19:00:06 #startmeeting 19:00:06 Meeting started Mon Jan 19 19:00:06 2015 UTC. The chair is mikeperry. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:00:06 Useful Commands: #action #agreed #help #info #idea #link #topic. 19:00:11 ok, lets get started 19:00:18 Last week, I worked on some non-tbb things, was slowed due to choppy internet seas, and helped Georg organize and release TBB 4.5a3. 19:00:24 This week, my plan is to help with the project coordinator interview process, make sure everything is OK for people to get contracts, and also be distracted by travelling. 19:00:30 There are a few more things I want to merge with respect to release processes, and file some tickets for the next release of the alpha. 19:00:35 Notably I think we should get an omnibox plugin for disconnect.me into the alpha, and switch the Torbutton-based update menu to cause the browser to follow the MAR-based update procedure. According to some of weasel's statistics, a large number of people (especially windows users) are still downloading updates manually: https://www.palfrader.org/volatile/2015-01-14-aTZpQXulSo8/stdin 19:00:41 (Now that we have signed MARs, I think it's safe to start steering people towards in-browser updates for the alpha series). 19:00:45 Relatedly, nickm is looking for TBB people to review https://trac.torproject.org/projects/tor/ticket/10395. It's probably good to have Pearl Crescent take a look at this, to make sure they agree its sane, and understand how we expect to use it. 19:00:51 FYI: I may or may not miss the meeting next monday, depending on how travel goes. I will try to notify everyone, but I may not finish reinstalling my computers by then (crossing borders is such fun!). 19:00:56 That's it for me. 19:02:38 who wants to go next? 19:02:50 I can 19:03:13 so, I was mainly busy doing release related things 19:03:30 then I started testing the Disconnect search plugin 19:03:58 and I filed a bunch of ticket most notably those that make use of ioerro's SocksSocket option 19:04:07 seems to be a good fit for the hardened bundles at least 19:04:13 err ioerror's 19:04:51 then I started a mail for tbb-dev inspired by the private browsing mode discussion in our last dev meeting 19:05:14 I hope it will be ready and starts an in-team discussion 19:05:27 might help for Mike's mail to Mozilla wrt to their fingerprinting plans 19:05:30 we'll see 19:05:45 (oh crap, I have a huge pile of mail to send.. the mail to mozilla about fingerprinting feature control and private browsing mode behavior among them. those mails are all in my TODO list. I should have mentioned that) 19:05:59 next week I plan to work harder on #9387 19:06:22 resume my work on the windows signing given that we have more and more users complaining about issues with win 8.1 19:06:58 I want to take a look at nickm's consensus patch for us 19:07:27 and thought about taking a look at #11236 19:07:38 given that we think about testing the Disconnect plugin 19:07:47 in all locales we ship 19:08:07 if there remains some time I plan to take a look at the double-key cookie patch 19:08:12 that's it for now 19:08:18 What's in the Disconnect plugin? 19:08:37 it's a search plugi, no extension 19:08:38 one of these: http://mycroftproject.com/search-engines.html?name=disconnect 19:08:43 *plugin 19:08:50 to search https://search.disconnect.me/ 19:08:59 Oh, just a search option? 19:09:07 yes 19:10:01 they have something in addons.mozilla.org, too, but that is too heavyweight 19:10:23 and probably does weird things to about:home expecting i to be the homepage, and likely won't help us anyway 19:10:45 ok, who wants to go next? 19:11:00 * MarkSmith can go 19:11:09 This past week Kathy and I made a revised patch for #14122 (thanks to GeKo for merging the fix). 19:11:23 We took another look at #13818 and commented in Trac (short summary: we think the patch attached to that bug should be accepted). 19:11:32 We did a code review for #9701. 19:11:41 We did a little updater testing for 4.0.3 and 4.5a3. 19:11:46 We also started to experiment with running Torbutton, Tor Launcher, etc. in a Firefox that has electrolysis enabled. 19:11:52 Of course various things are broken by post-ESR31 Firefox changes and the fact that we are not running with a patched Tor Browser… so it will take a little time to sort our the e10s issues from other noise. 19:12:02 We will have more to report after we work on it some more. 19:12:07 This week we will review #10395. 19:12:16 (I forgot to ask about that last week, but mikeperry just reminded me.) 19:12:21 It is probably a good idea for us to look at it even though GeKo plans to also review it. 19:12:26 And we will do more e10s research. 19:12:32 That's all for us. 19:12:33 Is it possible to enable electrolysis in the ESR31-based Tor Browser? 19:13:07 MarkSemith: I have no plans to review the patch yet (definitely not without seeing the code ;) ) 19:13:08 I am not sure. SInce e10s is a moving target / work-in-progress, we decided to work with a nightly build (very bleeding edge though). 19:13:26 I just had some comments on the prop 227 in the past and want to see what eventeually got into the code 19:13:40 *eventually 19:14:47 arthuredelstein: I don't think so. IIRC there is too much e10 related code missing in ESR 31 19:14:53 I thought when you said "I want to take a look at nickm's consensus patch for us" that you meant "code review" Now I am confused. 19:15:06 Anyway, Kathy and I will look at it too. 19:15:25 MarkSmith: realistically, e10s may not be of any use for us until FF45ESR, so it may be premature to sink too much time into it now 19:15:36 so you could push that back a bit I think 19:15:45 For e10s, the good news is that our add-ons mostly do not access content pages directly. At least I don't think so. 19:16:10 mikeperry: OK. We did not plan to sink a lot of time but you are right about timing. 19:16:15 at best, it will be optionally enabled in FF38ESR I think, and that probably won't get us much sandboxing benefit at that point unless we're ready to do a lot of backporting 19:17:05 At some point it will be good for all of us to klnow if we will have a lot of work to do or only a little (for e10s). 19:18:02 right. things may also change though as Mozilla adds more e10s glue to support other addons, too though 19:18:30 Agreed. It is definitely a moving target. So we will put it on the back burner. 19:19:14 there are some things in https://trac.torproject.org/projects/tor/query?status=!closed&keywords=~TorBrowserTeam201501 you could pick up instead, and I will be filing that Torbutton Update Menu thing soon 19:19:57 OK. Will the update menu change be for 4.0.x or just 4.5? 19:20:02 just 4.5 19:20:11 Sounds good. 19:20:44 Is #13406 the same issue as the Update Menu? 19:21:47 oh yes, great 19:21:49 MarkSmith: #13900 seems pretty useful as well 19:22:09 as part of our third party isolation thingy 19:22:58 For #13406, we will have to decide how things should work… but we can discuss that in the ticket or later. 19:23:46 We can look at #13900. 19:24:53 * arthuredelstein can go next. 19:24:59 Last week I worked on #13670. I've made progress with both favicons and OCSP, and I hope I can get both caching and network isolation for those two working soon. Also, I'm wondering if we should suggest landing the patch here: https://trac.torproject.org/projects/tor/ticket/8405#comment:25 19:25:04 That's it for me. 19:26:33 * boklm can go next 19:26:40 I think it should somehow make it into mainline 0.2.6 19:27:47 This week I reviewed #10125 19:27:49 I made a patch for the ReleaseProcess file after the #13015 changes: #14212 19:28:00 An other patch to fix the $TORBROWSER_VERSION -> $TORBROWSER_BUILDDIR symlink: #14221 19:28:11 So now we have a different directory for each build, with a symlink $version -> $builddir updated after each build. 19:28:20 In the last comment on #14221, GeKo is wondering if it is a good idea, or if we should switch back to one directory. I am not sure about this. 19:28:36 Today I also fixed some problems in the testsuite that prevented the tests on 4.5a3 to start. They are beeing at the moment (on Linux and Windows). 19:28:46 This week I'm planning to do some improvements on the Windows testsuite. 19:28:53 that's it for me 19:29:09 do we see the test results on Windows somewhere? 19:29:25 there is no mail for it yet, right? 19:29:40 they should be a mail when it finish running 19:29:43 there 19:29:50 ah, okay 19:29:55 and uploaded at the same place as the other results 19:34:44 Regarding #8405, I can comment on the ticket, but I think Nick would be more persuaded to land the patch by a comment from Mike or GeKo. :) 19:35:09 arthuredelstein: I am wondering if maybe we want to exempt our updater pings from domain isolation 19:35:31 we probably actually want those going out over varied circuits 19:35:50 What are they doing now? 19:36:24 Are they running over the "no-first-party" circuit? 19:36:39 Probably that (no-first-party circuit). 19:36:42 they may actually respect domain isolation, which is Ok with 10 minute circuit lifetimes, but perhaps not with https://trac.torproject.org/projects/tor/ticket/13766 19:36:49 I have not checked though. 19:37:34 So the design would be to run over a new circuit with each ping? 19:38:06 Does that force thrashing of circuits for other traffic as well? 19:38:28 arthuredelstein: I think so. perhaps maybe we do this by setting a different nonce for the password field? 19:38:46 Yes, that should work. 19:39:38 Is there a danger in using the same circuit over multiple pings for a long time? 19:40:33 good question: what is the threat model here, mike? 19:40:54 https://bradleyf.id.au/nix/shaving-your-rtt-wth-tfo/ TCP Fast Open (Tor users could benefit from this) 19:41:05 hold-back/freeze attacks from that exit. 19:41:17 mkstn? 19:41:28 federico3: right here 19:41:28 yes 19:41:29 Firefox will complain if it goes a few days without being able to hit the update responses, but using more circuits will also reduce the risk 19:41:48 mkstn: oh, did I got your email address right? 19:42:05 federico3: yep, I got your mail 19:42:18 Just brainstorming: Would a hidden site make sense for the update service? 19:42:56 we discussed that before, and armadev thinks it won't scale yet. we would need the SponsorR scaling+reliability work to be deployed first, probably 19:43:41 I see. 19:45:24 Well, the nonce strategy should work. The only issue is how to get that working with the updater. Possibly the domain isolator could simply recognize the update ping URI(s) as special. 19:46:00 hrm. we may need to think harder about this. we also don't want to let websites perform guard discovery attacks :/ 19:46:13 (see my comment on #7870) 19:47:29 and so we do *not* want to magically exempt https://www.torproject.org/projects/torbrowser/RecommendedTBBVersions with a new nonce, if for example, we website decides to make a ton of