18:00:06 #startmeeting 18:00:06 Meeting started Mon Aug 18 18:00:06 2014 UTC. The chair is mikeperry. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:06 Useful Commands: #action #agreed #help #info #idea #link #topic. 18:00:22 nickm: (that's the mail asn referred to, not sure if that's the one you were thinking about) 18:00:22 ok, let's get started 18:01:20 so last week, I started working on #12621, as well as cleaning up the getfirstpartyURI error logging 18:01:44 I did another round of edits on the iSEC blog post. waiting to hear from tjr 18:02:30 and then I did a bunch of non-TBB stuff (mostly Android, some gsoc, some literature review) 18:03:03 this week I plan to finish the developer doc and undocumented ticket review for #12621 and post it there 18:03:31 and then start chruning through MikePerry201408R 18:04:17 I might also clean up #7265 18:04:45 the patch is good, but I think it should log always, and log the script URL involved 18:05:19 that's it for me 18:05:53 (I probably will be distracted by more Android things also, fwiw) 18:06:28 always logging seems like a good idea (for consistency and debug-ability) 18:08:33 yeah, I actually tested the patch and it seems like most of the popular canvas using sites (github, riseup's pad, etc) are actually doing it from first-party scrpts. I found some code to log the script URL, so I'll throw that in there too 18:09:47 with this + isis's changes the canvas message should hopefully be a lot easier for normal people to understand, as well as for technical people to dig and find out what is actually happening 18:10:32 oh, though that reminds me 18:10:47 Hopefully some of the recent press attention has raised awareness… I think a lot of sites are accessing canvas when they don't really need to (just a guess though) 18:11:15 MarkSmith: are you aware how the Browser Console handles XUL filtering? should we be worried about XSS attempts when logging URLS and such? 18:11:48 Good question. One of us should look at that issue. 18:11:49 I assume they must do something, but I got a little worried when the control port logging had to use that old deprecated message 18:12:01 err deprecated logging function 18:12:43 If you like, brade and I can dig into that area and report back. 18:12:44 your work in #9516, using logStringMessage() 18:12:46 Or you can. 18:13:13 I think the #9516 issue is caused by Mozilla JSONifying everything. 18:13:36 But we did not trace through all of their code in the debugger. 18:15:29 well I am most worried about this deprecation message: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIConsoleService 18:16:14 both patches use logStringMessage from that service. I am worried that a) we may have issues in FF31, and B) they may do more filtering on the Web Console logging methods 18:16:34 At some point they did the work to route messages submitted via the old API to the new browser console 18:17:12 More filtering (or not) is an unknown to me though 18:18:54 I can try logging some XUL tags and see what happens, and look into the beowser console window XUL 18:19:02 OK; sounds good. 18:19:22 It should be easy enough to try the old and new APIs. 18:22:18 ok. who wants to go next? 18:22:35 * MarkSmith can go 18:22:47 This past week, Kathy Brade and I rebased our browser and builder patches for #4234. 18:22:57 We are now waiting for mikeperry and/or GeKo to review and (if all looks OK) land the changes. 18:23:08 We also sent boklm some info about changes that needed to be made to the script he created 18:23:15 for #12622; he has already made the necessary changes (thanks!) 18:23:28 For Tor Launcher, we landed a fixup for #11199 to improve the "Tor expectedly exited" prompts based on feedback from Lunar (thanks!) 18:23:41 This week we will help land the #4234 changes and look at some other TorBrowserTeam201408 bugs (probably #10804, #11405, and #12444) 18:23:57 That's all for us. 18:26:21 * nickm pipes up to ask for feedback on 8405. arthuredelstein has a patch, and my main question is whether the approach it takes would do what TorBrowser wants. 18:26:37 It would be great to make progress here, and all we need is a tor-controller-protocol API review 18:27:38 * nickm has been begging for feedback since this time last month. 18:29:25 nickm: yes, sorry, that one is bottlenecked on me, and I have been bottlenecked on writing proposals and blog posts. I think I finally have time to look at that this week 18:29:55 ok. are there any tbb-wants tickets that I should be looking at? 18:30:01 arthuredelstein: it looks like there are 3 patches to review there, where one of them has been revised 3 times? 18:30:24 mikeperry: I'm not asking for patch review; I can do that. I only need review on the new interface. 18:31:04 mikeperry: Actually, I think my latest patch is not even there. Please ignore all of those and I'll post the new one. 18:33:01 The new interface I propose is described at https://trac.torproject.org/projects/tor/ticket/8405#comment:17 18:34:23 do you still intend to make use of additional info on STREAM events? or will CIRC events be enough? 18:35:24 I think CIRC events would be enough. Provided we can assume that isolation isn't modified after circuit launch. 18:35:40 Which I think works for Tor Browser circuits. 18:36:49 Most of the time, circuits are built pretty fast, so this is really a cosmetic improvement. The circuit diagrams can already be shown with the existing control port interface. 18:37:03 I need to also make sure your code handles CIRC failure cases and STREAM reattachment OK 18:37:24 that's why I think this might require more thorough review than just looking at the control protocol changes 18:37:33 I need to see how we're using them 18:37:57 Yes, I think STREAM reattachment might be a concern. Is this documented somewhere? 18:37:59 which means reviewing most of the parent/related patches too 18:38:10 I agree 18:39:50 * arthuredelstein can go next 18:39:55 my memory is fuzzy on where it is documented, but in general streams can be DETACHED from one circuit and placed on another one all the way up to SUCCEEDED 18:40:34 As long as the CIRCUITID is available, I think it should work 18:40:38 But I haven't tested that. 18:40:41 and circ construction can fail at any point, and CIRCs can even mysteriously die up to that SUCCEEDED call without affecting much as far as the app is concerned 18:40:57 and Firefox may also retry in some cases even if the circ+stream fail after SUCCEDED 18:42:31 Basically, my patch just monitors CIRC and STREAM events. STREAM gives a Circuit ID, and then Circuit gives node IPs. So I reconstruct a circuit, assuming that the first STREAM on a circuit indicates its "first party" domain 18:43:33 hrm. that assumption may not hold if parts of the page are either cached, or sitting around in a tab long enough for the original circ to get closed.. 18:43:53 If the original circuit gets closed, then we have a new circuit and a new first stream 18:44:19 But indeed if that assumption turns out to be wrong, then the #8405 patch will be cleaner (as well as a cosmetic improvement) because it directly ties the first party domain to the circuit, instread of indirectly through the first stream 18:44:52 but that stream may be for some third party content that is sitting around doing AJAX or something 18:45:18 That's OK, isn't it? We want it attached to the first party domain. 18:45:50 (I just peeked in, haven't read all the backscroll, but can chime in on ctmalloc and coordinate with you, mikeperry, on getting this post out when you're able.) 18:46:13 I guess you're saying, if the first CIRC dies, then a new circuit wakes up and does third-party AJAX. 18:46:46 tjr: ok 18:47:05 arthuredelstein: yes 18:47:42 we probably want some way to tell Tor not to mark circuits dirty in the same way while this is in use 18:48:03 That's a good point. So I think my #8405 proposal fixes the third-party AJAX problem. 18:48:09 it shouldn't really close our circuits until NEWNYM under this mode.. or at least keep them around much longer 18:49:09 Right. 18:51:04 So, on another subject: last week I worked on #12620. I did a first pass through the TB patches and got all but one to compile on ESR31 (https://github.com/arthuredelstein/tor-browser/commits/esr31-port-tmp). This week I'll hope to start carefully testing the patches to confirm that they are working and try to write some unit tests. 18:51:06 I suppose we can just set a higher MaxCircuitDirtiness in our torrc 18:51:27 wow, awesome 18:52:33 Just to be clear, that branch is definitely not ready for use yet. 18:53:19 that's all for me 18:53:46 ok. update that bug with any questions or patch issues 18:53:50 Impressive progress on ESR31 patches! 18:53:55 #12620 18:54:21 Will do. There's a laundry list 18:54:37 thanks! 18:55:08 we also need to make sure to get secondary closer reviewon the DOM storage and canvas patches especially. if memory serves, new APIs were scheduled to be added to those componenets by Mozilla 18:56:20 we'll definitely need to inspect each patch carefully for regressions 19:00:00 arthuredelstein: when you have a branch for which you are interested to see the results of unit tests on each commit, let me know and I can launch a rebuild 19:00:26 thanks. will do 19:00:53 I have a bad habit of asking users to open bug tickets so they can provide the most accurate responses to questions like system information 19:01:07 and they get intimdated and don't open them at all 19:02:29 but it looks like one that I should have opened instead of asking a user to do it is "Can't use proxy with no PTs in Tor Browser 4.0-alpha" 19:03:41 Interestingly, the log message indicated that the port number of his local proxy was incorrect, even though other applications could use it just fine. 19:04:00 I have only seen this one user with this problem. 19:05:16 which OS is he using ? 19:05:30 Windows 7 19:05:42 could it be a firewall issue ? 19:06:15 I asked him to disable his firewall & antivirus, and he said that didn't help 19:09:45 Anyways I will open the bug when I find the ticket again. 19:10:11 ok 19:10:17 * boklm can go next 19:10:26 oh wait 19:10:35 ah 19:10:59 I also wanted to say that I have been bugging helix lately with many questions about Tor Expert Bundle. 19:11:15 She told me it is actually built with gitian. 19:11:43 I built one for the tor alpha release. There hasn't been a Windows Tor alpha in a while 19:12:25 But I didn't know we were making the Windows Tor deterministic. 19:12:59 It'd be cool if I could get access to a build machine so I can experiment with this further (I don't have one) 19:13:02 ah, I am not sure where the descriptors live for the expert bundle. I haven't seen them 19:13:15 tor/contrib/win32build 19:14:58 in tor.git? 19:15:05 I'd actually like to get more involved with this if possible. 19:15:09 Yes. 19:15:46 Wierd, why is browser stuff in the proxy repo? 19:16:17 Or gitian even for that matter. 19:16:42 msvb-lab: well it's not actually the browser. It's tor plus windows packaging. 19:17:05 mttp: Ok, I thought by 'bundle' it included the browser. 19:17:33 it doesn't look like gitian stuff there 19:17:48 yeah, I don't see it either 19:18:10 the other bundle things do 19:18:12 yeah the gitian requirement doesn't seem to be documented at all--that's based only on conversations I've had with Erinn 19:20:42 ok, well I guess we will need to ask helix later 19:20:54 One possibility could be to put non-deterministic Windows alpha tor on the website and then iterate on the deterministic part. It seems like Erinn still had some research questions unanswered about how to best incorporate gitian, so IDK 19:21:11 we have an LXC build machine, but #12237 means that it may not produce matching builds 19:21:20 As the browser meeting even the right place to ask these questions? 19:21:35 s/As/Is/ 19:22:19 mikeperry: is said lxc build bux sufficient for doing devel work? 19:23:16 I want to dust off my obfs4 patch to tbb in preperation for deployment and it'd be nice if I could save the vm setup time 19:25:44 yes, I can give you guys accounts on that machine. though you probably shouldn't trust it :/ 19:25:58 lxc needs way more sudo access than kvm 19:26:50 yeah less a matter of trust and more "I want something I can use to update a set of msotly done descriptors" 19:27:32 mostly done with the obfs4 code changes I wanted to do so tbb integration and packaging it for bridge operators is next on my todo list 19:27:35 The ideal solution is me saving up enough for a nice machine of my own. In the mean time though, access to resources is appreciated. 19:28:17 the 4.0 alpha branch has the go stuff from meek and uses tor 0.2.5.x right? 19:28:34 I have successfully built TBB on AWS EC2. Again, not a trustworthy machine, but works in a pinch if you're desperate 19:29:24 worst comes to worst I could install ubuntu on one of my extra laptops or setup the vm stuff again, but neither of those options are ideal :/ 19:29:28 also I promise not to do anything malicious or sinister 19:29:45 i solemnly swear i am up to no good 19:30:34 Yawning: yes, 4.0 uses 2.5.x and meek 19:30:45 excellent, should be mostly smooth then 19:32:31 ok, I added making accounts in my TODO file. email me an ssh key you'd like to use 19:33:30 By the way, cookie tester has a prototype http://docookie-europalab.rhcloud.com/#setsimple_page 19:33:36 Might complement or be replaced by XPCShell style in the long run (for testing.) 19:34:01 For now it suits the purpose of figuring out when a cookie flow is correct. 19:34:07 mikeperry: thanks <3 19:35:48 msvb-lab: is this for #3246? 19:35:55 That's right 3246. 19:37:15 Even Live HTTP headers wasn't easy to sort out, and we don't want HTTPS or keepalive rambles mucking up testing. 19:38:47 I'll be more vocal once it's in production and #3246 gets coded again to produce a new (not rebased) patch. 19:40:20 ok, yeah, that was my next question.. how to test this, and against what 19:40:55 Against a canonical baseline, with use case scenarios according to Dan Witte's documented logic. 19:41:00 Kind of http://docookie-europalab.rhcloud.com 19:46:18 ok, well let me know when we can test this and what we should look for 19:46:45 boklm: you've been waiting for a while. ready? 19:46:49 yes 19:47:02 Last week I made a few changes to the update responses script for #12622 19:47:11 I tried a build using the bug4234-02 branch within user/brade/tor-browser-bundle.git (from #4234), which produced some .mar files 19:47:52 I made it possible in the testsuite to define some tests as known issues, so we can use it to ignore the meek binaries which are not PIE, with a bug number as reference to be displayed on the results page 19:48:16 This week I plan to look at the mozilla mochitests included in firefox, to run them as part of our test suite 19:48:42 that's it for me 19:50:54 mochitests will be very useful. We'll be able to write our own JS fingerprinting regression tests. 19:51:28 yeah 19:52:10 I've written on in https://trac.torproject.org/projects/tor/attachment/ticket/2874/0001-fixup-Bug-2874.-Remove-the-Components-shim-introduce.patch 19:52:12 *one 19:52:43 nice :) 19:53:17 ok, anyone else? 19:53:57 mikeperry: were your changes to getfirstpartyURI() revealing of anything? 19:54:06 Can't check myself, since Internet is fried in Munich today. 19:54:40 favicons seem to always fail for that API 19:54:50 as do some cases where sites are creating about:blank 19:55:05 that latter bit is very concerning. we'll need to dig into that more 19:55:33 https://gitweb.torproject.org/user/mikeperry/tor-browser.git/commitdiff/6d893177ee16b1305967319186e2d4506f9848d9 19:55:43 I will be merging that into the next 4.0-alpha release 19:57:10 I think that's it, then? man, we ran long today 19:57:24 I can update on ctmalloc 19:57:32 I'll be quick :) 19:57:34 ah, ok, yes please do 19:57:47 I got it working! 19:58:00 you got my mail with the updated blog post, yes? 19:58:04 awesome! 19:58:27 The next thing I need to do is a) test it on all OS's b) do a performance comparison and c) improve it so it takes advantage of the partitions 19:58:47 I didn't actually get the mail, but I checked your transient link and it looks good to me 19:59:07 I will push the report to gihub, you can publish your blog post, and then we'll publish ours? 20:00:44 shall I link to your post? can you email me a copy? 20:01:42 I will email you my draft, but I can't publish my post until I have the link to your post. :-p 20:02:19 deadlock ;) 20:02:46 emailed. I will push the report to our github so you can link to it when you tell me to 20:03:05 heh, and I need a link to the final report to publish my blog post. lots of deadlock :) 20:03:33 I can do that before (iSEC) does the blog post 20:03:59 our blog post will be at https://blog.torproject.org/blog/isec-partners-conducts-tor-browser-hardening-study 20:04:48 Okay, I think we're pretty set, should I push the report (but not blog post) then? 20:04:54 we also found https://gcc.gnu.org/wiki/vtv while looking into hardening options btw 20:05:04 possibly a better solution than the vtable final thing? 20:05:31 Uh, we had recommended that... :-p 20:05:50 VTV and VTable final are independent of each other, they're both good ideas 20:07:37 Is it possible to force Tor to publish a specific TorHS to *all* available HSDir of the network? 20:09:14 oh, hrmm, I didn't see the VTV rec. anyways, it sounds like we're ready to go. I should be able to post this later today/tomorrow 20:10:26 I think we're finally done for the meeting then? 20:12:03 alright, *baf* time 20:12:10 #endmeeting *baf*