commit fc0c8ed76346f2bb0b4d139ca444cbc404df5d07
Author: Georg Koppen <gk(a)torproject.org>
Date: Tue Mar 31 07:33:51 2015 +0000
Fix small typo in comment
---
src/modules/tor-control-port.js | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/modules/tor-control-port.js b/src/modules/tor-control-port.js
index e4c7d16..de9f10a 100644
--- a/src/modules/tor-control-port.js
+++ b/src/modules/tor-control-port.js
@@ -606,7 +606,7 @@ event.messageToData = function (…
[View More]type, message) {
// __event.watchEvent(controlSocket, type, filter, onData)__.
// Watches for a particular type of event. If filter(data) returns true, the event's
-// data is pass to the onData callback. Returns a zero arg function that
+// data is passed to the onData callback. Returns a zero arg function that
// stops watching the event.
event.watchEvent = function (controlSocket, type, filter, onData) {
return controlSocket.addNotificationCallback(new RegExp("^650." + type, "i"),
[View Less]
commit 6f5b6ea7b976c678ac1032378653f3dc286582e0
Author: Arthur Edelstein <arthuredelstein(a)gmail.com>
Date: Fri Mar 27 20:34:34 2015 -0700
Bug #15472: Make node text black in circuit status UI.
---
src/chrome/skin/tor-circuit-display.css | 11 ++++++-----
1 file changed, 6 insertions(+), 5 deletions(-)
diff --git a/src/chrome/skin/tor-circuit-display.css b/src/chrome/skin/tor-circuit-display.css
index 004a68f..fc18f05 100644
--- a/src/chrome/skin/tor-circuit-display.css
+++ b/…
[View More]src/chrome/skin/tor-circuit-display.css
@@ -1,16 +1,16 @@
/*
-This CSS file is for styling the tor circuit display. It consists of a title,
+This CSS file is for styling the tor circuit display, which consists of a title,
a domain, and a bulleted list.
Each bullet in the circuit node list is supposed to represent a Tor circuit node,
and lines drawn between them to represent Tor network inter-relay connections.
-CSS for line between bullets is Derived in part from https://jsfiddle.net/5JP8Q/
-
-Color the background to make circuit display distinct from the rest of popup.
+CSS for line between bullets is derived in part from https://jsfiddle.net/5JP8Q/
*/
-/* The circuit-display div encloses all other HTML elements. */
+/* The circuit-display div encloses all other HTML elements.
+ Color the background to make circuit display distinct
+ from the rest of the popup. */
div#circuit-display {
background-color: #e8f4f4;
font-family: Arial;
@@ -40,6 +40,7 @@ div#circuit-display p#domain {
ul#circuit-nodes {
font-family: Arial;
font-size: 14px;
+ color: black;
margin-top: 8px;
padding-left: 8px;
padding-right: 8px;
[View Less]
commit 71e3da38a123fed8c240311f3aec90fd632234a3
Author: Mike Perry <mikeperry-git(a)torproject.org>
Date: Fri Mar 27 17:12:53 2015 -0700
Fix word order on security slider notification.
Sorry, translators :/.
---
src/chrome/locale/en/torbutton.properties | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/chrome/locale/en/torbutton.properties b/src/chrome/locale/en/torbutton.properties
index ef1723e..ca048df 100644
--- a/src/chrome/locale/en/…
[View More]torbutton.properties
+++ b/src/chrome/locale/en/torbutton.properties
@@ -55,7 +55,7 @@ torbutton.popup.confirm_plugins = Plugins such as Flash can harm your privacy an
torbutton.popup.never_ask_again = Never ask me again
torbutton.popup.confirm_newnym = Tor Browser will close all windows and tabs. All website sessions will be lost.\n\nRestart Tor Browser now to reset your identity?\n\n
-torbutton.slider_notification = The green onion menu has now a security slider which lets you adjust your security level. Check it out!
+torbutton.slider_notification = The green onion menu now has a security slider which lets you adjust your security level. Check it out!
torbutton.slider_notification_button = Open security settings
torbutton.maximize_warning = Maximizing Tor Browser can allow websites to determine your monitor size, which can be used to track you. We recommend that you leave Tor Browser windows in their original default size.
[View Less]
commit 351ecc463ff860e617e690ec709e80ec76f0be53
Author: Mike Perry <mikeperry-git(a)torproject.org>
Date: Fri Mar 27 13:01:45 2015 -0700
Bug 15482: Restrict circuit lifetime extension to SOCKS-auth streams.
That way people's non-TBB activity won't be affected.
---
gitian/patches/bug15482.patch | 36 ++++++++++++++++++++++--------------
1 file changed, 22 insertions(+), 14 deletions(-)
diff --git a/gitian/patches/bug15482.patch b/gitian/patches/bug15482.patch
index …
[View More]5250fe4..df8a156 100644
--- a/gitian/patches/bug15482.patch
+++ b/gitian/patches/bug15482.patch
@@ -1,29 +1,37 @@
-From a9c7e6dc3508e78f4b296e38603dd34174e2a14c Mon Sep 17 00:00:00 2001
+From 748414784f71126b093aa7466908e00f71a7b046 Mon Sep 17 00:00:00 2001
From: Mike Perry <mikeperry-git(a)torproject.org>
-Date: Thu, 26 Mar 2015 22:38:45 -0700
-Subject: [PATCH] Bug 15482: Don't abandon circuits that are still being used
- by TBB.
+Date: Fri, 27 Mar 2015 12:57:37 -0700
+Subject: [PATCH] Bug 15482: Don't abandon circuits that are still in use for
+ browsing.
-Reset timestamp_dirty every time we get a new stream request so that circuits
-are not abandoned while still in use.
+Only applies to connections with SOCKS auth set, so that non-web Tor
+activity is not affected.
+
+Simpler version of Nick's patch because the randomness worried me, and I'm not
+otherwise sure why we want a max here.
---
- src/or/circuituse.c | 6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
+ src/or/circuituse.c | 11 +++++++++--
+ 1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/src/or/circuituse.c b/src/or/circuituse.c
-index d0d31ad..fff46cd 100644
+index d0d31ad..6cce4bf 100644
--- a/src/or/circuituse.c
+++ b/src/or/circuituse.c
-@@ -2264,8 +2264,10 @@ connection_ap_handshake_attach_chosen_circuit(entry_connection_t *conn,
+@@ -2264,8 +2264,15 @@ connection_ap_handshake_attach_chosen_circuit(entry_connection_t *conn,
base_conn->state = AP_CONN_STATE_CIRCUIT_WAIT;
- if (!circ->base_.timestamp_dirty)
- circ->base_.timestamp_dirty = time(NULL);
-+ /* For Tor Browser, we want to avoid surprising the user by giving up on
-+ * circuits while they are still being used, so we always reset the
-+ * dirtiness timestamp. */
-+ circ->base_.timestamp_dirty = time(NULL);
++ if (!circ->base_.timestamp_dirty) {
++ circ->base_.timestamp_dirty = approx_time();
++ } else if ((conn->entry_cfg.isolation_flags & ISO_SOCKSAUTH) &&
++ (conn->socks_request->usernamelen ||
++ conn->socks_request->passwordlen)) {
++ /* When stream isolation is in use and controlled by an application
++ * we are willing to keep using the stream. */
++ circ->base_.timestamp_dirty = approx_time();
++ }
pathbias_count_use_attempt(circ);
[View Less]
commit be94df05ea2c58a34e4084b74b653f277a136a44
Author: Mike Perry <mikeperry-git(a)torproject.org>
Date: Fri Mar 27 00:03:17 2015 -0700
HTTPS-Everywhere is so easy to forget. Maybe because it works so well?
---
Bundle-Data/Docs/ChangeLog.txt | 1 +
1 file changed, 1 insertion(+)
diff --git a/Bundle-Data/Docs/ChangeLog.txt b/Bundle-Data/Docs/ChangeLog.txt
index 40833da..f27632f 100644
--- a/Bundle-Data/Docs/ChangeLog.txt
+++ b/Bundle-Data/Docs/ChangeLog.txt
@@ -4,6 +4,7 @@ Tor …
[View More]Browser 4.5a5 -- Mar 31 2015
* Update OpenSSL to 1.0.1m
* Update Tor to 0.2.6.6
* Update NoScript to 2.6.9.19
+ * Update HTTPS-Everywhere to 5.0
* Update meek to 0.16
* Update Tor Launcher to 0.2.7.3
* Bug 13983: Directory search path fix for Tor Messanger+TorBirdy
[View Less]