Hey, team!
Welcome to the April 2019 user feedback report!
For more information on what users and community members were talking
about this month, check out the April/May 2019 User Feedback pad [1].
There weren't any updates to the stable Tor Browser Bundle during April,
so the blog had fewer comments than in other months. Overall, April was
a relatively slow month in terms of feedback.
Otherwise...
- Users on Reddit began organizing against Reddit's apparent policy of
blocking Tor exit relays [2].
- There weren't many user reported bugs in April, but two high priority
bugs were mentioned on the 8.5a11 blog post [3]
Now, on to the feedback! Scroll further down to see a summary of Reddit
posts, some points from Google Play Store reviews, a list of the most
common Stack Exchange tags from the month, and a collection of some
notable issues and bugs mentioned by users in April.
---
Most common questions on Reddit:
- Users have mentioned getting "blocked" pages when using Tor Browser to
access Reddit [2].
- Questions about using VPNs.
---
TBA Reviews & Feedback on Google Play Store:
The average review score is 4.1 (0.1 lower than previous months).
Reviews mention a white screen on boot, possibly related to #30284 [6].
Other users report seeing the error message related to #30284: "Control
port file not created."
---
Most common stack exchange tags:
tor-browser-bundle: 16 this month
configuration: 14 this month
security: 6 this month
hidden-services: 6 this month
tails: 6 this month
connection: 6 this month
tor-install: 5 this month
---
Notable bugs, fixes, & issues mentioned by users:
- #21967 - obfs4proxy not killed when unused [4]
- #29982 - Clicking on cog/gear icon crashes Tor Browser for Android [5]
- #30284 - Start fails with "Control port file not created" [6]
---
That's it for the month of April! If you want to know more, please do
check out the April/May 2019 User Feedback pad [1] or reach out to me
via email (waywardwyrd at riseup dot net) or IRC (wayward).
Thanks for reading!
- wayward
------
Annotations:
1.
https://storm.torproject.org/shared/UVM89BKbYewCPQzH2cPNsBQtn1PbVc47jrwlSYn…
2.
https://www.reddit.com/r/TOR/comments/bhe4yk/reddit_is_now_blocking_certain…
3. https://blog.torproject.org/new-release-tor-browser-85a11
4. https://trac.torproject.org/projects/tor/ticket/21967
5. https://trac.torproject.org/projects/tor/ticket/29982
6. https://trac.torproject.org/projects/tor/ticket/30284
Notes for May 16 2019 meeting:
Roger:
0) Nick: btw, GeKo and I decided to leave me on the tor-security list,
but pretend that I'm not on it. I asked if we should add a real third
person, and he said he's got it under control.
1) Arturo: it looks like the ooni package on deb.tpo is no longer in
debian? That means we're no longer following our intended policy of
having deb.tpo things be only imported from debian. Is there a plan to
fix? Plan: we limp along with ooniprobe in deb.tpo for now, because
there aren't any better options for users, and then when ooniprobe 3.0
is released -- by Nov 2019 is the current schedule -- we remove
ooniprobe from deb.tpo, point users to the new one and inform existing
users how to upgrade.
2) I added Gaba and Pili to the speaking@ alias, so they can help us
coordinate our speaker invites.
3) We're nearly done assigning the first round of PETS stipends. We'll
have allocated most, but not quite all, of the stipend money.
4) Cecylia, Philipp, the NRL folks, I, and others will be at the Race
kickoff meeting next Thursday / Friday in DC. I look forward to figuring
out what the program actually is, and from there, how we can best
encourage the other people in it to build practical useful things to
help real people.
5) Sue: speaking of which, we should shortly be getting a copy of the
agreement between Georgetown and us.
6) We're half-way until the submission deadline for the Mozilla research
grants. Is there something more proactive we should do, besides the blog
post from some weeks back?
Mike:
1) Sponsor2 (NSF-TTP) is just about at a point where we can "declare
victory" in future NSF-TTP proposals (we have functionality merged into
an upcoming alpha). Matt Wright said this was a good time to start new
NSF-TTP funding proposals
2) Roger: What do you think about doing another/larger NSF-TTP for
traffic analysis, or for transitioning performance research into
practice? [You should mail Matt and ask him what he wants to do, and
whether he already has plans for his NSF TTP proposal token for this
round. My plans for my TTP proposal token for this round are unclear, so
if we really need me, I can do it, or if you want to lead it, that's
great too. -RD]
Pili:
1) Still helping to moderate tor-talk and tor-relays
2) Stepping up work on new Community Portal
3) Responding to GSoD enquiries
4) Playing with new git lab instance and plotting out processes and
workflows for teams
Antonela:
1) TB 8.5 release #29955, #30497
2) triaged OONI Explorer UX tasks for stable, trying to prioritize
3) reviewing Q1/Q2 user research reporting, coordinating next Africa
trips with ggus
4) sent peer-reviews
5) working with onions #30024
Arturo:
1) Our post on wikipedia blocking in China:
https://ooni.torproject.org/post/2019-china-wikipedia-blocking/, got
pretty big media coverage
2) Made a new release of ooniprobe 3.0.0-beta.3:
https://github.com/ooni/probe-cli/releases/tag/v3.0.0-beta.3. Testing is
greatly appreciated!
3) Working on OONI Explorer
4) Supporting individuals who submitted OTF fellowship proposals
Steph:
1) nyc fundraiser on Tuesday went well
2) preparing for vacation coverage may 23-june 11, scheduling lots of
social media
3) community portal copy review
4) promoting swag discounts
5) feedback, travel arrangements
6) media inquiry
Karsten:
1) CollecTor is now archiving bandwidth files from directory authorities.
2) Work on new OnionPerf graphs is moving forward, though this will
still take a bit more time.
Sarah:
1) Discount sticker promotion email has made almost $1,000. We will send
this message out periodically several weeks after people join the email
list. The average gift is $27, meaning most people are giving much more
than the $17 promotion.
2) feedback
3) travel arrangements
4) Craig Newmark Philanthropies granted $50k for general operating.
Sue:
1) General accounting stuff
Erin:
1) peer and team lead feedback due May 17th
2) general HR stuff
Gaba:
1) Coordinating retrospective for network team
2) Following on moz-tor meeting and moz research grants
3) Feedback
4) Trying to get an automatic way to visualize trac tickets per sponsor/team
Here are our meeting logs:
http://meetbot.debian.net/tor-meeting/2019/tor-meeting.2019-05-16-17.01.html
Here is our meeting pad:
ANTI-CENSORSHIP work meeting pad
--------------------------------
Next meeting: Thursday May 16th 17:00 UTC
Weekly meetings every Thursday 17:00 UTC on #tor-meeting at OFTC (channel is logged while meetings are in progress).
== Goal of this meeting ==
Weekly checkin about the status of anti-censorship work at Tor.
Coordinate collaboration between people/teams on anti-censorship at Tor.
== Links to Useful documents ==
THE Anti-censorship Roadmap (kanban board): https://storm.torproject.org/shared/knaG2lEzepdsCC21DYk4dD4hRtwcUGnXQvalH1s… <-- a subset of tasks from trac that the team is working on. (There is a bug in wekan, what we use for the board, that make it hard to load. You have to click in 'all boards' and then in the board to get it to load)
Roadmap by topic: https://storm.torproject.org/shared/KXkqlNP8ouNks_ey5khZKUSbNj9ZoidXmEp80OD…
Gettor Roadmap: https://storm.torproject.org/shared/rhsSl_3Pb253HPqoCdFiAdmXQ57NUG_BLvBCxqF…
Roger's thoughts on anti-censorship's priorities: https://storm.torproject.org/shared/kU83M2pQehsnQZPzR_mwmYslAijqKgYNOEak57T…
Komlo's thoughts on anti-censorship's plan: https://pad.riseup.net/p/CensorshipTeam-Planning-keep
PTO Calendar: Ask gaba for the link and keep it up to date with when you are not going to be around.
---------------------------
---- 16th May 2019 ----
---------------------------
== Announcements ==
- Let's start thinking about the Tor meeting in July and if this team needs any private session (maybe roadmap & retrospective for the team?) https://trac.torproject.org/projects/tor/wiki/org/meetings/2019Stockholm/Da… .
== Discussion ==
* We just retired 19 default bridges. Where should we get new ones?
* We're left with: https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/DefaultBridges
* Team Cymru may be willing to help again, but we should decentralise our operators.
* University contacts?
* Roger is asking what the current state of IPv6 and Snowflake because a research group wants to run a Snowflake test on a large IPv6 block. (ahf: 11/5)
* See kat5's "help with"
* Should we do #5304 as part of s19? The change seems trivial to do, but might be a good idea? Propagating OutboundBindAddress to PT's.
[Announcement I forgot] Please spread the word about the Mozilla Research Grant for Tor https://blog.torproject.org/mozilla-research-call-tune-tor-integration-and-…
== Actions ==
== Updates ==
FORMAT!
Name:
Last week:
- What you worked on last week.
Next week:
- What you are planning to work on next week (related to anti-censorship work).
Help with:
- Something you may need help with.
hiro:
This week (2019-05-16):
- Revised gettor code with phw
- Merge new code
- Deploy gettor
- See who has access to gettor repository in torgit
- Sync torgit repository with dip
- Port tickets from roadmap to dip
Next week:
- Add more tests to gettor
- Work on twitter distribution channel
Past week:
- Rebase gettor PR with phw
- Started testing framework
phw:
This week (2019-05-16):
- Revised instructions for setting up an obfs4 bridge.
https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports/obfs4…
See also https://bugs.torproject.org/30471
- Implemented web service that lets bridge operators scan the reachability of their obfs4 port:
https://github.com/NullHypothesis/obfs4PortScan
- Filed ticket for automated PT reachability testing
https://bugs.torproject.org/30472
- Emailed default bridge operators to set 'BridgeDistribution none' in their torrc
- Reviewed GetTor refactor
- Talked to researchers about GFW's current active probing behavior and reproduced it
+ Looks like recent tors use a TLS client hello that the GFW does not detect
+ Filed https://bugs.torproject.org/30500
- Started working on a fix for https://bugs.torproject.org/30512
Next week:
- Look into httpsproxy
- Get closer to launching "set up obfs4 bridges" campaign
Help with:
- Review of https://github.com/NullHypothesis/obfs4PortScan (all in golang)
hiro:
Working on GetTor. It has been refactored taking into account latest development from Isra.
https://gitweb.torproject.org/user/hiro/gettor.git/tree/?h=refactoring
* It now uses twisted server so it is easier to develop new features.
* Code has been cleaned
* It has been refactored to allow tests.
* It is working at gettor+test(a)torproject.org.
Todo:
* review the new code (#28152)
* merge and deploy the new code. It is in testing right now but not production.
Gaba:
Last week:
This week (05/16):
* look at s19 and what is that we are completing in May
ahf
Last week (2019/05/09):
- Gitlab is working for people with Tor LDAP access. Go to https://dip.torproject.org/ - click "Forgot your password?" - enter your torproject.org email and receive login instructions. Guest login is coming and trac ticket migration is something we are looking at.
- Talked Dormant mode and PT with Nick M yesterday. Would like to discuss that during this meeting.
- Spend some of Monday splitting up anti-censorship team tasks from network team tasks on our roadmaps together with Gaba and Catalyst
- Still finishing off #29736
This week (2019/05/16):
- Progress on dormant changes in #28849 - thanks to dcf for review! Going to update the spec/patch today.
- Working on #28930 (proxy/pt bootstrap re-ordering). Got some help from Catalyst already.
kat5:
Last week (May 6):
- Content for newer tickets
This week (May 13):
- Updates for completed work
- Edits from hiro's review of GetTor content
- A few updates for monitoring tickets
- finalize report
- NEEDS HELP:
- Which of the "In Review" tickets should we mark as completed in the report?
- I've added content for ~10 tickets since phw and cohosh have reviewed. Does anyone want to review the final doc? Or the diffs? The changes are not big or complicated.
dcf: 2019-05-15 (will miss 2019-05-16 meeting)
Last week:
- merged uTLS for meek-client (#29077)
- helped with broker certificate problem (#30509)
- reviewed dormant mode spec changes (#28849)
- reviewed Snowflake broker certificate cache (#30512)
- reviewed Snowflake read limits (#26348)
Next week:
- AMP cache/QUIC prototyping
- make graphs using the old unsanitized broker logs before the June 1 deletion deadline
Help with:
- I will not have much time next week but I'm aware of these tickets that need review:
- #30511 Remove OnIceComplete
- #30451, https://github.com/keroserene/go-webrtc/pull/105 snowflake-client has executable stack
cecylia (cohosh): last updated 2019-05-16
Last week:
- snowflake
- provisionally deployed proxy geoip metrics (#29734)
- revised guard against large reads (#26348)
- fixed snowflake executable stack problem (#30451)
- worked on finer-grained snowflake blocking tests (#30368)
- helped with broker outage (#30509)
This week:
- snowflake
- start implementing a (simple) sequencing/reliability layer for snowflake client traffic (#25429)
- clean up and increase test coverage for snowflake (#29259)
- continue hacking on windows build (#25483)
- review obfs4PortScan
- update snowbox to simulate observed snowflake blocking behaviour
- review #30511
Help with:
- metrics feedback on #21315 (broker stats) before merge of #29734 (geoip metrics of proxies)
catalyst:
week of 5/9 (planned):
- get #29976 ready for review
- open other bootstrap reporting tickets as needed
- peer and team leader feedback
week of 5/9 (actual):
- [redacted]
- peer and team leader feedback in progress
week of 5/16 (planned):
- get #29976 ready for review
- peer and team leader feedback
- help ahf more with bootstrap stuff as needed
arlolra: 2019-05-16
Last week:
- snowflake webextension
- js proxy refactoring
This week:
- more snowflake webextension
- maybe remove coffeescript
Help with:
- review of https://trac.torproject.org/projects/tor/ticket/30511
Hello!
Mozilla just launched a call for proposals [0] for researchers to work
on several areas. One of the areas is "RQ12 Privacy & Security for
Firefox" and particular questions around Tor network performance and
scalability. You can read about many of research ideas in the blogpost
[1][2][3] we published last week.
The deadline to apply for this grant is May 31st. We are receiving
questions/comments/discussions at research(a)torproject.org
It would be great if you all can share this call with researchers,
students and community in general that may be interested in tackle this
questions. Thanks!!
cheers,
gaba
[0]
https://mozilla-research.forms.fm/mozilla-research-grants-2019h1/forms/6510
[1]
https://blog.torproject.org/mozilla-research-call-tune-tor-integration-and-…
[2] https://twitter.com/torproject/status/1126117511966097414
[3] https://mastodon.social/@torproject/102072044469996039
ps. yes, the subject of this mail was "clickbait" :P
--
Project Manager: Network, Anti-Censorship and Metrics teams and OONI support
gaba at torproject.org
she/her are my pronouns
GPG Fingerprint EE3F DF5C AD91 643C 21BE 8370 180D B06C 59CA BD19
Hello,
The OONI team made steady progress in April 2019.
## Report on social media blocking and internet blackout in Benin
In collaboration with CAIDA's IODA project, we co-published a research
report that shares network measurement data on the blocking of social
media (and the subsequent internet blackout) in Benin, amid the
country's 2019 parliamentary elections.
Our report is available here:
https://ooni.io/post/2019-benin-social-media-blocking/
## OONI Probe mobile app
Throughout April 2019, we improved testing coverage
(https://github.com/ooni/probe-ios/pull/263) and we did a lot of
development work on the OONI Probe mobile apps (in preparation for the
upcoming 2.1.0 release).
We worked on adding support for re-uploading non-uploaded measurements
manually. This will allow users to submit measurements at a later stage,
even if they had disabled automatic upload or if the initial upload had
failed.
On Android:
https://github.com/ooni/probe-android/pull/214https://github.com/ooni/probe-android/pull/215https://github.com/ooni/probe-android/pull/213
On iOS:
https://github.com/ooni/probe-ios/pull/258https://github.com/ooni/probe-ios/pull/265https://github.com/ooni/probe-ios/pull/266https://github.com/ooni/probe-ios/pull/267https://github.com/ooni/probe-ios/pull/268https://github.com/ooni/probe-ios/pull/269
## OONI pipeline
We worked quite extensively on the OONI data processing pipeline to make
the annotation of confirmed and anomalous measurements more accurate,
and to extract metadata from new tests.
Our work on the pipeline can be viewed via the following pull requests:
https://github.com/ooni/pipeline/pull/177https://github.com/ooni/pipeline/pull/151
We also worked on improving the documentation of the OONI pipeline and
explained how to reprocess measurements:
https://github.com/ooni/pipeline/pull/183
## System for sharing OONI metadb with third parties
We set up a system for sharing OONI's metadata database with third
parties: https://github.com/ooni/sysadmin/issues/272
This new system allows external people to set up their own instance (and
to have an always in sync version) of the OONI measurement database that
powers the OONI API and OONI Explorer.
It includes all the features that are extracted as part of the OONI
pipeline for all OONI measurements ever collected.
We also wrote documentation which explains how you can set up your own
copy of the OONI metadb:
https://github.com/ooni/sysadmin/blob/metadb-share/docs/metadb-sharing.md.
## ndt7
We aim to replace the NDT speed test (currently included in the OONI
Probe mobile app) with ndt7: a next generation speed test that will run
very short network performance tests and provide users with greater
quality information.
To this end, we have been working on implementing the ndt7 server and
ndt7 client for Measurement Kit:
https://github.com/measurement-kit/engine/issues/4. We continued to make
progress on this throughout April 2019.
## Updated test list
Leading up to India's 2019 general elections, we updated the Indian test
list to include more political party sites and election sites:
https://github.com/citizenlab/test-lists/pull/455
We also embedded several OONI Run buttons on our site
(https://ooni.io/get-involved/run/) to enable the testing of Indian
political and media websites, as well as the testing of the whole Indian
test list.
## Community activities
### Internet Freedom Festival (IFF)
The OONI team attended the Internet Freedom Festival (IFF) in Valencia,
Spain, between 1st to 5th April 2019.
As part of our participation at the IFF, we:
* Facilitated a session to collect OONI community feedback:
https://platform.internetfreedomfestival.org/en/IFF2019/public/schedule/cus…
* Hosted the OONI Partners Meetup:
https://platform.internetfreedomfestival.org/en/IFF2019/public/schedule/cus…
* Presented OONI at the IFF expo:
https://platform.internetfreedomfestival.org/en/IFF2019/public/schedule/cus…
* Presented OONI at the Tool Showcase:
https://platform.internetfreedomfestival.org/en/IFF2019/public/schedule/cus…
* Co-facilitated a session with our Venezuelan partners:
https://platform.internetfreedomfestival.org/en/IFF2019/public/schedule/cus…
### Digital Rights & Inclusion Forum (DRIF)
OONI's Maria traveled to Lagos, Nigeria, to participate at the Digital
Rights & Inclusion Forum (DRIF) between 23rd to 25th April 2019.
At DRIF, Maria facilitated the session "Uncovering censorship evidence",
where she presented OONI and explained how digital rights communities in
Africa can use OONI Probe and OONI data as part of their work.
Information about the event is available here: https://drif.paradigmhq.org/
### Community meeting
We held the monthly OONI community meeting on our Slack channel
(https://slack.openobservatory.org/) on 30th April 2019.
As part of the meeting, we discussed:
1. Measuring HTTPS throttling in Iran
2. Starting to use a Go engine - would an OONI Probe app bigger than 50
MB be a big problem for users?
3. Sourcing more in-country collaborators for OONI Probe testing
## Userbase
In April 2019, OONI Probe was run 319,720 times from 4,805 different
vantage points in 212 countries around the world.
This information can also be found through our stats:
https://api.ooni.io/stats
~ The OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.torproject.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hi!
We had the weekly Tor Browser meeting on Monday. Here come the link to
our IRC meeting log:
http://meetbot.debian.net/tor-meeting2/2019/tor-meeting2.2019-05-13-17.31.l…
and the notes from our pad:
Discussion:
- Monthly Tor/Mozilla meeting is tomorrow morning
- Did we get the donate button/assets for the next Browser release?
(GeKo: no, however we have #30497 now)
mcs and brade:
Last week:
- Discussed PT args encoding in #29627 (Moat: add support for
obfsproxy's meek_lite).
- Opened #30442 (PT spec: should 255 bytes be sent in the
RFC 1929 UNAME field?)
- Revised our patch for #28044 (Integrate Tor Launcher into
tor-browser).
- Worked on #30000 (Integrating client-side authorization to
onion services v3).
- Experimented some more with Arthur's old v2 auth patch
from 14389#comment:15.
- Discussed control port event vs. SOCKS or HTTP CONNECT
error code on IRC, in #14389, and in child tickets.
- Responded regarding time estimates / roadmap.
- Commented in #10760 (Integrate TorButton to TorBrowser core).
- Code reviews.
- Booked flights for travel to the Stockholm meeting in July.
This week:
- #30000 (Integrating client-side authorization to onion
services v3).
- investigate possible use of new SOCKS5 error codes for
integration with tor.
- continue discussions with Network Team.
- review UX proposal in #30237.
- Submit peer and team lead feedback.
- We will be out of the office Wednesday and Thursday (15 and 16
May).
boklm:
Last week:
- fixed/disabled some testsuite tests
- helped with published releases
- fixed #30448 (Strip Browser/gtk2/libmozgtk.so)
- reviewed #30377 (Remove selfrando from our build system)
- started working on #28672 (Android reproducible build of
Snowflake):
- go is now building
- currently trying to get webrtc building
This week:
- continue work on #28672 (Android reproducible build of Snowflake)
- look at remaining failing testsuite tests
- make a patch for #30480 (rbm should check that a signed tag
object contains the expected tag name)
- review #30319 (Drop FTE related bits in Tor Browser)
- help with building new releases
- will be afk on Wednesday
- submit feedback
sysrqb:
Last week
Finished creating Tor Browser APK Signing key (#26536)
Finished code-review of "Tor Browser" renaming on Android (#30136)
Finished code-review of torbutton localization on Android (#30069)
Looked a little bit at control port issue on Android (#30284)
Some BridgeDB things
This week
F-Droid deployment (#27539)
Mozilla bugs (1480877, 1478438)
Remaining tbb-8.5-must code reviews and debugging (as needed)
Fastlane deployment (#26844) (maybe)
Remove remaining Orfox patches (#30036) (maybe, at least before
68esr rebasing)
Maybe begin creating final Orfox update (#29955)
acat:
Last week:
Worked on torbutton integration with Tor browser for ESR68 (#10760)
This week:
Finish #10760
Finish patch for https://bugzilla.mozilla.org/show_bug.cgi?id=467035
If ESR68 beta branch is there, start working on rebasing patches.
tjr
- Letterboxing improvement:
https://bugzilla.mozilla.org/show_bug.cgi?id=1546832
- Got findbar fixed in a local patch; still trying to get a response
from people about devtools
- Working on Mingw Build Stuff (free time only)
- Fix binutils issue:
https://bugzilla.mozilla.org/show_bug.cgi?id=1471698 waiting on Jacek to r+
- x86 alloc/free mismatch: need to catch glandium and ask him about it
- RDD process doesn't work with mingw-clang - need to write test program
- Inching towards enabling some tests for the mingw-clang build on try
GeKo:
Last week
- feedback mails
- finished monthly admin work
- clean-up (dropping fte (#30319) and selfrando (#30377))
- bump GCC to 8.3.0 for Linux builds (#25930)
- work on letterboxing backport (#30372)
- reviews (
This week:
- release prep
- reviews
- will be at SIF on Thursday and part of Friday
- feedback mails
- more toolchain work: mingw-w64/clang for Firefox (#28238)
pili:
Last week
- GSoD admin duties
- Roadmapping
This week
- Looking into gitlab instance (dip.tpo.org)
- dev meeting planning
sisbell:
Last Week:
- #30324 - Update Android Toolchain for 68 ESR (completed this),
will check in tomorrow after verifying it works with other projects.
- Started reviews for tor-android-service issues: #30483 - JCenter
Repo, #30489 - Remove unused resources from tor-android-service, #30484
- Upgrade Android Plugin, #30166 - custom bridges
- Opened PR to cleanup resources in Orbot
This Week:
- Investigate KitKat Failures for starting tor (tor works with
Orbot implementation) #30284
- Move delta in latest Orbot code to tor-android-service, open issues
- #30460, #30461 Use new Android Toolchain
pospeselr:
Last week:
- widl work
- found yet more bugs, though it doesn't look like they are blockers
for us
- worked around more discovered complications, but a fix for the
main issue should be reviewable today or tomorrow, with smaller fixes
following for remaining issues
- finally got Phabricator working for submitting mozilla patches,
#1506693 in review again
This week:
- review emails
antonela
Last week:
- Worked on #29955 - Orfox > TBA
- Filed #30456 - Better bridges for TBA, could work for TB
Desktop too
This week:
- #30024
- #30497 - `about:tor` Donate link
Georg
Hi!
We just had a meeting. Logs are at:
http://meetbot.debian.net/tor-meeting/2019/tor-meeting.2019-05-13-17.00.html
Meeting pad contents are below:
= Network team meeting pad! =
This week's team meeting is at Monday 13 May at 1700 UTC on
#tor-meeting on OFTC.
May schedule:
* Monday 6 May at 1700 UTC
* Monday 13 May at 1700 UTC
* Monday 20 May at 1700 UTC
* Monday 27 May at 1700 UTC
June schedule:
* Tuesday 4 June at 2300 UTC
* Monday 10 June at 1700 UTC
Welcome to our meeting!
First meeting each month: Tuesday at 2300 UTC
Other meetings each month: Mondays at 1700 UTC until 3 November 2019,
when daylight saving time changes
On #tor-meeting on OFTC.
(This channel is logged while meetings are in progress.) (See
https://lists.torproject.org/pipermail/tor-project/2017-September/001459.ht…
for background.)
Want to participate? Awesome! Here's what to do:
1. If you have updates, enter them below, under your name.
2. If you see anything you want to talk about in your updates, put
them in boldface!
3. Show up to the IRC meeting and say hi!
After each week's meetings, the contents of this pad will be sent to
tor-project @ lists.torproject.org.
After that is done, the pad can be used for the next week.
== Previous notes ==
(Search the list archive for older notes.)
25 Mar: https://lists.torproject.org/pipermail/tor-project/2019-April/002280.html
2 Apr: http://meetbot.debian.net/tor-meeting/2019/tor-meeting.2019-04-02-23.00.html
(we forgot to post the notes)
8 Apr: https://lists.torproject.org/pipermail/tor-project/2019-April/002289.html
15 Apr: https://lists.torproject.org/pipermail/tor-project/2019-April/002296.html
23 Apr: https://lists.torproject.org/pipermail/tor-project/2019-April/002308.html
29 Apr: https://lists.torproject.org/pipermail/tor-project/2019-April/002310.html
6 May: https://lists.torproject.org/pipermail/tor-project/2019-May/002316.html
== Stuff to do every week =
* How are we managing CI failures from last week?
See https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/CIFailu…
* Let's check the 0.4.0 release status page.
See https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/CoreTor…
(This page automatically shows the latest trac ticket status.)
* Let's check and update the roadmap.
What's done, and what's coming up?
We're using a kanban board:
https://storm.torproject.org/shared/_mx8PMGOHFBOximocl1gy3COvhLPr6k3Ja7JA1v…
Click on 'all boards' and then the network team one. Filter by
your name and check the 'in progress' column is correct.
* Check reviewer assignments! How reviews from last week worked? Any blocker?
Here are the outstanding reviews, oldest first, including sbws
https://trac.torproject.org/projects/tor/query?status=needs_review&componen…
* Check rotations at
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/TeamRot…
.
* See discussion notes below.
Any blocker from last week?
== Reminders ==
* Remember to "/me status: foo" at least once daily.
* Remember that our current code reviews should be done by end-of-week.
* Make sure you are in touch with everybody with whom you are doing
work for the next releases.
* Remember to fill up the 'actual point' field when you close a
ticket. We need those to calculate velocity.
* Check other's people call for help in their entries.
* Remember to fill in the doodle for monthly retrospective
https://doodle.com/poll/8xhmkm3zqmzdg8pe
-------------------------------
---- 13th May 2019
-------------------------------
== Announcements ==
- The master branch is now 0.4.1.x; 0.4.0 development will continue in
maint-0.4.0.
We need to prioritize 0.4.0 fixes and reviews in April, because stable
was due on 15 April.
== Discussion ==
Rotation updates:
Bug triage - ahf to asn
The Bug Triage role description and queries is on the wiki at:
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/TeamRot…
I think I've left all our triage queries as empty as of Monday.
CI - catalyst to dgoulet
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/CIFailu…
Jenkins tor-ci-freebsd-amd64-0.2.9 seems to have been broken
for a while, but maybe the FreeBSD builds don't automatically build
anymore?
Coverity - catalyst to dgoulet
[In other news, coverity scan seems to have TLS issues that are
keeping nick's automatic updates from working. If anybody can provide
a correct incantation to "curl https://scan.coverity.com/ " in a way
that works, that would rock. -nickm]
new CID 1444999 https://trac.torproject.org/projects/tor/ticket/30467
-- fixed by dgoulet
new CID 1444999 https://trac.torproject.org/projects/tor/ticket/30458
-- low priority?
Tor meetup in July: do we need 1 room for the network team for 1 whole
day? Retrospective, roadmap, any other session that may not be shared
with the rest of Tor?
How do we handle our freeze and freeze period? Nick has suggestions:
Let's default to "if a feature isn't needs_review by Wednesday, it
isn't going in", with sensible exceptions.
If the initial review suggests that the branch is high-risk, we should
maybe not merge it, depending on impact.
Let's IMMEDIATELY look for MUST items in 041, and try to fix them.
Nick will recreate Teor's "040-must" page for 041.
We can open 042 early if people are all focusing on 041-must fixes.
Please look for 041 problems to fix, or S19 things to do, instead of
getting an early start on 042.
By default we keep 042 closed for a month, but should look at it fresh
each meeting.
== Recommended links ==
"Select male faculty, they said, effectively ran the Institute and
were showered with private donations,
while women were forced to fire essential staff and were shut out from power."
This article is an excellent analysis of the mechanics of power and
discrimination:
https://www.nytimes.com/2019/04/18/magazine/salk-institute-discrimination-s…
On allyship in newsrooms but also in workplaces:
https://source.opennews.org/articles/how-be-ally-newsroom/
In github but a bot for assigning reviews: https://github.com/lmarkus/ReviewBot
== Updates ==
NOTE NEW FORMAT!
Name:
Week of XYZ (planned):
- What you planned for last week.
Week of XYZ (actual):
- What you did last week.
Week of ABC (planned):
- What you're planning to do this week.
Help with:
- Something you may need help with.
PLEASE DO NOT BULK-DELETE THE OLD ENTRIES!
Leave the "Planned" parts!
Leave the parts for last week and this week!
gaba:
Last week (actual):
looked at closed tickets during April. Still a lot of non sponsor work.
incorporated net team sponsored projects into Tor planning
This week (planned):
check sponsor v and 2 work until now
check s27 in the network team roadmap
Help with:
teor: (online for 23 April, then on leave until 21 May)
* AFK
Nick:
Week of 6 May (planned):
- Finish up ADL prototype
- More refactoring
- Work on PTs in chutney?
- Lots of reviews and merges
- Meetings most of the day on Tuesday
- finish up relay-periodic events branch and get it merged,
then fill in some gaps from it that would be well suited for pubsub.
Week of 6 May (actual):
- ADL prototype to mailing list, with comments on prop295.
(https://lists.torproject.org/pipermail/tor-dev/2019-May/013804.html )
- Implemented code to make chutney handle bidi connections
(#29263) and gracefully detect unsupported configurations (#30459)
- Wrestled with confusing chutney travis failures for way too
long on #29263.
- Lots of reviews and merges and meetings
Week of 13 May (planned):
- Reviews and merge as top priority
- Work on 29024 [PT support in chutney] for obfs4 at least
- Freeze 0.4.1.x
- Start on (and finish?) an alpha release
- Privcount, time permitting
- More work on 30414, time permitting, if review happens
dgoulet:
Week of 05/06 (actual):
- Reviews and merges (See timeline).
- Work on #26288 child tickets.
- Resolve important issue found by armadev about prop289 code: #30428
- While working on the #15516 defenses, find out that #30440 is a big
problem so we are falling back to a token bucket approach instead.
- Found #30454 issue in the HS code and made a fix for it.
- Opened #30466 which is related to #30440.
- Did worked hard on implementing a unit test for #26288 but ultimately
couldn't achieve it with our current code setup :S.
Week of 05/13 (planned):
- Rush anything needed for the freeze. In particular, some child tickets
in #26288.
- Work on the #15516 Plan B which is token bucket rate limit design.
- Make progress in #30382 which changed to using SOCKS error.
- REMINDER: Will be offline on Thu and Fri.
Mike:
Week of 5/6 (planned):
- PETS stipend, registration, and hotel logistics
- Get child tickets of
https://trac.torproject.org/projects/tor/ticket/28634 merged or
needs_review
Week of 5/6 (actual):
- PETS stipend
- Got child tickets of
https://trac.torproject.org/projects/tor/ticket/28634 merged or
needs_review
Week of 5/13 (planned):
- Get child tickets of
https://trac.torproject.org/projects/tor/ticket/28634 merged
Need help with:
- Discuss https://trac.torproject.org/projects/tor/ticket/28780
with Nick, asn some more
catalyst:
week of 05/06 (2019-W19) (planned):
- reviews
- CI + Coverity rotation
- get #29976 ready for review
- peer feedback (2) and team leader feedback
- open more bootstrap reporting improvement tickets
week of 05/06 (2019-W19) (actual):
- more [redacted]
- medical bureaucracy
- CI + Coverity rotation -- a few new defects; see handoff section
- reviews
week of 05/13 (2019-W20) (planned):
- reviews
- #29976
- peer feedback (2) and team leader feedback
asn:
Week of 05/06 (planned):
- Hopefully finalize open WTF-PAD tasks.
- Work more on #30381.
- Work more on #15516.
- Reviews and merges.
Week of 05/06 (actual):
- Hopefully finalize open WTF-PAD tasks by the 15th.
- Finalized #30381 spec work and started coding the control port parts.
- Provided (almost) final revisions for the final WTF-PAD branch
(#28634), and tested #28780 code.
- Discused #14389 with mcs and David. We figured that reviving prop#229 is
the way to go.
- Discussed #15516 with David and made some plans for future DoS prevention.
- Rebased #30236 to master because of some conflicts.
- Reviews and merges.
Week of 05/13 (planned):
- Continue coding #30381 so that we unblock the TB team.
- Keep on working on the DoS stuff by the side.
- Got lots of reviews for this week. Got a few more last midweek, so I got
stuff to do here.
- Peer review everything
ahf
Week of 5/6 (planned):
Network team:
- Bug triage role.
- Look at network team S19 tickets for May after the
network team meeting.
Anti-censorship team:
- Cleaning up Snowflake patches for cohosh/dcf to review.
Week of 5/6 (actually):
Network team:
- Meeting with Gaba and Catalyst about splitting up S19
network team tickets.
- Got a lot of help from Nick with Dormant mode questions
- Wrote pt-spec.txt patch proposal and initial patch for
#28849 (dormant and PT integration)
- Got help from Catalyst with understanding #28930
Anti-censorship Team:
- Got help from dcf with #28849 spec changes.
Misc:
- Triage duty.
- Submitted request for PETS stipend.
Week of 13/5 (planned):
Network team:
- Finish #28849 when we (PT community and us) agrees on
spec changes.
- Begin #28930 code.
- Rebase #29736 code on top of master and see what is missing.
Misc:
- Submit peer review to people's respective team leaders.
juga(offline):
Week of 05/06 (plan)
- Add Tor version to the bandwidth file (#30196)
- Most headers non-compliant with spec (#30373)
Week of 05/13 (actual)
- Revised Add HeaderLine to the bandwidth file specification (#30311)
- Revised Refactor header constants in sbws to use Stem's one (#30406)
- Added patch for Most headers non-compliant with spec (#30373)
Week of 05/20 (actual)
- Continue with #30311, #30406, #30373 as needed
Help with:
- Question: basted would start running sbws 1.0.1 (Tor 3.5.8)
later this week if nobody sees a problem with it
Notes for May 9 2019 meeting:
Arturo:
1) Wrapped up the MOSS related work for OONI Explorer and defining the
roadmap for the public launch
2) Spoke about OONI in DC at an event by the USAGM:
https://www.usagm.gov/2019/05/07/media-for-democracy-forum/
3) Preparing OONI Probe mobile 2.1.0 release
4) Planning upcoming work on OONI Probe Desktop:
https://github.com/orgs/ooni/projects/4
Gaba:
1) worked on blogpost for moz grant research
2) talked and started writing a proposal with ggus for APC (that it
turns out we are not going to apply now)
3) time allocation for sponsors
4) finalize team planning document
5) attended part of csvconf yesterday
6) peer reviews
Steph:
1) Press inquiries: Answered questions about the CIA’s onion service
2) Working with organizers and managing the eventbrite page and tix for
the upcoming Tor talk/fundraiser connected to Ethereal Summit. Will help
with Roger's slides
3) Published a post on the Mozilla Research Grant w help from Gaba
4) Getting ready to be ooo May 23-June 11
5) Will submit for Roger to do another ama at the crypto and privacy def
con village
6) Planning for upcoming comms campaigns including t-shirt discounts,
story pitches, next TB launch
7) Looking into a collab at upcoming Blockchain event
Sarah:
1) Sponsors newsletter went out yesterday.
2) Monthly giving page should be live today and I'll start inviting past
donors to convert to monthly giving.
3) Al submitted proposal to Craig Newmark Philanthropies for $50k of
general operating support.
4) Submitted proposal to Deer Creek Foundation for $50k for general
operating/comms funds.
5) Organizing vintage swag promotion for social media.
6) Creating appeal for newsletter subscribers who have not yet donated
to get the sticker pack for a discounted $17.
7) Peer reviews.
8) Travel arrangements.
Pili:
1) Finished off first draft of S9 Workplan
2) Mailing list moderation
3) Finally finished of S27 roadmap!
4) Working on other sponsors and work time allocation
5) Started setting up 1:1s with community team members
6) Helping with OTF Fellowship proposal
7) Replying to Google Season of Docs enquiries
Georg:
1) Fun with Mozilla emergency releases
2) Tor Browser 8.5 gets delayed due to those releases (we plan to start
building 8.5 next week)
3) Getting tickets sorted for May work
4) More HackerOne (Sue: could you please wire the 1.000 USD, thanks! -
yes I did not do disbursements last week and it is included in this
week's disbursements-SA) and other organizational tasks
5) feedback mails
6) Generally struggling to keep up with doing ALL the things
Mike:
1) Wrapping up 0.4.1 things for sponsor2
Antonela:
1) made a meeting with OK Thanks. They are working on Onion Browser with
Guardian Project.
2) shared the Mozilla Grant with academic researchers interested in
usability.
3) working on OTF #30029, #30024.
4) coordinating User Research in Mexico with flexlibris, reviewing nah's
reporting from Q2, Caroline's reporting from Q1, organizing next travels.
5) sent Personas to the UX list for feedback.
6) closed OONI Explorer for the sponsor, roadmapping OONI Explorer
stable release.
7) writing peer-reviews.
8) worked on some fundraising needs.
Sue:
1) general accounting procedures
Erin:
1) general HR stuff
2) reminder: peer and team lead feedback is due next Friday, May 17
Nick:
1) all's well on network team
2) reminded team about booking travel. Do we have a list of people who
are not yet booked?