Hi, everyone,
This is my Status report for June 2022.
As usual, my focus in June was on supporting Russian-speaking users of
Tor Browser on various channels: Telegram, IRC, and email.
1. User support
Overall:
537 tickets were successfully resolved!
- Telegram channel (@TorProjectSupportBot): 407
- Email (frontdesk@tpo): 130
The majority of requests were censorship-related - bridges and
troubleshooting around them. But there were issues with TB not working
on Windows 10 and proxy server bug [1]
2. Migration
The migration to the new cdr.link instance happened at the end of June
[2]. I tested the new one final instance after it became our main one.
So I shared my experience of 5 months of using the cdr.link for tech
support [3], which was positive. During the discussion, a few good ideas
came up - to use the tag system from the start and to communicate with
the users that we deleted all the previous data, so they need to
re-share background info with us.
So now, this channel is published on the Tor Project website [2] and is
open to any user regardless of the language.
3. Hackweek
Taking part in Hackweek, I started to gather useful information on the
countries with a high risk of censorship events, the work I plan to
continue.
[1]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40536
[2] https://gitlab.torproject.org/tpo/tpa/team/-/issues/40592
[3] https://gitlab.torproject.org/tpo/community/support/-/issues/40084
[4] https://support.torproject.org/misc/bug-or-feedback/
Hi Everyone,
I believe tomorrow is an official Tor holiday, so we will move the Tor Browser weekly meeting back a
day to Tuesday (2022-07-05) at 1100 UTC in #tor-meeting on OFTC IRC.
best,
-Richard
Hi everyone!
Here is my status report for June 2022.
At the beginning of the month, I finished reviewing, reordering, and
improving our patch set [0], as part of the work for S131.
Then, I merged other changes I had worked on during the past months: the
offline manual is now a thing, and we also merged the new mechanism to
deal with the .securedrop.tor.onion domains. With it, we could remove
HTTPS Everywhere from the desktop version of TBB.
All these changes are available in Tor Browser 11.5a13.
Some other minor changes I have been working on will be available in the
next release (possibly, the first stable of Tor Browser 11.5).
The latest issues I have been working on are about fonts. We want to
improve script support in Tor Browser [1], at least on Windows and
Linux. macOS will have to wait because we found an issue with bundled
fonts [2], which turned out to be an upstream problem [3], for which I
proposed a patch to Mozilla.
Please, let us know if the pages in your language are not rendered or
rendered incorrectly in Tor Browser.
Finally, the last week has been hackweek at the Tor Project.
I joined the project to improve support for pluggable transport in Tails.
Thanks,
Pier
[0]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commits/tor-br…
[1]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/30589
[2]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41004
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1774413
Hi!
Tomorrow at 1600 UTC we will have the presentation of what different
teams worked on during this hackweek. It will be in the same BBB room
https://tor.meet.coop/gab-dpb-9zt-7tq
Friday July 1st at 1600 UTC
ROOM: https://tor.meet.coop/gab-dpb-9zt-7tq
see you there!
gaba
--
pronouns she/her/they
GPG Fingerprint EE3F DF5C AD91 643C 21BE 8370 180D B06C 59CA BD19
Summary: headers in GitLab email notifications are changing, you may
need to update your email filters
# Background
I am working on building a development server for GitLab, where we can
go wild testing things without breaking the production
environment. For email to work there, I need a configuration that is
separate from the current production server.
Unfortunately, the email address used by the production GitLab server
doesn't include the hostname of the server (`gitlab.torproject.org`)
and only the main domain name (`torproject.org`) which makes it
needlessly difficult to add new configurations.
Finally, using the full service name (`gitlab.torproject.org`)
address means that the GitLab server will be able to keep operating
email services even if the main email service goes down.
# Proposal
This changes the headers:
From: gitlab(a)torproject.org
Reply-To: gitlab-incoming+%{key}(a)torproject.org
to:
From: git(a)gitlab.torproject.org
Reply-To: git+%{key}(a)gitlab.torproject.org
If you are using the `From` headers in your email client filters, for
example to send all GitLab email into a separate mailbox, you WILL
need to make a change for that filter to work again. I know I had to
make such a change, which was simply to replace
`gitlab(a)torproject.org` by `git(a)gitlab.torproject.org` in my filter.
The `Reply-To` change should not have a real impact. I suspected
emails sent before the change might not deliver properly, but I tested
this, and both the old emails and the new ones work correctly, so that
change should be transparent to everyone.
(The reason for that is that the previous
`gitlab-incoming(a)torproject.org` address is *still* forwarding to
`git(a)torproject.org` so that will work for the foreseeable future.)
# Alternatives considered
## Reusing the prod email address
The main reason I implemented this change is that I want to have a
GitLab development server, as mentioned in the background. But more
specifically, we don't want the prod and dev servers to share email
addresses, because then people could easily get confused as to where a
notification is coming from. Even worse, a notification from the dev
server could yield a reply that would end up in the prod server.
## Adding a new top-level address
So, clearly, we need two different email addresses. But why change the
*current* email address instead of just adding a new one? That's
trickier. One reason is that I didn't want to add a new alias on the
top-level `torproject.org` domain. Furthermore, the old configuration
(using `torproject.org`) is officially [discouraged upstream][] as it
can lead to some security issues.
[discouraged upstream]: https://docs.gitlab.com/ee/administration/incoming_email.html#security-conc…
# Costs
N/A, staff.
# Approval
This needs approval from TPA and tor-internal.
# Deadline
This will be considered approved tomorrow (2022-06-30) at 16:00 UTC
unless there are any objections, in which case it will be rolled back
for further discussion.
The reason there is such a tight deadline is that I want to get the
development server up and running for the Hackweek. It is proving less
and less likely that the server will actually be *usable* *during* the
Hackweek, but if we can get the server up as a result of the Hackweek,
it will already be a good start.
# Status
This proposal is currently in the `proposed` state.
# References
Comments welcome by email or in issue [tpo/tpa/team#40820][].
[tpo/tpa/team#40820]: https://gitlab.torproject.org/tpo/tpa/team/-/issues/40820
--
Antoine Beaupré
torproject.org system administration
Hi all!
I also have a super last-minute hackweek proposal: a docs hackathon!
There's two parts to this proposal:
1) Updating our web- and wiki-based documentation where it needs to be
updated, adding to it where it's incomplete, and opening tickets for
changes that should be made at some point (but that we maybe don't have
time/energy for right now)
2) Finding a replacement for gitlab wikis. Gitlab wikis only allow
contributions from repository developers
(<https://gitlab.torproject.org/tpo/tpa/gitlab/-/issues/76>), and the
restrictions of the wiki are starting to become a quality-of-life issue
for some teams. Ideally we'll find a replacement that fixes our issues
without introducing new ones :p
Basic familiarity with gitlab and wiki software (as an admin or user) is
useful. Being able to update lektor pages is also helpful, though not
required!
If you're interested in helping out, feel free to add yourself to the
pad and stop by #hackweek-docshackathon-2022 on OFTC!
Kez