The Tor Project issueshttps://gitlab.torproject.org/groups/tpo/-/issues2020-06-27T14:39:01Zhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19427Layout of businesswire.com website is broken2020-06-27T14:39:01ZGeorg KoppenLayout of businesswire.com website is brokenhttp://www.businesswire.com/news/home/20160607006114/en/ISACA-Study-UK-Office-Workers-Employers-Give is broken in a way that makes it unreadable. The only workaround is setting the security slider at least to medium-high.
Thanks to sumt...http://www.businesswire.com/news/home/20160607006114/en/ISACA-Study-UK-Office-Workers-Employers-Give is broken in a way that makes it unreadable. The only workaround is setting the security slider at least to medium-high.
Thanks to sumthin_sumthin for reporting.https://gitlab.torproject.org/tpo/network-health/metrics/collector/-/issues/19424remove hard coded paths and set default properties to values used on the main...2020-06-27T14:22:45Ziwakehremove hard coded paths and set default properties to values used on the main CollecTor instance... and scan code base for other missed hard coded paths; e.g.
`File ... = new File("stats");` should be
`File ... = config.getPath(Key.StatsPath).toFile();`.... and scan code base for other missed hard coded paths; e.g.
`File ... = new File("stats");` should be
`File ... = config.getPath(Key.StatsPath).toFile();`.CollecTor 1.0.0iwakehiwakehhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19423Tor Quit working!2020-06-27T14:39:01ZTracTor Quit working!Suddenly it quit working. Have tried everything I can think of TOR works on my other computer but not this one this is the report I get
Uninstalled both firefox and tor and reinstalled still i get same message
Problem signature:
Probl...Suddenly it quit working. Have tried everything I can think of TOR works on my other computer but not this one this is the report I get
Uninstalled both firefox and tor and reinstalled still i get same message
Problem signature:
Problem Event Name: APPCRASH
Application Name: firefox.exe
Application Version: 45.2.0.0
Application Timestamp: 00000000
Fault Module Name: KERNELBASE.dll
Fault Module Version: 6.1.7601.18869
Fault Module Timestamp: 556363bc
Exception Code: c06d007f
Exception Offset: 0000c42d
OS Version: 6.1.7601.2.1.0.768.3
Locale ID: 1033
Additional Information 1: 0a9e
Additional Information 2: 0a9e372d3b4ad19135b953a78882e789
Additional Information 3: 0a9e
Additional Information 4: 0a9e372d3b4ad19135b953a78882e789
**Trac**:
**Username**: dj1953https://gitlab.torproject.org/tpo/tpa/team/-/issues/19422Grant permission for torbirdy/ on dist2020-06-27T14:19:19ZSukhbir SinghGrant permission for torbirdy/ on dist```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Can I please have push permission to dist.torproject.org/torbirdy/. I need
this to make TorBirdy releases.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIcBAEBCgAGBQJXYZYHAAoJELAc...```
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Can I please have push permission to dist.torproject.org/torbirdy/. I need
this to make TorBirdy releases.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=3WO1
-----END PGP SIGNATURE-----
```https://gitlab.torproject.org/tpo/core/tor/-/issues/19421test-network-all target does not work with out-of-tree builds2020-06-27T13:58:45Zcypherpunkstest-network-all target does not work with out-of-tree buildsThis is caused by assuming the test-driver script is the build directory. The Automake variable `LOG_DRIVER` contains the correct path.This is caused by assuming the test-driver script is the build directory. The Automake variable `LOG_DRIVER` contains the correct path.Tor: 0.2.9.x-finalcypherpunkscypherpunkshttps://gitlab.torproject.org/tpo/network-health/metrics/onionoo/-/issues/19420No AS data for some relays2020-06-27T14:24:12ZtwimNo AS data for some relaysSince circa 13062016 Onionoo fails to resolve ASNs and AS names for growing number of relays [1].
It doesn't seem to be connected with newcoming relays because some long-living relays are also affected (they recently had ASNs). Also many...Since circa 13062016 Onionoo fails to resolve ASNs and AS names for growing number of relays [1].
It doesn't seem to be connected with newcoming relays because some long-living relays are also affected (they recently had ASNs). Also many new relays are not affected.
At the same time Onionoo successfuly resolves country codes so it may not be related to legacy/trac#19154.
Maybe something is wrong with GeoIP database itself?
[1] https://lists.riseup.net/www/arc/ornetradar/2016-06/msg00028.htmlKarsten LoesingKarsten Loesinghttps://gitlab.torproject.org/tpo/core/tor/-/issues/19419Tor generates different onion "hostname" out of same private key?2020-06-27T13:58:45ZTracTor generates different onion "hostname" out of same private key?When I copy some older private_key files I generated with Shallot time ago to a new tor process, then give it a kill -1, it parses the private_key and produces a different hostname to match it. It's odd because the private key is the one...When I copy some older private_key files I generated with Shallot time ago to a new tor process, then give it a kill -1, it parses the private_key and produces a different hostname to match it. It's odd because the private key is the one that should have the nice name, instead it now gets an ugly new one. Any guess on what I could have done wrong? Apparently nobody else ran into this problem...
**Trac**:
**Username**: vynXTor: unspecifiedhttps://gitlab.torproject.org/tpo/core/tor/-/issues/19418i2d_RSAPublicKey retval ignored in multiple callsites2020-06-27T13:58:45ZGeorge Kadianakisi2d_RSAPublicKey retval ignored in multiple callsitesHello. Here follows a bug report by `Guido Vranken` received through the hackerone program.
There are various places in the codebase where we don't check the retval of `i2d_RSA_PublicKey()` (or its callers). That function can fail in ca...Hello. Here follows a bug report by `Guido Vranken` received through the hackerone program.
There are various places in the codebase where we don't check the retval of `i2d_RSA_PublicKey()` (or its callers). That function can fail in cases of OOM, and this is something we should be handling correctly. This is a similar case to legacy/trac#17686.Tor: 0.3.1.x-finalNick MathewsonNick Mathewsonhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19417asm.js files should be no linkability risk2020-06-27T14:39:01ZGeorg Koppenasm.js files should be no linkability risklegacy/trac#19400 revealed that asm.js files are cached to disk which violates at least our no-disk-leaks requirement. The upstream bug is https://bugzilla.mozilla.org/show_bug.cgi?id=1047105 which got fixed in Firefox 51. However, there...legacy/trac#19400 revealed that asm.js files are cached to disk which violates at least our no-disk-leaks requirement. The upstream bug is https://bugzilla.mozilla.org/show_bug.cgi?id=1047105 which got fixed in Firefox 51. However, there are linkability risks as well we might want to address.https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19416OCSP requests are not isolated to the URL bar domain2020-06-27T14:39:02ZGeorg KoppenOCSP requests are not isolated to the URL bar domainNot sure when this regressed but I can find log messages like
```
[06-15 09:22:41] Torbutton INFO: tor SOCKS isolation catchall: http://clients1.google.com/ocsp via --unknown--:1
```
in my terminal. In fact it seems all OCSP requests are...Not sure when this regressed but I can find log messages like
```
[06-15 09:22:41] Torbutton INFO: tor SOCKS isolation catchall: http://clients1.google.com/ocsp via --unknown--:1
```
in my terminal. In fact it seems all OCSP requests are affected.https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19415Bug. I don't connect.2020-06-27T14:39:02ZTracBug. I don't connect.15.06.2016 11:30:45.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:31:14.100 [NOTICE] DisableNetwork is set. Tor will not make or ac...15.06.2016 11:30:45.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:31:14.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:31:14.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:31:14.100 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:31:14.100 [NOTICE] Opening Socks listener on 127.0.0.1:9150
15.06.2016 11:33:06.800 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
15.06.2016 11:33:06.800 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:33:06.800 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
15.06.2016 11:33:16.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:33:16.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:33:16.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
15.06.2016 11:33:16.700 [NOTICE] Opening Socks listener on 127.0.0.1:9150
15.06.2016 11:33:16.900 [NOTICE] Bootstrapped 5%: Connecting to directory server
15.06.2016 11:33:17.100 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
15.06.2016 11:38:17.900 [WARN] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 3; recommendation warn; host 81C89EA589E7F788042A370BF74B03A8DEF36580 at 194.132.209.58:31553)
15.06.2016 11:38:17.900 [WARN] 3 connections have failed:
15.06.2016 11:38:17.900 [WARN] 2 connections died in state handshaking (TLS) with SSL state SSLv3 read finished A in HANDSHAKE
15.06.2016 11:38:17.900 [WARN] 1 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE
**Trac**:
**Username**: kdsdimanIsis LovecruftIsis Lovecrufthttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19414Pointless, nonfuctional options in Tor Browser2020-06-27T14:39:02ZTracPointless, nonfuctional options in Tor Browser(duplicated by request from <https://tor.stackexchange.com/questions/11736/pointless-nonfuctional-options-in-tor-browser>)
I use Tor Browser often enough on my Windows 7 PC to have a semi-permanent entry for it in my Start Menu, and whe...(duplicated by request from <https://tor.stackexchange.com/questions/11736/pointless-nonfuctional-options-in-tor-browser>)
I use Tor Browser often enough on my Windows 7 PC to have a semi-permanent entry for it in my Start Menu, and when I hover the mouse over that entry, a submenu appears with a list of options: "Open new tab", "Open new window", and "New private window". I never paid much attention to this before (except to think that "New private window" was somewhat redundant), but today I tried "Open new tab" with Tor running. I expected a new, blank tab to open in the existing Tor Browser window, but the actual response surprised me: "Tor Browser is already running, but is not responding. The old Tor Browser process must be closed to open a new window." (As I said, I was not trying to open a new window.) Canceling out of that dialog brought me to the main Tor window, which continued to function perfectly normally (i.e. Tor Browser hadn't crashed, as the appearance of similar dialogs usually implies.)
I assume that the sort of communication between the OS and the program that would be necessary for this to work has been blocked as one of Tor's security measures, but if that's true, shouldn't the appearance of this menu have also been blocked?
**Trac**:
**Username**: user1128https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19413hardened browser does not start on debian with grsec2020-06-27T14:39:02ZTrachardened browser does not start on debian with grsecI am running debian stable with the grsec kernel from backports. The hardened browser bundle does not start (with no error message given) but the normal browser bundle works fine. Both have MPROTECT (PaX) disabled on the bundled firefox ...I am running debian stable with the grsec kernel from backports. The hardened browser bundle does not start (with no error message given) but the normal browser bundle works fine. Both have MPROTECT (PaX) disabled on the bundled firefox executable. TPE is disabled for the user executing tor browser. Both browser bundles are the current versions as of today (6.5a1-hardened and 6.0.1).
No errors are displayed in /var/log/messages or dmesg.
# uname -a
Linux hostname 4.5.0-2-grsec-amd64 #1 SMP Debian 4.5.5-1+grsec201605291201+1~bpo8+1 (2016-06-06) x86_64 GNU/Linux
# strace
execve("./start-tor-browser.desktop", ["./start-tor-browser.desktop"], [/* 39 vars */]) = 0
brk(0) = 0x12e1b90
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x3ac92627000
access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=97489, ...}) = 0
mmap(NULL, 97489, PROT_READ, MAP_PRIVATE, 3, 0) = 0x3ac9260f000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\34\2\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1738176, ...}) = 0
mmap(NULL, 3844640, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x3ac92063000
mprotect(0x3ac92205000, 2093056, PROT_NONE) = 0
mmap(0x3ac92404000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a1000) = 0x3ac92404000
mmap(0x3ac9240a000, 14880, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x3ac9240a000
close(3) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x3ac9260e000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x3ac9260d000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x3ac9260c000
arch_prctl(ARCH_SET_FS, 0x3ac9260d700) = 0
mprotect(0x3ac92404000, 16384, PROT_READ) = 0
mprotect(0x606000, 4096, PROT_READ) = 0
mprotect(0x3ac9262e000, 4096, PROT_READ) = 0
munmap(0x3ac9260f000, 97489) = 0
brk(0) = 0x12e1b90
brk(0x1302b90) = 0x1302b90
brk(0x1303000) = 0x1303000
open("/usr/lib/locale/locale-archive", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1607760, ...}) = 0
mmap(NULL, 1607760, PROT_READ, MAP_PRIVATE, 3, 0) = 0x3ac92483000
close(3) = 0
execve("./Browser/execdesktop", ["./Browser/execdesktop", "./start-tor-browser.desktop"], [/* 39 vars */]) = 0
brk(0) = 0x2a76e00
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x37ffabbf000
access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory)
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=97489, ...}) = 0
mmap(NULL, 97489, PROT_READ, MAP_PRIVATE, 3, 0) = 0x37ffaba7000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libncurses.so.5", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320l\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=151120, ...}) = 0
mmap(NULL, 2246824, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x37ffa781000
mprotect(0x37ffa7a5000, 2093056, PROT_NONE) = 0
mmap(0x37ffa9a4000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x23000) = 0x37ffa9a4000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libtinfo.so.5", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0@\316\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=171800, ...}) = 0
mmap(NULL, 2269152, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x37ffa557000
mprotect(0x37ffa57d000, 2093056, PROT_NONE) = 0
mmap(0x37ffa77c000, 20480, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x25000) = 0x37ffa77c000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libdl.so.2", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\0\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\320\16\0\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0644, st_size=14664, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x37ffaba6000
mmap(NULL, 2109712, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x37ffa353000
mprotect(0x37ffa356000, 2093056, PROT_NONE) = 0
mmap(0x37ffa555000, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x2000) = 0x37ffa555000
close(3) = 0
access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory)
open("/lib/x86_64-linux-gnu/libc.so.6", O_RDONLY|O_CLOEXEC) = 3
read(3, "\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0P\34\2\0\0\0\0\0"..., 832) = 832
fstat(3, {st_mode=S_IFREG|0755, st_size=1738176, ...}) = 0
mmap(NULL, 3844640, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0x37ff9fa8000
mprotect(0x37ffa14a000, 2093056, PROT_NONE) = 0
mmap(0x37ffa349000, 24576, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x1a1000) = 0x37ffa349000
mmap(0x37ffa34f000, 14880, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x37ffa34f000
close(3) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x37ffaba5000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x37ffaba4000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x37ffaba3000
arch_prctl(ARCH_SET_FS, 0x37ffaba4700) = 0
mprotect(0x37ffa349000, 16384, PROT_READ) = 0
mprotect(0x37ffa555000, 4096, PROT_READ) = 0
mprotect(0x37ffa77c000, 16384, PROT_READ) = 0
mprotect(0x37ffa9a4000, 4096, PROT_READ) = 0
mprotect(0x6f1000, 4096, PROT_READ) = 0
mprotect(0x37ffabc6000, 4096, PROT_READ) = 0
munmap(0x37ffaba7000, 97489) = 0
open("/dev/tty", O_RDWR|O_NONBLOCK) = 3
close(3) = 0
brk(0) = 0x2a76e00
brk(0x2a77000) = 0x2a77000
open("/usr/lib/locale/locale-archive", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=1607760, ...}) = 0
mmap(NULL, 1607760, PROT_READ, MAP_PRIVATE, 3, 0) = 0x37ffaa1a000
close(3) = 0
brk(0x2a78000) = 0x2a78000
brk(0x2a79000) = 0x2a79000
getuid() = 1000
getgid() = 1000
geteuid() = 1000
getegid() = 1000
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
brk(0x2a7a000) = 0x2a7a000
open("/proc/meminfo", O_RDONLY|O_CLOEXEC) = 3
fstat(3, {st_mode=S_IFREG|0444, st_size=0, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x37ffabbe000
read(3, "MemTotal: 3999936 kB\nMemF"..., 1024) = 1024
close(3) = 0
munmap(0x37ffabbe000, 4096) = 0
brk(0x2a7b000) = 0x2a7b000
rt_sigaction(SIGCHLD, {SIG_DFL, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, {SIG_DFL, [], 0}, 8) = 0
rt_sigaction(SIGCHLD, {SIG_DFL, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, 8) = 0
rt_sigaction(SIGINT, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], 0}, 8) = 0
rt_sigaction(SIGINT, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
rt_sigaction(SIGQUIT, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], 0}, 8) = 0
rt_sigaction(SIGQUIT, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
rt_sigaction(SIGQUIT, {SIG_IGN, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
uname({sys="Linux", node="hostname", ...}) = 0
brk(0x2a7c000) = 0x2a7c000
brk(0x2a7d000) = 0x2a7d000
brk(0x2a7e000) = 0x2a7e000
brk(0x2a7f000) = 0x2a7f000
stat("/home/user/tor-browser", {st_mode=S_IFDIR|0700, st_size=4096, ...}) = 0
stat(".", {st_mode=S_IFDIR|0700, st_size=4096, ...}) = 0
getpid() = 8176
open("/usr/lib/x86_64-linux-gnu/gconv/gconv-modules.cache", O_RDONLY) = 3
fstat(3, {st_mode=S_IFREG|0644, st_size=26258, ...}) = 0
mmap(NULL, 26258, PROT_READ, MAP_SHARED, 3, 0) = 0x37ffabb8000
close(3) = 0
brk(0x2a80000) = 0x2a80000
getppid() = 8173
brk(0x2a81000) = 0x2a81000
brk(0x2a82000) = 0x2a82000
getpgrp() = 8173
rt_sigaction(SIGCHLD, {0x4464a0, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, 8) = 0
getrlimit(RLIMIT_NPROC, {rlim_cur=15542, rlim_max=15542}) = 0
brk(0x2a83000) = 0x2a83000
brk(0x2a84000) = 0x2a84000
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
open("./Browser/execdesktop", O_RDONLY) = 3
ioctl(3, SNDCTL_TMR_TIMEBASE or SNDRV_TIMER_IOCTL_NEXT_DEVICE or TCGETS, 0x3dcbdbca8e0) = -1 ENOTTY (Inappropriate ioctl for device)
lseek(3, 0, SEEK_CUR) = 0
read(3, "#!/bin/bash\n\nTBB_START_PROG=\"$(g"..., 80) = 80
lseek(3, 0, SEEK_SET) = 0
getrlimit(RLIMIT_NOFILE, {rlim_cur=64*1024, rlim_max=64*1024}) = 0
fcntl(255, F_GETFD) = -1 EBADF (Bad file descriptor)
dup2(3, 255) = 255
close(3) = 0
fcntl(255, F_SETFD, FD_CLOEXEC) = 0
fcntl(255, F_GETFL) = 0x8000 (flags O_RDONLY|O_LARGEFILE)
fstat(255, {st_mode=S_IFREG|0755, st_size=284, ...}) = 0
lseek(255, 0, SEEK_CUR) = 0
brk(0x2a85000) = 0x2a85000
read(255, "#!/bin/bash\n\nTBB_START_PROG=\"$(g"..., 284) = 284
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
brk(0x2a86000) = 0x2a86000
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
pipe([3, 4]) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [INT CHLD], [], 8) = 0
lseek(255, -155, SEEK_CUR) = 129
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x37ffaba49d0) = 8177
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigaction(SIGCHLD, {0x4464a0, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, {0x4464a0, [], SA_RESTORER|SA_RESTART, 0x37ff9fdd0e0}, 8) = 0
close(4) = 0
read(3, "./Browser/start-tor-browser --de"..., 128) = 37
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=8177, si_uid=1000, si_status=0, si_utime=0, si_stime=0} ---
wait4(-1, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], WNOHANG, NULL) = 8177
wait4(-1, 0x3dcbdbc9c90, WNOHANG, NULL) = -1 ECHILD (No child processes)
rt_sigreturn() = 37
read(3, "", 128) = 0
close(3) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigaction(SIGINT, {0x443660, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
rt_sigaction(SIGINT, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, {0x443660, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
read(255, "\nshift\n\nif [ \"$#\" -ge 1 ]\nthen\n "..., 284) = 155
write(1, "Launching './Browser/start-tor-b"..., 52Launching './Browser/start-tor-browser --detach'...
) = 52
rt_sigprocmask(SIG_BLOCK, NULL, [], 8) = 0
brk(0x2a87000) = 0x2a87000
rt_sigprocmask(SIG_BLOCK, [INT CHLD], [], 8) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [INT CHLD], 8) = 0
rt_sigprocmask(SIG_SETMASK, [INT CHLD], NULL, 8) = 0
clone(child_stack=0, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x37ffaba49d0) = 8182
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigaction(SIGINT, {0x443660, [], SA_RESTORER, 0x37ff9fdd0e0}, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
wait4(-1, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0, NULL) = 8182
rt_sigaction(SIGINT, {SIG_DFL, [], SA_RESTORER, 0x37ff9fdd0e0}, {0x443660, [], SA_RESTORER, 0x37ff9fdd0e0}, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=8182, si_uid=1000, si_status=0, si_utime=0, si_stime=0} ---
wait4(-1, 0x3dcbdbc9ed0, WNOHANG, NULL) = -1 ECHILD (No child processes)
rt_sigreturn() = 0
read(255, "", 284) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
exit_group(0) = ?
+++ exited with 0 +++
**Trac**:
**Username**: tblahhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19412Windows 10 frame is changing forcing the screen height to change2020-06-27T14:39:02ZTracWindows 10 frame is changing forcing the screen height to changeSometimes when i open tor the screen seems to be smaller in height duo to a strange looking thick frame at the bottom (!["https://www.anony.ws/image/JCo8"](uploads/"https://www.anony.ws/image/JCo8")), and other times or when i try to max...Sometimes when i open tor the screen seems to be smaller in height duo to a strange looking thick frame at the bottom (!["https://www.anony.ws/image/JCo8"](uploads/"https://www.anony.ws/image/JCo8")), and other times or when i try to maximize and restore the window it change to what i believe a normal frame (!["https://www.anony.ws/image/JCoR"](uploads/"https://www.anony.ws/image/JCoR")), I've heard of tracking by screen size and wonder if i should be concerned.
**Trac**:
**Username**: Ageddhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19411Update icon shows up even if partial updates are failing2020-06-27T14:39:02ZGeorg KoppenUpdate icon shows up even if partial updates are failingWhile investigating legacy/trac#19410 I realized that the green icon on the hambuger menu is showing up as well if the partial update is failing. I confirmed that clicking on it restarts the browser but still there is no update (obviousl...While investigating legacy/trac#19410 I realized that the green icon on the hambuger menu is showing up as well if the partial update is failing. I confirmed that clicking on it restarts the browser but still there is no update (obviously) to 6.0.1. This is pretty confusing. This was tested on OS X.https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19410Incremental updates from 6.0 to 6.0.1 are not working on OS X2020-06-27T14:39:02ZGeorg KoppenIncremental updates from 6.0 to 6.0.1 are not working on OS XI tried to update from 6.0 to 6.0.1 and first it downloads the incremental update. Verification is fine it seems but then I get the following error:
```
AUS:SVC Downloader:_verifyDownload called
AUS:SVC Downloader:_verifyDownload downloa...I tried to update from 6.0 to 6.0.1 and first it downloads the incremental update. Verification is fine it seems but then I get the following error:
```
AUS:SVC Downloader:_verifyDownload called
AUS:SVC Downloader:_verifyDownload downloaded size == expected size.
AUS:SVC Downloader:_verifyDownload hashes match.
AUS:SVC Downloader:onStopRequest - setting state to: pending
AUS:SVC Downloader:onStopRequest - attempting to stage update: Tor Browser 6.0.1
AUS:SVC readStatusFile - status: failed: 2, path: /Users/release/Desktop/TorBrowser-Data/UpdateInfo/Users/release/Desktop/TorBrowser/updates/0/update.status
AUS:SVC handleFallbackToCompleteUpdate - install of partial patch failed, downloading complete patch
AUS:SVC Creating Downloader
AUS:SVC UpdateService:_downloadUpdate
AUS:SVC readStringFromFile - file doesn't exist: /Users/release/Desktop/TorBrowser-Data/UpdateInfo/Users/release/Desktop/TorBrowser/updates/0/update.status
AUS:SVC readStatusFile - status: null, path: /Users/release/Desktop/TorBrowser-Data/UpdateInfo/Users/release/Desktop/TorBrowser/updates/0/update.status
AUS:SVC Downloader:_selectPatch - found existing patch with state: null
AUS:SVC Downloader:downloadUpdate - downloading from https://www.torproject.org/dist/torbrowser/6.0.1/tor-browser-osx64-6.0.1_en-US.mar to /Users/release/Desktop/TorBrowser-Data/UpdateInfo/Users/release/Desktop/TorBrowser/updates/0/update.mar
AUS:SVC UpdateManager:refreshUpdateStatus - Notifying observers that the update was staged. state: downloading, status: failed: 2
```
And the browser is falling back to downloading and applying the full update successfully.boklmboklmhttps://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/19409Make a deb of snowflake (proxy and client) and get into Debian2022-03-05T21:42:54ZadrelanosMake a deb of snowflake (proxy and client) and get into Debianaka
`apt-get install snowflake`
Speaking for Whonix, this would be very useful. Perhaps for Tails as well, but I am not speaking for them.
(Similar to legacy/trac#13160.)aka
`apt-get install snowflake`
Speaking for Whonix, this would be very useful. Perhaps for Tails as well, but I am not speaking for them.
(Similar to legacy/trac#13160.)Sponsor 96: Rapid Expansion of Access to the Uncensored Internet through Tor in China, Hong Kong, & Tibetmeskiomeskio@torproject.orgmeskiomeskio@torproject.orghttps://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/trac/-/issues/19408Tor cannot work in China2020-06-27T13:43:53ZTracTor cannot work in ChinaSadly Tor is not working in China without VPN, it cannot even work with any plugin such as obfs4, amazon, and with new bridges also no help. This problem exist on any OS for a long time.
Here's a example log:
6/13/2016 23:36:52 PM.200 [N...Sadly Tor is not working in China without VPN, it cannot even work with any plugin such as obfs4, amazon, and with new bridges also no help. This problem exist on any OS for a long time.
Here's a example log:
6/13/2016 23:36:52 PM.200 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
6/13/2016 23:37:17 PM.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
6/13/2016 23:37:17 PM.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
6/13/2016 23:37:17 PM.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
6/13/2016 23:37:17 PM.700 [NOTICE] Opening Socks listener on 127.0.0.1:9150
6/13/2016 23:37:24 PM.400 [NOTICE] Bootstrapped 5%: Connecting to directory server
6/13/2016 23:37:24 PM.400 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 109.105.109.165:10527 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 154.35.22.12:80 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 154.35.22.10:443 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 83.212.101.3:41213 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 104.131.108.182:56880 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 109.105.109.147:13764 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
6/13/2016 23:37:45 PM.500 [WARN] Proxy Client: unable to connect to 198.245.60.50:443 ("general SOCKS server failure")
6/13/2016 23:38:26 PM.000 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
6/13/2016 23:38:27 PM.900 [WARN] Proxy Client: unable to connect to 154.35.22.9:60873 ("general SOCKS server failure")
6/13/2016 23:38:27 PM.900 [WARN] Proxy Client: unable to connect to 154.35.22.11:49868 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 109.105.109.165:10527 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 154.35.22.12:80 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 154.35.22.10:443 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 83.212.101.3:41213 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 104.131.108.182:56880 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 109.105.109.147:13764 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.300 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
6/13/2016 23:52:45 PM.700 [WARN] Proxy Client: unable to connect to 198.245.60.50:443 ("general SOCKS server failure")
6/13/2016 23:53:24 PM.700 [WARN] Proxy Client: unable to connect to 154.35.22.9:60873 ("general SOCKS server failure")
6/13/2016 23:53:26 PM.200 [WARN] Proxy Client: unable to connect to 154.35.22.11:49868 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.200 [WARN] Proxy Client: unable to connect to 109.105.109.165:10527 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.200 [WARN] Proxy Client: unable to connect to 154.35.22.12:80 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.200 [WARN] Proxy Client: unable to connect to 154.35.22.10:443 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.200 [WARN] Proxy Client: unable to connect to 83.212.101.3:41213 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.200 [WARN] Proxy Client: unable to connect to 104.131.108.182:56880 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.200 [WARN] Proxy Client: unable to connect to 109.105.109.147:13764 ("general SOCKS server failure")
6/14/2016 0:07:45 AM.300 [WARN] Proxy Client: unable to connect to 192.99.11.54:443 ("general SOCKS server failure")
6/14/2016 0:07:46 AM.900 [WARN] Proxy Client: unable to connect to 198.245.60.50:443 ("general SOCKS server failure")
6/14/2016 0:08:26 AM.000 [WARN] Proxy Client: unable to connect to 154.35.22.11:49868 ("general SOCKS server failure")
6/14/2016 0:08:27 AM.700 [WARN] Proxy Client: unable to connect to 154.35.22.13:443 ("general SOCKS server failure")
6/14/2016 0:08:28 AM.000 [WARN] Proxy Client: unable to connect to 154.35.22.9:60873 ("general SOCKS server failure")
6/14/2016 0:43:12 AM.700 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
6/14/2016 0:43:12 AM.700 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
6/14/2016 0:43:12 AM.700 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
**Trac**:
**Username**: sam1275https://gitlab.torproject.org/tpo/core/tor/-/issues/19406OpenSSL 1.1.0pre5 breaks with maint-0.2.82020-06-27T13:58:46ZNick MathewsonOpenSSL 1.1.0pre5 breaks with maint-0.2.8Weasel reports these errors:
https://volatile.noreply.org/2016-06-13-seGxpz8DoUk/script.txtWeasel reports these errors:
https://volatile.noreply.org/2016-06-13-seGxpz8DoUk/script.txtTor: 0.2.8.x-finalYawning AngelYawning Angelhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/19405Error when accessing mega.nz2020-06-27T14:39:03ZTracError when accessing mega.nz
When I try accessing mega.nz with Tor Browser 6.0.1, I get the following error message in a popup window:
An error occurred while loading MEGA.
Filename:
Exception: InternalError: allocation size overflow
The problem doesn't ha...
When I try accessing mega.nz with Tor Browser 6.0.1, I get the following error message in a popup window:
An error occurred while loading MEGA.
Filename:
Exception: InternalError: allocation size overflow
The problem doesn't happen if I try with an older version of firefox (routed via Tor).
**Trac**:
**Username**: torbacchi