Delivery-Date: Tue, 01 Mar 2016 19:22:45 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id ADCB21E0DA6;
	Tue,  1 Mar 2016 19:22:43 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id AF24039602;
	Wed,  2 Mar 2016 00:22:39 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1ABA2395EC
 for <tor-talk@lists.torproject.org>; Wed,  2 Mar 2016 00:22:36 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id W8WU9fwVrJC5 for <tor-talk@lists.torproject.org>;
 Wed,  2 Mar 2016 00:22:36 +0000 (UTC)
Received: from forward14h.cmail.yandex.net (forward14h.cmail.yandex.net
 [87.250.230.156])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "forwards.mail.yandex.net", Issuer "Yandex CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id D94AB39527
 for <tor-talk@lists.torproject.org>; Wed,  2 Mar 2016 00:22:35 +0000 (UTC)
Received: from web15h.yandex.ru (web15h.yandex.ru [84.201.186.44])
 by forward14h.cmail.yandex.net (Yandex) with ESMTP id 1DE2F22081
 for <tor-talk@lists.torproject.org>; Wed,  2 Mar 2016 03:22:01 +0300 (MSK)
Received: from web15h.yandex.ru (localhost [127.0.0.1])
 by web15h.yandex.ru (Yandex) with ESMTP id 9B4845901EE7;
 Wed,  2 Mar 2016 03:22:01 +0300 (MSK)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.com; s=mail;
 t=1456878121; bh=Gyg1VQNRulaf8SCEokLgf9qODkGkVjGSi+LAfKaZsGI=;
 h=From:To:Subject:Date;
 b=RrgPO63bbAlRfoZDi7mz2m7W49SVfb6J+rHzoyhqNkX6jZ0xRUsxl/lHBW4rrbsqD
 lqrqOuD0Di0p6FBGskfPLt/plC09xWQD2MDrM+b0Fzg0IlwOzWtBT9yhjTDpcbZyh8
 P6RNIjUkRF4JFxkuwRie5pQoL6JjoanKgJEpgOg4=
Received: by web15h.yandex.ru with HTTP;
	Wed, 02 Mar 2016 03:22:00 +0300
From: Cain Ungothep <ungocain@yandex.com>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
Message-Id: <1121101456878120@web15h.yandex.ru>
X-Mailer: Yamail [ http://yandex.ru ] 5.0
Date: Wed, 02 Mar 2016 01:22:00 +0100
Subject: Re: [tor-talk] Tor Browser update
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

> Hi,
>
> When I start Tor Browser it displays a message that it is establishing
> a connection to Tor network.
>
> After that I can request "Check for Tor Browser update ..." from
> Torbutton or from menu Help - About Tor Browser display and eventually
> obtain it without "Test Tor Network Settings" verification (that is,
> the Tor circuit's and my IP addresses not visible thru Torbutton
> selection yet).

Your IP should never be visible there.

> I would tend to think that Tor browser should be tested and anonimized
> first (that is configured) before initiating any communication with
> the outside world, even if it is a Tor Project site.
>
> Is that by design or something that should be fixed ?
>
> Tor Browser 5.5.2 on Linux.
>
> jb

Is /what/ by design?

All communication should be tunnelled through the local tor daemon.  It
should not matter whether you click "Test tor network settings" or not.
It should not matter whether you see anything in Torbutton circuit
display or not. Both of these are merely informational.

You can check for yourself using a network sniffer like tcpdump.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

