*.bamsoftware.com is currently marked as "unsafe" by Google's "safe" browsing system, which breaks in-browser snowflake proxies. We don't know what caused this decision. It's probably a false positive because of an educational article but it may be snowflake itself. We are still waiting to hear back from Google.
We cannot transition the system to a torproject.org domain because if snowflake itself was the issue, we may end up getting torproject.org marked as unsafe too. Besides, our sysadmins may not like providing a domain for a system they don't control.
As a temporary solution, we could purchase another domain and transition to it. Examples are:
snowflake.best
snowflake.rocks
snowflake.world
snowflake.army
Designs
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
$ host snowflake.freehaven.netsnowflake.freehaven.net is an alias for snowflake.bamsoftware.com.snowflake.bamsoftware.com has address 37.218.242.151snowflake.bamsoftware.com has IPv6 address 2a00:c6c0:0:151:4:8f94:69f5:7c01$ host snowflake-broker.freehaven.netsnowflake-broker.freehaven.net is an alias for snowflake-broker.bamsoftware.com.snowflake-broker.bamsoftware.com has address 37.218.240.96
Feel free to give these a try. We can use them for the medium term until we learn more about whether it was the woot paper that caused the trouble, or snowflake. (And if it was snowflake, ok I guess I will now have two domains to ask the safe browsing team wtf about.)
Long term, once we've resolved the zip bomb question, I think using a cname in the torproject.net domain will be a fine choice.
I configured the hosts to recognize the freehaven.net names.
One the broker, in /etc/service/snowflake-broker/run, I changed --acme-hostnames snowflake-broker.bamsoftware.com to --acme-hostnames snowflake-broker.bamsoftware.com,snowflake-broker.freehaven.net and ran sv restart snowflake-broker.
On the bridge, in /etc/tor/torrc, I changed --acme-hostnames snowflake.bamsoftware.com to --acme-hostnames snowflake.bamsoftware.com,snowflake.freehaven.net and ran service tor restart.
So if we want to go ahead with this plan, all that's needed is changing the broker and bridge addresses in the proxy code, and redeploying.
Long term, once we've resolved the zip bomb question, I think using a cname in the torproject.net domain will be a fine choice.
*.torproject.net and *.torproject.org are both routinely blocked for residential Internet connections in the UK on the basis that they provide circumvention of the connection filtering. The snowflake extension itself doesn't provide circumvention to the user of the extension so there is a good basis for arguing it shouldn't be blocked (and I've had these arguments with 's staff, who maintain some of the block lists) but I think their stuff doesn't really work on subdomains or their staff did not configure things with subdomains when I've made complaints. It's all or nothing.
As a side note, Mozilla must have changed their validation process a bit because they complained that the snowflake icon in the manifest wasn't square. I made this change and pushed it as well.
Alright, sorry for the messy update/versioning. I'd accidentally included the embed.html and embed.js files from a different branch. Should be fixed now.
Alright, sorry for the messy update/versioning. I'd accidentally included the embed.html and embed.js files from a different branch. Should be fixed now.
Why is the update taking this much time to appear in the Chrome addon store?
In our experience so far, the Chrome addon store takes at least a day (maybe longer?) to approve new versions. I'm not sure why.
I hope so, since I prefer that over the Firefox addon because it lets me see what's actually happening, and I can run more than one tab with it instead of just the one addon proxy. But if not, it should probably be removed from the docs page at https://trac.torproject.org/projects/tor/wiki/doc/Snowflake. There should either be an explicit commitment to keep the in-page js proxy up to date with changes made to the plugin, or the docs page should stop showing it as a valid option.
Why is the update taking this much time to appear in the Chrome addon store?
In our experience so far, the Chrome addon store takes at least a day (maybe longer?) to approve new versions. I'm not sure why.
I checked just now (2019-07-27T15:19:08+00:00) and it's now showing version 0.0.7 rather than 0.0.8
I checked just now (2019-07-27T15:19:08+00:00) and it's now showing version 0.0.7 rather than 0.0.8
Thanks David, another shameless question when will cupcake use the new freehaven domain? (I tested it and I only saw the bamsoftware one in the addon's settings)
Thanks David, another shameless question when will cupcake use the new freehaven domain? (I tested it and I only saw the bamsoftware one in the addon's settings)
I just sent email to saint about that today, we'll see.
Trac: Cc: cohosh, dcf, arlolra, phw to cohosh, dcf, arlolra, phw, saint
Why is the update taking this much time to appear in the Chrome addon store?
In our experience so far, the Chrome addon store takes at least a day (maybe longer?) to approve new versions. I'm not sure why.
I checked just now (2019-07-27T15:19:08+00:00) and it's now showing version 0.0.7 rather than 0.0.8
Yeah, there's a different packaging requirement for Chrome and Firefox and I messed up the Firefox 0.0.7 upload so had to do a version bump. The Chrome one is fine (I think). In any case, the update took too long for me to just bump it right away again.
I'll close this now because we have the *.freehaven.net and *.torproject.net domain names, and the issue is moot anyway because bamsoftware.com is no longer on the safe browsing blacklist.
Trac: Resolution: N/Ato fixed Status: needs_information to closed