Re: [Tails-testers] Tails-testers Digest, Vol 73, Issue 2

このメッセージを削除

このメッセージに返信
著者: David Poulsen
日付:  
To: tails-testers@boum.org
題目: Re: [Tails-testers] Tails-testers Digest, Vol 73, Issue 2
I've tested it with succesfull result.
Had an issue about UTC Daylight time settings on routers!

Dadana
David

Sent with ProtonMail Secure Email.

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Tuesday, September 15, 2020 12:22 PM, <tails-testers-request@???> wrote:

> Send Tails-testers mailing list submissions to
> tails-testers@???
>


> To subscribe or unsubscribe via the World Wide Web, visit
> https://www.autistici.org/mailman/listinfo/tails-testers
> or, via email, send a message with subject or body 'help' to
> tails-testers-request@???
>


> You can reach the person managing the list at
> tails-testers-owner@???
>


> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Tails-testers digest..."
>


> Today's Topics:
>


> 1. [Tails-news] Call for testing: 4.11~rc1 (Tails - News)
> 2. Re: [Tails-news] Call for testing: 4.11~rc1 (carlosm2)
> 3. test (renaud)
> 4. Tails 4.11~rc1 Tests & Report (Circletop)
>


>


> Message: 1
> Date: Tue, 08 Sep 2020 10:50:02 -0000
> From: Tails - News tails@???
> To: amnesia-news@???
> Subject: [Tails-testers] [Tails-news] Call for testing: 4.11~rc1
> Message-ID: f74f9ec8-6b8d-450b-9be1-43e46cff35ed@???
> Content-Type: text/plain; charset="utf-8"
>


> Tails 4.11, scheduled for September 22, will be the first version of Tails to
> include Tor Browser 10.0 and to support persistent settings on the Welcome
> Screen!
>


> You can help Tails by testing the release candidate for Tails 4.11 now.
>


> Persistent settings on the Welcome Screen
>


> ==========================================
>


> If you enable this persistence feature your Welcome Screen settings, like
> language selection and any administration password, will be automatically
> saved between sessions. While at the Welcome Screen the settings are restored
> as soon as you unlock your persistent encrypted volume. Please let us know if
> there are any problems!
>


> Tor Browser 10.0 (alpha 6)
>


> ===========================
>


> This new major release of Tor Browser is based on a brand new Firefox ESR
> series, version 78, which contains tons of changes, most under the hood.
> There's a risk that some of these changes break some expected feature in
> Tails, so please pay close attention and report any such issues to us!
>


> Changelog
>


> ==========
>


> For more details about what has changed in Tails 4.11~rc1, read our
> changelog.
>


> Known issues
>


> =============
>


> - In Tor Browser, opening `file://` URLs has a problem: opening any such local file will result in an infinite refresh loop like if you kept the F5 key pressed, so it will likely not display anything. At the moment this makes it impossible to read the offline documentation inside Tails, for instance. This will be fixed in Tails 4.11.
>


>     See the list of long-standingissues.

>


> How to test Tails 4.11~rc1?
>


> ============================
>


> Keep in mind that this is a test image. We tested that it is not broken in
> obvious ways, but it might still contain undiscovered issues.
>


> Please, report any new problem to [tails-testers@???](mailto:tails-
> testers@???) (public mailing list).
>


> Get Tails 4.11~rc1
>


> ===================
>


> To upgrade your Tails USB stick and keep your persistent storage
>


> -----------------------------------------------------------------
>


> - Automatic upgrades are available from 4.2 or later to 4.11~rc1.
>


>     To do an automatic upgrade to Tails 4.11~rc1:

>


>     1.  Start Tails 4.2 or later and set an administration password.
>     2.  Run this command in a Terminal:

>


>         echo TAILS_CHANNEL=\"alpha\" | sudo tee -a /etc/os-release && \
>         tails-upgrade-frontend-wrapper

>


>         Enter the administration password when asked for the "password for amnesia".

>


>     3.  After the upgrade is applied, restart Tails and choose Applications ? Tails ? About Tails to verify that you are running Tails 4.11~rc1.
> -   If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.

>


> To download 4.11~rc1
>


> ---------------------
>


> ### Direct download
>


> - For USB sticks (USB image) (OpenPGP signature)
> - For DVDs and virtual machines (ISO image) (OpenPGP signature)
>


> ### BitTorrent download
>


> - For USB sticks (USB image)
> - For DVDs and virtual machines (ISO image)
>


> To install Tails on a new USB stick
>


> ------------------------------------
>


> Follow our installation instructions:
>


> - Install from Windows
> - Install from macOS
> - Install from Linux
>


>     All the data on this USB stick will be lost.

>


>


> What's coming up?
>


> ==================
>


> Tails 4.11 isscheduled for
> September 22.
>


> Have a look at our roadmap to see
> where we are heading to.
>


> We need your help and there are many ways to contribute toTails(donating is only one of them).
> Come [talk to us](https://tails.boum.org/about/contact/index.en.html#tails-
> dev)!
>


> URL: https://tails.boum.org/news/test_4.11-rc1/
>


> amnesia-news mailing list
> amnesia-news@???
> https://www.autistici.org/mailman/listinfo/amnesia-news
> To unsubscribe from this list, send an email to amnesia-news-unsubscribe@???.
>


> -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>


> Message: 2
> Date: Thu, 10 Sep 2020 21:50:24 -0500
> From: carlosm2 carlosm2@???
> To: tails-testers@???
> Subject: Re: [Tails-testers] [Tails-news] Call for testing: 4.11~rc1
> Message-ID: d6bdcc21-fb6b-124d-3048-344a51a48b06@???
> Content-Type: text/plain; charset=utf-8
>


> hi dear Tails team
>


> first thanks for the constant work
>


> for some time I could not support with testing
>


> I answer between the lines
>


> El 08/09/20 a las 5:50, Tails - News escribi?:
>


> > You can help Tails by testing the release candidate for Tails 4.11 now.
> >


> > Persistent settings on the Welcome Screen
> >


> > ==========================================
>


> i enable the persistent setting on welcome screen, was great to use this
> new feature, I find it very useful
>


> I restart the computer with this feature 3 times, enabling and testing
> thunderbird, bookmarks, welcome screen, additional software (htop, lshw)
> and all works fine
>


> > If you enable this persistence feature your Welcome Screen settings, like
> > language selection and any administration password, will be automatically
> > saved between sessions. While at the Welcome Screen the settings are restored
> > as soon as you unlock your persistent encrypted volume. Please let us know if
> > there are any problems!
>


> this feature worked great:
>


> language (spanish), keyboard layout (latin america) and administration
> password
>


> > Tor Browser 10.0 (alpha 6)
> >


> > ===========================
> >


> > This new major release of Tor Browser is based on a brand new Firefox ESR
> > series, version 78, which contains tons of changes, most under the hood.
> > There's a risk that some of these changes break some expected feature in
> > Tails, so please pay close attention and report any such issues to us!
>


> I test a bookmark, youtube on full screen and twitter, all good
>


> > Changelog
> >


> > ==========
>


> some more info:
>


> root@amnesia:/home/amnesia# lshw
> amnesia
> description: Notebook
> product: X455LAB (ASUS-NotebookSKU)
> *-cpu
> description: CPU
> product: Intel(R) Core(TM) i3-4005U CPU @ 1.70GHz
> *-memory
> description: System Memory
> physical id: 14
> slot: System board or motherboard
> size: 4GiB
> *-display
> description: VGA compatible controller
> product: Haswell-ULT Integrated Graphics Controller
> vendor: Intel Corporation
> *-usb:0
> description: Mass storage device
> product: ADATA USB Flash Drive
>


> > For more details about what has changed in Tails 4.11~rc1, read our
> > changelog.
> >


> > Known issues
> >


> > =============
> >


> > - In Tor Browser, opening `file://` URLs has a problem: opening any such local file will result in an infinite refresh loop like if you kept the F5 key pressed, so it will likely not display anything. At the moment this makes it impossible to read the offline documentation inside Tails, for instance. This will be fixed in Tails 4.11.
> >


> > See the list of long-standingissues.
> >


> > How to test Tails 4.11~rc1?
> >


> > ============================
> >


> > Keep in mind that this is a test image. We tested that it is not broken in
> > obvious ways, but it might still contain undiscovered issues.
> > Please, report any new problem to [tails-testers@???](mailto:tails-
> > testers@???) (public mailing list).
> >


> > Get Tails 4.11~rc1
> >


> > ===================
> >


> > To upgrade your Tails USB stick and keep your persistent storage
> >


> > -----------------------------------------------------------------
> >


> > - Automatic upgrades are available from 4.2 or later to 4.11~rc1.
> >


> > To do an automatic upgrade to Tails 4.11~rc1:
> >


> >     1. Start Tails 4.2 or later and [set an administration password](https://tails.boum.org/doc/first_steps/welcome_screen/administration_password/index.en.html).

> >


> >     2. Run this command in a _Terminal_:

> >


> >                 echo TAILS_CHANNEL=\\"alpha\\" | sudo tee -a /etc/os-release && \\
> >              tails-upgrade-frontend-wrapper

> >


> >


> > Enter the administration password when asked for the "password for amnesia".
> >


> >     3. After the upgrade is applied, restart Tails and choose **Applications ? Tails ? About Tails** to verify that you are running Tails 4.11~rc1.

> >


> >


> > - If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade.
> >


> > To download 4.11~rc1
> >


> > ---------------------
> >


> > ### Direct download
> >


> > - For USB sticks (USB image) (OpenPGP signature)
> >


> > - For DVDs and virtual machines (ISO image) (OpenPGP signature)
> >


> >


> > ### BitTorrent download
> >


> > - For USB sticks (USB image)
> >


> > - For DVDs and virtual machines (ISO image)
> >


> >


> > To install Tails on a new USB stick
> >


> > ------------------------------------
> >


> > Follow our installation instructions:
> >


> > - Install from Windows
> > - Install from macOS
> > - Install from Linux
> >


> > All the data on this USB stick will be lost.
> >


> > What's coming up?
> >


> > ==================
> >


> > Tails 4.11 is scheduled for
> > September 22.
> > Have a look at our roadmap to see
> > where we are heading to.
> > We need your help and there are many ways to contribute toTails(donating is only one of them).
> > Come [talk to us](https://tails.boum.org/about/contact/index.en.html#tails-
> > dev)!
> > URL: https://tails.boum.org/news/test_4.11-rc1/
> >


> > amnesia-news mailing list
> > amnesia-news@???
> > https://www.autistici.org/mailman/listinfo/amnesia-news
> > To unsubscribe from this list, send an email to amnesia-news-unsubscribe@???.
> >


> > Tails-testers mailing list
> > Tails-testers@???
> > https://www.autistici.org/mailman/listinfo/tails-testers
> > To unsubscribe from this list, send an empty email to Tails-testers-unsubscribe@???.
>


> thanks
>


> >


>


> --
>


> carlosm2
>


> gpg fingerprint: CFCA1F086AAF3654FBC7D44C5FDA7A75CE42E670
> keyid: 0x5FDA7A75CE42E670
>


> ----------------------------------------------------------------------------------------------
>


> Message: 3
> Date: Thu, 10 Sep 2020 11:51:43 +0200
> From: renaud celtic@???
> To: tails-testers@???
> Subject: [Tails-testers] test
> Message-ID: 8b50c5e5-53d6-072c-3a34-8af7a6040343@???
> Content-Type: text/plain; charset="utf-8"
>


> dear all,
>


> tails 4.10? VM :
>


> -   runs well in KVM with settings :
>     o debian 10,
>     o ?ram : 8192 MB

>


>     tails 411rc1 VM

>


> - seems to be ok with same settings
>


>     have a nice day

>


>     -------------- next part --------------
>     HTML attachment scrubbed and removed

>


>


> Message: 4
> Date: Tue, 15 Sep 2020 10:22:22 +0000
> From: Circletop circletop@???
> To: "tails-testers@???" tails-testers@???
> Cc: "circletop@???" circletop@???
> Subject: [Tails-testers] Tails 4.11~rc1 Tests & Report
> Message-ID:
> 7OhRw6tHHj_bXKJRAlhRfvgbldZJnLJcJ75kPl_4qynqvB7qZrjEaPoCU3TbuEyE9JQTQXKxCEzuPoHrFzXf_3oKcyaXgrRQbf314XX2HuU=@protonmail.com
>


> Content-Type: text/plain; charset="utf-8"
>


>

> Hello Tails Team and Testers,
>


> Here is our report on Tails 4.11~rc1. Let us know if any clarification is desired.
>


> Thanks to the Tails team for all their hard work, and congratulations on nearing another successful release.
>


> This email is signed with our OpenPGP key, which is also attached in ASCII-armored format.
>


> To learn more about us, or, to confirm the details of said key, please visit our website at: https://circletop.wordpress.com
>


> Best Regards,
>


> Circletop
>


> Contact: circletop@???
>


> ============================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
>


> CONTENTS:
>


> - Introduction
> - Build information
> - Acquisition
> - Verification
> - Installation
> - Boot
> - Persistence
> - Welcome Screen
> - Tor
> - Tor Browser
> - Manual Test Suite
> - References
> - OpenPGP Key Details
>


>     ========================================================================================================================

>


>     INTRODUCTION:

>


>     These tests were performed using Tails 4.10 and 4.11~rc1. Both operating systems ran from a USB flash drive on a 64-bit PC computer with password-protected Secure Boot enabled. The computer was plugged into a power source the whole time, and never ran on battery.

>


>     All internet connections were established using 2.4 GHz 802.11 ("Wi-Fi") with WPA2 AES-PSK encryption.

>


>     In general, 4.11~rc1 performs as well as 4.10. It boots, displays the correct version, runs Tor, the Tor Browser, the Unsafe Browser, and other applications without producing errors.

>


>     The new persistent settings on the Welcome Screen function fine, as does persistence of other data.

>


>     The main problem we discovered is that the Tor Browser 10.0a6 in Tails 4.11~rc1 is much more likely to produce a Cloudflare captcha request when attempting to access a website than its predecessor, Tor Browser 9.5.4 in Tails 4.10.

>


>     ========================================================================================================================

>


>     BUILD INFORMATION:

>


>     This is the build information for the two versions of Tails used in these tests:

>


>     Tails 4.10:
>     4.10 - 20200824
>     340e0ca863b5f8aca8ac47edab2235d82420dee9
>     live-build: 3.0.5+really+is+2.0.12-0.tails5
>     live-boot: 1:20170112
>     live-config: 5.20190519

>


>     Tails 4.11~rc1:
>     4.11~rc1 - 20200907
>     f851752ef1b31c0fa5674830ff10df151597fe8f
>     live-build: 3.0.5+really+is+2.0.12-0.tails5
>     live-boot: 1:20170112
>     live-config: 5.20190519

>


>     ========================================================================================================================

>


>     ACQUISITION:

>


>     All files relevant to the installation of Tails 4.11~rc1 were downloaded using the Tor Browser 9.5.4 running on Tails 4.10. However, the Tails signing key and signatures were downloaded a second time using the "wget" command in the terminal, then, the checksums of the respective pairs were compared. All were identical.

>


>     The following is a list of the five acquired files in addition to relevant information:

>


>


> 1.  Tails signing key
>     Filename: tails-signing.key
>     Source: https://tails.boum.org/tails-signing.key
>     SHA-256 Checksum: 7a4e647d7ead15db1f5b0ba8013c710ace2c91957e75a32110795c3c8be50651

>


> 2.  Tails 4.11~rc1 USB image
>     Filename: tails-amd64-4.11~rc1.img
>     Source: https://tails.quantum-mirror.hu/alpha/tails-amd64-4.11~rc1/tails-amd64-4.11~rc1.img
>     SHA-256 Checksum: 3cfc11e112f94f70cde2018c469db65a5653236d05eaa3b4deec449a1ba13c59

>


> 3.  Tails 4.11~rc1 USB image OpenPGP signature
>     Filename: tails-amd64-4.11~rc1.img.sig
>     Source: https://tails.boum.org/torrents/files/tails-amd64-4.11~rc1.img.sig
>     SHA-256 Checksum: 05eec118ce725d1b297b7c4d0dfe012907d169866580c210a4e612ea11cb77e3

>


> 4.  Tails 4.11~rc1 ISO image
>     Filename: tails-amd64-4.11~rc1.iso
>     Source: https://tails.quantum-mirror.hu/alpha/tails-amd64-4.11~rc1/tails-amd64-4.11~rc1.iso
>     SHA-256 Checksum: c583734586fbc0fdd95289c2e4a51a5dc519349aa5daf16fabeb9b360dd478e0

>


> 5.  Tails 4.11~rc1 ISO image OpenPGP signature
>     Filename: tails-amd64-4.11~rc1.iso.sig
>     Source: https://tails.boum.org/torrents/files/tails-amd64-4.11~rc1.iso.sig
>     SHA-256 Checksum: 4e83f68d908696d70f200c92f40eaedb8098110052ce7a14c3f229c75e1955dc

>


>     ========================================================================================================================

>


>     VERIFICATION:

>


>     Verification of the Tails 4.11~rc1 installation media using either the terminal or Seahorse-tool integrated into Nautilus ("Files") both succeeded.

>


>     The only small problem was a grammatical error in the part of the notification the Seahorse-tool produced which reads "Valid but untrusted signature by on 2020-09-07." The "by" should be removed. This error occurred verifying both the USB and ISO images.

>


>     The following is the terminal output displayed when importing the Tails signing key then verifying the respective media using the "gpg" command:

>


>     amnesia@amnesia:~$ gpg --import tails-signing.key
>     gpg: key 0xDBB802B258ACD84F: 2170 signatures not checked due to missing keys
>     gpg: key 0xDBB802B258ACD84F: "Tails developers (offline long-term identity key) tails@???" 8 new signatures

>


>


> gpg: Total number processed: 1
> gpg: new signatures: 8
> gpg: marginals needed: 3 completes needed: 1 trust model: pgp
> gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u
>


> amnesia@amnesia:~$ TZ=UTC gpg --no-options --keyid-format long --verify tails-amd64-4.11~rc1.img.sig tails-amd64-4.11~rc1.img
> gpg: Signature made Mon 07 Sep 2020 03:17:42 PM UTC
> gpg: using RSA key 05469FB85EAD6589B43D41D3D21DAD38AF281C0B
> gpg: Good signature from "Tails developers (offline long-term identity key) tails@???" [unknown]
> gpg: aka "Tails developers tails@???" [unknown]
> gpg: WARNING: This key is not certified with a trusted signature!
> gpg: There is no indication that the signature belongs to the owner.
> Primary key fingerprint: A490 D0F4 D311 A415 3E2B B7CA DBB8 02B2 58AC D84F
> Subkey fingerprint: 0546 9FB8 5EAD 6589 B43D 41D3 D21D AD38 AF28 1C0B
>


> amnesia@amnesia:~$ TZ=UTC gpg --no-options --keyid-format long --verify tails-amd64-4.11~rc1.iso.sig tails-amd64-4.11~rc1.iso
> gpg: Signature made Mon 07 Sep 2020 03:17:30 PM UTC
> gpg: using RSA key 05469FB85EAD6589B43D41D3D21DAD38AF281C0B
> gpg: Good signature from "Tails developers (offline long-term identity key) tails@???" [unknown]
> gpg: aka "Tails developers tails@???" [unknown]
>


> gpg: WARNING: This key is not certified with a trusted signature!
> gpg: There is no indication that the signature belongs to the owner.
> Primary key fingerprint: A490 D0F4 D311 A415 3E2B B7CA DBB8 02B2 58AC D84F
> Subkey fingerprint: 0546 9FB8 5EAD 6589 B43D 41D3 D21D AD38 AF28 1C0B
>


> ========================================================================================================================================================================================================================================================================================
>


> INSTALLATION:
>


> Tails 4.11~rc1 was installed from Tails 4.10 to a USB drive using its USB image file and the "Restore Disk Image" function of Gnome Disks. This technique is described on the "Install from Linux" page of the Tails documentation. [1]
>


> The installation took about two minutes to complete. After it was done Gnome Disks showed two partitions: "TAILS Partition 1: Tails 1.2 GB FAT" and "Free Space 63 GB."
>


> This is some of the information that was displayed by Gnome Disks when the "TAILS Partition 1: Tails 1.2 GB FAT" partition was selected:
> Partitioning: GUID Partition Table
> Size: 1.2 GB (1,241,513,984 bytes)
> Device: /dev/sdc1
> UUID: /dev/sdc1
> Partition Type: EFI System (System, Legacy BIOS Bootable, Read-only, Hidden, No Automount)
> Contents: FAT (32-bit version) - Not Mounted
>


> This is some of the information that was displayed by Gnome Disks when the "Free Space 63 GB" partition was selected:
> Size: FAT (32-bit version) - Not Mounted
> Device: /dev/sdc
> Contents: Unallocated Space
>


> =========================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
>


> BOOT:
>


> Tails was booted with Secure Boot enabled. It booted in the same amount of time as Tails 4.10.
>


> To boot Tails 4.11~rc1 we inserted the USB drive containing the operating system, pressed the power button, pressed the function "fn" key related to boot selection, entered our BIOS administrator password, selected the USB drive, and pressed enter.
>


> Then the screen showed:
>


> Welcome to GRUB!
>


> Then the Grub selection screen showed:
>


> GNU Grub 2.04-8
>


> -   Tails
>     Tails (Troubleshooting mode)

>


>     Then the following text appeared:

>


>     Booting 'Tails'
>     Loading the Linux kernel...
>     Loading the initramfs...
>     Booting...

>


>     Then the same three-dot progress bar from earlier versions of Tails appeared, and, as usual, the dots were highlighted left to right.
>     Then the Welcome Screen appeared, and, after selecting "Start Tails," the operating system began after a few more seconds.

>


>


> The following system and disk space information was generated by the terminal on first boot using the default Welcome Screen options without any persistent volume, administrative password, or other configurations:
>


> amnesia@amnesia:~$ uname -a
> Linux amnesia 5.7.0-3-amd64 #1 SMP Debian 5.7.17-1 (2020-08-23) x86_64 GNU/Linux
>


> amnesia@amnesia:~$ df -h
> Filesystem Size Used Avail Use% Mounted on
> udev 3.9G 0 3.9G 0% /dev
> tmpfs 787M 9.7M 777M 2% /run
> /dev/sdb1 8.0G 1.2G 6.9G 15% /lib/live/mount/medium
> /dev/loop0 1.1G 1.1G 0 100% /lib/live/mount/rootfs/filesystem.squashfs
> tmpfs 3.9G 16M 3.9G 1% /lib/live/mount/overlay
> overlay 3.9G 16M 3.9G 1% /
> tmpfs 3.9G 0 3.9G 0% /dev/shm
> tmpfs 5.0M 4.0K 5.0M 1% /run/lock
> tmpfs 3.9G 0 3.9G 0% /sys/fs/cgroup
> tmpfs 3.9G 0 3.9G 0% /var/tmp
> tmpfs 3.9G 74M 3.8G 2% /run/initramfs
> tmpfs 3.9G 0 3.9G 0% /tmp
> tmpfs 787M 48K 787M 1% /run/user/1000
>


> ==============================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
>


> PERSISTENCE:
>


> The "Configure Persistent Volume" application was used to create and configure the persistent volume. Every option to save files was selected. 51.62 GB of free space was created out of the 64 GB USB drive, which took about eighteen seconds to complete.
>


> According to the "Configure Persistent Volume" application the persistent volume was located at /dev/sdb2, but the terminal didn't agree. Before restarting, it appeared at /dev/dm-0:
>


> amnesia@amnesia:~$ df -h
> Filesystem Size Used Avail Use% Mounted on
> udev 3.9G 0 3.9G 0% /dev
> tmpfs 787M 9.7M 777M 2% /run
> /dev/sdb1 8.0G 1.2G 6.9G 15% /lib/live/mount/medium
> /dev/loop0 1.1G 1.1G 0 100% /lib/live/mount/rootfs/filesystem.squashfs
> tmpfs 3.9G 16M 3.9G 1% /lib/live/mount/overlay
> overlay 3.9G 16M 3.9G 1% /
> tmpfs 3.9G 0 3.9G 0% /dev/shm
> tmpfs 5.0M 4.0K 5.0M 1% /run/lock
> tmpfs 3.9G 0 3.9G 0% /sys/fs/cgroup
> tmpfs 3.9G 0 3.9G 0% /var/tmp
> tmpfs 3.9G 74M 3.8G 2% /run/initramfs
> tmpfs 3.9G 0 3.9G 0% /tmp
> tmpfs 787M 52K 787M 1% /run/user/1000
> /dev/dm-0 51G 53M 48G 1% /media/tails-persistence-setup/TailsData
>


> After restarting it appeared at /dev/mapper/TailsData_unlocked:
>


> amnesia@amnesia:~$ df -h
> Filesystem Size Used Avail Use% Mounted on
> udev 3.9G 0 3.9G 0% /dev
> tmpfs 787M 9.7M 777M 2% /run
> /dev/sdb1 8.0G 1.2G 6.9G 15% /lib/live/mount/medium
> /dev/loop0 1.1G 1.1G 0 100% /lib/live/mount/rootfs/filesystem.squashfs
> tmpfs 3.9G 16M 3.9G 1% /lib/live/mount/overlay
> overlay 3.9G 16M 3.9G 1% /
> tmpfs 3.9G 0 3.9G 0% /dev/shm
> tmpfs 5.0M 4.0K 5.0M 1% /run/lock
> tmpfs 3.9G 0 3.9G 0% /sys/fs/cgroup
> tmpfs 3.9G 0 3.9G 0% /var/tmp
> tmpfs 3.9G 74M 3.8G 2% /run/initramfs
> tmpfs 3.9G 4.0K 3.9G 1% /tmp
> /dev/mapper/TailsData_unlocked 51G 55M 48G 1% /live/persistence/TailsData_unlocked
> tmpfs 787M 44K 787M 1% /run/user/1000
>


> ==============================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
>


> WELCOME SCREEN:
>


> The persistent volume, Administrative Password, Unsafe Web Browser, and language selection features of the Welcome Screen all worked and persisted through multiple cold boots without problems.
>


> ====================================================================================================================================================================================================================
>


> TOR:
>


> This is the tor version in Tails 4.11~rc1:
>


> amnesia@amnesia:~$ apt show tor
> Package: tor
> Version: 0.4.3.6-1~d10.buster+1
>


> The first line of terminal output for the "tor" command read "Tor 0.4.3.6 running on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.1d, Zlib 1.2.11, Liblzma 5.2.4, and Libzstd 1.3.8."
>


> =========================================================================================================================================================================================================================================================================================================================
>


> TOR BROWSER:
>


> This is the Tor Browser version bundled with Tails 4.10:
> 9.5.4 (based on Mozilla Firefox 68.12.0esr) (64-bit)
>


> This is the Tor Browser version bundled with Tails 4.11~rc1:
> 10.0a6 (based on Mozilla Firefox 78.2.0esr) (64-bit)
>


> We encountered these four problems testing Tor Browser 10.0a6 running on Tails 4.11~rc1:
>


> 1.  We visited multiple unrelated websites over the course of several days using both the Tor Browser 10.0a6 and Tor Browser 9.5.4. The same sites which never produced a Cloudflare captcha request on Tor Browser 9.5.4 always did responding to Tor Browser 10.0a6. Using "New Identity" or "New Tor Circuit for this Site" made no difference.
>     We consider this a serious problem effecting both the functionality and adoption of the Tor Browser and Tails.

>


> 2. Some embedded content which loaded automatically using Tor Browser 9.5.4 produced the following notice with Tor Browser 10.0a6:
>


>     "Tor Browser Can't Open This Page
>     To protect your security, [URL] will not allow Tor Browser to display the page if another site has embedded it. To see this page, you need to open it in a new window."

>


>     Then clicking "Open Site in New Window" opened a Cloudflare-protected link which rendered content without user intervention in a few seconds.

>


> 3. When we visited the internet utility website Arul John [2] the initial Tor Browser 10.0a6 resolution and size displayed was 640x480, but that quickly changed to either 998x499 or 999x500 even though the page hadn't been reloaded. The resolution and size given for Tor Browser 9.5.4 was a static 1000x700. This maybe a bug with the website or the Tor Browser 10.0a6.
> 4. After loading the JonDonym website using Tor Browser 10.0a6 it showed "Warning: Your IP address is neither anonymized by JonDonym nor by Tor." [3] However, the Tor Project's Tor Check site showed "Congratulations. This browser is configured to use Tor." [4] Finally, visiting the JonDonym website using Tor Browser 9.5.4 showed "You are using Tor," as did the Tor Check site. This maybe a problem with the JonDonym website rather than the Tor Browser.
>


> The following is a list of other test results and observations from Tor Browser 10.0a6 running on Tails 4.11~rc1:
>


> 1. All websites visited using onion ("hidden") services functioned.
> 2. An html file of bookmarks exported from Tor Browser 9.5.4 was imported into Tor Browser 10.0a6 without problems.
> 3. The homepage was changed from "Welcome to Tails!" to "Trying a testing version of Tails." [5]
> 4. Video-streaming websites worked.
> 5. Internet speed tests results showed Tor Browser 10.0a6 was roughly 20-40% faster than Tor Browser 9.5.4
> 6. The uBlock icon was visible. When visiting websites ads weren't displayed and the uBlock icon showed "a strictly positive number of blocked elements."
> 7. Samy Kamkar's evercookie [6] didn't persist once "New Identity" was used with uBlock disabled.
>


>     The created cookie showed:
>     userData mechanism: undefined
>     cookieData mechanism: 769
>     localData mechanism: 769
>     globalData mechanism: undefined
>     sessionData mechanism: 769
>     windowData mechanism: 769
>     etagData mechanism: 769
>     cacheData mechanism: 769
>     lsoData mechanism: undefined
>     slData mechanism: undefined

>


>     Then after "New Identity" was used "Click to rediscover cookies" showed:
>     pngData mechanism: undefined
>     etagData mechanism:
>     cacheData mechanism:
>     userData mechanism: undefined
>     cookieData mechanism: undefined
>     localData mechanism: null
>     globalData mechanism: undefined
>     sessionData mechanism: null
>     windowData mechanism: undefined
>     lsoData mechanism: undefined
>     slData mechanism: undefined

>


> 8.  An extended DNS test showed no leakage. [7]
> 9.  media.peerconnection.enabled was set to "false" in "about:config"
> 10.  https://net.ipcalf.com displayed:
>     ifconfig | grep inet | grep -v inet6 | cut -d" " -f2 | tail -n1

>


> 11. Using the root terminal "apt" or "apropos" commands didn't show anything about the tor-browser package, which the terminal showed as present with the double-tab or "which" commands:
>


>     root@amnesia:~# apropos tor-browser
>     tor-browser: nothing appropriate.

>


>     root@amnesia:~# apt search tor-browser
>     Sorting... Done
>     Full Text Search... Done

>


>     root@amnesia:~# apt show tor-browser
>     N: Unable to locate package tor-browser
>     N: Unable to locate package tor-browser
>     E: No packages found

>


>     root@amnesia:~# tor-
>     tor-browser tor-instance-create tor-print-ed-signing-cert tor-resolve
>     tor-gencert tor-launcher tor-prompt

>


>     root@amnesia:~# which tor-browser
>     /usr/local/bin/tor-browser

>


>     ========================================================================================================================

>


>     MANUAL TEST SUITE:

>


>     This is a list of tests we ran on Tails 4.11~rc1 largely derived from the "Manual Test Suite." [8]

>


> 12. WhisperBack 1.8.4 was used to send a test message and headers with a contact email address and its public OpenPGP key included, then printed "Your message has been sent."
> 13. APT:
>


>     amnesia@amnesia:~$ grep -r jenw7xbd6tf7vfhp.onion /etc/apt/sources.list*
>     /etc/apt/sources.list.d/tails.list:deb tor+http://jenw7xbd6tf7vfhp.onion/ 4.11-rc1 main contrib

>


> 14. When online the "Tails documentation" desktop launcher opened the Tails Documentation website in the Tor Browser. [9] When offline the same launcher opened a copy of the entire Tails website, whose internal links worked well. [10]
> 15. The "systemctl --failed --all" command showed "0 loaded units listed" using either the root or standard terminal:
>


>     amnesia@amnesia:~$ systemctl --failed --all
>     0 loaded units listed.
>     To show all installed unit files use 'systemctl list-unit-files'.

>


> 16. This is the output of the "sudo journalctl -p 0..3" command:
>


>     root@amnesia:~# sudo journalctl -p 0..3
>     amnesia kernel: x86/cpu: VMX (outside TXT) disabled by BIOS
>     amnesia kernel: radeon 0000:03:00.0: failed VCE resume (-110).
>     amnesia kernel: usb 2-5: device descriptor read/64, error -71
>     amnesia kernel: usb 2-5: device descriptor read/64, error -71
>     amnesia kernel: usb 2-5: device descriptor read/64, error -71
>     amnesia kernel: usb 2-5: device descriptor read/64, error -71
>     amnesia kernel: usb 2-5: device not accepting address 6, error -71
>     amnesia kernel: usb 2-5: device not accepting address 7, error -71
>     amnesia kernel: usb usb2-port5: unable to enumerate USB device
>     amnesia kernel: radeon 0000:03:00.0: failed VCE resume (-110).
>     amnesia spice-vdagent[5227]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0
>     amnesia gdm-password][6502]: PAM unable to dlopen(pam_gnome_keyring.so): /lib/security/pam_gnome_keyring.so: cannot open shared
>     amnesia gdm-password][6502]: PAM adding faulty module: pam_gnome_keyring.so
>     amnesia kernel: radeon 0000:03:00.0: failed VCE resume (-110).
>     amnesia kernel: iwlwifi 0000:02:00.0: firmware: failed to load iwl-debug-yoyo.bin (-2)
>     amnesia kernel: firmware_class: See https://wiki.debian.org/Firmware for information about missing firmware
>     amnesia spice-vdagent[9586]: Cannot access vdagent virtio channel /dev/virtio-ports/com.redhat.spice.0
>     amnesia wpa_supplicant[3895]: nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No suc
>     amnesia wpa_supplicant[3895]: nl80211: Failed to set IPv4 unicast in multicast filter
>     amnesia wpa_supplicant[3895]: nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No suc
>     amnesia wpa_supplicant[3895]: nl80211: Failed to set IPv4 unicast in multicast filter
>     amnesia wpa_supplicant[3895]: nl80211: Failed to open /proc/sys/net/ipv4/conf/p2p-dev-wlan0/drop_unicast_in_l2_multicast: No suc
>     amnesia wpa_supplicant[3895]: nl80211: Failed to set IPv4 unicast in multicast filter
>     amnesia gdm-session-worker.real[14493]: PAM unable to dlopen(pam_gnome_keyring.so): /lib/security/pam_gnome_keyring.so: cannot o
>     amnesia gdm-session-worker.real[14493]: PAM adding faulty module: pam_gnome_keyring.so
>     amnesia kernel: radeon 0000:03:00.0: failed VCE resume (-110).
>     amnesia kernel: radeon 0000:03:00.0: failed VCE resume (-110).
>     amnesia kernel: tpm tpm0: tpm_try_transmit: send(): error -5
>     amnesia gdm-session-worker.real[16334]: PAM unable to dlopen(pam_gnome_keyring.so): /lib/security/pam_gnome_keyring.so: cannot o
>     amnesia gdm-session-worker.real[16334]: PAM adding faulty module: pam_gnome_keyring.so
>     lines 1-31

>


> 17. The Tails Verification Extension running in the Tor Browser worked to verify both the USB and ISO images of Tails 4.10.
> 18. The Unsafe Web Browser worked as long as it was enabled in the Welcome Screen and there was an internet connection.
>


> -   -   Trying to start it without enabling it in the Welcome Screen showed a popup which read:
>         "Error: The Unsafe Browser was not enabled in the Welcome Screen. To use the Unsafe Browser, restart Tails and enable the Unsafe Browser in the additional settings of the Welcome Screen. To always enable the Unsafe Browser, turn on the Welcome Screen feature of the Persistent Storage."

>


> -   -   Trying to start it without an internet connection showed a popup which read:
>         "Error: No DNS server was obtained through DHCP or manually configured in NetworkManager."

>


> -   -   Starting it with an internet connection showed a popup which read:
>         "Launch the Unsafe Browser? The Unsafe Browser is not anonymous and the websites that you visit can see your real IP address. Only use the Unsafe Browser to log in to a captive portal or browse trusted web pages on the local network."

>


>


> 8. Root access control worked. Tails was started, the persistent volume was unlocked, the persistent administrative password was subtracted from the welcome screen additional options, then the following tests were performed:
>


> - - Root Terminal was started. The administrative password was entered. No root terminal opened and the screen read "Sorry, that didn't work. Please try again."
> - - Terminal was started, then the "sudo su" command was attempted and failed after presenting an option to enter a password:
>


>         amnesia@amnesia:~$ sudo su
>         By default, the administration password is disabled for better security.
>         In order to perform administration tasks, you need to setup an administration password when starting Tails.
>         See the corresponding documentation:
>         https://tails.boum.org/administration_password/
>         [sudo] password for amnesia:
>         The administration password is disabled."

>


> - - Terminal was started, then the "su" command was attempted and failed without an option to enter a password:
>


>         "amnesia@amnesia:~$ su
>         By default, the administration password is disabled for better security.
>         In order to perform administration tasks, you need to setup an administration password when starting Tails.
>         See the corresponding documentation:
>         https://tails.boum.org/administration_password/"

>


>


> 9. Tails was started using the "French - France (French-France)," ""Simplified Chinese - China," and Korean language options:
>


> - - The problems listed on the Tails Gitlab persist [11].
> - - French is the most localized, followed by Chinese, then, Korean.
> - - In all instances DuckDuckGo was the default, pre-selected search plugin.
>


> 10. After turning on then off the "Settings > Universal Access > High Contrast" option the Trash icon on the desktop remained in black-and-white high contrast mode. Turning "High Contrast" on and off again failed to get it back to normal, but, did cause Gedit and Nautilus "Files" to freeze for thirty seconds each.
>


> ==
>


> REFERENCES:
>


> [1] "Install from Linux"
> https://tails.boum.org/install/linux/usb/index.en.html
>


> [2] "Arul's utilities"
> https://aruljohn.com
>


> [3] "JonDonym"
> https://ip-check.info
>


> [4] "Tor Check"
> https://check.torproject.org
>


> [5] "Welcome to Tails!"
> https://tails.boum.org/home/index.en.html
>


> "Trying a testing version of Tails"
> https://tails.boum.org/home/testing/index.en.html
>


> [6] "evercookie"
> https://samy.pl/evercookie
>


> [7] "DNS Leak Test"
> https://www.dnsleaktest.com
>


> [8] "Manual test suite"
> https://tails.boum.org/contribute/release_process/test
>


> [9] "Tails Documentation"
> https://tails.boum.org/doc/index.en.html
>


> [10] "Tails" (Offline)
> file:///usr/share/doc/tails/website/index.en.html
>


> [11] "Automatic language -> keyboard selection is broken when selecting some languages"
>


> https://gitlab.tails.boum.org/tails/tails/-/issues/12638
>


> "Test that the on-screen keyboard works and its layout is correctly set"
> https://gitlab.tails.boum.org/tails/tails/-/issues/10263
>


> ============================================================================================================================================================================================
>


> CIRCLETOP OPENPGP KEY DETAILS:
>


> Type: RSA
> Size: 4096
> ID: 5500303F
> Fingerprint: D75B 048F 4789 A622 A297 E555 B552 E2BA 5500 303F
>


> Format: ASCII-armored PGP key
> Name: circletop-public-pgp-key.asc
> SHA-256 checksum: e6a5acfb979e67b997e97e8d48d7748b091f8a7d9bfa3e3adbcd1a8bf6fb5fb1
>


>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: circletop-public-pgp-key.asc
> Type: application/pgp-keys
> Size: 4105 bytes
> Desc: not available
> URL: https://lists.autistici.org/list/tails-testers.html/attachments/20200915/14b507be/attachment.key
>


> --
>


> Subject: Digest Footer
>


> Tails-testers mailing list
> Tails-testers@???
> https://www.autistici.org/mailman/listinfo/tails-testers
>


>


> ------------------------------------------------------------------------------------------------------------
>


> End of Tails-testers Digest, Vol 73, Issue 2