[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10395 [Tor]: Tor's consensus lists Torbrowser updates



#10395: Tor's consensus lists Torbrowser updates
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  mikeperry
  StrangeCharm           |     Status:  needs_review
         Type:           |  Milestone:  Tor: 0.2.6.x-final
  enhancement            |    Version:
     Priority:  major    |   Keywords:  pantheon chronos prop227 nickm-
    Component:  Tor      |  patch
   Resolution:           |  Parent ID:  #10393
Actual Points:           |
       Points:           |
-------------------------+-------------------------------------------------

Comment (by gk):

 Replying to [comment:15 mcs]:
 > Kathy and also want to raise some Prop 227 issues that are specific to
 Tor Browser's intended usage (for Mike and GK to ponder):
 >
 > - The proposal mentions a "proposed update timestamp" which is checked
 against the consensus timestamp.  Where will that timestamp come from?  It
 seems like it will need to be a field within the JSON document that the
 consensus points to, but if so, the steps described are slightly out of
 order (the JSON file would need to be downloaded and its hash verified
 against the consensus before the timestamp could be retrieved and
 checked).

 Good question. Even after re-reading section 3.1 a couple of times it is
 still not easy to extract all the necessary things. I think we need to
 rethink/clarify that section at least partly (for instance, that the Tor
 Browser is dowloading the JSON file again and is using that one (How does
 it e.g. know it got the one the Tor client downloaded earlier to check
 whether the hash is correct?) seems a bit weird. At least the hash should
 be checked again. Probably the JSON file should get downloaded only once
 anyway...). But as far as I can see there are no additional tor things
 needed.

 > - If we do not include an OS/platform name in the consensus package
 names, then we will always need to release Tor Browser for all platforms
 at the same time.  This might be OK, but it is worth thinking about
 whether we want to use one package name (e.g., tbb-stable or maybe just
 tb-stable) or 3 package names (e.g., tb-stable-linux, tb-stable-win, tb-
 stable-mac).

 This is a good point. I am leaning to Nick's idea to even include the full
 OS/platform portion. IIRC in the past we had at least one occasion where
 we shipped only new bundles for 64 bit Linux. That was related to a
 compiler bug: #10195. If we think that's too much overhead then at least
 the OS should get added. We may want to add a Tor Browser for Android one
 day and I can imagine that these bundles are different enough that we (at
 least in the beginning) have to release bugfixes much more frequent than
 for Linux/Mac/Windows bundles.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10395#comment:24>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs