The Tor Project issueshttps://gitlab.torproject.org/groups/tpo/-/issues2020-06-27T14:18:33Zhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/23986Add jenkins builders for maint-0.3.22020-06-27T14:18:33ZNick MathewsonAdd jenkins builders for maint-0.3.2Tor master is now the pre-alpha branch for 0.3.3; the maint-0.3.2 and release-0.3.2 branches now exist for work on the 0.3.2 series. They don't yet have Jenkins builders.Tor master is now the pre-alpha branch for 0.3.3; the maint-0.3.2 and release-0.3.2 branches now exist for work on the 0.3.2 series. They don't yet have Jenkins builders.weasel (Peter Palfrader)weasel (Peter Palfrader)https://gitlab.torproject.org/tpo/tpa/team/-/issues/23987Stop using --enable-fatal-warnings on GCC 0.2.8 builds2020-06-27T14:18:33ZNick MathewsonStop using --enable-fatal-warnings on GCC 0.2.8 buildsThe 0.2.8 builds with GCC are failing on buster and sid when built with --enable-fatal-warnings, because of GCC warnings that were added in GCC 7. We don't plan to backport fixes for those warnings, since the fixes are fairly big, and 0...The 0.2.8 builds with GCC are failing on buster and sid when built with --enable-fatal-warnings, because of GCC warnings that were added in GCC 7. We don't plan to backport fixes for those warnings, since the fixes are fairly big, and 0.2.8 is only supported for another two months.
Maybe Jenkins should just remove --enable-fatal-warnings for these builders?
(Note that the configure option in question was formerly known as --enable-gcc-warnings : it's possible that the jenkins builders are invoking it by that name instead.)weasel (Peter Palfrader)weasel (Peter Palfrader)https://gitlab.torproject.org/tpo/tpa/team/-/issues/23999New table format2020-06-27T14:18:33ZcypherpunksNew table formatI give up. I tried many times.
> Submission rejected as potential spam
> Maximum number of external links per post exceeded
I think this table format is better than current "list" style.
If you think this is great, please merge it. ...I give up. I tried many times.
> Submission rejected as potential spam
> Maximum number of external links per post exceeded
I think this table format is better than current "list" style.
If you think this is great, please merge it. And fix that trac spam system :(
https://trac.torproject.org/projects/tor/wiki/org/projects/WeSupportTorJens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24035It would be great to have a rust builder on jenkins2020-06-27T14:18:32ZNick MathewsonIt would be great to have a rust builder on jenkinsThis is an "I want a pony" task for now, but it would be really cool: it would be great if there were a Jenkins builder that built Tor with rust enabled -- ideally, it would do make check, and then do distcheck with `AM_DISTCHECK_CONFIG...This is an "I want a pony" task for now, but it would be really cool: it would be great if there were a Jenkins builder that built Tor with rust enabled -- ideally, it would do make check, and then do distcheck with `AM_DISTCHECK_CONFIGURE_FLAGS="--enable-rust --enable-cargo-online-mode --enable-fatal-warnings"` or something like that.
This isn't going to be trivial.weasel (Peter Palfrader)weasel (Peter Palfrader)https://gitlab.torproject.org/tpo/tpa/team/-/issues/24038Delete all spam comments from #182222020-06-27T14:18:32ZcypherpunksDelete all spam comments from #18222Someone please delete all spam comments from ticket legacy/trac#18222Someone please delete all spam comments from ticket legacy/trac#18222Jens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24051disable ldap accounts for long-idle people2020-06-27T14:18:32ZRoger Dingledinedisable ldap accounts for long-idle peopleWe have some ldap accounts registered for people who have not been doing Tor things for a long while.
Here are some:
jgay
huseby
flamsmark
cristobal
eyv
I think we should disable these accounts, to reduce general vulnerability surface ...We have some ldap accounts registered for people who have not been doing Tor things for a long while.
Here are some:
jgay
huseby
flamsmark
cristobal
eyv
I think we should disable these accounts, to reduce general vulnerability surface area -- and I hear from the TPA folks that it is easier to re-enable them if we want to do that at a later point, so this step doesn't need to be regarded as a momentous decision.https://gitlab.torproject.org/tpo/tpa/team/-/issues/24055Create rbm.torproject.org website2020-06-27T14:18:32ZboklmCreate rbm.torproject.org websiterbm currently has a website on https://people.torproject.org/~boklm/rbm/. When discussing about that with arma on IRC, it seemed like a good idea to make a more legit looking url for it, such as `rbm.torproject.org`.
The website is all ...rbm currently has a website on https://people.torproject.org/~boklm/rbm/. When discussing about that with arma on IRC, it seemed like a good idea to make a more legit looking url for it, such as `rbm.torproject.org`.
The website is all static content, and you can set `gk` and `boklm` as users who can upload files there.https://gitlab.torproject.org/tpo/tpa/team/-/issues/24058Allow more link - WeSupportTor2020-06-27T14:18:32ZcypherpunksAllow more link - WeSupportTorHey maintainers, can you do something to this page?
The trac system always reject text because of these "links".
Why so strict? DontBlockMe page is less strict than WeSupportTor.
https://trac.torproject.org/projects/tor/wiki/org/projec...Hey maintainers, can you do something to this page?
The trac system always reject text because of these "links".
Why so strict? DontBlockMe page is less strict than WeSupportTor.
https://trac.torproject.org/projects/tor/wiki/org/projects/WeSupportTorJens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24087Add teor as a torflow maintainer2020-06-27T14:18:32ZteorAdd teor as a torflow maintainerHi Tom,
I'd like to be able to push fixes to trivial issues like legacy/trac#21393 (deprecated tor options), and legacy/trac#23283 (use the latest stable tor release).
Can you please sign a message asking for commit access for me?
teorHi Tom,
I'd like to be able to push fixes to trivial issues like legacy/trac#21393 (deprecated tor options), and legacy/trac#23283 (use the latest stable tor release).
Can you please sign a message asking for commit access for me?
teorhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24092Create a torsocks repo for ln52020-06-27T14:18:32ZLinus Nordberglinus@torproject.orgCreate a torsocks repo for ln5Please create repo
user/linus/torsocks
Linus' torsocks repositoryPlease create repo
user/linus/torsocks
Linus' torsocks repositoryhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24105disable ldap accounts for old https-everywhere people2020-06-27T14:18:32ZRoger Dingledinedisable ldap accounts for old https-everywhere peopleFollowing on from legacy/trac#24051, I talked to legind and we agreed to keep two ldap accounts for https everywhere devs (primary maintainer and a backup for bus factor).
So, let's disable the others:
schoen ...Following on from legacy/trac#24051, I talked to legind and we agreed to keep two ldap accounts for https everywhere devs (primary maintainer and a backup for bus factor).
So, let's disable the others:
schoen
dtauerbach
micah
pde
yan
And as before, if your name is in this list, don't worry, the goal here is to reduce our security vulnerability surface area for accounts that aren't in active use, and this is an easy operation to reverse if you want the account to become in active use again.https://gitlab.torproject.org/tpo/tpa/team/-/issues/24106Please make teor an oniongit account2020-06-27T14:18:31ZteorPlease make teor an oniongit accountThanks!Thanks!HiroHirohttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24120"Maximum number of external links per post exceeded" is cramping my style2020-06-27T14:18:31ZDavid Fifielddcf@torproject.org"Maximum number of external links per post exceeded" is cramping my styleI tried to edit [[doc/MetricsTimeline]], adding 6 six external links to lists.torproject.org domains. I got the error "Maximum number of external links per post exceeded" with a captcha; but even after solving the captcha it doesn't let ...I tried to edit [[doc/MetricsTimeline]], adding 6 six external links to lists.torproject.org domains. I got the error "Maximum number of external links per post exceeded" with a captcha; but even after solving the captcha it doesn't let me post.
The workaround is tedious: break one edit into several edits that each add only a couple of links.
A cypherpunks recently ran into the same problem while making constructive edits and filed legacy/trac#23999. They are working around it at [[org/projects/WeSupportTor]] by writing links as https:!!example.com instead of !https://example.com.
I realize that the link limit is probably an anti-spam measure. I don't necessarily expect you to remove it. I just want to report these false positives to help you tune it. I know this ticket isn't actionable. I won't be upset if you close it as wontfix.Jens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24144Cannot login or submit forms Trac onion site ('must use HTTPS to submit forms')2020-06-27T14:18:31ZTracCannot login or submit forms Trac onion site ('must use HTTPS to submit forms')Attempting to login on the onion service for trac (http://ea5faa5po25cf7fb.onion) results in 'Error: Bad request. Missing or invalid form token. Secure cookies are enabled, you must use https to submit forms.'
The onion service doesn't ...Attempting to login on the onion service for trac (http://ea5faa5po25cf7fb.onion) results in 'Error: Bad request. Missing or invalid form token. Secure cookies are enabled, you must use https to submit forms.'
The onion service doesn't work with HTTPS.
**Trac**:
**Username**: nidoJens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24183Please create user/boklm/rbm git repository2020-06-27T14:18:31ZboklmPlease create user/boklm/rbm git repositoryPlease create a user/boklm/rbm git repository.
Thanks.Please create a user/boklm/rbm git repository.
Thanks.https://gitlab.torproject.org/tpo/tpa/team/-/issues/24189new newsletter@tpo alias2020-06-27T14:18:31ZRoger Dingledinenew newsletter@tpo aliasSteph asks me for a new newsletter@ alias, which points to her and tommy.Steph asks me for a new newsletter@ alias, which points to her and tommy.https://gitlab.torproject.org/tpo/tpa/team/-/issues/24191Remove trac spam prevention from GRP_devel people2020-06-27T14:18:31ZRoger DingledineRemove trac spam prevention from GRP_devel peopleBased on legacy/trac#24120, I think we would have many happier people if we figured out what is special about GRP_admin from a spam prevention standpoint in trac's configuration, and do those things for the people in GRP_devel too.Based on legacy/trac#24120, I think we would have many happier people if we figured out what is special about GRP_admin from a spam prevention standpoint in trac's configuration, and do those things for the people in GRP_devel too.Jens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24202Please make stem-packagers@ list2020-06-27T14:18:30ZDamian JohnsonPlease make stem-packagers@ listHi Jens, the group of folks I contact for Stem and Nyx packaging has grown large enough that I could use a list to ensure I don't miss someone at release time.
List name: stem-packagers@lists.torproject.org
List maintainer: me
Descripti...Hi Jens, the group of folks I contact for Stem and Nyx packaging has grown large enough that I could use a list to ensure I don't miss someone at release time.
List name: stem-packagers@lists.torproject.org
List maintainer: me
Description: Package maintainers for Stem and Nyx.
I'll go ahead and handle filling in the membership.Jens KubiezielJens Kubiezielhttps://gitlab.torproject.org/tpo/tpa/team/-/issues/24212Get developer access to pytorctl2020-06-27T14:18:30ZteorGet developer access to pytorctlHey tom, let's both get access to pytorctl for tickets like legacy/trac#20619 and legacy/trac#24210.
Do you have access already?Hey tom, let's both get access to pytorctl for tickets like legacy/trac#20619 and legacy/trac#24210.
Do you have access already?https://gitlab.torproject.org/tpo/tpa/team/-/issues/24226Please create git repository for fpcentral2020-06-27T14:18:30ZboklmPlease create git repository for fpcentralPlease create a git repository for fpcentral, which is the tool we want to use to check the fingerprint of new Tor Browser releases.
I will attach a patch for the gitolite.conf changes.Please create a git repository for fpcentral, which is the tool we want to use to check the fingerprint of new Tor Browser releases.
I will attach a patch for the gitolite.conf changes.