1. 21 Dec, 2022 1 commit
  2. 03 Mar, 2022 1 commit
    • intrigeri's avatar
      Have tor log to the Journal · e892ef30
      intrigeri authored
      Dropping tordate removed the only reason why we still had to make tor log to its
      own log file, instead of to the Journal. This log split makes it harder than
      necessary to debug stuff, so let's converge to the Journal.
      
      refs #18842
      e892ef30
  3. 29 Jul, 2021 1 commit
  4. 20 Jul, 2021 1 commit
    • anonym's avatar
      Re-enable the tor sandbox when no PTs are used (refs: #18237) · 090dbd6b
      anonym authored
      We have these constraints:
      
      * The tor sandbox is incompatible with the use of PTs
      * The tor Sandbox conf cannot be set at runtime but must be changed in
        torrc followed by a tor restart, which is privileged and cannot be
        done through the control port
      
      The implementation is: when TCA enables bridges, it disables (via
      tca-portal) the tor sandbox iff any PT is used.
      090dbd6b
  5. 22 Mar, 2021 1 commit
  6. 09 Mar, 2021 1 commit
    • anonym's avatar
      Temporarily add pluggable transport config to torrc. · f54b380e
      anonym authored
      So that PTs actually work in this branch. But the real solution is
      probably for TCA to dynamically set ClientTransportPlugin ... when the
      tor seccomp sandbox is disabled (since PTs and the sandbox are
      incompatible).
      f54b380e
  7. 08 Mar, 2021 1 commit
    • anonym's avatar
      Temporarily workaround tor bug by always disabling the seccomp sandbox. · acad89a4
      anonym authored
      NOTE: This commit should be reverted/dropped before merging this
      branch into production!
      
      There is a bug in tor that prevents SAVECONF from working when the
      seccomp sandbox is enabled:
      
        https://gitlab.torproject.org/tpo/core/tor/-/issues/40317
      
      At the moment this breaks pretty much the whole automated test suite:
      we successfully create the with-network-logged-in snapshot, but due to
      the bug torrc is not updated, so it still has "DisableNetwork" set. So
      when we restore the snapshot, and as a consequence restart tor, it
      looses the configuration set by Tor Launcher. And since it is not
      committed to torrc either they won't be restored, so "DisableNetwork"
      is still on and tor won't bootstrap.
      
      More details:
      
        !326 (comment 166438)
      acad89a4
  8. 02 Mar, 2021 1 commit
  9. 24 Feb, 2021 2 commits
  10. 08 Feb, 2021 3 commits
  11. 15 Jan, 2021 1 commit
    • anonym's avatar
      Always start Tor Launcher (refs: #17330). · 1ef8d52f
      anonym authored
      In other words, always enable what we used to call "bridge mode",
      i.e. that tor won't touch the network until the user has configured it
      via Tor Launcher.
      
      This also includes changing Tails Greeter's Network Configuration
      setting to only be about whether to enable or disable networking.
      1ef8d52f
  12. 15 May, 2020 2 commits
  13. 11 Jul, 2019 2 commits
  14. 08 Dec, 2017 1 commit
    • intrigeri's avatar
      Drop (broken) Thunderbird dedicated SocksPort (refs: #12460) · 23932128
      intrigeri authored
      We use a dedicated SocksPort for the MUA as a trade-off: it gives poorer circuit
      isolation than if we used the default SocksPort, but we were ready to compromise
      on this in order to make POP-before-SMTP work. We've released Tails 3.0 with
      this change 4 months ago and I've not heard about anyone being harmed by the
      lack of POP-before-SMTP support, so let's give up on this one and get stronger
      stream isolation in exchange.
      23932128
  15. 22 May, 2017 1 commit
  16. 19 May, 2017 1 commit
  17. 06 Oct, 2016 1 commit
  18. 08 Oct, 2015 1 commit
  19. 05 May, 2015 1 commit
  20. 17 Mar, 2015 2 commits
  21. 19 Sep, 2014 1 commit
    • Tails developers's avatar
      Install TBB in a custom way instead of installing Iceweasel. · 3f1a351d
      Tails developers authored
      Instead of installing the iceweasel package (and friends) we now fetch
      the TBB tarballs at build-time and extract the Tor Browser, browser
      add-ons and langpacks, and browser user data into sensible places. We
      try to keep something like the old organization as much as possible.
      
      Unfortunately this drops language support to whatever subset that the
      TBB supports.
      3f1a351d
  22. 17 Sep, 2014 2 commits
  23. 04 Mar, 2014 1 commit
  24. 21 Oct, 2013 1 commit
  25. 10 Apr, 2013 1 commit
  26. 26 Oct, 2012 1 commit
    • Tails developers's avatar
      Do not use pdnsd anymore. · 155ff43b
      Tails developers authored
      It has been orphaned in Debian, has quite some bugs in there, and apparently
      Tor's DNSPort's own caching could be good enough.
      155ff43b
  27. 24 Oct, 2012 1 commit
  28. 24 Sep, 2012 1 commit
  29. 17 Sep, 2012 1 commit
  30. 04 Sep, 2012 1 commit
  31. 18 Aug, 2012 1 commit
  32. 19 Oct, 2011 1 commit
  33. 14 Oct, 2011 1 commit