The Tor Project issueshttps://gitlab.torproject.org/groups/tpo/-/issues2021-07-22T19:06:01Zhttps://gitlab.torproject.org/tpo/applications/android-components/-/issues/40059Rebase android-components patches for Fenix 91 beta X builds2021-07-22T19:06:01ZboklmRebase android-components patches for Fenix 91 beta X buildsboklmboklmhttps://gitlab.torproject.org/tpo/web/support/-/issues/240Operators "How do I change my bridge distribution method"2021-07-31T06:20:07ZGusOperators "How do I change my bridge distribution method"It's quite common to have bridge operators asking about bridge distribution methods on the Tor relay mailing list.
We should create a new support entry.
Example: https://lists.torproject.org/pipermail/tor-relays/2021-July/019745.htmlIt's quite common to have bridge operators asking about bridge distribution methods on the Tor relay mailing list.
We should create a new support entry.
Example: https://lists.torproject.org/pipermail/tor-relays/2021-July/019745.htmlkulsoom.zahrakulsoomzahra24@gmail.comkulsoom.zahrakulsoomzahra24@gmail.comhttps://gitlab.torproject.org/tpo/core/torspec/-/issues/57path-spec.txt: mechanisms for detecting down network are redundant?2021-07-13T17:19:14ZNick Mathewsonpath-spec.txt: mechanisms for detecting down network are redundant?From path-spec.txt 2.4.5:
Clients assume that they have had network connectivity loss if a circuit
times out and have received no cells or TLS handshakes since that
circuit began. Clients then temporarily stop counting timeo...From path-spec.txt 2.4.5:
Clients assume that they have had network connectivity loss if a circuit
times out and have received no cells or TLS handshakes since that
circuit began. Clients then temporarily stop counting timeouts until
network activity resumes (ie: until a TLS handshake completes or a cell
arrives at the client).
To detect changing network conditions, clients keep a history of
the timeout or non-timeout status of the past 'cbtrecentcount' circuits
(20 circuits) that successfully completed at least one hop. If more than
90% of these circuits timeout, the client discards all buildtimes history,
resets the timeout to 'cbtinitialtimeout' (60 seconds), and then begins
recomputing the timeout.
So as I understand it, we only count a timeout if two conditions apply:
1. We have received network activity since the circuit launched.
2. The circuit has completed at least one hop successfully.
But it seems to me that these two conditions are redundant, and we can just ignore the first: If the circuit has completed one hop successfully, then we received a create cell, and so the first condition will always be true if the second condition is true.
@mikeperry, am I reasoning through this correctly?Nick MathewsonNick Mathewsonhttps://gitlab.torproject.org/tpo/web/tpo/-/issues/213Please remove Browser Developer job description from website2021-07-15T21:48:44ZErin WyattPlease remove Browser Developer job description from websitePlease remove Browser Developer job description from website. We have replaced it with another job description.
https://www.torproject.org/about/jobs/tor-browser-developer/
Thank you!Please remove Browser Developer job description from website. We have replaced it with another job description.
https://www.torproject.org/about/jobs/tor-browser-developer/
Thank you!GusGushttps://gitlab.torproject.org/tpo/web/support/-/issues/241Remove GetTor XMPP support2021-07-14T18:39:06ZGusRemove GetTor XMPP supportWe no longer support XMPP and that probably won't change in the near future.
Let's remove this from the docs:
https://support.torproject.org/gettor/gettor-4/We no longer support XMPP and that probably won't change in the near future.
Let's remove this from the docs:
https://support.torproject.org/gettor/gettor-4/kulsoom.zahrakulsoomzahra24@gmail.comkulsoom.zahrakulsoomzahra24@gmail.comhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40544Show tor's bootstrapping percentage and description on about:torconnect2022-05-17T23:09:26ZMatthew FinkelShow tor's bootstrapping percentage and description on about:torconnectIt's written on the label.
Possible backport candidate.It's written on the label.
Possible backport candidate.Tor Browser: 11.0 Issues with previous releaserichardrichardhttps://gitlab.torproject.org/tpo/web/blog/-/issues/40006Add markup for sharing links on social media sites2021-08-31T13:55:31ZdonutsAdd markup for sharing links on social media sitesComms often have to create and upload separate images when sharing links on Facebook, Twitter and Mastodon as our current blog posts don't generate link previews on the timeline.
To reduce this effort, could we add the appropriate share...Comms often have to create and upload separate images when sharing links on Facebook, Twitter and Mastodon as our current blog posts don't generate link previews on the timeline.
To reduce this effort, could we add the appropriate share metatags for the following platforms:
- [Facebook](https://developers.facebook.com/docs/sharing/webmasters#markup)
- [Twitter](https://developer.twitter.com/en/docs/twitter-for-websites/cards/overview/markup)
- [Mastodon](https://docs.joinmastodon.org/entities/card/) (it seems this uses Opengraph too, so no further action may be necessary)
Full-sized cards featuring the blog post's title, description and banner image would be great, please.Launch support's Forum and Blog migrationJérôme Charaouilavamind@torproject.orgJérôme Charaouilavamind@torproject.orghttps://gitlab.torproject.org/tpo/web/blog/-/issues/40007A very simple author's page2021-08-31T13:39:08ZGusA very simple author's pageAs we already have a tag page, can we have an authors' page, ie, a page that list all the blog posts made by someone?As we already have a tag page, can we have an authors' page, ie, a page that list all the blog posts made by someone?Launch support's Forum and Blog migrationJérôme Charaouilavamind@torproject.orgJérôme Charaouilavamind@torproject.orghttps://gitlab.torproject.org/tpo/tpa/gitlab/-/issues/32Create Onion service for Gitlab2021-09-08T18:51:25ZAlexander Færøyahf@torproject.orgCreate Onion service for GitlabWe should probably have an onion service for our Gitlab instance. I think @hacim have looked into this before?
- [x] onion service for gitlab.torproject.org
- [ ] onion services for pagesWe should probably have an onion service for our Gitlab instance. I think @hacim have looked into this before?
- [x] onion service for gitlab.torproject.org
- [ ] onion services for pagesJérôme Charaouilavamind@torproject.orgJérôme Charaouilavamind@torproject.orghttps://gitlab.torproject.org/tpo/tpa/team/-/issues/40329complete GitLab runner registration and configuration in puppet2021-07-27T05:19:51Zanarcatcomplete GitLab runner registration and configuration in puppetgitlab runners are automatically installed by Puppet, but the registration fails. even if it would work, custom configuration like the one done in https://gitlab.torproject.org/tpo/tpa/team/-/issues/40327 is currently done by hand, while...gitlab runners are automatically installed by Puppet, but the registration fails. even if it would work, custom configuration like the one done in https://gitlab.torproject.org/tpo/tpa/team/-/issues/40327 is currently done by hand, while it should be done in puppet.Jérôme Charaouilavamind@torproject.orgJérôme Charaouilavamind@torproject.orghttps://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/40339Prep 11.0a22021-07-16T00:30:13ZMatthew FinkelPrep 11.0a2https://gitlab.torproject.org/tpo/applications/android-components/-/issues/40060Rebase 11.0 onto 90.0.122021-07-14T10:36:58ZMatthew FinkelRebase 11.0 onto 90.0.120ab0465c5ca99b9b01a32e4562905fe51a7092040ab0465c5ca99b9b01a32e4562905fe51a709204https://gitlab.torproject.org/tpo/core/arti/-/issues/147derive(Ord,PartialOrd) in more places2021-09-16T14:40:22ZNick Mathewsonderive(Ord,PartialOrd) in more placesThere are a few types where we implement Ord and PartialOrd ourselves, but we could use `#[derive(Ord,PartialOrd)]` instead. They include:
* [ ] `AuthCertKeyIds`
* [ ] `TorVersion`
We should make this change only after double-checki...There are a few types where we implement Ord and PartialOrd ourselves, but we could use `#[derive(Ord,PartialOrd)]` instead. They include:
* [ ] `AuthCertKeyIds`
* [ ] `TorVersion`
We should make this change only after double-checking that there are enough unit tests to be sure that the results are unchanged.https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40545Remove V2 Deprecation banner on about:tor for desktop2021-08-04T17:54:40ZdonutsRemove V2 Deprecation banner on about:tor for desktopAs per feedback from the community described here: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40523#note_2743842, let's remove the V2 Deprecation banner from `about:tor`.
This ticket concerns the banner on `abou...As per feedback from the community described here: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40523#note_2743842, let's remove the V2 Deprecation banner from `about:tor`.
This ticket concerns the banner on `about:tor` only, and does not include any changes to the V2 onion address warnings, which will be detailed here if required: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40523.https://gitlab.torproject.org/tpo/core/arti/-/issues/148How to start Tor from MacOs terminal [BigSur 11.4]2021-07-16T15:01:10ZdaggerHow to start Tor from MacOs terminal [BigSur 11.4]Hi, I'm pretty new to the project. There's one question I would like to ask:
From the https://gitlab.torproject.org/tpo/core/arti/-/blob/main/CONTRIBUTING.md:
This will ensure that arti sets its SOCKS port on 9150. Now we need to launc...Hi, I'm pretty new to the project. There's one question I would like to ask:
From the https://gitlab.torproject.org/tpo/core/arti/-/blob/main/CONTRIBUTING.md:
This will ensure that arti sets its SOCKS port on 9150. Now we need to launch Tor Browser and instruct it to use that SOCKS port:
```
$ TOR_SKIP_LAUNCH=1 TOR_SOCKS_PORT=9150 ./start-tor-browser.desktop
```
I'm wondering how to get Tor open on MacOS terminal to run with the Arti Rust code, I cannot find the part "./start-tor-browser.desktop" for MacOS. Please help.
Thank youhttps://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40546proxy error: Unrecognized SOCKS error code -102022-07-08T23:28:18Zbakertaylor28proxy error: Unrecognized SOCKS error code -10![doc1](/uploads/1dda8ffd0544b708b5dc5ba8b56b15ae/doc1.JPG)![doc2](/uploads/528bd12c8ce3d6be7b1a3813ed720a87/doc2.JPG)
Upon connecting to wvdg4gsabtb7uwbmst2b4tyihtpfxvyafbbv3w3j3tsqcebybwc3wad.onion:23 with PuTTY client Proxied through...![doc1](/uploads/1dda8ffd0544b708b5dc5ba8b56b15ae/doc1.JPG)![doc2](/uploads/528bd12c8ce3d6be7b1a3813ed720a87/doc2.JPG)
Upon connecting to wvdg4gsabtb7uwbmst2b4tyihtpfxvyafbbv3w3j3tsqcebybwc3wad.onion:23 with PuTTY client Proxied through Tor at Localhost:9150 using TBB's SOCKS5 The error is transmitted: proxy error: Unrecognized SOCKS error code -10. This occurs with TBB 10.5.2 in it's default state, and is replicated on both Windows 10 and Linux Ubuntu 18, including the machine running the onion domain.Tor Browser: 10.52021-07-30https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/40340Use the https-everywhere Github repo2021-07-16T00:30:13ZMatthew FinkelUse the https-everywhere Github repoWe're still using the repo on git.torproject.org, and it's obvious that https://git.torproject.org/https-everywhere.git is a remainder of earlier days. The new tag (`2021.7.13`) wasn't pushed to the git.tpo repo, so let's start pulling f...We're still using the repo on git.torproject.org, and it's obvious that https://git.torproject.org/https-everywhere.git is a remainder of earlier days. The new tag (`2021.7.13`) wasn't pushed to the git.tpo repo, so let's start pulling from Github.https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40548Set network.proxy.failover_direct to false in FF 912021-12-07T11:31:19ZTom Rittertom@ritter.vgSet network.proxy.failover_direct to false in FF 91https://bugzilla.mozilla.org/show_bug.cgi?id=1720221
https://phabricator.services.mozilla.com/D119695
To combat malicious add-ons, Firefox has set up a mechanism to have system requests fail over outside the proxy. This is controlled by...https://bugzilla.mozilla.org/show_bug.cgi?id=1720221
https://phabricator.services.mozilla.com/D119695
To combat malicious add-ons, Firefox has set up a mechanism to have system requests fail over outside the proxy. This is controlled by a pref; and will be uplifted to 91.Tor Browser: 11.0 Issues with previous releasehttps://gitlab.torproject.org/tpo/core/tor/-/issues/40435"Padding negotiated cell from wrong hop" messages on re-extended intro circs2022-07-07T00:47:10ZGeorge Kadianakis"Padding negotiated cell from wrong hop" messages on re-extended intro circsSeems like even after https://gitlab.torproject.org/tpo/core/tor/-/issues/32040 and https://gitlab.torproject.org/tpo/core/tor/-/issues/30992 we still get "Padding negotiated cell from wrong hop" messages on `main` when a client circ fai...Seems like even after https://gitlab.torproject.org/tpo/core/tor/-/issues/32040 and https://gitlab.torproject.org/tpo/core/tor/-/issues/30992 we still get "Padding negotiated cell from wrong hop" messages on `main` when a client circ fails the first intro and then re-extends for a second attempt (happens much more often on chutney than normal net):
```
Jul 15 16:30:22.990 [info] connection_ap_handshake_attach_circuit(): Found open intro circ 4275612781 (id: 75). Rend circuit 4061106010
(id: 74); Sending introduction. (stream 0 sec old)
Jul 15 16:30:22.990 [info] send_introduce1(): Sending INTRODUCE1 cell to service 3meybgbnlmca5d46w4kjkyzolkcdubo3mn7a5wppcprvapan7oinjmi
d on circuit 4275612781
Jul 15 16:30:22.991 [info] circpad_setup_machine_on_circ(): Registering machine client_ip_circ to origin circ 75 (7)
Jul 15 16:30:22.991 [info] circpad_node_supports_padding(): Checking padding: supported
Jul 15 16:30:22.991 [info] circpad_negotiate_padding(): Negotiating padding on circuit 75 (7), command 2, for ctr 1
Jul 15 16:30:22.991 [info] circpad_machine_spec_transition(): Circuit 75 circpad machine 0 transitioning from 0 to 1
Jul 15 16:30:22.991 [info] circpad_machine_schedule_padding(): Padding in 4294967295 usec on circuit 75
Jul 15 16:30:22.991 [info] pathbias_count_use_attempt(): Used circuit 74 is already in path state use succeeded. Circuit is a Hidden ser
vice client: Pending rendezvous point currently open.
Jul 15 16:30:23.014 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.062 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.063 [info] handle_introduce_ack_bad(): Received INTRODUCE_ACK nack by $3AEDDA5127E2ABFCC5EE2B470A64AC60FEBC39A6~ [i3korg
rlaRZFTqf3vQC/wT26FoeXhGGylWIn3p83Po0] at 127.0.0.1. Reason: 1
Jul 15 16:30:23.063 [info] circpad_circuit_machineinfo_free_idx(): Freeing padding info idx 0 on circuit 75 (6)
Jul 15 16:30:23.063 [info] circpad_node_supports_padding(): Checking padding: supported
Jul 15 16:30:23.063 [info] circpad_negotiate_padding(): Negotiating padding on circuit 75 (6), command 1, for ctr 1
Jul 15 16:30:23.063 [info] intro_point_is_usable(): Intro point with auth key vi6y0u23BiXbHhFVxADbvjmhOU8B70O/HwoCiUPm1mo had an error.
Not usable
Jul 15 16:30:23.063 [info] hs_client_reextend_intro_circuit(): Re-extending circ 4275612781, this time to $D3514D3562BED4F28837ECCEE3561
724654B17A0~ [IlkMzThwHe1ksPJ7bsPgkLJX+IKvZXwJEf7bSZ9qRq8] at 127.0.0.1.
Jul 15 16:30:23.063 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.063 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.063 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.063 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.071 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.071 [info] circpad_deliver_recognized_relay_cell_events(): Got padding cell on origin circuit 75.
Jul 15 16:30:23.071 [info] circpad_handle_padding_negotiated(): Received STOP command on PADDING_NEGOTIATED for circuit 75
Jul 15 16:30:23.081 [warn] Padding negotiated cell from wrong hop on circuit 75
```George KadianakisGeorge Kadianakishttps://gitlab.torproject.org/tpo/core/tor/-/issues/40456onionservice; HiddenServiceEnableIntroDoS* settings2021-10-14T13:03:31Zcypherpunksonionservice; HiddenServiceEnableIntroDoS* settingsTHis is Documentation problem.
1. I have read all docs and lists.tpo emails but still can't understand what "HiddenServiceEnableIntroDoS" actually do for service operators.
2. The default you're suggesting, 25,200 , is really wrong bec...THis is Documentation problem.
1. I have read all docs and lists.tpo emails but still can't understand what "HiddenServiceEnableIntroDoS" actually do for service operators.
2. The default you're suggesting, 25,200 , is really wrong because my service (email, forum, webchat, and Irc for 6K+ anons) works fine with:
HiddenServiceEnableIntroDoSDefense 1
HiddenServiceEnableIntroDoSRatePerSec 15
HiddenServiceEnableIntroDoSBurstPerSec 60
3. Plz update your blog post to explain clearly what the HiddenServiceEnableIntroDoS* actually do. Does this limit users per seconds?Tor: 0.4.7.x-freezeDavid Gouletdgoulet@torproject.orgDavid Gouletdgoulet@torproject.org