======================================================================== Tor Weekly News April 30th, 2014 ======================================================================== Welcome to the seventeenth issue of Tor Weekly News in 2014, the weekly newsletter that covers what is happening in the Tor community. Tor 0.2.5.4-alpha is released ----------------------------- The latest incarnation of the current development branch of Tor, dubbed 0.2.5.4-alpha, was released on April 26thÂ[1]. This release brings mainly security and performance improvements for clients and relays. As a preventive measure (there being no evidence that the keys have been compromised), authority signing keys that were used while susceptible to the OpenSSL âheartbleedâ bug are now blacklisted. Other improvements include fixing two expensive functions on busy relays, better TLS ciphersuite preference lists, support for run-time hardening on compilers that support AddressSanitizerÂ[2], and more work on the Linux sandbox code. There are also several usability fixes for clients (especially clients that use bridges), two new TransPort protocols supported (one on OpenBSD, one on FreeBSD), and various other bugfixes. As Nick Mathewson wrote: âThis release marks end-of-life for Tor 0.2.2.x; those Tor versions have accumulated many known flawsâ. Source code is available at the usual locationÂ[3] and binary packages have already started to be updated. [1]:Âhttps://lists.torproject.org/pipermail/tor-talk/2014-April/032817.html [2]:Âhttps://code.google.com/p/address-sanitizer/ [3]:Âhttps://www.torproject.org/dist/ Introducing the 2014 Google Summer of Code projects --------------------------------------------------- As announced in FebruaryÂ[4], Tor is once again participating in Googleâs Summer of Code program, allowing students and aspiring developers the chance to work on a Tor-related project with funding from Google and expert guidance from Tor Project members. After several months of coordination and discussion, this summerâs successful proposals have now been chosen, and some of the students took to the tor-dev mailing list to introduce themselves and their upcoming work. Juha NurmiÂ[5] will continue to work on the already-operational ahmia.fi hidden service search engine, while Marc JuarezÂ[6] will be âimplementing the building blocks for a future padding-based website fingerprinting countermeasure as a pluggable transportâ. Daniel MartÃÂ[7] has taken up the challenge of implementing proposal 140Â[8], which aims to considerably reduce the size of the network consensus data that Tor clients fetch every hour, and Israel LeivaÂ[9] plans to spruce up the neglected GetTor service, which allows users to download the Tor Browser Bundle even if the Tor website and its mirrors are inaccessible. Amogh PradeepÂ[10] will be contributing to the Guardian Projectâs development of Orfox, a new Android web browser to be used with Orbot, while Kostas JakeliunasÂ[11] returns to Tor GSoC to construct a new BridgeDB distributor, serving bridge addresses to users in censored areas over Twitter, and possibly other channels as well. Quinn JarrellÂ[12] will be working on building a pluggable transports combiner that âwill allow transports to be chained together to form more varieties of transports and make them harder to detect and blockâ. Sreenatha BhatlapenumarthiÂ[13] will pick up the effort of rewriting Tor Weather. You can read more about each proposal in the respective introductory messages and their replies; a full list of accepted projects is available on the Google Summer of Code websiteÂ[14]. As Daniel wrote, âcomments are very welcomeâ! [4]:Âhttps://blog.torproject.org/blog/tor-google-summer-code-2014 [5]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006739.html [6]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006741.html [7]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006744.html [8]:Âhttps://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/140-consensus-diffs.txt [9]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006745.html [10]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006748.html [11]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006749.html [12]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006777.html [13]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006752.html [14]:Âhttps://www.google-melange.com/gsoc/org2/google/gsoc2014/tor Miscellaneous news ------------------ Meejah released version 0.9.2 of txtorconÂ[15] â the Tor controller library for the Twisted Python framework: âthis release adds a few minor bug-fixes and a few API enhancementsâ. [15]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006766.html The Tails team is looking for enthusiasts equipped with a Bluetooth keyboard and mouseÂ[16] to ensure that Tails works properly with such hardware. [16]:Âhttps://mailman.boum.org/pipermail/tails-testers/2014-April/000010.html Matthew Finkel forwarded a copy of the email that was sent to bridge operatorsÂ[17] to warn them about the âHeartbleedâ vulnerability, and the actions that should be taken as a result. If you know any bridge operator who might not have filled in their contact information, please forward the message! [17]:Âhttps://lists.torproject.org/pipermail/tor-relays/2014-April/004428.html Karsten Loesing has been working on switching Onionoo â the web service to retrieve information about the Tor network â to use the Gson library instead of plain string concatenation to format its JSON output. As the change might break some applications, client authors should test their applicationsÂ[18] and see if everything still works as it should. [18]:Âhttps://lists.torproject.org/pipermail/tor-dev/2014-April/006772.html Tor help desk roundup --------------------- The help desk has been asked why the Tor Projectâs hidden service site mirrors are offline. The sites were taken down during the fallout from the Heartbleed security vulnerability. New hidden service addresses were not generated. The sysadmin team has expressed that they no longer wish to maintain these servicesÂ[19]. [19]:Âhttps://bugs.torproject.org/11567 News from Tor StackExchange --------------------------- Kristopher Ives is working on a card game using Tor. Each user accepts inbound connections through hidden services, and also needs to make outbound connectionsÂ[20]. Tom Ritter acknowledged it was possible to use only one Tor daemon to do both. [20]:Âhttps://tor.stackexchange.com/q/1592/88 Dan gets the error message âCannot load XPCOMâ whenever Tor Browser is startedÂ[21]. Jens Kubieziel pointed to the discussion at #10789Â[22]. The culprit is WebRoot Internet Security as it prevents the proper loading of all browser components; either uninstalling it or adding DLL files to the whitelist has helped other usersÂ[23]. [21]:Âhttps://tor.stackexchange.com/q/2012/88 [22]:Âhttps://bugs.torproject.org/10789 [23]:Âhttps://blog.torproject.org/blog/tor-browser-352-released#comment-47052 Upcoming events --------------- Apr 30 19:00 UTC | little-t tor development meeting | #tor-dev, irc.oftc.net | https://lists.torproject.org/pipermail/tor-dev/2014-March/006616.html | May 2 15:00 UTC | Tor Browser online meeting | #tor-dev, irc.oftc.net | https://lists.torproject.org/pipermail/tbb-dev/2014-April/000049.html | May 27-28 | Tor @ Stockholm Internet Forum | Stockholm, Sweden | http://www.stockholminternetforum.se/ This issue of Tor Weekly News has been assembled by Lunar, harmony, Matt Pagan, qbi, and Karsten Loesing. Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project pageÂ[24], write down your name and subscribe to the team mailing listÂ[25] if you want to get involved! [24]:Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews [25]:Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk