[tbb-dev] Feedback on design decision for Tor Launcher
Linda Naeun Lee
linda at torproject.org
Tue Feb 28 17:43:00 UTC 2017
On 2017-02-27 16:18, teor wrote:
>> On 28 Feb 2017, at 09:55, Mike Perry <mikeperry at torproject.org> wrote:
>>
>> Mark Smith:
>>> On 2/21/17 5:02 PM, Mike Perry wrote:
>>>> Now that we do have an updater, I actually think that an optional
>>>> "Try
>>>> Everything!" button that tests all PTs (and fetches new PT bridges
>>>> from
>>>> a BridgeDB API via domain fronting) will definitely be safer than
>>>> what
>>>> we have now, and I think it is also likely that some form of
>>>> optional
>>>> automation (after a proper user warning) is likely to beat out
>>>> anything
>>>> that requires more decision points or interactions.
>>>>
>>>> One hard part will be figuring out how to best provide the choice of
>>>> using automated PT testing to the user, and describe the risks.
>>>>
>>>> Another hard part will be deciding which things to include in the
>>>> automated testing: the public tor network, provided bridges, bridges
>>>> from BridgeDB, or some subset/combination. Which of these things we
>>>> include in the test will change the user's risk profile with respect
>>>> to
>>>> the categories you mentioned at
>>>> https://trac.torproject.org/projects/tor/wiki/doc/TorLauncherUX2016#Designconsiderations
>>>
>>> Another consideration is "How much help can we realistically expect
>>> to
>>> get from the network team?" Kathy and I are skeptical that automated
>>> trial/error/timeout PT configuration will work well without some
>>> changes
>>> to tor. I think a strong argument can be made that in the long run
>>> that
>>> kind of probing should be built into tor. For example, without
>>> adaptive
>>> timeouts for fast vs. slow networks it will be difficult to have Tor
>>> Launcher complete an automated probing process efficiently. If things
>>> are too slow, users will give up.
>>
>> This specific problem sounds like it will have UX consequences if we
>> have automation or not. Without automation, users have to manually try
>> a
>> bridge, wait for it to fail, and then enter a new one. With
>> automation,
>> we can at least say "This may take a while. Go have some coffee"
>> rather
>> than hold the user hostage.
>>
>> Also, I think that exposing a hidden Tor pref to lower the initial
>> bootstrap timeouts just for this automation test should be a simple
>> change.
>
> There are already multiple torrc options for this: some modify various
> timeouts, others modify the rate at which we fetch directory documents
> after we connect.
>
> However, they are untested, and some values are known to cause
> bootstrap
> failures.
>
>> However, I grant that there may be other technical issues with
>> automation that could surprise us. It is risky to promise that it will
>> work well. Do you know of any other bootstrap issues or control port
>> weirdness that may cause problems with automating? Do you expect there
>> to be lots of surprises?
>
> I worry that on very slow connections, reducing timeouts will cut off
> users who would have previously had a working configuration.
Hmm, interesting.
There are strategies to get users to wait! We could show them an
informational video, give them a tour of the security features, or
something like that (all of which are nice-to-have things I would have
worked on way later).
> We've had issues in the past with IPv6 support: while the major ones
> are fixed in 0.3.0 (and always worked via IPv6 bridges), there may
> still be some remaining bugs.
>
> I had been considering automatic client selection of IPv4/IPv6, as
> OnionBrowser (iOS) currently uses their own automated selection process
> so they can pass Apple's IPv6-only tests. We should design this in such
> a way that it's extensible if we want to try multiple bridges and PTs.
>
> T
>
> --
> Tim Wilson-Brown (teor)
>
> teor2345 at gmail dot com
> PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
> ricochet:ekmygaiu4rzgsk6n
> xmpp: teor at torproject dot org
> ------------------------------------------------------------------------
--
Current Key: https://pgp.mit.edu/pks/lookup?search=lindanaeunlee
GPG Fingerprint: FA0A C9BE 2881 B347 9F4F C0D7 BE70 F826 5ED2 8FA2
More information about the tbb-dev
mailing list