19:00:01 #startmeeting tor browser 19:00:01 Meeting started Mon Dec 5 19:00:01 2016 UTC. The chair is GeKo. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:00:01 Useful Commands: #action #agreed #help #info #idea #link #topic. 19:00:24 hi all and welcome to another round of the tor browser meeting! 19:00:33 hi everyone 19:00:41 i guess we have to cover quite some ground today, thus let's start with quick status updates 19:00:42 hi 19:00:45 who goes first? 19:00:46 Hi everyone 19:01:17 hi 19:01:22 hi 19:01:48 * mcs will go first 19:01:55 Last week Kathy and I created a tor-browser-bundle patch for #20121. 19:02:00 We also did some work on #20761. 19:02:06 This week we will do something to address #20761 and we will also help with code reviews. 19:02:12 If we have extra time we will work on #9675 and maybe #20083. 19:02:22 That’s all for us. 19:03:25 (#20883 isn't a huge deal because I think integrating the update ui into an external sandbox agent is better) 19:03:29 err 19:03:30 i did not get to think much about #20761 the last days 19:03:33 sorry 19:03:56 i hope to get to that tomorrow 19:04:02 Yawning: right, you said that last week but I already forgot 19:04:06 GeKo: no problem 19:04:18 I can go. 19:04:41 I worked on stomping out sandboxing bugs, and making the sandboxing better, I still can tag whenever 19:04:55 I might tag and start working on the more.. involved stuff 19:05:07 not sure yet 19:05:26 That's basically it. 19:06:19 i can go 19:06:52 i worked on #20684 hoping to get that into the alpha but there are problems 19:06:57 err 19:07:02 #20683 19:07:15 32bit is not ready yet it seems 19:07:42 and i even hit issues with 64bit selfrando in the alpha. we'll see if i find time to debug and fix that in time 19:08:06 GeKo: is there a ticket re: NSS, HW AES and selfrando 19:08:10 but the selfrando people fixed already some stuff and made a tag for us 19:08:16 Yawning: not yet 19:08:26 probably best in their github bugtracker 19:08:38 but we can have one on trac as well 19:08:48 I need to apply the override to the alpha in the sandbox if that ships 19:08:56 then i worked on the drl proposal for tor browser on mobile 19:09:02 which takes all of 2 mins, but I need to know to do it. 19:09:04 (sorry) 19:09:28 i had the interesting experience of acting on a 0-day chemspill release 19:09:35 thanks for all that helped with it 19:09:53 that did cost bascially two days :( 19:10:06 then i did the admin stuff for the month 19:10:23 (lolwtf https://github.com/immunant/selfrando/issues/5) 19:10:40 i am not fully done yet due to some planning we can talk about later 19:11:05 Yawning: yeah, i was, well, surprised about that one too 19:11:18 i reviewed #20121 19:11:33 this week i hope to get all the things into the alpha and release we want 19:11:39 and get the building going 19:11:49 i guess there won't be much time else :( 19:11:52 that's it for now 19:13:05 * boklm can go next 19:13:17 This past week I helped with the new surprise releases, helped with #20352 to install seccomp from backports 19:13:20 I posted a patch on #20660 and worked a little on #17380 19:13:29 This week I'm planning to help with the new releases, fix setup on the Windows test machine to fix the win_DEP_ASLR test, and work on #17380 19:13:37 That's all for me 19:13:47 where are we with #20352? 19:13:56 do you think the patches are good as they are? 19:14:35 I can review the patches more carefully tomorrow 19:14:44 that would be neat 19:14:54 (SHould #20793 live with the gitian stuff?) 19:15:07 i think having a nightly might not be that bad before we start with the alpha 19:15:19 (It's more, add a .desktp and an icon to the packaging thing.) 19:15:21 Yawning: i thought so while looking over the ticket 19:15:37 I could put one in the source tree somewhere as well 19:15:44 but I have no neat icon 19:16:16 and my artistic tallent is bacially like, stick figures and ascii art middle fingers 19:16:18 so 19:16:51 * GeKo mumbles something about ux team 19:17:19 we dont have a designer on staff but we can help look for volunteers who could help 19:17:22 :) 19:17:40 who is next? 19:17:40 Yawning: all you need is an icon? 19:18:08 I could go next 19:20:09 Synzvato: sure, go 19:20:10 I have done some additional work on #20815 during the past week 19:20:30 Wrapped up the tests, shared some conclusions, and the corresponding prototype 19:21:16 neat 19:21:20 Wrapped up the tests, shared some conclusions, and the corresponding prototype. This week, based on the results, we could discuss where we want to go from here (technology-wise). 19:21:51 fine with me 19:21:53 Synzvato: sounds good - we can do that after this meeting on tor-mobile 19:22:52 Sure 19:23:15 That's it for me 19:23:49 * arthuredelstein can go 19:24:09 This week again I have been working on #10281. 19:24:18 I have 3 approaches now: 19:24:24 (1) Using DieHarder 19:24:30 (2) Using a patch to use randomized partitions 19:24:36 (3) Using jemalloc redzones 19:24:46 do we get all three? :) 19:24:55 (1) unforunately is causing occasional crashes. The DieHarder author is helping me look into it. 19:25:08 (2) seems to be a good idea but I have had a lot of trouble trying getting my backport to work correctly on ESR45. 19:25:15 (3) now seems to be the simplest option, so I started working on that this weekend and I hope to have a patch ready today. 19:25:24 (weird irc client shat itself sorry) 19:25:39 Once I have (3) working I will go back to (2) as well. 19:25:48 But given the time pressure I think (3) is the best option right now. 19:26:05 okay, let me know if there is stuff i or anybody else can help with 19:26:12 thanks 19:26:39 Would be useful to me to discuss selfrando at some point as well. 19:26:48 That's all for me. 19:27:06 have you read the paper? 19:27:46 Yes, part of it. 19:28:14 okay, otherwise this would have been my first idea 19:28:34 anyway, anybody else here for a status update? 19:29:44 okay, then let's move on to discussion time 19:30:21 i have two items. the most important one is work for the coming weeks and months now that sponsoru is basically over 19:30:31 we have https://trac.torproject.org/projects/tor/wiki/org/roadmaps/TorBrowser 19:30:41 and i updated it a bit and shuffeld items around 19:30:57 i think it is okay for the next couple of weeks and months at least 19:31:05 but it is not set in stone 19:31:22 mcs: the main task for you would be sandboxing things 19:31:47 probably seatbelt profile feedback incorporation; unix domain socket stuff 19:32:03 and most importantly looking at the content sandboxing that comes with esr52 19:32:22 there was plans to talk to mozilla about things 19:32:38 one big item here would be to check how well our own extensions work with e10s 19:32:44 yeah, sounds good 19:33:08 boklm: i have the gitian transformation as main point for you 19:33:18 ok 19:33:19 GeKo: OK. Kathy and I will look over the roadmap in more detail soon. 19:33:28 i guess the windows 64bits builds have to wait for 7.5 alpha 19:33:51 mcs: thanks 19:34:18 boklm: it might be too much to try to get away from gitian and get 64bit builds out with gitian at the same time 19:34:22 I still have no idea what I'm going to do next year 19:34:44 there is still 1month we have for the linux sandbox i guess 19:35:02 I mean, I dunno, it needs ongoing improvement 19:35:02 (money-wise) 19:35:06 (yeah) 19:35:12 (yeah) 19:35:22 oh here's a random question 19:35:34 does sending SIGTERM to firefox cause a graceful exit? 19:35:54 arthuredelstein: i think if you want to start with the rebasing once the dust settles that might be good thing 19:36:07 ie: if I want to retart firefox to apply an update, can I just SIGTERM it? 19:36:10 we would have chances this time to be earlier done with that 19:36:24 and would have more time for testing thigns 19:36:27 *things 19:36:52 i plan to look over the release notes of past firefox releases to find large things we need to patch earlier 19:37:14 GeKo: Yes, I agree rebasing should be my next task 19:37:20 this way we avoid doing all the 52esr things whn they are urgent 19:37:24 okay, cool 19:37:36 Yawning: not sure, i'd have to look at the code 19:37:40 Also because it will help to see how well the new FPI patches are working 19:37:57 And I think with E10s we're going to have more things to fix. 19:38:06 yes, and testing all that can't get started early enough 19:38:12 exactly 19:38:46 arthuredelstein: oh, with respect to rebasing and upstreaming there is #20557 19:38:50 no worries I can check myself, just wondering if anyone knew offhand 19:38:56 i wonder whether we could help the bsd people here 19:39:13 either by upstreaming their patches or at least by including them into our tree 19:39:27 (so that we are aware of them) 19:39:58 might be a thing to thing about while doing the esr52 transition 19:39:59 GeKo: Yeah, that sounds like a good idea. 19:40:15 okay. that's it from me wrt planning 19:40:23 for the next weeks and months 19:40:48 if there are things that sound wrong or not optimal let me know and we can fix them 19:40:56 also 19:41:01 patching that selfrando thing looks easy 19:41:05 the ux team are tracking the tasks we can help y'all with 19:41:19 "make the sandbox ui not suck, once there's binaries for download" 19:41:25 i know they are far away on the roadmap 19:41:48 unless they want to build the current master 19:42:24 just want to let you know we are aware of them and will organize ourselves to help out with it 19:42:40 thanks 19:43:29 the second item i have on my list is a bit 6.5 planning 19:43:52 because next week there'll be the last 6.5 alpha coming out (hopefully) 19:44:08 question 1) what do we do with the unix domain socket work? 19:44:19 does it work? 19:44:38 for most of the scenarios for most people as it seems 19:45:00 but i feel we should wait for 7.0 before we ship it on by default 19:45:04 I guess more importantly, does anything else we plan to ship during the 6.5 service life require it? 19:45:17 there are still edges i want to get rid of 19:45:33 Yawning: i don't think so 19:45:56 I mean, the fact that we wre working on it got a lot of press, but I tbb_stub-ed the problem away 19:46:05 so I don't have the dependnecy 19:46:05 yeah 19:46:11 does the OSX thing need it? 19:46:27 currently #20761 is the main blocker here 19:46:53 not sure actually but it uses it 19:47:02 Yawning: Yes, although we could enable it via an env var if necessary (I think) 19:47:29 I think it is okay to disable it by default (via prefs) if we think we may break too many things 19:47:36 ^ 19:47:53 that's my impression, too, good 19:48:25 If #20761 is the main blocker, then that seems like something that could be patched. 19:48:31 Although maybe there isn't enough time 19:49:03 i think we need a patch anyway as disabling it does not restore the old behavior it seems 19:49:28 GeKo: I think you are correct. 19:49:48 so, my current plan is to disable it for the next alpha to have at least one alpha to test for the configuration we want to ship 19:50:52 mcs: so what is probably most needed right now is a patch that is guaranteeing the old behavior if the feature is disabled 19:51:04 should I patch that selfrando thing? 19:51:05 i am still not sure whether that means solving #20761 19:51:35 GeKo: We don’t have a solution yet even for just that part but we will work on it. 19:51:40 or whether there is a shortcut for us to get what we want short term 19:51:42 okay, thanks 19:51:54 Yawning: feel free, the selfrando folks would be happy i guess 19:52:07 but read the dev agreement first 19:52:18 that was horrible the last time i looked at ot 19:52:20 *it 19:52:31 dev agreement? 19:53:54 yeah, let me look it up later 19:54:03 oh I see 19:54:25 question 2) we want to have a new MAR signing key soon just for the usual yearly rotation 19:54:29 we do for the first time 19:54:41 i wonder what would be a good timeframe for this 19:54:56 should we put it into the alpha and then ship it in 6.5 19:55:10 or is aiming for 7.0 a better thing? 19:55:48 ... they want me to sign something 19:55:48 i wonder whether there are are some cons for the 6.5 plan i am missing 19:55:50 yeah ok fuck that 19:55:56 yeah 19:56:10 are *we* comfortable with, carrying a patch around that fixes that 19:56:17 #fuckupstream 19:56:24 i think so, yes 19:56:27 k 19:56:34 I'll ragefork the repo and fix that 19:56:39 thx 19:57:29 apart from that i don't have further things to discuss 19:57:41 if there is something else we have three minutes :) 19:57:52 If we are rotating mar keys 19:58:02 will the old ones continue to work for a while? 19:58:20 testing the new mar signing key in the alpha might be smart just in case 19:58:23 there is no expiration date on them 19:58:26 my tinfoil hattery hardcodes the mar signing key in my sandbox thing, so I don't need to trust the updater to verify sigs 19:58:42 there's like 10 sig slots or something in the MAR format right? 19:58:43 which is one reason we want to rotate them yearly 19:58:53 we'll continue to sign updates with the old keys for a while? 19:59:01 mcs: that was one of my thoughts as well 19:59:49 Yawning: the second one that has been baked in from the beginning will be there for more than another year 20:00:02 Updating the hardcoded mar keys is trivial, I'm more concerned about getting the update out, because I have no idea how to handle updating my thing yet 20:00:04 ok 20:00:25 I have release_primar and release_secondary 20:00:28 right now 20:00:55 primar goes away and secondary->primar and a new secondary enters the scene 20:01:09 *primary probably 20:01:19 ah gotcha 20:01:21 ok 20:01:26 okay, i think i'll aim for 7.0 and plan to think a bit harder about it 20:01:42 i think we are at the end 20:01:55 thanks all for your input *baf* 20:01:59 #endmeeting