18:59:40 #startmeeting TorBrowser meeting 30 November 2020 18:59:40 Meeting started Mon Nov 30 18:59:40 2020 UTC. The chair is sysrqb. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:59:40 Useful Commands: #action #agreed #help #info #idea #link #topic. 18:59:42 hello! 18:59:59 Pad: https://pad.riseup.net/p/tor-tbb-2020-keep 19:00:53 o/ 19:00:55 o/ 19:04:09 hi all :) 19:04:11 o/ 19:07:03 I see updates on the pad from most people 19:08:18 let's start with the Boards 19:08:22 https://gitlab.torproject.org/groups/tpo/applications/-/boards 19:10:37 Okay, maybe going through each board is not worthwhile 19:11:08 but does anyone want to talk about anything on their board, or how they should prioritise their tickets? 19:12:12 Maybe this is simly best as a reminder that everyone should keep their boards updated 19:14:48 okay, the boards and issue/MR assignments look okay 19:15:39 the only announcement/reminder I have is that we have the first android alpha version based on FF84 scheduled for this friday 19:15:48 and we are still on track for that 19:16:45 the only discussion item I have is regarding our plan for setting https: as the default (and warning before loading a http: website) 19:17:23 what is your estimated timeline for it? 19:17:29 the most recent pan we discussed was enabling this in an alpha version ASAP and then begin testing in as many regions as posisble 19:17:37 antonela: yep :) 19:17:42 but 19:18:36 after I began looking at the work needed for backporting the version Mozilla released in Firefox 83 for Tor Borwser (based on Firfox 78esr) 19:18:48 we found that is a large amount of changes needed 19:19:10 and we can use the HTTPS Everywhere EASE mode and modify that UI 19:19:16 but that is non-trivial work, too 19:19:40 and then last week GeKo tried a more reasonable approach 19:19:53 and suggest that instead of backporting Firefox patches or modifying EASE 19:20:06 * antonela anxious about the 3rd position 19:20:17 Any reason to not just use EASE until newer Firefox is used everywhere? Enabling EASE is just a pref or something similar, isn't it? 19:20:34 (Are there UI issues in EASE? I use it all the time and never noticed problems.) 19:20:51 we concentrate on moving all platforms on the rapid release and pick up the Firefox https-only mode automatically 19:20:58 love it 19:20:59 after the rapid release tranistion is stablized 19:21:07 yes, they are Jeremy_Rand_Talos 19:21:37 but, that means we likely don't release this as stable until the middle or end of next year 19:22:05 9.5 is a good target? 19:22:07 becase we won't finish the transition for TB 10.5 19:22:13 antonela: is that "anxious" in a positive way? that word has in my english often just a defensive/negative meaning 19:22:13 ay 10.5 19:22:18 nah, i think that is too ambitious 19:22:20 yes yes, positive 19:22:24 was eating my nails 19:22:26 cool 19:22:28 haha 19:22:32 haha 19:22:36 hahaha 19:22:41 so, we would target TB 11 19:22:57 whenever we decide on a release date for that 19:23:07 well, i guess we could even postpone that decision 19:23:21 looking how experiment goes 19:23:28 sounds good for me, do you think the alpha can be ready earlier? 19:23:30 and I agree with GeKo that this is probablyu the most reasonable plan, given everything else we are doing 19:23:37 just to run experiments before it 19:23:38 how fast we can remove to rapdid release for the other plaforms 19:24:00 or whether we would be cool with shipping a feature not on all platforms from the start 19:24:01 antonela: yes, i hope we will start having alphas around spring time 19:24:15 after or before 10.5? 19:24:19 s/remove/move/ 19:24:43 antonela: we could start with mobile this week :) 19:24:44 antonela: i'm not sure right now 19:24:56 heh, sure 19:24:59 GeKo: that'd be awesome actually 19:25:01 hahaha 19:25:02 oki 19:25:04 good to know 19:25:14 well, it's just a pref flip away 19:25:16 android doesn't have a good UI, but we can try it 19:25:19 yeah 19:25:29 nah has this one open https://gitlab.torproject.org/tpo/ux/research/-/issues/19 19:25:39 if tba happens, please let her know so we can call for testing 19:25:59 antonela: yeah, i that was one reason I wanted to discuss this topic today 19:26:02 maybe we should wait there too 19:26:19 -i 19:26:53 i'll think about enabling it on android this year 19:27:06 i don't think this week is the best idea :) 19:27:14 (android alpha) 19:27:22 no :) 19:27:52 but doing that in two weeks for the alpha does not seem to be unreasonable to me 19:27:59 yeah 19:28:16 that is cool 19:28:18 and then whenever we have linux ready etc. 19:28:36 and then eaach platform inherits that pref flip when we move it onto the new branch 19:28:57 sounds good 19:30:00 does anyone else have comments or concerns about this plan? 19:30:11 lets say we launch TBA tomorrow with https-only enabled in 2 security levels, how we prefer user to report feedback? should we think in a prompt? should we include a link in the error page to trigger an email to frontdesk? 19:30:17 * antonela poor frontdesk 19:30:38 you dont need to answer me now but some ideas in the ticket would be appreciated 19:31:04 so it's just going to be on safer/safest by default? 19:31:30 antonela: the usual avenues? blog, bug tracker, irc? 19:31:41 mailing lists... 19:31:55 yes.. but i was wondering if having something in the app will help 19:32:27 is the goal learning which websites don't support https? 19:32:52 dunqan: for a start, yes 19:33:30 sysrqb: mmm no, but you might like numbers 19:33:50 GeKo: gotcha 19:35:01 yeah, hrm 19:35:16 lets think about it, i dont need an answer now now 19:35:31 has the error flow been discussed already? 19:35:32 i'll think about what information will be most helpful 19:35:35 (for http only pages) 19:35:50 dunqan: no, not outside of using the error page in Firefox 19:35:50 regular call for testing in tor-qa + a contact to global south partners is a good start 19:36:00 yeah 19:36:19 dunqan: there is an important edge case where the exit node in the current cuircut is malicious 19:36:31 and it stripped the redirect to the https page 19:36:55 so we may want to encourage the user to reload the page with a new circuit 19:37:00 (new circuit for this site) 19:37:23 but we can't easily distinguish between this attack and a website that doesn't support https 19:37:47 right, I see 19:37:54 sysrqb, any reason not to automatically try a new circuit a couple times? Would it put too much load on the relays? 19:38:09 so we should think about how we include this as a suggestion, but not scare users away from every http site 19:38:26 Jeremy_Rand_Talos: only engineering time 19:38:35 ah ok 19:39:56 sysrqb: might be less invasive, though, all in all given all the ux engineering to decide between attack or not 19:40:29 * Jeremy_Rand_Talos ponders maybe filing a ticket about automatically trying a new circuit if any kind of TLS error happens, including but not limited to "only non-TLS HTTP available" 19:40:55 s/invasive/engineering-time-costing/ 19:41:03 * Jeremy_Rand_Talos sees TLS handshake errors fairly often, which go away with a new circuit 19:41:41 we could implement it relatively easily in a web extension (or using the webextension API) 19:42:05 but i'm not sure where we should put something like this on the roadmap for the entire feature 19:42:36 i don't think this needs to be part of the "MVP" 19:43:03 maybe for the stable release? we can start with the alphas as it is... 19:43:30 but if dunqan (and/or antonela) think they can mock useful UIs with this feature, then we can think about how to implement it 19:43:59 good stuff, we will need a ticket tho or take over the current one 19:44:06 yup, feel free to throw a ticket my way! 19:44:09 or, maybe this feature means we don't need to change the UI as much 19:44:25 because any malicious exit node will be autoamtically routed around 19:44:36 okay, we'll think more about this 19:45:06 we somehow discussed this flow here https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40209 19:45:49 yep, it is a similar problem 19:46:58 and the https-only mode should mostly replace the cryptocurrency feature 19:48:11 and we can consider keeping the warning message on http sites afterward 19:48:51 my take away there is: we should encourage users to raise their security level (that might raise other problems but per-site sec settings could help) 19:49:00 anyways, good problems to think about :) 19:49:24 sysrqb, as an aside, seems like the cryptocurrency feature might make more sense as a crypto feature. I.e. it seems like PGP and Signify keys should be considered untrustworthy in the same way as Bitcoin addresses 19:50:15 Jeremy_Rand_Talos: that's an interesting idea 19:50:40 But if TLS is soon going to become mandatory, then yeah, it becomes less of an issue anyway 19:50:48 Jeremy_Rand_Talos: can you add a comment on the ticket? 19:51:05 sysrqb, yeah sure, I'll add a comment later today 19:51:10 thanks 19:52:09 any final thoughts on this? 19:53:23 alright 19:53:35 thanks everyone, have a good week 19:53:45 #endmeeting