[tor-project] Tor Browser team meeting notes, 5 Feb 2018
Georg Koppen
gk at torproject.org
Mon Feb 5 20:33:00 UTC 2018
Hi!
Here are the meeting notes for the Tor Browser meeting which just finished.
The transcript can be found at:
http://meetbot.debian.net/tor-meeting/2018/tor-meeting.2018-02-05-18.59.log.txt
And here are the entries from our pad:
Monday, February 05, 2018
Discussion:
-sessions for the meeting days
-next meeting
boklm (maybe afk during meeting):
Last week:
- worked on some patches for:
- #25111: Don't compile Yasm on our own anymore for Windows
Tor Browser
- #24995: include git hash in tor --version
- #20892: use sha256sums-signed-build.txt in
download_missing_versions
- started opening sub-tickets for #18867 (Ship auto-updates for
Tor Browser nightly channel)
- started doing some rsyncs to upload nightly builds to
nightlies.tbb.torproject.org, but rsync from an .onion seems to be too
slow to rsync everything in less than a day
- was at FOSDEM this weekend
- afk most of this monday
This week:
- fix the https-everywhere test from our testsuite
- work on #18867 (Ship auto-updates for Tor Browser nightly channel)
- try to fix upload of builds to nightlies.tbb.torproject.org
mcs and brade:
Last week:
- Commented on some of "our" bugs that are listed in Arthur's
Uplift Tracker.
- Debugged and fixed #25089 (Special characters not escaped in
proxy password).
- Helped a little with #25099 (Update nightly version number).
- Reviewed the fix for #22794 (Don't open AF_INET/AF_INET6
sockets when AF_LOCAL is configured).
- Did some bug triage, e.g., #25064 (Don't record update history).
- Did a little work on #23136 (Moat integration):
- Discussed backing out the SOCKS optimistic data patch.
- Pinged dcf about creating a new meek tag for us.
- Pinged isis regarding the problem where BridgeDB is
not returning any bridges.
Planned for this week:
- Review the updated patch for #22794 (Don't open
AF_INET/AF_INET6 sockets when AF_LOCAL is configured).
- For #23136 (Moat integration):
- Assist Isis as needed with the "no bridges returned" bug.
- Request review of Tor Launcher's Moat client
implementation.
- Review gk's proposal for redesigning the security controls.
- Plan Rome travel.
- Triage the Tor Launcher bug list (set priorities, close
outdated tickets).
sysrqb:
Last week:
- Ran many Try builds using master and TBA branch and corrected
failures
- I'd like to patch tor-browser.git with some small changes so
Try builds are nearly the same as official Tor Browser builds
- I don't have much to discuss, but is there a reason for
not doing this?
- Started `step 0` of Tor Launcher integration
- Built a test package, but I still need to test it
- Chatted with Arthur about Tor Launcher in TBA and the current
Tor Launcher proposal
This week:
- Update #19675 (Merge Orfox patches into tor-browser) with
current status and next steps
- Write a design proposal (with igt0) for TBA (in general)
- Decide what the minimal viable product should be for shipping TBA
- Should we ship with tor-launcher on mobile or should we
release a version that still requires Orbot?
- Isa, is the UX team working on designs for mobile, like a
Tor Launcher flow?
igt0:
Last week:
- Did few updates in the Tor Button Proposal (I still need to
add more info about language importer):
https://storm.torproject.org/shared/YzB0w-EaaSIeD8jHszY5MiyeGG7s3Br4RcTwc0FU-U3
- Update the commit message and rebased with the latest tor
button version #25013
- Ported the code from #25013 to the mobile
browser(https://github.com/igortoliveira/tor-browser/tree/tor-button-mobile)
(it doesn't work yet because the button does not exists, so
the gettorbutton method doesn't work)
Geko, Arthur: are we going to move the tor circuit to the
address bar? (and what about the new identity?) [Arthur says: yes --
this is #24309 and #24918][It's not decided yet what to do with New
Identity but it's more a general thing, not site-specific. Thus, I am
inclined to not move it to the address bar but have maybe an own button
for it on the toolbar given it's importance - GeKo]
This week:
- Add the tor button icon in the mobile menu so i can keep
integrating the tor button extension into Orfox
- Add the language importer in the #25013
Geko, mcs: What about the
https://trac.torproject.org/projects/tor/ticket/25126 ? do we have a
design document or should we make the current page responsive?
tjr
Still working on Timer Fuzzing, but think I have a real path forward now
Sandbox almost uplifted:
gk: Can you remind me/refresh me on what the Sandbox Exports thing
is? [That's a suggestion I got from bobowen to avoid mingw-related
crashes on win32; they said to me that this is a thing that will be
deprecated in the future IIRC and that's fine to take a different code
path - GeKo]
Bug people may be interested in:
https://bugzilla.mozilla.org/show_bug.cgi?id=1435780
pospeselr:
Last Week:
patch for #22794
This Week:
Firefox patch uplift
Sync with Pari's spreadsheet
arthuredelstein:
Last week:
Worked on uplift
https://bugzilla.mozilla.org/show_bug.cgi?id=1433357
https://bugzilla.mozilla.org/show_bug.cgi?id=1432983
https://bugzilla.mozilla.org/show_bug.cgi?id=1432983
https://bugzilla.mozilla.org/show_bug.cgi?id=1432905
https://bugzilla.mozilla.org/show_bug.cgi?id=1433517
https://bugzilla.mozilla.org/1330467 (wrestling with weird bug in
rebase)
Looked into what locales we can add (#20628).
Made some comments about security slider issues
Discussed tor-launcher strategy with sysrqb
This week
Continue uplift
Try to fix https://bugzilla.mozilla.org/1330467
Continue rebasing to mozilla-central
Yet another revision for Save As bug (#22343)
isabela
Was sick most of last week.
Got the extension for sponsor4 negotiated (also added 2 small tasks,
so we could receive remaining funds from this grant)
Working on sponsor8 report (late cuz i was sick) - will follow up
with mobile team after meeting
hopefully meet this wed and catch up on the circuit display work
GeKo:
Last week:
-worked on #21777 and made little progress
-wrote a patch for the .onion mixed content blocking
-debugged sandbox related crashes on 64bit systems
-thought a bit about Vista crashes with 7.5 (#25112)
This week:
-work harder on #21777
-fix tests for the .onion mixed content blocking and put ticket
in needs_review
-further debug sandbox related crashes on 64bit systems
Georg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20180205/69bb3a40/attachment-0001.sig>
More information about the tor-project
mailing list