The Tor Project issueshttps://gitlab.torproject.org/groups/tpo/-/issues2023-04-04T15:29:45Zhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41038Update "Click to Copy" button label in circuit display2023-04-04T15:29:45ZdonutsUpdate "Click to Copy" button label in circuit displayApparently the circuit display has a button to click to copy the URL, that appears when you hover over it (which is news to me!):
<img src="/uploads/fe519f445175dba65088b0cfa3430ba4/circuit-display-nyt.png" alt="circuit-display-nyt" wid...Apparently the circuit display has a button to click to copy the URL, that appears when you hover over it (which is news to me!):
<img src="/uploads/fe519f445175dba65088b0cfa3430ba4/circuit-display-nyt.png" alt="circuit-display-nyt" width="50%">
I'm guessing this is a legacy feature carried across from torbutton, since it's trivial enough to copy the URL from the address bar itself? In any case, we should avoid "Click..." commands in our microcopy and update the label to something like `Copy Address` instead.Sponsor 30 - Objective 3.5henryhenry2023-04-17https://gitlab.torproject.org/tpo/anti-censorship/rdsys/-/issues/137Proposal - to edit message of getbridges bot2023-01-31T15:41:25ZninaProposal - to edit message of getbridges botI want to offer to remove the phrase "Your bridges:" that @GetBridgesBot sends with the list of bridges (or split it into two different messages)
When the users copy the bridges from the message on the smartphone, they have to copy the...I want to offer to remove the phrase "Your bridges:" that @GetBridgesBot sends with the list of bridges (or split it into two different messages)
When the users copy the bridges from the message on the smartphone, they have to copy the whole message with the phrase "Your bridges:" and then remove this piece already in the TBA/Orbot/Onion Browser. So removing these words from the message would make the user experience bettermeskiomeskio@torproject.orgmeskiomeskio@torproject.org2023-01-11https://gitlab.torproject.org/tpo/web/lego/-/issues/33Add Discourse forum logo on the footer2021-10-25T19:31:15ZGusAdd Discourse forum logo on the footerAs part of our [Soft launch plan](https://gitlab.torproject.org/tpo/web/team/-/wikis/Plan-To-Launch-Tor's-Forum#timeline), we need to add [Discourse logo](https://fontawesome.com/v5.15/icons/discourse) on the footer.As part of our [Soft launch plan](https://gitlab.torproject.org/tpo/web/team/-/wikis/Plan-To-Launch-Tor's-Forum#timeline), we need to add [Discourse logo](https://fontawesome.com/v5.15/icons/discourse) on the footer.2021-10-20https://gitlab.torproject.org/tpo/web/community/-/issues/341[Featured Onions] Add Amnesty International onionsite2024-03-06T17:41:16ZGus[Featured Onions] Add Amnesty International onionsiteLet's add Amnesty International onionsite to our curated list: https://community.torproject.org/onion-services/#featured-onions
"Amnesty International has today launched its global website as an .onion site on the Tor network, giving us...Let's add Amnesty International onionsite to our curated list: https://community.torproject.org/onion-services/#featured-onions
"Amnesty International has today launched its global website as an .onion site on the Tor network, giving users greater access to its ground-breaking work exposing and documenting human rights violations in areas where government censorship and digital surveillance are rife.
In recent years, a number of countries including Algeria, China, Iran, Russia and Viet Nam have blocked Amnesty International websites, according to the Open Observatory of Network Interference (OONI), in a deliberate attempt to suppress freedom of information and efforts to hold the powerful to account.
The new Amnesty onion site can be accessed using the Tor Browser through our secure onion address at: https://www.amnestyl337aduwuvpf57irfl54ggtnuera45ygcxzuftwxjvvmpuzqd.onion."
https://www.amnesty.org/en/latest/news/2023/12/global-amnesty-international-website-launches-on-tor-network-to-help-universal-access/GusGushttps://gitlab.torproject.org/tpo/onion-services/onionmine/-/issues/26Setup Onion MkDocs for Onionmine2024-02-22T22:06:52ZSilvio RhattoSetup Onion MkDocs for OnionmineConvert Onionmine documentation to [Onion MkDocs][].
[Onion Mkdocs]: https://gitlab.torproject.org/tpo/web/onion-mkdocs/Convert Onionmine documentation to [Onion MkDocs][].
[Onion Mkdocs]: https://gitlab.torproject.org/tpo/web/onion-mkdocs/Silvio RhattoSilvio Rhattohttps://gitlab.torproject.org/tpo/network-health/doctor/-/issues/40035"NOTICE: gabelmoo had 17 MiddleOnly flags in its vote but the consensus had 9...2024-03-21T14:27:02ZRoger Dingledine"NOTICE: gabelmoo had 17 MiddleOnly flags in its vote but the consensus had 9" isn't noteworthyI grabbed the consensus and gabelmoo's vote during the time period that we got the doctor warning, and sure enough:
```
$ grep MiddleOnly cached-consensus |grep ^s|wc -l
9
$ grep MiddleOnly gabelmoo-vote |grep ^s|wc -l
17
```
And in mo...I grabbed the consensus and gabelmoo's vote during the time period that we got the doctor warning, and sure enough:
```
$ grep MiddleOnly cached-consensus |grep ^s|wc -l
9
$ grep MiddleOnly gabelmoo-vote |grep ^s|wc -l
17
```
And in more detail,
```
$ grep MiddleOnly gabelmoo-vote |grep ^s
s BadExit MiddleOnly Running Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Running Stable Valid
s BadExit Fast MiddleOnly Running Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Running Valid
s BadExit Fast MiddleOnly Running Stable Valid
s BadExit Fast MiddleOnly Running Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Running Stable Valid
s BadExit Fast MiddleOnly Running Stable Valid
s BadExit Fast MiddleOnly Stable Valid
s BadExit Fast MiddleOnly Running Stable Valid
```
So even gabelmoo only thought 9 of the 17 should be Running, so it's not surprising that only 9 of them made it into the consensus.
But even if gabelmoo had different opinions about which ones are Running, the fact that gabelmoo voted MiddleOnly about a relay which didn't make it into the consensus is not noteworthy. There are a variety of cases where it could happen during normal operation.
I think a more precise check would be: for each relay listed in the consensus as MiddleOnly, did gabelmoo list it as MiddleOnly too?
If that's too much coding, a simpler approximation (which avoids reporting the false positives but also omits some of the true positives) might be: don't log anything if the number in the vote is bigger than the number in the consensus.Georg KoppenGeorg Koppenhttps://gitlab.torproject.org/tpo/anti-censorship/bridge-port-scan/-/issues/7Build process needs updating2024-02-07T13:11:37ZKezBuild process needs updatingThe web team's lektor site build process has changed a bit since this repo was last updated, and the repo no longer builds with the instructions provided (the build instructions seem a bit incomplete even without these build changes). So...The web team's lektor site build process has changed a bit since this repo was last updated, and the repo no longer builds with the instructions provided (the build instructions seem a bit incomplete even without these build changes). So the build process needs to be updated, and more thoroughly documented.https://gitlab.torproject.org/tpo/web/community/-/issues/335(Snowflake guide) Add Snowflake debian package2024-02-05T19:12:52ZGus(Snowflake guide) Add Snowflake debian packageSnowflake-proxy is available as a package in Debian bookworm. We should mention at https://community.torproject.org/relay/setup/snowflake/standalone/Snowflake-proxy is available as a package in Debian bookworm. We should mention at https://community.torproject.org/relay/setup/snowflake/standalone/Sponsor 96: Rapid Expansion of Access to the Uncensored Internet through Tor in China, Hong Kong, & TibetGusGushttps://gitlab.torproject.org/tpo/network-health/metrics/website/-/issues/40106Details API returning undocumented `contact` for bridges2023-11-29T20:48:03ZSarthik Guptasarthikg@icloud.comDetails API returning undocumented `contact` for bridgesContrary to the key-value pairs listed at https://metrics.torproject.org/onionoo.html#details_bridge,
Details API Response contains `contact` key for bridges as can be tested in the response for the following api, https://onionoo.torpro...Contrary to the key-value pairs listed at https://metrics.torproject.org/onionoo.html#details_bridge,
Details API Response contains `contact` key for bridges as can be tested in the response for the following api, https://onionoo.torproject.org/details?limit=4&search=scriptonhttps://gitlab.torproject.org/tpo/network-health/metrics/onionoo/-/issues/40041Details API returning undocumented `contact` for bridges2023-11-27T14:49:33ZSarthik Guptasarthikg@icloud.comDetails API returning undocumented `contact` for bridgesContrary to the key-value pairs listed at https://metrics.torproject.org/onionoo.html#details_bridge,
Details API Response contains `contact` key for bridges as can be tested in the response for the following api, https://onionoo.torpro...Contrary to the key-value pairs listed at https://metrics.torproject.org/onionoo.html#details_bridge,
Details API Response contains `contact` key for bridges as can be tested in the response for the following api, https://onionoo.torproject.org/details?limit=4&search=scriptonhttps://gitlab.torproject.org/tpo/web/blog/-/issues/40066Update CoC link2023-10-25T21:24:35ZGusUpdate CoC linkTor Code of Conduct document moved from gitweb to gitlab (https://gitlab.torproject.org/tpo/community/policies/-/blob/master/code_of_conduct.txt?ref_type=heads).
We need to change the link: https://gitlab.torproject.org/tpo/web/blog/-/b...Tor Code of Conduct document moved from gitweb to gitlab (https://gitlab.torproject.org/tpo/community/policies/-/blob/master/code_of_conduct.txt?ref_type=heads).
We need to change the link: https://gitlab.torproject.org/tpo/web/blog/-/blob/main/templates/macros/blog.html#L87Jérôme Charaouilavamind@torproject.orgJérôme Charaouilavamind@torproject.orghttps://gitlab.torproject.org/tpo/core/arti/-/issues/1057migrate from trust-dns to hickory2024-03-11T17:14:29Ztrinity-1686amigrate from trust-dns to hickorytrust-dns will soon get rebranded to Hicktory (this is not a change of ownership, just rebranding). We should migrate from one to the other to keep getting updates.
[public announcement](https://bluejekyll.github.io/blog/posts/announcin...trust-dns will soon get rebranded to Hicktory (this is not a change of ownership, just rebranding). We should migrate from one to the other to keep getting updates.
[public announcement](https://bluejekyll.github.io/blog/posts/announcing-hickory-dns/)https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41881Developer tools/Network/New Request remembers requests2023-10-03T15:37:59ZcypherpunksDeveloper tools/Network/New Request remembers requestsOn TBB 12.5.1, opening Developer tools, Network tab and then clicking on "New Request" causes address, headers, POST body to be autofilled with ones of previous request in other isolation domain or even after browser restart.On TBB 12.5.1, opening Developer tools, Network tab and then clicking on "New Request" causes address, headers, POST body to be autofilled with ones of previous request in other isolation domain or even after browser restart.cypherpunkscypherpunkshttps://gitlab.torproject.org/tpo/web/community/-/issues/316[Onion Services] Featured onions - EFF, Certbot, SSD2023-08-10T17:28:54ZGus[Onion Services] Featured onions - EFF, Certbot, SSDA little bit late to the party, but hey, let's add these new onions to the #featured-onions list:
```
Today, we’re announcing .onion addresses for eff.org and two of its affiliated projects: Certbot, an EFF-developed tool for automatica...A little bit late to the party, but hey, let's add these new onions to the #featured-onions list:
```
Today, we’re announcing .onion addresses for eff.org and two of its affiliated projects: Certbot, an EFF-developed tool for automatically obtaining and renewing TLS certificates for websites, and Surveillance Self-Defense, which provides resources and guidance for individuals and organizations to protect themselves from surveillance and other security threats.
```
https://www.eff.org/deeplinks/2023/04/eff-now-has-tor-onions
```
eff.org
iykpqm7jiradoeezzkhj7c4b33g4hbgfwelht2evxxeicbpjy44c7ead.onion
certbot.eff.org
5yl6j7al5iwjn3kltayvumj5d25agnq4t6rznkvphossoqyzb3batwid.onion
ssd.eff.org
y7yea4pmqqtznb33qiugvysyn2bob5v62e4pvoadoibrwkq3tsddjeyd.onion
```https://gitlab.torproject.org/tpo/web/support/-/issues/327Dead link to blog2023-11-06T19:25:02ZslrslrDead link to bloghttps://support.torproject.org/tbb/tbb-22/
contains 404 not found link to https://blog.torproject.org/why-tor-is-slow
It is not even on archive: https://web.archive.org/web/20220715000000*/https://blog.torproject.org/why-tor-is-slow
I a...https://support.torproject.org/tbb/tbb-22/
contains 404 not found link to https://blog.torproject.org/why-tor-is-slow
It is not even on archive: https://web.archive.org/web/20220715000000*/https://blog.torproject.org/why-tor-is-slow
I am unsure if the article is still present: https://www.ecosia.org/search?addon=firefox&q=tor+blog+why+tor+is+slow+site%3Ablog.torproject.org
Though the https://support.torproject.org/tbb/tbb-22/ should contain some more answer to the question in its title..https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/issues/177Change help links in `about:preferences` and menu2023-10-03T13:30:05ZruihildtChange help links in `about:preferences` and menuRight now, we link to https://mullvad.net/en/help/ in:
- `about:preferences` under `Mullvad Browser Support` link at the bottom left
- the menu `Help > Get Help`
I might be forgetting other places where this link exists.
There's now a ...Right now, we link to https://mullvad.net/en/help/ in:
- `about:preferences` under `Mullvad Browser Support` link at the bottom left
- the menu `Help > Get Help`
I might be forgetting other places where this link exists.
There's now a dedicated sub-section link we can use instead https://mullvad.net/en/help/tag/mullvad-browser/richardrichardhttps://gitlab.torproject.org/tpo/network-health/tor-weather/-/issues/62Improve contrast of login form2023-05-31T06:47:17ZtelekoboldImprove contrast of login formThe contrast on the [login field](https://weather.torproject.org/login) of Tor Weather is quite bad, the text fields for typing Email ID and Password are hard to recognize.
The bad contrast is caused by the value `#f8f9fa` of the proper...The contrast on the [login field](https://weather.torproject.org/login) of Tor Weather is quite bad, the text fields for typing Email ID and Password are hard to recognize.
The bad contrast is caused by the value `#f8f9fa` of the property `background-color` in the class attribute `login-form`. It should be changed to a color that is such that both the contrast with the white background and the black font is large enough. `#7d4698`, which seems to be Tor's corporate design color, seems not to be suitable because of the black font.https://gitlab.torproject.org/tpo/core/arti/-/issues/831"Unused import" warnings on Windows2023-06-23T11:51:35ZNick Mathewson"Unused import" warnings on WindowsIn our reproducible-build script, as it's cross compiling for windows, we see:
```
Compiling termcolor v1.2.0
Compiling tor-rtmock v0.7.2 (/arti/crates/tor-rtmock)
Compiling clap_lex v0.2.4
Compiling tracing-subscriber v0.3.1...In our reproducible-build script, as it's cross compiling for windows, we see:
```
Compiling termcolor v1.2.0
Compiling tor-rtmock v0.7.2 (/arti/crates/tor-rtmock)
Compiling clap_lex v0.2.4
Compiling tracing-subscriber v0.3.16
Compiling atty v0.2.14
Compiling windows v0.43.0
Compiling strsim v0.10.0
Compiling data-encoding v2.3.3
Compiling tor-cell v0.9.1 (/arti/crates/tor-cell)
Compiling tor-netdir v0.8.1 (/arti/crates/tor-netdir)
Compiling textwrap v0.16.0
Compiling hostname-validator v1.1.1
Compiling ipnet v2.7.2
Compiling clap v3.2.23
Compiling notify v5.1.0
Compiling rlimit v0.9.1
Compiling trust-dns-proto v0.22.0
Compiling tor-proto v0.9.1 (/arti/crates/tor-proto)
Compiling tracing-appender v0.2.2
Compiling tor-chanmgr v0.8.3 (/arti/crates/tor-chanmgr)
Compiling tor-guardmgr v0.8.3 (/arti/crates/tor-guardmgr)
Compiling tor-ptmgr v0.2.3 (/arti/crates/tor-ptmgr)
Compiling tor-circmgr v0.7.3 (/arti/crates/tor-circmgr)
Compiling xz2 v0.1.7
Compiling zstd-safe v5.0.2+zstd.1.5.2
Compiling zstd v0.11.2+zstd.1.5.2
Compiling async-compression v0.3.15
Compiling tor-dirclient v0.6.3 (/arti/crates/tor-dirclient)
Compiling secmem-proc v0.3.0
Compiling rusqlite v0.29.0
Compiling tor-dirmgr v0.9.3 (/arti/crates/tor-dirmgr)
Compiling arti-client v0.8.3 (/arti/crates/arti-client)
Compiling arti v1.1.3 (/arti/crates/arti)
warning: unused import: `futures::task::SpawnExt`
--> crates/arti/src/reload_cfg.rs:16:5
|
16 | use futures::task::SpawnExt;
| ^^^^^^^^^^^^^^^^^^^^^^^
|
= note: `#[warn(unused_imports)]` on by default
warning: unused import: `crate::process::sighup_stream`
--> crates/arti/src/reload_cfg.rs:18:5
|
18 | use crate::process::sighup_stream;
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
warning: function `sighup_stream` is never used
--> crates/arti/src/process.rs:80:15
|
80 | pub(crate) fn sighup_stream() -> crate::Result<impl futures::Stream<Item = ()>> {
| ^^^^^^^^^^^^^
|
= note: `#[warn(dead_code)]` on by default
warning: variant `SigHup` is never constructed
--> crates/arti/src/reload_cfg.rs:28:5
|
26 | enum Event {
| ----- variant in this enum
27 | /// SIGHUP has been received.
28 | SigHup,
| ^^^^^^
|
= note: `Event` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
warning: `arti` (lib) generated 4 warning
```
It would be nice if this would build without warnings everywhere.https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/conjure/-/issues/29Add CI to the project2023-04-12T15:41:01Zmeskiomeskio@torproject.orgAdd CI to the projectEven if there is no tests for now we could just check that it compiles.Even if there is no tests for now we could just check that it compiles.https://gitlab.torproject.org/tpo/network-health/tor-weather/-/issues/34Add more details to email2023-12-13T15:44:20ZbauruineAdd more details to emailAt the moment the email only contains the fingerprint. It would be nice to have additional information like the nickname, ip and hostname. And maybe also a link to the relay on metrics.tpo.At the moment the email only contains the fingerprint. It would be nice to have additional information like the nickname, ip and hostname. And maybe also a link to the relay on metrics.tpo.