18:00:22 #startmeeting Browser July 20th 18:00:22 Meeting started Mon Jul 20 18:00:22 2020 UTC. The chair is gaba. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:00:22 Useful Commands: #action #agreed #help #info #idea #link #topic. 18:00:27 Pad is in http://kfahv6wfkbezjyg4r6mlhpmieydbebr5vkok5r34ya464gqz6c44bnyd.onion/p/tor-tbb-2020-keep 18:00:28 hi! 18:02:06 please update the statuses. We will wait :) 18:03:25 and add anything you may have to discuss to the agenda 18:06:09 ok. should we start? 18:06:35 good for me 18:06:58 is the board up to date on what everybody is working on ? https://gitlab.torproject.org/groups/tpo/applications/-/boards 18:07:06 are people using this board or finding it useful? 18:07:57 not sure yet :) 18:08:09 i still have some problems adjusting to the gitlab ui 18:08:16 with all the colors and stuff 18:08:56 me too, but I haven't tried as hard as I should 18:09:21 ok 18:09:37 i think it'll be helpful in the future when I don't know what is needed within the next month 18:09:50 but right now, we have an quickly approaching deadline 18:09:51 heh 18:09:52 ok 18:10:03 and we know what is needed in general 18:11:32 okay, reviews 18:12:03 https://gitlab.torproject.org/groups/tpo/applications/-/issues?scope=all&utf8=%E2%9C%93&state=opened&label_name[]=Needs%20Review&assignee_id=None&label_name[]=Sponsor%2058 18:12:11 is empty, so that seems good 18:12:31 all reviews are assigned 18:12:32 nice 18:12:47 does anybody have any review that you think nobody is taking care of? 18:12:54 should i move my tickets which need comments to [review 18:13:01 i plan to look over the Merge Ready items to get them finally merged :) 18:13:15 or we are actively working on them and reviews are just merge requests 18:13:23 antonela: i think pinging folks might be enough? 18:13:28 but i am fine either way 18:13:30 antonela: please do and unassign yourself 18:13:51 but i did not finish 18:13:58 oh 18:14:02 you just need comments 18:14:17 right 18:14:19 Can someone remind me what the protocol is for getting things reviewed? Create an MR and then add Needs Review? 18:14:19 pinging people or comment with their names on it may be good 18:14:21 to focus 18:14:29 mcs: yes 18:14:34 oh, and reassign to the reviewer 18:14:39 yes 18:14:42 right, matt has it in his todo list i bet 18:14:44 I think brade and I missed some steps last week :) 18:14:50 (the MR that is) 18:15:10 yes 18:15:19 so reassign the MR and leave the issue assigned to the patch author? 18:15:43 yes 18:15:49 thx 18:17:02 I don't see anyone requesting help with any tickets/issues 18:17:45 please grab someone's attention if you need during the week 18:18:34 so, discussion topics 18:18:38 we have a few this week 18:18:48 I left the discussion on line 51 from last week there 18:18:55 in case there is any other question about it 18:19:10 yes, thanks 18:19:39 i don't have anything to add on that 18:19:44 good info; thanks 18:20:41 okay, next item 18:20:55 gaba: we should probably go over the tickets you tagged with s58 after the meeting 18:21:01 some are not s58 related 18:21:14 (just to get the milestones right) 18:21:24 yes 18:21:41 some of you may be aware of the discussion that preceded tpo/applications/tor-browser#40033 18:22:13 but, the short summary is that we know there exist some onion services that do not terminate at the onion service 18:22:25 the connection extends passed the onion serices to a remote host 18:22:33 mostly in enterprise onions, right? 18:22:55 the onion service doesn't provide any guarantees about the "onion service" -> "remote web server" connection 18:23:14 :( 18:23:22 sysrqb, are you talking about TLS in Whonix-style scenarios as well as enterprise infra? 18:23:33 if that connection goes over the internet, then a http connection between tor browser and an onion srevice using http may be secure 18:24:04 but if the onion service -> remote server connection is not encrypted in another way, then the http connection is happening over the internet 18:24:08 so fun times. 18:24:25 Jeremy_Rand_Talos: not in particular 18:24:35 gaba: yes, i hope 18:24:50 but i don't know how often an onion service is deployed like this 18:25:09 therefore, we have a problem 18:25:40 where Tor Browser assumes onion services connections are secure 18:25:46 hopefully none of them are deployed where the last link is over the internet with HTTP? :o 18:25:52 sysrqb, so, IMO it's unwise to treat non-TLS onion as secure, because in Whonix style threat models the Tor daemon is in a different trust domain than the application, and onions terminate at the Tor daemon 18:26:04 ahf: there are 18:26:06 (providing authenticity, integrity, and confidentiality) 18:26:14 ok 18:26:16 which is the problem :) 18:26:57 Jeremy_Rand_Talos: if that is in your theat model 18:27:04 then I argue you're doing it wrong 18:27:15 and Tor Browser should have its own tor client 18:27:25 and that client connects to another gateway tor client 18:28:06 using a remote tor client is kinda weird 18:28:45 so, maybe this would be better discusssed at a dedicated meeting 18:29:09 sysrqb, yeah let's defer my comment for later, don't want to hijack the convo :) 18:29:10 and i saw acat snuck a comment onto tpo/applications/tor-browser#40033 just before the meeting 18:29:56 but, given that we know about deployments where an onion service connection should not be considered as a secure channel 18:30:12 we should think about what assumptions we can/should make about onion service connections 18:30:34 and, maybe, what we should start doing such that in the future we can correctly make that assumption 18:30:41 and what we should do in the mean time 18:30:55 because tpo/applications/tor-browser#40033 has usability implications 18:31:36 we have a release next week, and that should (probably) include a fix, of some sort 18:31:53 so maybe i'lltry scheduling a meeting in the next day or two for this 18:32:06 we are supposed to have a release meeting tomorrow 18:32:10 at the same time as today 18:32:11 (we have too many discussion topics today for that) 18:32:26 https://pad.riseup.net/p/tor-browser-release-meeting-keep 18:32:30 oh, true, we can take over the release meeting with this topic 18:32:36 good idgaba 18:32:38 yes 18:32:39 let's do that 18:32:41 *idea 18:32:49 great 18:32:50 do you think we should announce that this meeting its happening tomorrow? 18:32:52 sysrqb: i think we should not waste time to try to get into contact 18:32:59 with the problematic onion services we know 18:33:04 in tor-project or tor-internal@ 18:33:10 maybe we can find a way to fix things together with them 18:33:23 because the problem runs way deeper than just cookies 18:33:32 GeKo: yes, i agree 18:33:37 if we think we need to backout the cookie patch 18:34:02 we should bite the bullet and do not treat *any* http://xxxx.onion as secure 18:34:19 and change the security expectations patch i guess 18:34:24 which has far-ranging usability issues for mixed content and password entering 18:34:35 see #21321 18:34:51 and additionally, #23439 18:35:07 at the end of the day 18:35:22 if http gets strike-through or blocked 18:35:25 * Jeremy_Rand_Talos notes that a potential medium to long term solution is discussed in #33568 18:35:31 http://xxxxx.onion would need too 18:35:45 yes 18:35:54 so, if we want to cross that bridge then we should be ready to burn down that whole thing 18:36:02 which we worked on over the last years 18:36:57 let alone getting all the code ripped out of firefox as we upstreamed everything here 18:37:06 sysrqb, I don't usually attend the release meetings, but if this topic will be covered at this one, I would probably want to attend; what's the timeslot (so I know to keep my schedule open for it)? 18:37:20 Jeremy_Rand_Talos: same time as this meeting 18:37:29 ok, and that's tomorrow? 18:37:33 gaba: but we should make clear our assumptions ues 18:37:37 arg. 18:37:38 yes 18:37:47 gaba: maybe tor-project 18:37:51 ok 18:38:01 done 18:38:10 GeKo: yes, i'm conflicted. 18:38:42 but we should create a plan 18:38:48 for one solution or another 18:38:55 ok. Let's discuss this tomorrow 18:39:22 yeah 18:39:28 There are a few more topics in the agenda and only 20 min more of meeting :) 18:39:34 sysrqb: could you get it going making contact to whomever knows anything about the problematic onion service setups? 18:39:57 i feel we still don't have all the information or possible view points to make a proper decision 18:40:08 GeKo: sure, yes 18:40:22 we have things alec said, yes. but that's it from the server side 18:41:04 yeah 18:41:15 okay. Fenix on Gitlab 18:41:16 are problematic onion services exclusively the ones that have expensive .onion TLS certs? 18:41:31 mikeperry: no 18:42:00 i don't think we know of any others, no? 18:42:04 because, as the argument goes, if the webserver sends a cookie containing a credential over http but sets the secure attribute 18:42:14 then, even though the original channel was not secure 18:42:26 the browser should not echo that cookie over an insure channel in the future 18:42:31 *insecure 18:43:00 but as GeKo said, then the actual problem is not just cookies, but anything that assumes that's a secure connection (e.g. logins) 18:43:13 so, if the browser doesn't know if the onion service is terminated locally or remotely, then it can't make a decision about whether the channel was secure 18:43:21 acat: right 18:43:25 i agree 18:43:52 okay. GitLab 18:44:14 mirroring the fenix repo from github seems reasonable 18:44:22 i know gitlab has a mirroring feature 18:44:29 but i don't know how it works 18:44:34 we have no way right now of automatically updating it, but i was thinking of pulling it over seems like a good start 18:44:46 i also don't know if we want to do it via gitolite? 18:45:00 sysrqb: why would we want to mirror the whole repo and not just create branches as we need them 18:45:08 as we do right now for tor-browser? 18:45:20 true 18:45:43 Fenix hosting on Gitlab :) 18:45:44 we'll create thosee branches manually 18:46:03 so we can simply push the branches onto gitlab directly 18:46:09 the fenix repo does already have a lot of branches in it, including their release branches 18:46:36 and we should maintain signed HEAD git commit 18:46:47 as we plan for the other repos 18:47:26 with a signature someone in tor makes or is that something they provide? 18:47:41 one of GeKo or myself (right now) 18:48:38 cool 18:48:47 ahf: how difficult is setting up CI on gitlab? 18:48:54 very easy! 18:48:59 and the machines that hans came with a beefy 18:49:06 and how heavy can it be? :) 18:49:06 i'd like to run the existing unit tests in fenix (and other android projects) 18:49:21 https://gitlab.torproject.org/tpo/core/tor/-/blob/master/.gitlab-ci.yml 18:49:29 is all it needs to for tor to build on debian 18:49:41 neat, thanks 18:50:08 and the machines have 32 cores and a lot of RAM, so things are moving fast there 18:50:13 while we are starting from a clean place, i'd like to try maintaining the tests in the next projects 18:50:16 and adjusting them as needed 18:50:38 so this is for fenix you are thinking? 18:50:58 yes, and android-componetns, application services, glean 18:51:07 but those can come after fenix 18:51:17 hm, i haven't tried running fenix' test because i have just messed around in the build systems 18:51:27 but maybe if it is very easy to run then it wouldn't be much work to do 18:51:38 sysrqb: and what about tor browser (desktop)? 18:51:48 acat: we want that, too 18:52:06 but i think that is a separate project 18:52:16 and we can run the testsuite locally until then 18:52:43 we could maybe at least have linting (./mach lint) 18:52:57 although we can also run locally, i guess 18:53:24 specifically we need to solve tpo/applications/tor-browser-build#23631 18:53:28 how about i try to move a fenic repo over on gitlab just to see how that goes and try to see if i can do anything useful with it via gitlab ci? i wanted to the first today anyway 18:53:29 acat: that's true 18:53:32 we can try that 18:53:54 ahf: sure 18:54:03 i've run the tests fenix locally 18:54:08 sysrqb: boklm has a good patch for that i think 18:54:12 you just run them on linux sysrqb? 18:54:13 so i can help with getting the config setup 18:54:16 without any emulator or anything? 18:54:25 we get to that ticket after we are done with release migration 18:54:28 ahf: yes, linux 18:54:35 sweet, gonna try that 18:54:37 GeKo: yeah, i haven't looked at it, though 18:54:39 (and are getting rid of wheezy for linux) 18:54:52 but i am happy to see it 18:55:19 ahf: it's only the java/kotlin tests, which are platform independent 18:55:34 i think there are android-specific tests, bu i haven't looked at them yet 18:55:47 oki! 18:56:06 okay, quickly tpo/applications/tor-browser#33962 18:56:27 whose discussion item was DoH? 18:56:29 yeah basically I realized that patch makes it unsafe for ppl to use DoH 18:56:32 but is itself safe 18:56:43 idk if that matters to us but I wanteds to flag it 18:56:59 because I could see ppl on eg tor-talk going yolo to test DoH 18:57:50 can we easily patch out the parallel request? 18:58:07 and it will first break, and then they may decide to flip that pref, and then that becomes unsafe.. and not because DoH itself leaks, but because there's this perf experiment stuff, and some other fallback cases to native 18:58:57 okay 18:59:00 sysrqb: yeah it will be blocked by that pref.. like we could make a separate patch to disable DoH and not have that pref apply to DoH 18:59:13 and then the parallel rerquests would fail due to that patch 18:59:27 can you create a gitlab issue for it? 18:59:47 this is something we should track 19:00:14 ok 19:00:17 in particular, related to tpo/applications/tor-browser#30753 19:00:37 (we missed the "Tor Browser 9" boat) 19:00:39 thanks 19:01:01 we're running a few minutes over time 19:01:11 so i'll end the meeting here 19:01:19 mikeperry: thanks for bringing that up 19:01:22 thanks everyone 19:01:29 o/ 19:01:30 thanks! 19:01:33 thanks 19:01:43 o/ 19:01:58 #endmeeting