This is my monthly status report for September 2023 with the main relevant
activities I have done during the period.
## 0. Research
The work for bringing TLS certificates for Onion Services was focused in the
ACME for Onions proposal (https://acmeforonions.org).
There were a series of relevant updates both on IETF ACME and on the
CA/B Forum's Validation working groups:
* [cabf_validation] Draft Minutes of Validation Subcommittee - Sept. 7, 2023
* [Acme] Obtaining the Tor hidden service descriptor for draft-ietf-acme-onion
* Options to get CAA without operating a whole Tor client · Issue #2 · AS207960/acme-onion · GitHub
I focused in:
* Helping to figure ways that CAA and .onion descriptors could be handled by
ACME client and servers. I'm still compiling the list of options for an
ACME server to parse and validate an Onion Service descriptor.
* Doing a documentation update about CAA checking:
ACME for Onions Evaluation - The Onion Plan
Feat: ACME: CAA scenario evaluation and misc updates (02341735) · Commits · The Tor Project / Onion Services / Onion Plan · GitLab
## Tor Browser Quality Assurance for Onion Services (TBB .onion QA)
I have completed the first three quarters of Tor Browser QA testing (since
* Since this QA process started, it's methodology and tooling was bootstrapped
* Some basic tests were defined to happen at every Tor Browser release (when
* Additional, specific tests were also defined to check for specific and
* The "Faulty Onions" project was prototyped, and is intended to provide test
Onion Services with different errors to check how Tor Browser and other
applications handles them. More details to be expected soon.
* A few alternatives for test automation were researched, to consider
whether some of the regular tests can be automated.
* Public documentation remains yet to be done.
### Versions tested
Eleven Tor Browsers versions were formally tested:
## 1. Development
* Onionprobe 1.1.2 was released:
ChangeLog.md · main · The Tor Project / Onion Services / Onionprobe · GitLab
## 2. Support
### Documentation Hackweek
As a preparation for the upcoming [Hackweek], I have submitted four project
* Onion MkDocs tryout:
Onion MkDocs tryout (#13) · Issues · The Tor Project / Community / Hackweek · GitLab
* Onion TeX Slim enhancements:
Onion TeX Slim enhancements (#14) · Issues · The Tor Project / Community / Hackweek · GitLab
* Onion Reveal coding and documenting:
Onion Reveal coding and documenting (#15) · Issues · The Tor Project / Community / Hackweek · GitLab
* Etherpad management:
Collaborative editing (#16) · Issues · The Tor Project / Community / Hackweek · GitLab
I'm planning to work in just one of these projects, depending in which one is
more popular or gets more attention. I'm also looking for people that wants to
form a team, or even adopt one of these proposals.
Please leave a comment, subscribe yourself or add your user name into the
ticket description if you're interested
* I also did the ongoing sponsored work with deployment, maintenance and
monitoring of Onion Services.
## 3. Organization
Time spent (from the total available for Tor-related work):
Category | Percentage
Research | 57
Development | 1
Support | 9
Organization | 33
Total | 100