⋔ Blog ⋔ Frequently Asked Questions ⋔ Resources ⋔ GitHub Repositories ⋔ Contact ⋔ TDP Hidden Service ⋔
The TDP Projects:
⋔ Tor Browser for OpenBSD ⋔ BSD Tor Relay Guides ⋔ BSD Firm Relays ⋔ Porting Targets for PETs ⋔ Quick-and-Dirty Static Reports ⋔
This is a list of general testing to perform for each Tor Browser (TB) release on OpenBSD. The obvious starting point is an up-to-date OpenBSD amd64 or i386 snapshot with synchronized ports/packages.
Spew output from TB is useful for investigating problems, or for finding problems that are not necessarily apparent to an end-user running TB.
To save spew to a file in the home directory, run tor-browser from an xterm(1) window:
$ /usr/local/bin/tor-browser >~/20160101-spew0
is a $HOME/.tor-browser created and correctly populated?
do all the Firefox add-ons appear in Tools, Add-ons, Extensions with the correct versions and settings?
are settings being saved with both “Privacy and Security Settings” and “Tor Network Settings” including bridges, slider, etc?
GeoIP country data appearing in circuit status, i.e., right-clicking on the green onion icon?
does “New Tor Circuit for this Site” works? Should reload page and change the circuit
do all the knobs from /usr/local/lib/tor-browser–5.5/browser/defaults/preferences/all-openbsd.js get turned in about:config?
can TB act as a relay?
are pluggable transports operational?
are a desktop icon and menu item created for Tor Browser? (doesn’t on XFCE, but should on KDE and Gnome)
Copyright © 2017 by The Tor BSD Diversity Project (TDP). All Rights Reserved.
last updated: Tue Sep 6 16:38:58 2016 UTC