1. 12 Jun, 2014 1 commit
    • Tails developers's avatar
      Modify a fresh Iceweasel profile instead of the system one. · ed0a3862
      Tails developers authored
      If we're in camouflage mode we want it to be applied to the Unsafe
      Browser as well. However, the camouflage activation script modifies
      the *user's* own profile, not the system one, so it must be present at
      this point, and then it's easier to also make all the other changes to
      the user's profile since any changes to the system profile will not be
      copied back in.
  2. 11 Jun, 2014 1 commit
  3. 10 Jun, 2014 1 commit
    • Tails developers's avatar
      Add png icons for gpgApplet · 0b208ff9
      Tails developers authored
      For whatever reason the png version is used at applet initialisation even
      though svg versions seems used when it updates its content.
  4. 07 Jun, 2014 1 commit
  5. 06 Jun, 2014 5 commits
  6. 05 Jun, 2014 1 commit
  7. 27 May, 2014 1 commit
  8. 05 Mar, 2014 2 commits
  9. 04 Mar, 2014 6 commits
    • Tails developers's avatar
      Run with gksudo for clipboard-sharing. · 2caef32f
      Tails developers authored
      Tor Launcher has a "Copy Tor Log To Clipboard" button which this is
      required for.
    • Tails developers's avatar
      Rework how we (re)start vidalia. · 05676de6
      Tails developers authored
      The old behaviour of restart-vidalia sometimes causes a number of
      * Vidalia fiddles with the signal handler for SIGINT and SIGTERM,
        delaying termination for up to several seconds when vidalia has just
        started (before its systray icon goes "green"). In that case
        restart-vidalia will fail to kill vidalia in time to start it via
        lckdo, so it just fails. The old vidalia process finally dies
        sometimes after that failure, leaving the user with no vidalia.
      * If vidalia is running (e.g. after the first network connection has
        completed) then restart-vidalia is called from restart-tor, which in
        turn is called from the 10-tor.sh NM hook. restart-vidalia is
        blocking, so in this situation all execution is blocked until the
        vidalia process is killed, which probably won't happen until the
        *next* network connection. The results of this is that all NM hook
        code after restart-tor is called in 10-tor.sh during a second
        network connection is delayed until the third network conncetion,
        and the third's to the fourth, and so on.
      We fix this by simply SIGKILL:ing vidalia and making sure it's always
      started in the background (non-blocking). In this context, lckdo isn't
      very relevant may just as well drop it.
    • Tails developers's avatar
      Drop unused variable. · 686facd8
      Tails developers authored
    • Tails developers's avatar
      Don't ever run Vidalia with -bridgeconf. · 1720cb40
      Tails developers authored
      We know handle the initial bridge configuration in Tor Launcher.
    • Tails developers's avatar
      Cleanup after exit to save some RAM. · a9c32405
      Tails developers authored
    • Tails developers's avatar
      Add start script for tor-launcher. · e654c92c
      Tails developers authored
  10. 02 Mar, 2014 2 commits
  11. 01 Mar, 2014 1 commit
  12. 27 Feb, 2014 1 commit
  13. 21 Feb, 2014 5 commits
  14. 20 Feb, 2014 6 commits
    • Tails developers's avatar
      Change MAC spoof verification method. · d855dd4f
      Tails developers authored
      Some hardware fails to report the permanent MAC address for
      `macchanger -p`. To deal with it we simply record the MAC address
      before and after trying to spoof it, and compare them. However, since
      macchanger truly picks a random value, it can randomly pick the real
      MAC address so there's a 1/2^24 probability that nothing really fails
      but the fail safe will trigger any way.
    • Tails developers's avatar
      Remove the macchanger_helper() wrapper. · ebd9e1b4
      Tails developers authored
      After finding a couple of bugs and issues in it I think we should just
      KISS and not try to be so smart. This script is supposed to be run
      immediately after the interface is plugged by udev, so the interface
      should always be down. If it's up that's actually worrisome...
    • Tails developers's avatar
      Move MAC spoof fail-safe to tails-spoof-mac. · d4fd3eda
      Tails developers authored
      Having the fail-safe in tails-unblock-network means that it's only run
      *once*, there will be no fail-safe for devices hotplugged after
      that. Now we have the fail-safe for each device, right after we try to
      spoof them.
      Note that we drop `set -u` because /usr/bin/gettext.sh uses the
      uninitialized `ZSH_VERSION` variable.
    • Tails developers's avatar
      Add defensive quoting. · c51dc2d9
      Tails developers authored
    • Tails developers's avatar
      Add MAC spoofing logs and errors to tails-debugging-info. · 4ee936f4
      Tails developers authored
      Without this it'll be hard to debug WhisperBacks about issues with MAC
    • Tails developers's avatar
      Remove unnecessary "|| true". · eb0750ad
      Tails developers authored
  15. 19 Feb, 2014 5 commits
  16. 13 Feb, 2014 1 commit