Hi everyone!
We have new bundles available with a Tor release candidate (0.2.3.20-rc) and new Tor Browser Bundles with a Firefox crash fix applied. Please try to give us feedback within the next 36 hours at a maximum, but we'd sincerely appreciate feedback before that because we really want to get the release candidate widely tested as soon as possible. Windows testing is especially important, as the 0.2.3.x tor client has not had very much exposure to that platform yet.
You can find the alpha bundles themselves for Linux, Mac OSX, and Windows at: https://people.torproject.org/~erinn/qa/alpha/torbrowser/
In the parent directory you can also find an obfsproxy build, which would also be useful to report feedback for: https://people.torproject.org/~erinn/qa/alpha/obfsproxy/
You have until Aug 9th 2012 13:00 UTC to test and report back before we commit to releasing the current build. As this deadline approaches, if you notice a particular platform that hasn't been tested, please give it a quick spin if you can.
Please email this list directly with results or if you have any questions. Keep in mind that an email saying "I tested TBB on Debian Wheezy and found no bugs" is just as useful as a list of issues. I think my own personal favorite response format so far was: https://lists.torproject.org/pipermail/tor-qa/2012-June/000004.html but as always feel free to innovate and improve on that. Note: I'm pretty sure we don't need your specific CPU string, only x86 vs x64.
For testing ideas, see the BuildSignoff wiki page and the TBB design document for information about different types of tests you can perform: https://trac.torproject.org/projects/tor/wiki/doc/build/BuildSignoff#Documen... https://www.torproject.org/projects/torbrowser/design/#Testing
In particular, the crash bug from the last alpha appeared on http://ip-check.info/ and http://news.bbc.co.uk.
Thank you for helping us make the Tor Browser Bundle better. Again, please don't hesitate to email if you have questions. If you have any suggestions on things we can do better, please let me know.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
You don't have permission to access /~erinn/qa/alpha/torbrowser/tor-browser-gnu-linux-x86_64-2.3.20-alpha-1-dev-en-US.tar.gz on this server.
[TBB tor-obfsproxy-browser-2.3.20-alpha-1_en-US on Windows 7 x64 with MSE 1.131.1638.0] 1. TBB Launches successfully - Success 2. Connects to the Tor network - Success 3a. Browser toolbars and menus work - Success 3b. Tab dragging works - Success 4. All extensions are present and functional - Success 5. Web browsing works as expected 5a. http://samy.pl/evercookie - Success 5b. http://html5demos.com/web-socket - Failure 5c. http://www.you tube.com/watch?v=8LsxmQV8AXk - Success 5d. https://ip-check.info/ - Success 5e. http://analyze.privacy.net/ - Success 5f. http://ha.ckers.org/mr-t/ - Failure: "It appears you are not using Tor" 5g. https://torcheck.xenobite.eu/index.php - Success 5h. http://www.dnsleaktest.com/ - Success
[TBB tor-browser-2.3.20-alpha-1_en-US on Windows 7 x64 with MSE 1.131.1638.0] 1. TBB Launches successfully - Success 2. Connects to the Tor network - Success 3a. Browser toolbars and menus work - Success 3b. Tab dragging works - Success 4. All extensions are present and functional - Success 5. Web browsing works as expected 5a. http://samy.pl/evercookie - Success 5b. http://html5demos.com/web-socket - Failure 5c. http://www.you tube.com/watch?v=8LsxmQV8AXk - Success 5d. https://ip-check.info/ - Success 5e. http://analyze.privacy.net/ - Success 5f. http://ha.ckers.org/mr-t/ - Failure: "It appears you are not using Tor" 5g. https://torcheck.xenobite.eu/index.php - Success 5h. http://www.dnsleaktest.com/ - Success
For both tests, I noticed that when I first ran TBB, the homepage URL would be https://check.torproject.org/?lang=en-US&small=1&uptodate=1 which indicates that the latest TBB is running. Subsequent loads will lead to the URL https://check.torproject.org/?lang=en-US&small=1&uptodate=0, and the message "There is a security update available for the Tor Browser Bundle." will be displayed.
This should finally be fixed. Next time I swear I will remember to test download before posting.
We'll extend the deadline to 24 hours from now: Aug 9th, 17:00 UTC.
Also, here is a list of sha256sums signed by Erinn: https://people.torproject.org/~erinn/qa/alpha/shasums-0.2.3.20-rc.txt.asc
Use 'gpg --verify shasums-0.2.3.20-rc.txt.asc' to verify the signature.
Thus spake tagnaq (tagnaq@gmail.com):
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
You don't have permission to access /~erinn/qa/alpha/torbrowser/tor-browser-gnu-linux-x86_64-2.3.20-alpha-1-dev-en-US.tar.gz on this server.
-----BEGIN PGP SIGNATURE-----
iF4EAREKAAYFAlAhg4MACgkQyM26BSNOM7ZsGAEAs2aDUZZdP1y8LFSfgghVTKO7 R1nnyjsQHuNjBIgTk6YA/3oM1fAd/XCgjKPF2qMJ84FBrl7FzOrBsa2nDIEpMXwd =OuYE -----END PGP SIGNATURE----- _______________________________________________ tor-qa mailing list tor-qa@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-qa
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
minor problem: #6483
The security message is irritating (I assume it is wrong): "There is a security update available for the Tor Browser Bundle."
"New Identity" browser restart is a *lot* faster than it used to be, great.
Thank you for the signature file.
Testing: tor-browser-gnu-linux-x86_64-2.3.20-alpha-1-dev-en-US.tar.gz Platform: Fedora 17 Processor: Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz
TBB Launches successfully - OK Connects to the Tor network - OK Browser toolbars and menus work. Tab dragging works. - OK DNS - No leaks observed (wireshark)
All extensions are present and functional - OK - HTTPS-Everywhere 3.0development.5 - NoScript 2.5 - TorButton 1.4.6
WebBrowsing works as expected - OK - HTTP, HTTPS, .onion browsing works - HTML5 videos work - ip-check.info - OK - samy.pl/evercookie - OK (new identity clears cookie) - html5demos.com/web-socket - Not Connected / Socket Closed
Other issues - None
On Tue, Aug 7, 2012 at 3:51 PM, Mike Perry mikeperry@torproject.org wrote:
Hi everyone!
We have new bundles available with a Tor release candidate (0.2.3.20-rc) and new Tor Browser Bundles with a Firefox crash fix applied. Please try to give us feedback within the next 36 hours at a maximum, but we'd sincerely appreciate feedback before that because we really want to get the release candidate widely tested as soon as possible. Windows testing is especially important, as the 0.2.3.x tor client has not had very much exposure to that platform yet.
You can find the alpha bundles themselves for Linux, Mac OSX, and Windows at: https://people.torproject.org/~erinn/qa/alpha/torbrowser/
In the parent directory you can also find an obfsproxy build, which would also be useful to report feedback for: https://people.torproject.org/~erinn/qa/alpha/obfsproxy/
You have until Aug 9th 2012 13:00 UTC to test and report back before we commit to releasing the current build. As this deadline approaches, if you notice a particular platform that hasn't been tested, please give it a quick spin if you can.
Please email this list directly with results or if you have any questions. Keep in mind that an email saying "I tested TBB on Debian Wheezy and found no bugs" is just as useful as a list of issues. I think my own personal favorite response format so far was: https://lists.torproject.org/pipermail/tor-qa/2012-June/000004.html but as always feel free to innovate and improve on that. Note: I'm pretty sure we don't need your specific CPU string, only x86 vs x64.
For testing ideas, see the BuildSignoff wiki page and the TBB design document for information about different types of tests you can perform:
https://trac.torproject.org/projects/tor/wiki/doc/build/BuildSignoff#Documen... https://www.torproject.org/projects/torbrowser/design/#Testing
In particular, the crash bug from the last alpha appeared on http://ip-check.info/ and http://news.bbc.co.uk.
Thank you for helping us make the Tor Browser Bundle better. Again, please don't hesitate to email if you have questions. If you have any suggestions on things we can do better, please let me know.
-- Mike Perry
tor-qa mailing list tor-qa@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-qa
Testing: tor-obfsproxy-browser-gnu-linux-x86_64-2.3.20-alpha-1-dev-en-US.tar.gz Platform: Fedora 17 Processor: Intel(R) Core(TM) i5-2450M CPU @ 2.50GHz
TBB Launches successfully - OK Connects to the Tor network - OK Browser toolbars and menus work. Tab dragging works. - OK DNS - No leaks observed (wireshark)
All extensions are present and functional - OK - HTTPS-Everywhere 3.0development.5 - NoScript 2.5 - TorButton 1.4.6
WebBrowsing works as expected - OK - HTTP, HTTPS, .onion browsing works - HTML5 videos work - ip-check.info - OK - samy.pl/evercookie - OK (new identity clears cookie) - html5demos.com/web-socket - Not Connected / Socket Closed
Other issues - None
Testing: TorBrowser-2.3.20-alpha-1-osx-i386-en-US.zip Platform: Mac OS 10.6 x86
TBB Launches successfully - OK Connects to the Tor network - OK Browser toolbars and menus work. Tab dragging works. - OK
All extensions are present and functional - OK - HTTPS-Everywhere 3.0dev5 - NoScript 2.5 - TorButton 1.4.6
Plugins: - Shockwave flash is present but disabled. - No other plugins found.
WebBrowsing works as expected - OK - HTTP, HTTPS browsing works - HTML5 videos work - samy.pl/evercookie - OK (new identity clears cookies) - html5demos.com/web-socket - Not Connected / Socket Closed - news.bbc.co.uk - No crash
Summary: No issues found. Ship it!