[tor-project] Tor Browser team meeting notes, 16 April 2018

Georg Koppen gk at torproject.org
Tue Apr 17 12:48:00 UTC 2018


Hi all!

Here come the meeting notes from our weekly meeting we had yesterday.

The chat log can be found on

http://meetbot.debian.net/tor-meeting/2018/tor-meeting.2018-04-16-18.09.log.txt

and our pad items are/were:

Monday, April 16, 2018


pospeselr:

    Last week:

    - uplifted patch for #20283 and posted to firefox bug #859782
(https://bugzilla.mozilla.org/show_bug.cgi?id=859782)

    - verified no other syscalls on files in /proc/ need to be fixed for
#20283

    - reviewed #21537, #25721

    This week:

    - finish uplift of #20283 (just need to update the patch with review
feedback)

    - #23247 (.onion padlock states), #25147 (Backport of fix shipped in
Firefox 58.0)

    - probably getting sick since my wife brought back the plague from
Oregon


GeKo:
    Last week:
        - release preparations
        - addressed review feedback for #21537 and #25481 and got both
merged
        - last interview for the android dev position
        - started to work on rust support for macOS (#25779)
    This week:
        - https://bugzilla.mozilla.org/show_bug.cgi?id=1390583 (stylo
build bug for windows)
        - help with the alpha releases
        - code review of #24309
        - fix rust enabled macOS builds (#25779)


mcs and brade:
  Last week:
    - Worked on rebasing Tor Browser updater patches for ESR60 (part of
#25543).
    - Created #25750 (update Tor Launcher for ESR 60).
    - Commented on #25511 (Expose TZ info on control port for better
debugging of time errors).
    - Helped with triage of #25737 (Tor Browser's update check bypassed
Tor once on macos, because of xpcproxy?)
    - Participated in the Android developer interview.
    - Participated in the UX/Tor Browser "sync" meeting.
    - Attended the Snowflake meeting.
  This week:
    - Continue rebasing Tor Browser updater patches for ESR 60.
    - Monitor #25807 (Can not request bridges from torproject.org (App
Engine is broken for moat)).
    - Revisit #25509 (Tor browser tells me "A local proxy is needed when
connecting through a company, school, or university network")


igt0:
    Last Week:
        - Testing fingerprinting and linkability defenses for TBA:
#25703. The last week focus was android ability to open and send data to
external apps.
          - Even if the external-default is false, Orfox(fennec) opens
external apps: #25790
          - Investigating an exception when an malformed android-app
intent is clicked, even when external-default is false.

              - sysrqb: igt0, are you using a fuzzer or manual testing?
(igt0: Manual testing, I am not sure if a fuzzer would help for privacy
related issues, however I am open for ideas :))

        - moved to a new place (was without internet the whole friday :( )
    This week:
        - Keep looking into #25703 (Test linkability/fingerprinting
defenses for TBAndroid).


tjr
  - Have spent a considerable amount of time on working on getting the
x64 version of MinGW running.
    - Most of that time has been spent on getting a debug version with
symbols working actually.
    - Current status: There is a belief from a few folks (ted, binutils)
that there are so many symbols in Firefox I am overflowing 'something'
in gcc with debug information or something.
    - Next step is to start parsing coff format and try to figure it out...
    - I am not sure how much more time I can spend on this...
  - All (or most) fingerprinting work is on hold until Ethan's team
resumes and a plan is determined =/


boklm:
    Last week:
        - reviewed #25481 (Enable rust support in Linux nightlies)
        - setup a new VM for nightly build with more disk space
        - made some ansible scripts to setup nightly builds (#25817)
    This week:
        - help with building the new alpha
        - finish setup of new nightly build VM and enable email
notifications
        - work on fixing testsuite issues
        - investigate binutils reproducibility issue


sysrqb:
    Last week:
        Continued rebasing Orfox patches onto mozilla-central (gecko-dev)
        Updated https-everywhere addon in Orfox (branch is ready, will
update ticket after meeting)
    This week:
        Finish rebasing Orfox patches, testing and ask for review by igt0
        Push some try builds
        Hopefully work on bug1440789 - integrating add-on features in-tree


arthuredelstein:
    Last week:

        Posted patch for circuit display:
https://trac.torproject.org/projects/tor/ticket/24309

        Continued rebasing
https://trac.torproject.org/projects/tor/ticket/25543 (will post branch
soon)

    This week:

    Post rebased patches

    run alpha release build

    Make revisions to #24309 patch as needed

    Look into PointerEvents
https://trac.torproject.org/projects/tor/ticket/25794 (GeKo: #22343
would be neat to see fixed)

    Experiment with a desktop TBB/Firefox 60 build? Figure out what's
still needed


Isabela:
    - need help from Mobile team with report for sponsor8 here is a pad
with more info:
https://storm.torproject.org/shared/fXYsrJU_42qUhjYLyc4Z0myeeXY39ab336XuYaL_Pqv
    - will probably bug geko on sponsor4 final reports to make sure I am
not missing anything (towards the end of the week)
    - this week sync will probably follow up with security controls and
about:tor
    - arthur is helping ux team with user research coordinator
applications :)


Georg

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20180417/874794ff/attachment.sig>


More information about the tor-project mailing list