Trac issueshttps://gitlab.torproject.org/legacy/trac/-/issues2020-06-13T16:25:57Zhttps://gitlab.torproject.org/legacy/trac/-/issues/2675Cert submission to decentralized SSL observatory2020-06-13T16:25:57ZMike PerryCert submission to decentralized SSL observatoryWe want to provide users with the ability to opt-in to submitting "strange" SSL certificates to the EFF's SSL Observatory. This ticket is just to cover the XPCOM component that submits SSL certs to some web service.We want to provide users with the ability to opt-in to submitting "strange" SSL certificates to the EFF's SSL Observatory. This ticket is just to cover the XPCOM component that submits SSL certs to some web service.Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/2673Get new cert for blog2011-03-09T03:15:36ZMike PerryGet new cert for blogblog.tp.o is in need of a new cert.blog.tp.o is in need of a new cert.Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/2672Fix bugs/issues with consolidate_stats2020-06-13T00:07:00ZMike PerryFix bugs/issues with consolidate_statsQuoting karsten:
I think there's a bug in this script: Whenever we skip a line in a .data file, because that line represents a failure, we might get out of sync with the .extradata file and stop writing any data to .mergedata. You shoul...Quoting karsten:
I think there's a bug in this script: Whenever we skip a line in a .data file, because that line represents a failure, we might get out of sync with the .extradata file and stop writing any data to .mergedata. You should be able to reproduce this bug with the Torperf 50KB run (https://metrics.torproject.org/data/torperf-50kb.data https://metrics.torproject.org/data/torperf-50kb.extradata). The last line in the result has CIRC_ID=4384. If I delete the line in .extradata starting with CIRC_ID=4397, the result has more entries than before. I think the fix is to distinguish between absolute slack of up to 1 second and a time difference of, say, more than 1 minute.
Also, is there a way to include timed out runs in the .mergedata, too? We do include failures, so by including timeouts, we wouldn't have to parse the original files for timeouts/failures anymore. This could be a new ticket, I'd just like to know whether it's possible.Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/2658Update Torbutton Transifex Docs2011-03-21T10:54:56ZMike PerryUpdate Torbutton Transifex DocsAfter doing the .po dance for torbutton with our new transifex setup, runa wants me to update the docs at:
https://svn.torproject.org/svn/translation/trunk/documentation/howto.txtAfter doing the .po dance for torbutton with our new transifex setup, runa wants me to update the docs at:
https://svn.torproject.org/svn/translation/trunk/documentation/howto.txtMike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/2588Release 1.3.2-alpha2020-06-13T00:05:03ZMike PerryRelease 1.3.2-alphaTicket to track the release of 1.3.2-alpha.Ticket to track the release of 1.3.2-alpha.Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/2480Check if intermediate cert store is cleared2011-03-13T00:04:37ZMike PerryCheck if intermediate cert store is clearedWe need to ensure that the cache of intermediate certificates is not shared across Tor states. It should be cleared by our ssl hacks, and/or nsICrypto::logout(). We should verify this.We need to ensure that the cache of intermediate certificates is not shared across Tor states. It should be cleared by our ssl hacks, and/or nsICrypto::logout(). We should verify this.Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/2422Test STS in FF42011-03-21T11:07:55ZMike PerryTest STS in FF4Dan Boneh told us that FF4 implements STS, and that the private browsing mode of Firefox does not in fact reset the STS state for it. We'll need to make sure our SSL state reset rests this.Dan Boneh told us that FF4 implements STS, and that the private browsing mode of Firefox does not in fact reset the STS state for it. We'll need to make sure our SSL state reset rests this.Mike PerryMike Perryhttps://gitlab.torproject.org/legacy/trac/-/issues/1624Use nsICrypto::logout() to clear SSL Session IDs instead of SSLv2 pref hack2011-03-12T21:56:10ZMike PerryUse nsICrypto::logout() to clear SSL Session IDs instead of SSLv2 pref hackApparently there is now a method to clear SSL Session IDs and other crypto data that we can call upon Tor toggle, instead of performing our current brutal hack of toggling security.enable_ssl2.
https://bugzilla.mozilla.org/show_bug.cgi?...Apparently there is now a method to clear SSL Session IDs and other crypto data that we can call upon Tor toggle, instead of performing our current brutal hack of toggling security.enable_ssl2.
https://bugzilla.mozilla.org/show_bug.cgi?id=448747Mike PerryMike Perry