14:01:24 #startmeeting Community team meeting 14:01:24 Meeting started Mon Mar 7 14:01:24 2022 UTC. The chair is emmapeel. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:01:24 Useful Commands: #action #agreed #help #info #idea #link #topic. 14:01:32 thanks, emmapeel 14:01:47 hello people, bear with me, ggus is afk this week and i will chair 14:01:55 the pad is here: https://pad.riseup.net/p/tor-community-team-2022-keep 14:01:58 o/ 14:02:11 please update the pad with your updates for the week ^ 14:02:13 welcome to the community team meeting, please add your updates to the pad, and when you are ready we can start 14:02:19 yes, exactly, thanks championquizzer 14:02:33 we are also lacking on discussion topics for this week, so feel free to add! 14:07:03 ok, are we ready? 14:07:27 ready :) 14:07:42 yes! 14:08:05 done! 14:08:21 ey, lets move some stuff to the discussions, do you want to discuss more stuff? 14:08:48 i will start with an announcement, that on Wednesday i will explain how the localization process works in Tor Project 14:08:57 at the All-Hands 14:09:22 looking forward to it 14:09:31 yes looking forward to it! 14:09:38 do you have any announcements, or updates that you would like to share? 14:10:44 raya[m]: can you explain the problem with https://forum.torproject.net/t/probleme-avec-le-proxy/1542/9 ? championquizzer is the forum expert here but others may be able to help 14:11:08 yes of course, so this user is facing an issue connecting to Tor via the Android browser 14:12:19 great idea to ask about the screenshot, raya[m]! 14:12:46 thank you! I was confused at first what their error was 14:13:09 I tried advising following what's written here: 14:13:09 https://support.torproject.org/it/connecting/connecting-4/ 14:13:37 sorry English link: https://support.torproject.org/connecting/connecting-4/ 14:14:02 I guess I'm wondering how to guide them to change the port they're connecting with 14:14:15 Would it be through TBA settings, or OS settings? 14:14:58 i (still) think it's likely the issue when you launch urls into TBA from other apps 14:15:19 the thing is Tor doesn't bootstrap on it's own 14:15:31 for me, many times i need to close tor browser and connect again 14:15:34 yeah exactly 14:15:44 also note: the user doesn;t have the 'onion' icon on the status bar 14:16:06 I asked them to check about that but didn't get a reply from them, will ask again! 14:16:21 so...they will probably need to have Tor bootstrapped 14:16:35 and the app minimized before launching links into the browser 14:16:47 thanks, raya[m] ..i will also follow up on that one :) 14:17:40 will reply to them now asking them to close the browser, open it, connect to the network, then try to access the site. will also tell them to lookout for the onion icon on the status bar 14:17:52 thanks everyone and thanks championquizzer :) 14:18:28 the thing is that after a while not browsing, the tor connection stops, but the browser stays 'open'. andthe link fails 14:18:34 yep 14:18:54 recent version of android are pretty aggressive with apps running in the background 14:19:12 s/version/versions 14:19:27 hehe ... 'green computing!' 14:19:59 ok, any more updates? 14:20:09 ey rhatto, what is OnionGroove? nice name! 14:20:34 what is it for? 14:21:18 emmapeel, glad you liked the name heh :) 14:21:52 im working in a specification for a tool to ease onion services deployment, monitoring and management 14:22:06 oh nice! 14:22:40 more onions por favor! 14:22:44 its intended initially for the sponsor 123 project, but we considered that would be nice to make a generic tool instead of keeping customized code 14:23:47 rhatto: cool! it will make for example ssl easily configurable? 14:24:05 or onion-location? 14:25:30 emmapeel, yes, the idea is to simplify the setup... right now its relativelly easy to setup an .onion, but if you want to make it with high availability and other goodies its a bit harder and involves lots of steps and different applications, like onionbalance, the vanguards addon, manually getting a TLS certificate... not to say about setting up monitoring 14:25:54 im now editing the initial brainstorming here: https://gitlab.torproject.org/rhatto/oniongroove/-/blob/feature/specs/docs/specs.md 14:26:28 and here is the proposed partial topology: https://gitlab.torproject.org/rhatto/oniongroove/-/blob/feature/specs/docs/specs.md#topology 14:27:09 despite all internal complexity, the idea is to pack everything in a single tool with a clean configuration format 14:28:13 * championquizzer likes the oniongroove avatar too! :) 14:28:17 rhatto: is looking great, thanks for sharing! 14:28:42 hahahaha the avatar is great 14:28:53 it's super cool :) 14:29:48 ok, people, do not be shy, lets do some announcements 14:30:01 i hope to finish the initial specs ASAP and submit it to the community for evaluation / get feedback so we have a quick iteration 14:30:26 emmapeel, i like the avatar too! it's part of the concept :) 14:30:53 just ping me if you have questions/suggestions/references/etc about oniongroove and .onions in general :) 14:31:40 #info ping rhatto if you have questions/suggestions/references/etc about oniongroove and .onions in general :) 14:31:54 i hope that works... 14:33:15 i have a question actually, what's the possibility of creating short links for .onion urls? maybe to make them memorable. this was a question asked in the mailing list and i got curious about it! 14:34:16 raya[m], thats an important question and its about thats getting more and more attention recently 14:34:36 raya[m]: i dont know if the services that shorten URLs allow .onion tlds. but i think many people that runs .onions do not want them indexed, and if you use a URL shortener, you are letting the shortening service know about each of your visits... 14:35:21 raya[m], if I understood correctly your question, those short links are called Onion Names - https://securedrop.org/news/introducing-onion-names-securedrop/ 14:35:47 ah ok, that looks better 14:35:59 ah yes! 14:36:20 that's pretty cool :) 14:39:03 yes, currently this is implemented via rulesets at the tor browser, so while someone is browsing something.securedrop.tor.onion its the actual long .onion address thats being accessed 14:39:58 theres and ongoing effort to integrate this directly at the tor browser since the web extension (HTTPS-Everywhere) is about to be deprecated - https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40458 14:40:37 https-e deprecated :O that's news! 14:41:10 oh it's native in browsers now 14:41:15 reading about it :) 14:41:58 https://www.eff.org/deeplinks/2021/09/https-actually-everywhere 14:42:16 i believe that enhance the Onion Names feature (using rulesets of some other mechanism) + make TLS certs generation for .onions easier are two of the most important things to discuss around onion services right now 14:43:30 aha 14:43:46 yeah, who else apart of securedrop has them? 14:44:23 and who is in charge of reviewing / verifying the names ? 14:44:33 we should document this better on our side 14:45:21 i.e. how you can get an Onion Name for your onion service 14:46:10 emmapeel, i agree about the docs 14:46:26 I think for SecureDrop it's Freedom of the Press that's in charge of them 14:46:50 right now i believe that only secure drop is maintaining those rules and that it arrived as an experimental feature / partnership 14:47:16 at the same time, i dont know if right now its worth documenting that since the workflow might change soon 14:47:31 yes, and that documentation explain how to get a subdomain .securedrop.tor.onion if you have a secure drop onion. 14:47:57 but it does not tell how to get bbc.tor.onion or *.emmapeel.tor.onion 14:48:02 perhaps we should wait till this feature settles and is intended to be widespread before attempting to write some docs about "how to get my short onion name" 14:48:12 i see 14:49:21 the big question right now is how to identify/attest that .emmapeel.tor.onion actually belongs to emmapeel, a problem similar to how certificate authorities handle TLS certs 14:50:32 yeah 14:51:27 ok, we have 9 minutes and then another meeting happens here. 14:51:56 wow time is mercyless :/ 14:52:14 rhatto: luckily we have the other channels to keep talking! 14:52:24 * gman999 is sorry.. but in another $work meeting 14:52:32 but we would not want the meetbot to work too much, poor bot 14:52:55 rhatto: thanks for the updates! very helpful 14:53:00 is such a poor bot, it doesn't have SSL! 14:53:35 championquizzer, :) 14:54:39 ok, lets start wrapping up then. any more comments, about onion-names, or something else? 14:55:10 all clear :) thank you rhatto, this clears out a lot of fog 14:56:44 ok, i would like to finish with a big hug to all the women everywhere for the International Day of Women! 14:57:42 Thank you, emmapeel Hugs! 14:57:42 <3 14:57:52 big hugs! 14:58:26 thanks all <3 ..have a great week! 14:58:32 #endmeeting