[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â October 30th, 2013



========================================================================
Tor Weekly News                                       October 30th, 2013
========================================================================

Welcome to the eighteenth issue of Tor Weekly News, the weekly
newsletter that covers what is happening in the Tor community.

A few highlights from this yearâs Google Summer of Code
-------------------------------------------------------

The Google Summer of Code 2013 program is over since the end of
September. While Nick, Moritz and Damian attended the GSoC Mentor
SummitÂ[1] at Googleâs main campus last week, here are a few highlights
from three of the five projects that were carried through the summer.

   [1]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html

Robert worked on enhancing Torâs Path Selection algorithm. The
enhancementÂ[2] uses active measurements of the Round-Trip-Time of Tor
circuits. Rejecting the slowest circuits will improve the average
latency of Tor circuits. The results of this work will hopefully be
integrated into Tor 0.2.5.x and should then be usable by users.  Robert
wrote: âWorking with the Tor community is very encouraging since there
are highly skilled and enthusiastic people around. I am really happy to
have made that decision and can definitely recommend doing so to
others.â

   [2]Âhttps://bitbucket.org/ra_/tor-rtt

Johannes FÃrmann created a censorship simulation tool that facilitates
testing of applications in a simulated network which can be configured
and extended to behave like censorship infrastructure in various
countries. EvilGeniusÂ[3] can be used to do automated âsmoke testingâ,
i.e. find out if code still works properly if a node in the network
manipulates traffic in different ways. Other than that, it can be used
to automatically test decentralized network applications. âOverall,
working with Tor was a great experience and I hope to be able to work
with the Tor community againâ said Johannes.

   [3]Âhttps://github.com/TheTorProject/EvilGenius

Kostas JakeliÅnas worked on creating a searchable and scalable Tor
Metrics data archiveÂ[4]. This required implementing a Tor relay
consensus and descriptor search backend that can encompass most of the
archival data available (as of now, the currently running backend covers
relays from 2008 up until now).

Those curious to browse Tor relay archives â searching for a needle in
the very large haystack or just looking around â might enjoy playing
with the current test platformÂ[5]. It can run powerful queries on the
large dataset without query parameter/span restrictions. Many use cases
are supportedÂ[6] â for example, since the newest consensus data is
always available, the backend can be used in an ExoneraTor-like fashion.

Together with Karsten Loesing, Kostas hopes to integrate this system
with the current OnionooÂ[7], hopefully further empowering (and
eventually simplifying) the overall Tor Metrics ecosystem.

Kostas described the project as âan interesting and challenging one â a
lot of workÂ[â] to make it robust and truly scalable.â He also added:
âWorking with Tor was a great experience: I found the developer
community to be welcoming indeed, comprised of many people who are
professionals in their field. It should be noted that where there are
interesting problems and a clear cause, great people assemble.â

   [4]Âhttp://github.com/wfn/torsearch
   [5]Âhttp://ts.mkj.lt:5555/
   [6]Âhttps://github.com/wfn/torsearch/blob/master/docs/use_cases_examples.md
   [7]Âhttps://www.torproject.org/projects/onionoo.html

Collecting data against network level adversaries
-------------------------------------------------

âThe anonymity of a connection over Tor is vulnerable to an adversary
who can observe it in enough places along its route. For example,
traffic that crosses the same country as it enters and leaves the Tor
network can potentially be deanonymized by an authority in that country
who can monitor all network communication.â Karsten Loesing, Anupam Das,
and Nikita Borisov began their call for help to Tor relay operators [8]
by stating a problem that has recently attracted some interest by the
research community.

The question âwhich part of the Internet does a Tor relay lie inâ is
easy enough to answer, but âdetermining routes with high confidence has
been difficultâ so far. The best source of information could come from
the relay operators, as Karsten et al. wrote: âTo figure out where
traffic travels from your relay, weâd like you to run a bunch of
âtraceroutesâ â network measurements that show the paths traffic takes.â

This one-time experiment â for nowÂâ is meant to be used by âseveral
researchers, but the leads are Anupam Das, a Ph.D. student at the
University of Illinois at Urbana-Champaign, and his advisor Nikita
Borisov.â

In order to participate, shell scripts are available which automate most
of the process. They have been reviewed with care from several members
of the Tor community and are available from a Git repositoryÂ[9]. Since
their initial email, Anupam Das has assembled a FAQ regarding scope,
resource consumption, and other topicsÂ[10].

Be sure to run the scripts if you can. As Karsten, Anupam, and Nikita
concluded, âwith your help, we will keep improving to face the new
challenges to privacy and freedom online.â

   [8]Âhttps://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
   [9]Âhttps://bitbucket.org/anupam_das/traceroute-from-tor-relays
  [10]Âhttp://web.engr.illinois.edu/~das17/tor-traceroute_v1.html#faq

Tor Help Desk Roundup
---------------------

Using the Tor Browser Bundle is still proving to be tricky for many
Ubuntu users who upgraded from Ubuntu 13.04 to 13.10. The commonly
reported error is that users cannot enter text in any of the browserâs
text fields, including the URL and search bars. So far this problem
appears to be resolved by removing ibus with apt-get before running the
Tor Browser. Users who need ibus can try running `export
GTK_IM_MODULE=xim`, as documented in Trac ticket #9353Â[11].

  [11]Âhttps://bugs.torproject.org/9353

Miscellaneous news
------------------

David Goulet is asking for a final round of reviews of his rewrite of
torsocksÂ[12] so it can replace the old implementation. Lunar has
updated the package in Debian experimental to encourage testing [13]. A
few portability bugs and a deadlockÂ[14] has already been ironed out in
the process.

  [12]Âhttps://trac.torproject.org/projects/tor/ticket/10007
  [13]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html
  [14]Âhttps://github.com/dgoulet/torsocks/commit/e55eae3d3

The next Tails contributor meeting will be held on November 6thÂ[15].
The present agenda has âfirewall exceptions for user-run local
servicesâ, âdecide what kind of questions go into the FAQâ, among other
topics.

  [15]Âhttps://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html

Matthew Finkel has sent a draft proposalÂ[16] with possible solutions
for Hidden Services backed by multiple servers. Several comments have
been made already, with Nick Mathewson giving a heads-up on the work he
has started on merging thoughts and discussions in a new
specificationÂ[17].

  [16]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html
  [17]Âhttps://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt

James B. reportedÂ[18] a tutorial on bsdnow.tvÂ[19] describing how to
setup Tor relays, bridges, exit nodes and hidden services on FreeBSD.
Their last weekâs podcast called âA Brief IntorductionâÂ[20] features a
live demonstration (beginning at 43:52).

  [18]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  [19]Âhttp://www.bsdnow.tv/tutorials/tor
  [20]Âhttp://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction

The Guardian Project has made a new release of its chat application for
Android systems. ChatSecure v12 (previously known has Gibberbot)
contains several new featuresÂ[21] and is fully integrated with Orbot.

  [21]Âhttps://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/

Upcoming events
---------------

Nov 04    | Workshop on Privacy in the Electronic Society
          | Berlin, Germany
          | http://wpes2013.di.unimi.it/
          |
Nov 05-07 | 20th ACM Conference on Computer and Communications Security
          | Berlin, Germany
          | http://www.sigsac.org/ccs/CCS2013/


This issue of Tor Weekly News has been assembled by Lunar, dope457,
Matt Pagan, Kostas JakeliÅnas, ra, Johannes FÃrmann, Karsten Loesing,
and Roger Dingledine.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project pageÂ[22], write down your
name and subscribe to the team mailing listÂ[23] if you want to
get involved!

  [22]Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [23]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

Attachment: signature.asc
Description: Digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk