[tor-project] Tor Browser Team Meeting Notes, 21 October 2019
sysrqb at torproject.org
Tue Oct 22 00:05:17 UTC 2019
We held our weekly Tor Browser meeting today in #tor-meeting2. Here is
the IRC log:
1) We are releasing Tor Browser 9.0 and Tor Browser 9.5a1 this week!
These are both based on Firefox 68.2.0esr.
2) We'll be tracking issues in Tor Browser 9.0 on trac with the keyword
3) Last week, with ticket #28709, we tried enabling FuzzyFox , but we
found it has problems in Tor Browser. At the meeting, we briefly
discussed whether investigating this should happen this week, and we
decided we'll delay this until after the upcoming releases.
4) We'll be changing our triaging process in two weeks and introducing a
multi-round, multi-level triage process. We'll begin every day by
triaging new tickets. The first round will be around Europe's morning,
and the second round will be around Americas morning. We'll begin using
a new trac keyword for indicating a ticket needs a deeper review before
it can be assigned.
5) We discussed upcoming tickets for the remainder of the year. They are
mostly scheduled for November (keyword TorBrowserTeam201911), but some
will eventually move to December.
6) Lastly, we discussed changing the team meeting time due to
"northern"-hemisphere Daylight Savings timing endings. Parts of Europe
change this coming weekend, and parts of North America change their time
the following weekend. We decided our next meeting (28 October) will be
at 17:30 UTC and the meetings after that will be at 18:30 UTC (until
Week of October 21, 2019
Browser Tasks and Experiences
New ticket triaging process
upcoming work (next two months)
upcoming meetings and daylight savings time (brade)
Reviewed acat's #31730 patch
Fixed up proxy-bypass patches for #31144
Resolved conflicts of rebasing onto 68.2.0 #32097
Began investigating fuzzyfox problems
Finish external app proxy-bypass notification #26529
- Helped publish 9.0a8
- Helped build the new releases and made draft blog post for 9.0
- Investigated reproducibility issues (#32052 and #32053)
- Help with publishing new releases
- Investigate reproducibility issues (#32052 and #32053) and try
to fix them
- Try to fix fpcentral (#32014), and related fpcentral tickets
(#31987 and #31986)
- Review #30334 (build_go_lib for executables)
- Work on #18867 (Ship auto-updates for Tor Browser nightly
channel) and sub-tickets
- help with OTF proposal (yay, we got it submitted)
- work on #32053 (macOS reproducibility issues)
- release prep for 9.0 and 9.5a1
- a ton of reviews
- work on #32053
- help with releases
- work on #32053 (macOS reproducibility issues)
- loose esr68 transition ends
- help with tbb-9.0-issues
mcs and brade:
- Opened Mozilla bugs for:
- #31547 (Back out or modify patches for Mozilla's bug
- #31955 (macOS: avoid throwing inside
- Investigated #32039 (Tor Browser 8.5.5 is not working on macOS
10.15 after being freshly installed).
- Investigated #32055 (Importing bookmarks from Safari doesn't
- Worked on #27604 (bundle relocation is broken).
- Filed and fixed #32154 (Tor Launcher's custom bridge field
only allows one line of input).
- Provided some UX feedback for #30783 (End of Year Fundraising
- Record Actual Points in our completed tickets (done).
- Get back into Sponsor 27 work: #30237 (v3 onion services
- Maybe #32119 (onboarding for "Goodbye Onion Button" could be
- waiting on UX input.
- We will be afk Thursday and Friday this week; sorry for the
- Revert aarch64 torbutton fixup (#31730 )
- Investigate/think about #13543 spoofing values.
- #31740: Review RemoteSettings usages in esr68
- Reviewed #22919
- Worked on #28745: THE Torbutton clean-up
- Finish #28745
- tor#30783: End of Year Fundraising Campaign Banner - [new] -
- #27604: Relocating the Tor Browser directory is broken with Tor
- #31573: Uncaught exception in SessionStore.jsm with Tor Browser
based on ESR 68
- Revise https://bugzilla.mozilla.org/show_bug.cgi?id=1581537.
[Browser UI locale is leaked in several ways]
- Several stream isolation patches are now merged to ncdns,
ncprop279, and ncdns-repro.
- As expected, was a less productive week than usual due to time
spent on the scheduled softfork (which is now finished -- softfork was
- Continue working on #19859, assuming my current patches get
more feedback. Might start porting my spec patches to implementation
even if no feedback on spec is immediately received.
- i've been thinking in a way to share our alpha builds with users
for pre-testing and i discovered tor-qa. Geko: is ok if we promote
tor-qa for early bird users? who is on that list? > we are building this
https://community.torproject.org/user-research/ [GeKo: yes, that would
be an option. I don't know who is on that list (but I could look :);
it's been quite as of late]
- Tor Browser 9 release, doing what is needed: screenshots, reviews,
- fixed various little bugs relating to #31286
- fixed #32125 (circuit display doesn't work with user-provided
bridges without a fingerprint )
- wireshark proxy bypass investigation
#32164 - tor log viewer
#31803 - icon
#31764 - broken paste and go
- #30501: BridgeList an overloaded field (in review)
- #30767: Custom obfs4 bridge does not work for custom bridges (in
- #30518: Missing command line options (merged/fixed)
- #30324: Adapt Android toolchain (fixed)
- #30461: Removed patches for tor-android-service (merged/fixed)
- 30552 - Cleanup of torrc
- 31130 - Android tor Debian
Have a good week everyone!
More information about the tor-project