[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â November 13th, 2013



========================================================================
Tor Weekly News                                      November 13th, 2013
========================================================================

Welcome to the twentieth issue of Tor Weekly News, the weekly newsletter
that covers what is happening in the Tor community.

First beta release of Tor Browser Bundle 3.0
--------------------------------------------

The Tor Browser BundleÂ[1] is the Tor Projectâs flagship product: an
easy and straightforward way to browse the web with anonymity and
privacy.

With previous Tor Browser Bundles, users had to interact with two
different applications, Vidalia and the browser itself. Vidalia was
responsible for handling and configuring the tor daemon, and the
browser had no knowledge of the connection status and other details.
The result was confusing error messages, and mismatched user
expectations.

With the 3.0 series of Tor Browser Bundle, the browser is directly
responsible for configuring and handling the tor daemon. Users only see
one single application. Itâs clearer that only the browser will go
through the Tor network. Starting and stopping the browser will take
care of starting and stopping torÂâ no extra steps are required.

Mike Perry, Kathleen Brade, Mark Smith, Georg Koppen, among others, are
working hard to perfect many other usability and technical improvements
that are part of Tor Browser Bundle 3.0 which has now reached the âbetaâ
stage.

The new 3.0beta1 releaseÂ[2] is based on Firefox 17.0.10esr for security
updatesÂ[3], and contains several other small improvements and
corrections.

Current users of the 3.0 alpha series should update. Others should give
it a tryÂ[4]!

   [1] https://www.torproject.org/projects/torbrowser.html
   [2] https://blog.torproject.org/blog/tor-browser-bundle-30beta1-released
   [3] https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox17.0.10
   [4] https://archive.torproject.org/tor-package-archive/torbrowser/3.0b1/

A critique of website traffic fingerprinting attacks
----------------------------------------------------

For a new blog postÂ[5], Mike Perry took the time to reflect on
fingerprinting attacks on website traffic. These are attacks âwhere the
adversary attempts to recognize the encrypted traffic patterns of
specific web pages without using any other information. In the case of
Tor, this attack would take place between the user and the Guard node,
or at the Guard node itself.â

In the post, Mike lays down three distinct types of adversary that could
mount fingerprinting attacks: partial blocking of Tor, identification of
visitors of a set of targeted pages, and identification of all web pages
visited by a user.

In theory, such attacks could pose devastating threats to Tor users.
But in practice, âfalse positives matterâ together with other factors
that affect the classification accuracy. Mike gives a comprehensive
introduction to these issues before reviewing five research papers
published between 2011 and 2013. Each of them are summarized together
with their shortcomings.

Mike concludes that âdefense work has not been as conclusively studied
as these papers have claimed, and that defenses are actually easier than
is presently assumed by the current body of literature.â He encourages
researchers to re-evaluate existing defenses âsuch as HTTPOSÂ[6], SPDY
and pipeline randomization, Guard node adaptive paddingÂ[7], and Traffic
MorphingÂ[8]â, and to think about âthe development of additional
defensesâ. Mike ends his post by mentioning that some new defenses can
also be dual purpose and help with end-to-end correlation attacks.

   [5] https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
   [6] http://freehaven.net/anonbib/cache/LZCLCP_NDSS11.pdf
   [7] https://bugs.torproject.org/7028
   [8] http://freehaven.net/anonbib/cache/morphing09.pdf

The âbananaphoneâ pluggable transport
-------------------------------------

Pluggable transportsÂ[9] is how Tor traffic can be transformed from a
client to a bridge in order to hide it from Deep Packet Inspection
filters.

Improving upon the initial work of Leif RygeÂ[10], David Stainton has
been working on the new âbananaphoneâ pluggable transport for
obfsproxyÂ[11]. The latter implements âreverse hash encodingâ,
described by Leif Ryge as âa steganographic encoding scheme which
transforms a stream of binary data into a stream of tokens (e.g.,
something resembling natural language text) such that the stream can be
decoded by concatenating the hashes of the tokens.â

For a concrete example, that means that using Project Gutenbergâs Don
QuixoteÂ[12] as corpus, one can encode âmy little poneyâ into âlock
whisper: yellow tremendous, again suddenly breathing. masterâs faces;
fees, beheld convinced there calmâ and back again!

While itâs probably not going to be the most compact pluggable
transport, âbananaphoneâ looks like a promising project.

   [9] https://www.torproject.org/docs/pluggable-transports.html
  [10] https://github.com/leif/bananaphone
  [11] https://github.com/david415/obfsproxy/tree/david-bananaphone
  [12] http://www.gutenberg.org/cache/epub/29468/pg29468.txt

Miscellaneous news
------------------

Christian Grothoff, Matthias Wachs and Hellekin Wolf are working on
getting special-use domain names for P2P networks reservedÂ[13]
according to RFC 6761Â[14]: âthe goal is to reserve .onion, .exit, .i2p,
.gnu and .zkey (so that they donât become ordinary commercial TLDs at
some point)â.

  [13] https://lists.torproject.org/pipermail/tor-talk/2013-November/031001.html
  [14] https://tools.ietf.org/html/rfc6761

The Tails team has released their report on Tails activity during the
month of OctoberÂ[15]. Things are happening on many fronts, have a look!

  [15] https://lists.torproject.org/pipermail/tor-reports/2013-November/000383.html

Andrea Shepard has been working on new scheduler code for Tor. Its goal
is to remove the limitation that âwe can only see one channel at a time
when making scheduling decisions.â Balancing between circuits without
opening new attack vectors is tricky, Andrea is asking for comments on
potential heuristicsÂ[16].

  [16] https://lists.torproject.org/pipermail/tor-dev/2013-November/005761.html

Justin Findlay has recreated some of the website diagramsÂ[17] in the
versatile SVG format.

  [17] https://lists.torproject.org/pipermail/tor-dev/2013-November/005762.html

Roger asked the communityÂ[18] to create a âTor, king of anonymityâ
graphic for his presentations. Griffin Boyce made a âqueen of anonymityâ
pictureÂ[19], Lazlo Westerhof crowned the onionÂ[20] and Matt Pagan
did the full Tor logoÂ[21].

  [18] https://lists.torproject.org/pipermail/tor-talk/2013-November/031001.html
  [19] http://i.imgur.com/PmuFz4n.jpg
  [20] http://i.imgur.com/vYZSu6Q.png
  [21] http://i.imgur.com/2yIMmcQ.png

David Fifield released the new Pluggable Transports Tor Browser
BundleÂ[22] version 2.4.17-rc-1-pt2 based on Tor Browser Bundle
2.4.17-rc-1. The only change from the previous release of the pluggable
transport bundle is a workaroundÂ[23] that makes transports resume
working on Mac OS X Mavericks.

  [22] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-rc-1-pt2-firefox-17010esr
  [23] https://bugs.torproject.org/10030#comment:20

Tor help desk round-up
----------------------

Recently users have been writing the help desk asking for assistance
verifying the signature on their Tor Browser Bundle package. These users
said they found the instructions on the official Tor Project pageÂ[24]
confusing. One person reported being unsure of how to open a terminal on
their computer. Another person did not know how to save the package
signature onto the Desktop. Yet another person reported they were able
to verify the signature only after discovering that their GnuPG program
was named gpg2.exe rather than gpg.exe. A ticket on improving the
signature verification page has been openedÂ[25].

One user mentioned wanting to use the Tor Browser Bundle as their
default browser but being unable to do so because their online bank
required Java. Java is disabled in the Tor Browser Bundle because it can
bypass the browser proxy settings and leak the clientâs real IP address
over the network.

  [24] https://torproject.org/docs/verifying-signatures.html
  [25] https://bugs.torproject.org/10073

Upcoming events
---------------

Nov 18    | Damian Johnson and Lee Colleton @ TA3M-Seattle #3
          | Seattle, Washington, USA
          | https://wiki.openitp.org/events:techno-activism_3rd_mondays:seattle
          |
Nov 20    | Torâs New Offices â Open House
          | Cambridge, Massachusetts
          | https://blog.torproject.org/events/tors-new-cambridge-offices-open-house
          |
Dec 27-30 | Tor @ 30th Chaos Communication Congress
          | Hamburg, Germany
          | https://events.ccc.de/congress/2013/

This issue of Tor Weekly News has been assembled by Lunar, dope457,
David Stainton, sqrt2, and Roger Dingledine.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project pageÂ[26], write down your name
and subscribe to the team mailing listÂ[27] if you want to get involved!

  [26] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [27] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

Attachment: signature.asc
Description: Digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk