest stable release.
is tricky as the keys we use nowadays are not working for pretty old Tor Browser releases anymore. So what we would need is an update over several Tor Browser versions until one finally reaches the current one.
Might involve quite some work but I am not sure about 1). What do you think boklm?
Trac: Cc: N/Ato boklm Status: new to needs_information
An update check results in this error:
Expected certificate attribute 'issuerName' value incorrect, expected: 'CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US', got: 'CN=Let's Encrypt Authority X3,O=Let's Encrypt,C=US'.
This happens because 4.5.3 includes some built-in checks to ensure that the browser is talking to the correct update server, but unfortunately we have switched from a DigiCert issued certificate to one from Let's Encrypt. I am not sure how to avoid this problem without running a server that uses a certificate from the older CA... forever.
An update check results in this error:
Expected certificate attribute 'issuerName' value incorrect, expected: 'CN=DigiCert SHA2 High Assurance Server CA,OU=www.digicert.com,O=DigiCert Inc,C=US', got: 'CN=Let's Encrypt Authority X3,O=Let's Encrypt,C=US'.
This happens because 4.5.3 includes some built-in checks to ensure that the browser is talking to the correct update server, but unfortunately we have switched from a DigiCert issued certificate to one from Let's Encrypt. I am not sure how to avoid this problem without running a server that uses a certificate from the older CA... forever.
So, 2) is even worse than I assumed without checking, sigh. But there is still 1). Could we do something about the false feedback in the About Tor Browser menu?
Sorry to be a nag, but are you certain that this won't happen in the future under similar circumstances?
To address pinned cert rollover, most browsers will not enforce pins N months after the build date of the browser.
To address the 'several version update' FF does just that. We will tag watershed releases that all users must update through. So if you're on firefox 20 you may have to upgrade through (hypothetical example) 20 -> 28 -> 35 -> 42 -> 50 -> 56. Watersheds aren't planned, they just occur when they're necessary for things like mandatory SSE2 support, signing key rollover, etc.