Trac issueshttps://gitlab.torproject.org/legacy/trac/-/issues2020-06-15T23:17:33Zhttps://gitlab.torproject.org/legacy/trac/-/issues/10462Firefox extension "Minimize to Tray Revived" stopped working in the TBB 3 rel...2020-06-15T23:17:33ZcypherpunksFirefox extension "Minimize to Tray Revived" stopped working in the TBB 3 release.It won't install; TBB complains that it is incompatible. When the rdf is edited to allow it to install, depending on the method TBB either complains that Minimize to tray Revived is corrupt (I don't think that is what the edits did, but ...It won't install; TBB complains that it is incompatible. When the rdf is edited to allow it to install, depending on the method TBB either complains that Minimize to tray Revived is corrupt (I don't think that is what the edits did, but I'm not a developer) or it allows it to install just fine, menus are available in the addons manager and accept input and everything, but the extension functionally does nothing. TBB does not minimize to tray.
I need a portable tray solution, I'm not going to drag a bunch of external utilities along on every portable cache, and MTT has always worked just fine. Minimizing TBB to the taskbar is stupid and archaic, I need that space for other things when TBB is minimized.
I don't know if the plugin dev just needs to update (they do have menu options specific to TBB in the addon) or if TBB has broken it. Either way, it sucks.
Tested OS for this ticket thus far is Windows.Tor: very long termErinn ClarkErinn Clarkhttps://gitlab.torproject.org/legacy/trac/-/issues/9755Migrate Tor to libphenom2020-06-13T14:32:01ZcypherpunksMigrate Tor to libphenomlibphenom is supposed to be faster than libevent. https://github.com/facebook/libphenom/commit/c2753c2154a0cffc0bd70e8f28dd0ea884aab4fdlibphenom is supposed to be faster than libevent. https://github.com/facebook/libphenom/commit/c2753c2154a0cffc0bd70e8f28dd0ea884aab4fdTor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/9733Generate statistics about compromise due to traffic correlation with differen...2020-06-13T14:31:57ZAaron JohnsonGenerate statistics about compromise due to traffic correlation with different guard selection and rotation parametersGuards can protect even better against traffic correlation if rotate them slower and/or choose fewer of them. To help decide if these changes are worth it, we should use path simulation and some reasonable adversary models to generate st...Guards can protect even better against traffic correlation if rotate them slower and/or choose fewer of them. To help decide if these changes are worth it, we should use path simulation and some reasonable adversary models to generate statistics about the security that results.Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/9165Evaluate datagram-based transports; build and merge as appropriate2020-06-13T14:30:04ZNick MathewsonEvaluate datagram-based transports; build and merge as appropriateThis is an omnibus ticket to serve as parent for work involving transports other than TLS-over-TCP for client->relay and relay->relay communication. This isn't about pluggable transports for anticensorship purposes; it's about using non...This is an omnibus ticket to serve as parent for work involving transports other than TLS-over-TCP for client->relay and relay->relay communication. This isn't about pluggable transports for anticensorship purposes; it's about using non-TCP mechanisms for better performance.Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/7830UDP over Tor2020-06-13T14:26:08ZproperUDP over TorI am interested to transfer UDP over Tor to the destination server.
https://blog.torproject.org/blog/moving-tor-datagram-transport
What happened to that?I am interested to transfer UDP over Tor to the destination server.
https://blog.torproject.org/blog/moving-tor-datagram-transport
What happened to that?Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/6001Transport IP packets over Tor2020-06-13T14:19:59ZAndrew LewmanTransport IP packets over TorAs listed here, https://www.torproject.org/docs/faq#TransportIPnotTCP, the ability to transport IP would enhance usability and functionality of Tor from a user perspective. Solving the challenges and enabling this will make Tor a more va...As listed here, https://www.torproject.org/docs/faq#TransportIPnotTCP, the ability to transport IP would enhance usability and functionality of Tor from a user perspective. Solving the challenges and enabling this will make Tor a more valuable tor for a wider range of usecases.Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/6000Promote users to relays2020-06-13T14:19:58ZAndrew LewmanPromote users to relaysAs listed here, https://www.torproject.org/docs/faq#EverybodyARelay, we would like to promote users to relays if their client meets certain conditions.As listed here, https://www.torproject.org/docs/faq#EverybodyARelay, we would like to promote users to relays if their client meets certain conditions.Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/5992META: Decentralize directory authorities as far as safely possible2020-06-13T14:19:57ZAndrew LewmanMETA: Decentralize directory authorities as far as safely possibleWe currently rely on a handful of directory authorities and their operators to generate and maintain the consensus of the Tor network. They're also the default place to go for clients to bootstrap into the network. Some research has been...We currently rely on a handful of directory authorities and their operators to generate and maintain the consensus of the Tor network. They're also the default place to go for clients to bootstrap into the network. Some research has been started into replacing the individual directory authorities with anonymity-preserving distributed hash table (DHT) models. Further this work, using simulators and/or private tor networks for handling future growth and expansion of the public tor network.Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/4855Allowing TOR to use LAN and other connections, not only internet2020-06-13T14:16:37ZTracAllowing TOR to use LAN and other connections, not only internetSince the threat of internet censorship, I've been looking for a system that allows connected computers to share data anonymously, and even create 'alternate internets' via mesh networking. I believe this would be a great feature for TOR...Since the threat of internet censorship, I've been looking for a system that allows connected computers to share data anonymously, and even create 'alternate internets' via mesh networking. I believe this would be a great feature for TOR, and wanted to suggest it for a while. This is what I had in mind:
Currently, TOR locates nodes on the internet and sends data between them. My request is making internet no longer be a requirement for TOR, but just one way of connecting. By giving TOR the ability to reach nodes on other computers using any means of communication... including a Local Area Network, WIFI, and maybe even Bluetooth.
There are two reasons why I suggest this. The first is to allow computers without an internet connection (but part of a LAN) to connect using TOR. For instance, let's say an user has been banned by his ISP from using the internet at all (happens in some countries). However, he can still be part of the LAN in his area. One of his neighbors runs a TOR node, which either exits to an internet connection or leads to another TOR node that does. The disconnected user could travel to the exit node from computer to computer, TOR acting as usual from there on.
The second reason is to make TOR usable for 'alternative internets'. This is an idea of the future, but with the fear of censorship I see it coming. Basically, an area of computers which can contact each other could establish its own private network to share data, host websites, etc. without touching the actual internet. But despite not finding any software that can do this (let alone anonymously), users creating an alternate internet could still be persecuted for sharing "illegal data" if they are caught. Using TOR's system, it would be impossible to tell who in the network is hosting what.
How TOR could do mesh networking and private internet: There is a LAN network running multiple computers, none of them connected to the actual internet. One of them wants to host a website accessible to the cloud. He would create a TOR node for that, exiting to the folder where he's hosting his files or website. The user wanting to reach his page would write the IP or URL in his web browser, then TOR would go from node to node inside the cloud, looking for the computer hosting that page. Once it finds it, it establishes a permanent connection, encrypting it using any available nodes it can relay the connection through in that cloud.
In my opinion, TOR would be a great candidate for this, and would allow even more users to connect, share data and evade censorship. It could even combine both ideas... by connecting to a LAN node, then an internet node, then going through another group of LAN computers, etc. TOR could automatically choose the best path to a resource, such as determining if it's located on the internet or a direct device, if to use an internet or a LAN node, etc. So all the user must do is type the URL and have TOR figure where and how to find it. I believe this would extend possibilities greatly, and really hope the idea can be considered.
**Trac**:
**Username**: MirceaKitsuneTor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/4812MapAddress should perhaps work without AllowDotExit2020-06-13T14:16:26ZTracMapAddress should perhaps work without AllowDotExitSebastian irc story is that MapAddress should work without setting AllowDotExit to 1.
Manual page story is that AllowDotExit is extremely dangerous.
This torrc configuration..
MapAddress livelyblog.com livelyblog.com.veronika.exit
Ma...Sebastian irc story is that MapAddress should work without setting AllowDotExit to 1.
Manual page story is that AllowDotExit is extremely dangerous.
This torrc configuration..
MapAddress livelyblog.com livelyblog.com.veronika.exit
MapAddress *.livelyblog.com *.livelyblog.com.veronika.exit
..spews out the following story in tor's log:
[warn] The ".exit" notation is disabled in Tor due to security risks. Set AllowDotExit in your torrc to enable it.
[warn] Invalid onion hostname [scrubbed]; rejecting
MapAddress does not work without AllowDotExit as of todays git. I have not tried other versions.
If Sebastian story about MapAddress should work without AllowDotExit is true then Tor has a bug which could pretty please be fixed.
**Trac**:
**Username**: oyvindsTor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/3678Disallow more than one relay per country in a circuit2020-06-13T17:20:10ZcypherpunksDisallow more than one relay per country in a circuitI have been running the Tor Browser Bundles that use 0.2.2.x tor branch. It seems more and more frequently, 2 of 3 nodes in a circuit are in the same country. My tor prefers Germany and the USA for nodes. I frequently find circuits wh...I have been running the Tor Browser Bundles that use 0.2.2.x tor branch. It seems more and more frequently, 2 of 3 nodes in a circuit are in the same country. My tor prefers Germany and the USA for nodes. I frequently find circuits which start and end in the USA, or start and end in Germany. I would like an option to avoid national surveillance by any one country. I am willing to sacrifice performance for anonymity.
You have the option called EnforceDistinctSubnets that is set to 1 by default. Perhaps EnforceDistinctCountries could be an option.Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/3028META: Support non-clique topologies on the network2020-06-13T14:10:07ZtagnaqMETA: Support non-clique topologies on the networkhttps://lists.torproject.org/pipermail/tor-relays/2011-April/000759.html
See it like a long term feature request :)
(if there is not one yet)https://lists.torproject.org/pipermail/tor-relays/2011-April/000759.html
See it like a long term feature request :)
(if there is not one yet)Tor: very long termhttps://gitlab.torproject.org/legacy/trac/-/issues/1880Enhanced Security Suggestion2020-06-13T14:06:08ZTracEnhanced Security SuggestionCould a random traffic delay be incorporated into the routing algorithm, in order to thwart traffic timing on the nodes. Random packing of data might also be necessary to avoid the detection of packet sizes through the nodes?
**Trac**:...Could a random traffic delay be incorporated into the routing algorithm, in order to thwart traffic timing on the nodes. Random packing of data might also be necessary to avoid the detection of packet sizes through the nodes?
**Trac**:
**Username**: foreverTor: very long term