[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â December 18th, 2013



========================================================================
Tor Weekly News                                      December 18th, 2013
========================================================================

Welcome to the twenty-fifth issue of Tor Weekly News, the weekly
newsletter that covers what is happening in the ever-updating Tor
community.

Tor 0.2.4.19 is out
-------------------

After more than a year in the making, Roger Dingledine announced [1] the
first stable release in the Tor 0.2.4 series, as well as the dedication
of this series to the memory of Aaron Swartz (1986-2013).

Tor 0.2.4 boasts a large number of major new features, among them a new
circuit handshake, improved link encryption, a flexible approach to the
queueing of circuit creation requests, and the use of âdirectory guardsâ
to defend against client-enumeration attacks. You can consult the full
changelog in Rogerâs announcement, and download the source code from the
website [2].

As no code changes have been made since the previous release candidate,
there is no reasons for users of tor 0.2.4.18-rc to upgrade in a hurry.

   [1] https://lists.torproject.org/pipermail/tor-talk/2013-December/031392.html
   [2] https://www.torproject.org/dist/

Tor Browser Bundle 3.5rc1 is out
--------------------------------

Mike Perry announced [3] the first release candidate in the Tor Browser
Bundle 3.5 series, and strongly encouraged users to update in
anticipation of the imminent end-of-life of both the 2.x stable and 3.0
series, following Mozilla's deprecation of Firefox 17 ESR, on which both
are based.

This release also includes a number of important security updates,
alongside various bugfixes and usability improvements; for this reason
as well, users should upgrade as soon as possible.

   [3] https://blog.torproject.org/blog/tor-browser-bundle-35rc1-released

Tails 0.22 is out
-----------------

Tails saw its 35th release on December 11th [4]. It incorporates many
major and minor improvements and bugfixes, and opens up the new
incremental-upgrade feature for beta-testing.

As this is the first release to feature a browser based on the Firefox
24 ESR series, some small inconveniences found their way in. Have a look
at the known issues before giving it a go.

Nevertheless, it fixes several important security issues [5], so it is
recommended that all users upgrade as soon as possible.

   [4] https://tails.boum.org/news/version_0.22/
   [5] https://tails.boum.org/security/Numerous_security_holes_in_0.21/

Torservers.net awarded $250,000 grant
-------------------------------------

The Torservers.net team announced [6] that they have received a $250,000
organizational grant, to be spread over two years, from the Digital
Defenders Partnership [7], which in its own words was âestablished to
provide rapid response to threats to internet freedom.â

With this grant, wrote Moritz Bartl, âparticipating Torservers
organizations will be able to sustain at least 3 Gbit/s of exit traffic,
and 2000 fast and up-to-date bridges.â

In order to make the most efficient use of this significant contribution
to the Tor network while maintaining its diversity, wrote Moritz, âwe
need to find seven more organizations that are willing to rent servers
for a period of at least 2 yearsâ [8], adding that âwe really want to
avoid having organizations run both high bandwidth exit relays and a
larger number of Tor bridges: An operator should not see both traffic
entering the Tor network and traffic leaving the Tor networkâ [9].

For this reason, he called for groups interested in supporting the Tor
network to get in contact, in order to discuss how they can best set up
and maintain Tor services. The first such partnership will be with the
Institute for War and Peace Reporting's Cyber Arabs group [10].

If you represent an organization that could make this much-needed
contribution to the Tor network, please contact the Torservers.net team,
or join them at the Tor relay operators meetup during the upcoming Chaos
Communication Congress in Hamburg [11].

   [6] https://blog.torservers.net/20131213/torservers-awarded-250000-by-digital-defenders.html
   [7] http://digitaldefenders.org/
   [8] https://lists.torproject.org/pipermail/tor-relays/2013-December/003495.html
   [9] https://mailman.stanford.edu/pipermail/liberationtech/2013-December/012376.html
  [10] https://www.cyber-arabs.com/
  [11] https://events.ccc.de/congress/2013/wiki/Session:Torservers_Meetup

Miscellaneous news
------------------

The Tails team reported on the vast amount of activity that occurred
during November 2013 [12]. Coming up in the next few Tails releases are
an updated I2P, a new clock applet with configurable timezone, better
localization, incremental upgrades, safer persistence, MAC spoofingâ

  [12] https://tails.boum.org/news/report_2013_11/

meejah announced the release of txtorcon 0.8.2, and warned users that
they should upgrade if they use that programâs TCP4HiddenServiceEndpoint
feature, in order to fix a bug that allows listening on hosts other than
127.0.0.1 [13].

  [13] https://lists.torproject.org/pipermail/tor-dev/2013-December/005927.html

Kevin P Dyer announced the 0.2.2 release of fteproxy, which âincludes
the removal of gmpy as a dependency, additional documentation to explain
the significance of language theoretical algorithms, and bounds checking
of the input/output of our (un)ranking algorithmsâ [14]; this hot on the
heels of 0.2.1, in which he âfocused on breaking away from heavyweight
dependencies: OpenFST and boostâ [15].

  [14] https://lists.torproject.org/pipermail/tor-dev/2013-December/005953.html
  [15] https://lists.torproject.org/pipermail/tor-dev/2013-December/005929.html

Mike Perry shared his thoughts regarding the presence of the Tor Browser
Bundle in centralized repositories such as the Apple App Store or Google
Play, and the possibilities for attack that these stores open up [16].

  [16] https://lists.torproject.org/pipermail/tor-dev/2013-December/005923.html

Ondrej Mikle warned users of Enterprise Linux 5 that Tor RPM packages
will no longer be built for their platform, owing to an âincreasing
number of required workaroundsâ [17].

  [17] https://lists.torproject.org/pipermail/tor-talk/2013-December/031408.html

Karsten Loesing published a summary of the past, present and the future
of the Tor Metrics project, which he maintains, offering some context
for the various changes that have recently been announced [18].

  [18] https://lists.torproject.org/pipermail/tor-dev/2013-December/005948.html

Lunar sent reports from the Tor help desk for October [19] and
November [20].

  [19] https://lists.torproject.org/pipermail/tor-reports/2013-December/000404.html
  [20] https://lists.torproject.org/pipermail/tor-reports/2013-December/000405.html

Jacob Appelbaum recapped his work over the last few months â from June
to December â in a slew of reports [21, 22, 23, 24, 25, 26, 27].

  [21] https://lists.torproject.org/pipermail/tor-reports/2013-December/000407.html
  [22] https://lists.torproject.org/pipermail/tor-reports/2013-December/000408.html
  [23] https://lists.torproject.org/pipermail/tor-reports/2013-December/000409.html
  [24] https://lists.torproject.org/pipermail/tor-reports/2013-December/000410.html
  [25] https://lists.torproject.org/pipermail/tor-reports/2013-December/000411.html
  [26] https://lists.torproject.org/pipermail/tor-reports/2013-December/000412.html
  [27] https://lists.torproject.org/pipermail/tor-reports/2013-December/000413.html

Tor help desk roundup
---------------------

Occasionally users who need the Pluggable Transports Tor Browser Bundle
will download the Vidalia Bridge Bundle instead, which is less useful
for users trying to circumvent state censorship. The Vidalia Bridge
Bundle is only available for Windows and is configured by default to
turn the client machine into a bridge. None of the Vidalia Bundles are
designed to use Pluggable Transports.

Upcoming events
---------------

Dec 27-30 | Tor @ 30th Chaos Communication Congress
          | Hamburg, Germany
          | https://events.ccc.de/congress/2013/

This issue of Tor Weekly News has been assembled by harmony, Lunar,
dope457, and Matt Pagan.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [28], write down your
name and subscribe to the team mailing list [29] if you want to
get involved!

  [28] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [29] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk