[tor-project] Tor Browser team meeting notes, 5 Feb 2018

Georg Koppen gk at torproject.org
Mon Feb 5 20:33:00 UTC 2018


Here are the meeting notes for the Tor Browser meeting which just finished.

The transcript can be found at:


And here are the entries from our pad:

Monday, February 05, 2018

    -sessions for the meeting days
    -next meeting

boklm (maybe afk during meeting):
    Last week:
        - worked on some patches for:
            - #25111: Don't compile Yasm on our own anymore for Windows
Tor Browser
            - #24995: include git hash in tor --version
            - #20892: use sha256sums-signed-build.txt in
        - started opening sub-tickets for #18867 (Ship auto-updates for
Tor Browser nightly channel)
        - started doing some rsyncs to upload nightly builds to
nightlies.tbb.torproject.org, but rsync from an .onion seems to be too
slow to rsync everything in less than a day
        - was at FOSDEM this weekend
        - afk most of this monday
    This week:
        - fix the https-everywhere test from our testsuite
        - work on #18867 (Ship auto-updates for Tor Browser nightly channel)
        - try to fix upload of builds to nightlies.tbb.torproject.org

mcs and brade:
    Last week:
        - Commented on some of "our" bugs that are listed in Arthur's
Uplift Tracker.
        - Debugged and fixed #25089 (Special characters not escaped in
proxy password).
        - Helped a little with #25099 (Update nightly version number).
        - Reviewed the fix for #22794 (Don't open AF_INET/AF_INET6
sockets when AF_LOCAL is configured).
        - Did some bug triage, e.g., #25064 (Don't record update history).
        - Did a little work on #23136 (Moat integration):
                - Discussed backing out the SOCKS optimistic data patch.
                - Pinged dcf about creating a new meek tag for us.
                - Pinged isis regarding the problem where BridgeDB is
not returning any bridges.
Planned for this week:
        - Review the updated patch for #22794 (Don't open
AF_INET/AF_INET6 sockets when AF_LOCAL is configured).
        - For #23136 (Moat integration):
                - Assist Isis as needed with the "no bridges returned" bug.
                - Request review of Tor Launcher's Moat client
        - Review gk's proposal for redesigning the security controls.
        - Plan Rome travel.
        - Triage the Tor Launcher bug list (set priorities, close
outdated tickets).

    Last week:
        - Ran many Try builds using master and TBA branch and corrected
          - I'd like to patch tor-browser.git with some small changes so
Try builds are nearly the same as official Tor Browser builds
            - I don't have much to discuss, but is there a reason for
not doing this?
        - Started `step 0` of Tor Launcher integration
          - Built a test package, but I still need to test it
        - Chatted with Arthur about Tor Launcher in TBA and the current
Tor Launcher proposal
    This week:
        - Update #19675 (Merge Orfox patches into tor-browser) with
current status and next steps
        - Write a design proposal (with igt0) for TBA (in general)
        - Decide what the minimal viable product should be for shipping TBA
          - Should we ship with tor-launcher on mobile or should we
release a version that still requires Orbot?
          - Isa, is the UX team working on designs for mobile, like a
Tor Launcher flow?

    Last week:
        - Did few updates in the Tor Button Proposal (I still need to
add more info about language importer):
        - Update the commit message and rebased with the latest tor
button version #25013
        - Ported the code from #25013 to the mobile

          (it doesn't work yet because the button does not exists, so
the gettorbutton method doesn't work)
          Geko, Arthur: are we going to move the tor circuit to the
address bar? (and what about the new identity?) [Arthur says: yes --
this is #24309 and #24918][It's not decided yet what to do with New
Identity but it's more  a general thing, not site-specific. Thus, I am
inclined to not move it to the address bar but have maybe an own button
for it on the toolbar given it's importance - GeKo]
    This week:
        - Add the tor button icon in the mobile menu so i can keep
integrating the tor button extension into Orfox
        - Add the language importer in the #25013
        Geko, mcs: What about the
https://trac.torproject.org/projects/tor/ticket/25126 ? do we have a
design document or should we make the current page responsive?


    Still working on Timer Fuzzing, but think I have a real path forward now

    Sandbox almost uplifted:

    gk: Can you remind me/refresh me on what the Sandbox Exports thing
is? [That's a suggestion I got from bobowen to avoid mingw-related
crashes on win32; they said to me that this is a thing that will be
deprecated in the future IIRC and that's fine to take a different code
path - GeKo]

    Bug people may be interested in:


    Last Week:

    patch for #22794

    This Week:

    Firefox patch uplift

    Sync with Pari's spreadsheet


    Last week:

    Worked on uplift






    https://bugzilla.mozilla.org/1330467 (wrestling with weird bug in

    Looked into what locales we can add (#20628).

    Made some comments about security slider issues

    Discussed tor-launcher strategy with sysrqb

    This week

    Continue uplift

    Try to fix https://bugzilla.mozilla.org/1330467

    Continue rebasing to mozilla-central

    Yet another revision for Save As bug (#22343)


     Was sick most of last week.

    Got the extension for sponsor4 negotiated (also added 2 small tasks,
so we could receive remaining funds from this grant)

    Working on sponsor8 report (late cuz i was sick) - will follow up
with mobile team after meeting

    hopefully meet this wed and catch up on the circuit display work

    Last week:
        -worked on #21777 and made little progress
        -wrote a patch for the .onion mixed content blocking
        -debugged sandbox related crashes on 64bit systems
        -thought a bit about Vista crashes with 7.5 (#25112)
    This week:
        -work harder on #21777
        -fix tests for the .onion mixed content blocking and put ticket
in needs_review
        -further debug sandbox related crashes on 64bit systems


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20180205/69bb3a40/attachment-0001.sig>

More information about the tor-project mailing list