[tor-project] Notes from the Tor Browser team meeting, 4 June 2018
Georg Koppen
gk at torproject.org
Mon Jun 4 19:57:00 UTC 2018
Hi!
We just finished our weekly Tor Browser meeting. The chat log can be
found at:
http://meetbot.debian.net/tor-meeting/2018/tor-meeting.2018-06-04-18.00.log.txt
The notes from our pad are:
Monday, June 4, 2018
Discussion:
sysrqb: Do we want to use the 'status:' updates during the week like
the network team? [GeKo: It seems we like this idea. Need to check with
the network team to not mess with their status updates]
sysrqb: General question: is there an update/timeline on the new
tp.o website? [GeKo: not sure actually]
igt0:
Last Week:
- Updated #1459420 patch (HLS Player doesn't use the centralized
Proxy Selector)
- Still struggling with the Orfox crash, I also contacted Till
from Mozilla (sysrqb: could you give a hand? yes)
- Delivered my talk in the JSConfEU about fingerprinting
techniques and mitigations. [GeKo: Are there slides/a recording
available somewhere?]
This Week:
- More Orfox debugging
- tweak Tor Button to make it work on mobile and initial mobile
UI preparation (we need to think about what we can reuse)
mcs and brade:
Last week:
- Reviewed and tested rebased external helper app patch (part of
#25543).
- Fixed #26235 (Help menu does not open in Tor Browser nightlies
based on ESR60).
- Started working on #22074 (Review Firefox Developer Docs and
Undocumented bugs since FF52esr).
This week:
- File a Bugzilla bug for #25909 (disable updater telemetry)
- Continue with #22074 (Review Firefox Developer Docs and
Undocumented bugs since FF52esr).
GeKo:
Last week:
- continued MAR signing key testing
- finished macOS patches for new toolchain (including all the
other components, not only firefox), nightlies should be available
rather soon
- made progress on the network review
- reviews (#25859, #25650, #26204, #26235)
- sent out 1:1 feedback scheduling mails
This week:
- finish MAR signing testing and come up with a plan for the
changes we need for the next update and how we address them (#26050)
- network review
- more code reviews
- help with the windows changes for esr60
- begin of the month admin stuff, ticket prioritization for next alpha
- I'll be afk on 6/6
sukhe:
Last Week:
- Worked on #26204, #25837, #26073, #26216 (in progress), #26205 (in
progress). Looked at Windows builds of Firefox 60ESR
- Rust build question: what's the purpose of prev_version? Is
there a reason we are using the source tar and not the git?
I am asking because panic-abort.patch fails to apply for the
Windows 32bit build.
I am building on top of master with
https://github.com/azadi/tor-browser-build-1/tree/bug-26204
and
https://gitweb.torproject.org/user/gk/tor-browser-build.git/commit/?h=bug_26250_v2&id=483e1cb6132936a25387ad1fd9d311d18487c49b
merged
[boklm: prev_version is the binary version we use for
bootstrapping the build. panic-abort.patch was made on rust 1.25.0 and
it seems it will need to be rebased on version 1.26.1.]
This week:
- Resume #26126, #26205, #26203 (Windows builds)
tjr
- Ethan, Tim and Gary are back! Had their first couple days. Will sync
up with them this week. (Arthur says: yay!)
- Expect a Tor/Mozilla sync meeting to get scheduled after all-hands,
probably late day Berlin time / early morning USA time
- MinGW Work
- x64 Sandbox work:
https://bugzilla.mozilla.org/show_bug.cgi?id=1461421
- x64 Sandbox with jemalloc:
https://bugzilla.mozilla.org/show_bug.cgi?id=1466192
- Jacek will start on mingw-clang sometime soonish in
https://bugzilla.mozilla.org/show_bug.cgi?id=mingw-clang and children
boklm:
Last week:
- reviewed #26204, #26249, #9711, #25832, #25894, #25554,
#25548, #26195, #26003
- updated #25860 (Clean up OpenSSL's configure options for Windows)
This week:
- finish reviewing #24632 (Update macOS toolchain for ESR 60)
- update HEASLR patch (#12968) and try to inspect the binary to
check if we are good
- start looking at #26050 and #26234 (update "watershed" for
ESR60-based Tor Browser)
- fill upstream binutils ticket for #26148
- continue work on some ansible roles for testsuite VMs setup
(#26149)
pospeselr:
Last week:
- run without /proc patch uplift updates
- seems like #23247 test failures were some intermittent issue
with the ESR60 tryserver, rebased agains latest and test failures went away
- localization approach of pulling strings from tor-button
strings list won't work as is (due to string formatting specifiers)
- problem is modifying that first line which either shows:
- the various HTTPS and encryption properties (uses string
formatters) OR
- scary connection not encrypted message (hard coded string)
- for onion https connections we would need to throw away the HTTPS
info altogether and only display a constant 'onion encryption' message
for the 1st line
- if anyone has thoughts on this I'm all ears
- started work on #26039
(<profiledir>/preferences/extension-overrides.js will not be loaded in
ESR 60)
- took off Friday (and Monday was Holiday)
This week:
- finish up #26039 patch
sysrqb:
- Last week:
Monday was US holiday
Continued work on TBA patches
Looked at Orfox bug
Began dogfooding nightly
- This week:
Rebasing and testting TBA patches on top of Arthur's Tor Browser
patches (#26233)
Looking at Orfox bug some more
arthuredelstein:
- Last week:
Finished a branch for #26233 (Rebase to Firefox 61)
Started work on #14952 (HTTP2 audit and patch)
- This week:
Try to get a patch for review for #14952
Work on #25555 (optimistic socks) and #26128 (noscript/security
slider, possibly in collaboration with sukhe)
Georg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20180604/5c2488e0/attachment.sig>
More information about the tor-project
mailing list