tails issueshttps://gitlab.tails.boum.org/tails/tails/-/issues2024-03-27T06:26:14Zhttps://gitlab.tails.boum.org/tails/tails/-/issues/19255Allow Tor Browser to save files to Documents, Downloads, Music, Pictures, Vid...2024-03-27T06:26:14Zsajolidasajolida@pimienta.orgAllow Tor Browser to save files to Documents, Downloads, Music, Pictures, Videos and their subfolders# Plan
- [x] Adjust Tor Browser's AppArmor policy to allow writing to Documents, Downloads, Music, Pictures, Videos and their subfolders: https://gitlab.tails.boum.org/tails/torbrowser-launcher/-/commits/19255-allow-download-to-default-...# Plan
- [x] Adjust Tor Browser's AppArmor policy to allow writing to Documents, Downloads, Music, Pictures, Videos and their subfolders: https://gitlab.tails.boum.org/tails/torbrowser-launcher/-/commits/19255-allow-download-to-default-GNOME-folders
- [x] Disable the GNOME localization code for xdg-user-dirs, so they're *not* renamed to a localized version anymore. They'll keep their English name for every user.
- Implementation: is it enough to disable `/etc/xdg/autostart/user-dirs-update-gtk.desktop`?
# Original report
8 years after we introduced AppArmor in [Tails 1.2](https://tails.boum.org/news/version_1.2), we haven't been able to improve on the serious UX regression introduced in how people can download files from the *Tor Browser*. See #15678 for details.
#10422 still seems pretty far away. Other partial solutions (#19254, #15028, #10790) also seem pretty far away still.
I propose that we temporarily work around this UX regression by allowing Tor Browser to read and write in all of $HOME, while maintaining the current AppArmor limitations on the Persistent Storage. The content of $HOME is amnesic, so should have fewer important documents and data that the Persistent Storage. We could add back some of these AppArmor limitations as we made progress on #15028, #10790, and #10422 for example.Tails_5.22hefeehefeehttps://gitlab.tails.boum.org/tails/tails/-/issues/20261Upgrade to Tor Browser based on ESR 115.92024-03-21T11:48:09ZgroenteUpgrade to Tor Browser based on ESR 115.9https://tails.boum.org/contribute/release_process/tor-browser/https://tails.boum.org/contribute/release_process/tor-browser/Tails_6.1groentegroente2024-03-22https://gitlab.tails.boum.org/tails/tails/-/issues/20242New Identity button will restart browser without closing preexisting "Page in...2024-03-08T00:05:19ZNathan BrooksNew Identity button will restart browser without closing preexisting "Page info" windowpreexisting tabs/window "Page info" pop up, that displays website info such as security, permissions etc will remain opened even after hitting new identity button of the browser.preexisting tabs/window "Page info" pop up, that displays website info such as security, permissions etc will remain opened even after hitting new identity button of the browser.https://gitlab.tails.boum.org/tails/tails/-/issues/20208Browser starts in full screen mode with letter boxing instead of restricted r...2024-02-28T17:01:35ZNathan BrooksBrowser starts in full screen mode with letter boxing instead of restricted resolution on lower resolution displaysthis happened on a resolution of 720p screen but not for 1440p monitor. while the Tor Project's browser starts in restricted window resolution, Tails' would start in full screen with letter boxing on such displays.this happened on a resolution of 720p screen but not for 1440p monitor. while the Tor Project's browser starts in restricted window resolution, Tails' would start in full screen with letter boxing on such displays.https://gitlab.tails.boum.org/tails/tails/-/issues/20159"Scenario Outline: The default XDG directories are usable in Tor Browser" is ...2024-02-28T11:10:57Zintrigeri"Scenario Outline: The default XDG directories are usable in Tor Browser" is fragileQuite often, we see "I can save the current page as "index.html" to the Downloads GNOME bookmark" fail after "I start the Tor Browser in offline mode" succeeded. When this happens, the screenshot shows the "Proxy server is refusing conne...Quite often, we see "I can save the current page as "index.html" to the Downloads GNOME bookmark" fail after "I start the Tor Browser in offline mode" succeeded. When this happens, the screenshot shows the "Proxy server is refusing connections" error in Tor Browser.
Could it be a race condition, where we can't save the error page while Tor Browser is still trying, or something?Tails_6.0segfaultsegfaulthttps://gitlab.tails.boum.org/tails/tails/-/issues/20210Upgrade to Tor Browser 13.0.10 based on ESR 115.82024-02-22T14:08:50ZboyskaUpgrade to Tor Browser 13.0.10 based on ESR 115.8https://tails.boum.org/contribute/release_process/tor-browser/https://tails.boum.org/contribute/release_process/tor-browser/Tails_6.0boyskaboyskahttps://gitlab.tails.boum.org/tails/tails/-/issues/20164tps-frontend: Race condition in handling of conflicting applications2024-02-07T12:34:31Zintrigeritps-frontend: Race condition in handling of conflicting applicationsReported by user in wb:99ade05510205dedefa3221934d8ac44 against 5.21, reproduced by me in 5.21 and 5.22:
when Tor Browser is running and I try to activate the browser bookmarks persistent storage feature, I don't see the dialog that's s...Reported by user in wb:99ade05510205dedefa3221934d8ac44 against 5.21, reproduced by me in 5.21 and 5.22:
when Tor Browser is running and I try to activate the browser bookmarks persistent storage feature, I don't see the dialog that's supposed to ask me to close Tor Browser, and the spinner in tps
GUI keeps spinning.
In the logs I see this:
`Jan 31 16:04:02 amnesia tpsd[6011]: INFO:feature.py:398: [2] Waiting for the user to terminate processes {'Tor Browser': [10281]}`
I cannot reproduce the bug in 5.20, so this regression was introduced recently.Tails_6.0segfaultsegfaulthttps://gitlab.tails.boum.org/tails/tails/-/issues/20060Upgrade to Tor Browser based on ESR 115.72024-01-25T11:25:51ZgroenteUpgrade to Tor Browser based on ESR 115.7Tails_5.22groentegroente2024-01-29https://gitlab.tails.boum.org/tails/tails/-/issues/20095Tor Browser should open documentation links from local website when offline2024-01-24T10:32:07ZboyskaTor Browser should open documentation links from local website when offline### Context
Right now, we have a nice `tails-documentation` command which can, when appropriate, convert a link like https://tails.net/doc/persistent_storage/ into a path like `/usr/share/doc/tails/website/doc/persistent_storage.en.html...### Context
Right now, we have a nice `tails-documentation` command which can, when appropriate, convert a link like https://tails.net/doc/persistent_storage/ into a path like `/usr/share/doc/tails/website/doc/persistent_storage.en.html
### problem
This is good. However, we need to explicitly call this. This means:
- we need to write more code into our GTK applications in order to make it work
- we sometimes forget to write this code
- zenity dialogs just don't support it
For example, !1332 is showing a zenity dialog just after the greeter. It has a link, but there are little chances the user could already be online, so I expect that most of the times this will give a bad UX to the user: they need to click on the link again after they managed to connect to Tor.
### proposal
We could just bake the logic of `tails-documentation` into `/usr/local/bin/tor-browser` itself. This would allow this to Just Work even for users which are currently offline.
I could imagine scenarios where a user has some link, maybe in a document in their Persistent Storage, this document has a link to the website, the user clicks on this link while offline, the link opens just fine now but is not updated, and maybe they would have preferred an error compared to an outdated document. I can't find any practical usecase where this would be worse than the current behavior, though.Tails_5.22boyskaboyskahttps://gitlab.tails.boum.org/tails/tails/-/issues/20127Update doc: Tor Browser can now read/write files from/to Documents, Downloads...2024-01-16T13:35:39ZintrigeriUpdate doc: Tor Browser can now read/write files from/to Documents, Downloads, Music, Pictures, Videos and their subfoldersThe following discussion from !1333 should be addressed:
- [ ] @intrigeri started a [discussion](https://gitlab.tails.boum.org/tails/tails/-/merge_requests/1333#note_223284): (+1 comment)
> @sajolida, I suppose we should update ht...The following discussion from !1333 should be addressed:
- [ ] @intrigeri started a [discussion](https://gitlab.tails.boum.org/tails/tails/-/merge_requests/1333#note_223284): (+1 comment)
> @sajolida, I suppose we should update https://tails.net/doc/anonymous_internet/Tor_Browser/index.en.html#confinement accordingly. If you think you can do this in time for 5.22, please let me know on this thread and do so on this branch. Else, let's resolve this thread with a new issue.Tails_5.22sajolidasajolida@pimienta.orgsajolidasajolida@pimienta.orghttps://gitlab.tails.boum.org/tails/tails/-/issues/20067Upgrade to Tor Browser based on Firefox 115.62023-12-20T08:39:51ZintrigeriUpgrade to Tor Browser based on Firefox 115.6Tails_5.21intrigeriintrigerihttps://gitlab.tails.boum.org/tails/tails/-/issues/20061Tor Browser sometimes crashes when clicking the uBlock icon2023-12-11T09:32:02ZintrigeriTor Browser sometimes crashes when clicking the uBlock iconThis is probably https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42306 wich is fixed in Tor Browser 13.0.6.
Next step: [upgrade Tor Browser](https://tails.net/contribute/release_process/tor-browser/)
This was report...This is probably https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42306 wich is fixed in Tor Browser 13.0.6.
Next step: [upgrade Tor Browser](https://tails.net/contribute/release_process/tor-browser/)
This was reported a number of times since the 5.20 release. It can lose user's work and data.Tails_5.21groentegroentehttps://gitlab.tails.boum.org/tails/tails/-/issues/18452Upgrade to Tor Browser 10.52023-12-08T23:17:22ZintrigeriUpgrade to Tor Browser 10.5Tor Browser 10.5 will ship their new UX for connecting to Tor. It probably won't be a seamless upgrade for us.
Quoting sysrqb:
> We scheduled the 10.5 release next Tuesday, but you can safely pick up
> 10.5.1 on 13 July.
>
> The large...Tor Browser 10.5 will ship their new UX for connecting to Tor. It probably won't be a seamless upgrade for us.
Quoting sysrqb:
> We scheduled the 10.5 release next Tuesday, but you can safely pick up
> 10.5.1 on 13 July.
>
> The largest change in 10.5 is the new default bootstrapping UI/UX, but
> you can use the old (tor-launcher) UI by setting the envvar
> TOR_USE_LEGACY_LAUNCHER.
>
> The other changes in 10.5 shouldn't impact Tails (afaik):
> - Adding support for snowflake
> - Adding warning page when visiting a v2 onion address (global, once
> per session)
> - Dropping support for CentOS 6Tails_4.20intrigeriintrigerihttps://gitlab.tails.boum.org/tails/tails/-/issues/20022uBlock enables and downloads per-region/language additional blocklists2023-11-23T18:44:42ZintrigeriuBlock enables and downloads per-region/language additional blocklistsReported by wb:2198b57911ce2246ba27e649caac5109, reproduced in 5.19: if I choose French locales in the Welcome Screen, when I start Tor Browser, uBlock enables and downloads the "AdGuard Français" lists.
We're told that some fingerprint...Reported by wb:2198b57911ce2246ba27e649caac5109, reproduced in 5.19: if I choose French locales in the Welcome Screen, when I start Tor Browser, uBlock enables and downloads the "AdGuard Français" lists.
We're told that some fingerprinting sites (like https://browserleaks.com/proxy) can
detect this new filter and this is a regression in recent uBlock. I did not confirm any of that.
These filters, defined in `assets.json`, are enabled like that:
```
if (
assetEntry.content === 'filters' &&
assetEntry.external !== true
) {
assetEntry.isDefault =
assetEntry.off === undefined ||
assetEntry.off === true &&
µb.listMatchesEnvironment(assetEntry);
}
```
We could patch that code, or patch `µb.listMatchesEnvironment` to always return false, or programmatically remove per region/language filters (`"group": "regions"`) from `assets.json`. This last option has greater chances to keep working across upgrades (no fuzzy patches that fail to apply), so I like it; but to avoid it silently stopping working we should ensure we are indeed removing some/enough filters.
Tentatively adding this to the FT short-term plate because it looks like a pretty bad fingerprinting bug (assuming we don't already leak the locale in other ways) with simple & cheap solutions.Tails_5.20intrigeriintrigerihttps://gitlab.tails.boum.org/tails/tails/-/issues/20043Upgrade to Tor Browser 13.0.4 based on Firefox 115.52023-11-23T15:50:08ZanonymUpgrade to Tor Browser 13.0.4 based on Firefox 115.5Tails_5.20anonymanonymhttps://gitlab.tails.boum.org/tails/tails/-/issues/20046Tor-browser ignores user.js when persisted as a dotfile2023-11-22T09:18:15ZHello WorldTor-browser ignores user.js when persisted as a dotfileTor-browser honors user.js when created but not when persisted and saved as a dotfile.
*Recreation of issue:*
User creates a `user.js` in `/home/amnesia/.tor-browser/profile.default/`
User places their custom prefs correctly formatte...Tor-browser honors user.js when created but not when persisted and saved as a dotfile.
*Recreation of issue:*
User creates a `user.js` in `/home/amnesia/.tor-browser/profile.default/`
User places their custom prefs correctly formatted in the in the user.js file like the prefs.js says
>// To change a preference value, you can either: \
// - modify it via the UI (e.g. via about:config in the browser); or \
// - set it within a user.js file in your profile.
example custom prefs:
```
user_pref("privacy.prioritizeonions.enabled", true);
user_pref("browser.toolbars.bookmarks.visibility", "always");
```
User launches tor-browser after creation of user.js in same session and sees that user.js is honored in the changes in about:config
User creates dotfile for user.js in dotfiles persistence
/.tor-browser/profile.default/user.js
User reboots tails and sees that Tor-browser then ignores the user.js dotfile they persisted.https://gitlab.tails.boum.org/tails/tails/-/issues/19991"Always ask you where to save files" setting is off by default.2023-10-31T21:36:53Zboyska"Always ask you where to save files" setting is off by default.According to a user report, TorBrowser is not asking where to save files. The user says this is a UX regression.
- Is it true?
- Do we agree it's a regression?
It's probably easy to change this.According to a user report, TorBrowser is not asking where to save files. The user says this is a UX regression.
- Is it true?
- Do we agree it's a regression?
It's probably easy to change this.https://gitlab.tails.boum.org/tails/tails/-/issues/19994Upgrade to Tor Browser 13.0.1 based on Firefox 115.42023-10-29T19:25:24ZintrigeriUpgrade to Tor Browser 13.0.1 based on Firefox 115.4Tails_5.19anonymanonymhttps://gitlab.tails.boum.org/tails/tails/-/issues/19478Upgrade to Tor Browser 13 based on Firefox 1152023-10-25T15:43:29ZintrigeriUpgrade to Tor Browser 13 based on Firefox 115Timing:
- PieroV wrote on Aug 1: "we are still targeting the end of September for 13.0 stable"Timing:
- PieroV wrote on Aug 1: "we are still targeting the end of September for 13.0 stable"Tails_5.19anonymanonymhttps://gitlab.tails.boum.org/tails/tails/-/issues/19983Upgrade Tor Browser to 12.5.62023-10-01T10:59:42ZboyskaUpgrade Tor Browser to 12.5.6https://tails.net/contribute/release_process/tor-browser/https://tails.net/contribute/release_process/tor-browser/Tails_5.18boyskaboyska