[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â February 4th, 2014

Tor Weekly News                                       February 4th, 2014

Welcome to the fifth issue of Tor Weekly News in 2014, the weekly
newsletter that covers what is happening in the Tor community.

News from the browser team front

Mike Perry has a detailed reportÂ[1] about what the growing Tor
Browser team has been up to. Among the good news, new fingerprinting
defenses are getting close to be merged for âscreen resolution, default
character sets, site permissions, and local service enumerationâ. Some
other changes that will reduce the attack surface include âdisabling
addon update requests for addons that should not update, a potential fix
for a disk leak in the browserâs video cache,Â[â], and a potential fix
to prevent the Flash plugin from being loaded into the browser at all
until the user actually requests to use it.â

Most censored users currently have to use a separate browser bundle
dubbed âpluggable transports bundleâ. This has proven quite inconvenient
for both users and those trying to support them. Mike
reports progress on âunifying the pluggable transport bundles with the
official bundles, so that both censored and uncensored users can use the
same bundles.Â[â] The progress is sufficient that we are very likely to
be able to deploy a 3.6-beta1 release in February to test these unified

Another important topic is how the privacy fixes in the Tor Browser
can benefit a wider userbase. The team has âcontinued the merge
process with Mozilla, and have worked to ensure that every patch of
ours is on their radar [â]. Two patches, one for an API we require to
manage the Tor subprocess, and another to give us a filter to remove
potentially dangerous drag-and-drop events to the desktop have already
been merged. Next steps will include filing more bugs, continual
contact with their development team, and touching up patches as

There are even more things to smile about in the report. Read it in full
for the whole picture.


Key revocation in next generation hidden services

It looks like every public-key infrastructureÂ[2] struggles with how to
handle key revocation. Hidden services are no different. The current
design completely ignored preventing a stolen key from being reused by
an attacker.

With the on-going effort to create a new protocol for hidden
servicesÂ[3], now seems to be a good time for George Kadianakis to raise
this issueÂ[4]. In the past there was little control for the hidden
services operators over their secret key. The new design enables offline
management operations which include key revocation.

As George puts it, currently well-known solutions âare always messy and
donât work really well (look at SSLâs OCSPÂ[5] and CRLsÂ[6]).â So how
can âthe legitimate Hidden Service can inform a client that its keys got

In his email, George describes two solutions, one relying on the
directory authorities, the other on hidden service directories. Both
have drawbacks, so perhaps further research is necessary.

In the same thread, Nick Hopper suggestedÂ[7] a scheme that uses
multiple hidden service directories to cross-certify their revocation
lists. This gives more confidence to the user, since the adversary now
has to compromise multiple hidden service directories.

Please join the discussion if you have ideas to share!


Help needed to remove DNS leaks from Mumble

MumbleÂ[8] is a âlow-latency, high quality voice chat software primarily
intended for use while gamingâ.

Itâs proven to be a reliable solution for voice chat among multiple
parties over Tor. Matt and Colin have worked on a documentation on how
to setup both the client and the server sideÂ[9] for Tor users.

But the client is currently safely usable only on Linux system with
torsocks and on Tails. On other operating systems, the Mumble client
will unfortunately leak the address of the server to the local DNS

The changes that need to be made to the Mumble code are less trivial
than one would think. Matt describe the issue in more details in his
call for helpÂ[11]. Have a look if you are up to some C++/Qt hacking.


Monthly status reports for January 2014

The wave of regular monthly reports from Tor project members for the
month of January has begun. Damian JohnsonÂ[12] released his report
first, followed by reports from Philipp WinterÂ[13], Sherief
AlaaÂ[14], the Tor Browser team from Mike PerryÂ[15], Colin C.Â[16], the
help deskÂ[17], MattÂ[18]. LunarÂ[19], George KadianakisÂ[20], and Pearl


Miscellaneous news

Nick Mathewson came upÂ[22] with a Python scriptÂ[23] to convert the new
MaxMind GeoIP2 binary database to the format used by Tor for its
geolocation database.


Thanks to John Ricketts from Quintex Alliance ConsultingÂ[24] for
providing another mirror for the Tor Projectâs website and software.


Abhiram Chintangal and Oliver Baumann are reportingÂ[25] progress on
their rewriteÂ[26] of the Tor Weather service.


Andreas Jonsson gave an updateÂ[27] on how Mozilla is moving to a
multi-process model for FirefoxÂ[28] and how this should positively
affect the possibility of sandboxing the Tor Browser in the future.


As plannedÂ[29], to help âdevelopers to analyze the directory protocol
and for researchers to understand what information is available to
clients to make path selection decisionsâ, Karsten Loesing has madeÂ[30]
microdescriptor archives available on the metrics website.


Christian has deployedÂ[31] a test platformÂ[32] for the JavaScript-less
version of Globe, a tool to retrieve information about the Tor network
and its relays.


In an answer to Shadowmanâs questions about pluggable transports, George
Kadianakis wrote a detailed reply on how Tor manages pluggable
transportsÂ[33], both on the server side an on the client side.


Arthur D. Edelstein has advertised a GreaseMonkey scriptÂ[34] to enable
Tor Browser to access YouTube videos without having JavaScript enabled.
Please be aware of the security risks that GreaseMonkey might
introduceÂ[35] before using such a solution.


Andrew Lewman reports on his trip to Washington DCÂ[36] where he met
Spitfire Strategies to learn about âTorâs brand, media presence, and
ideas for the futureâ. For a short excerpt: âItâs interesting to get
critiques on all our past media appearances; what was good and what
could be better. Overall, the team there are doing a great job.â


Lunar accountedÂ[37] for Torâs presence at FOSDEM, one of the largest
free software event in Europe. The project had a small boothÂ[38] shared
with Mozilla and there was even a relay operator meetupÂ[39].


Yan Zhu has releasedÂ[40] the first version of HTTPS Everywhere for
Firefox Mobile. A good news for users of the upcoming OrfoxÂ[41].


Tor help desk roundup

Users often want to know if Tor can make them appear to be coming from a
particular country. Although doing so can reduce oneâs anonymity, it is
documented on our FAQ pageÂ[42].

Orbot users have noticed that installing Orbot to their SD storage can
cause Orbot to stop functioning correctly. Installing Orbot to the
internal storage has resolved issues for a few users.


News from Tor StackExchange

Rhin is looking for hidden services hosting services. Jens pointed them
to ahmia.fiÂ[43] but it looks like no there are no gratis hidden
services hosters currently available.


Vijay kudal wanted to know how to change the current circuit within
shell scriptsÂ[44]. Jens Kubieziel gave an answer using expect and


Roya saw check.torproject.org replying contradictory informationÂ[46]
with Atlas about the exit node being used. It seems to be a bug in check
occuring when multiple nodes are using the same IP addressÂ[47].


Upcoming events

Feb 8     | Aaron Gibson Presenting Tor @ New Media Inspiration 2014
          | Prague, Czech Republic
          | http://www.tuesday.cz/akce/new-media-inspiration-2014/
Feb 8     | Colin Childs Presenting Tor @ CryptoParty, Winnipeg
          | Winnipeg, Canada
          | http://wiki.skullspace.ca/CryptoParty
Feb 9     | Privacy SOS CryptoParty @ NorthEastern University in Boston
          | Boston, Massachusetts, United States
          | http://privacysos.org/party

This issue of Tor Weekly News has been assembled by Lunar, Matt Pagan,
qbi, George Kadianakis, Colin, Sandeep, Paul Feitzinger and
Karsten Loesing.

TWN is a community newsletter. It canât rest upon a single pair of
shoulders at all times, especially when those shoulders stand behind a
booth for two days straight. So if you want to continue reading TWN, we
really need your help! Please see the project pageÂ[48] and say âhiâ on
the team mailing listÂ[49].


Attachment: signature.asc
Description: Digital signature

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to