======================================================================== Tor Weekly News October 9th, 2013 ======================================================================== Welcome to the fifteenth issue of Tor Weekly News, the weekly newsletter that covers what's happening in the world of Tor â âking of high-secure, low-latency anonymityâÂ[1]. [1]Âhttp://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity New tranche of NSA/GCHQ Tor documents released ---------------------------------------------- After a cameo appearance in previous leaked intelligence documentsÂ[2], Tor found itself at the center of attention in the latest installment of the ongoing Snowden disclosures after a series of stories were published in the Guardian and the Washington Post that detailed alleged attempts by NSA, GCHQ, and their allies to defeat or circumvent the protection that Tor offers its users. A number of source materials, redacted by the newspapers, were published to accompany the articles. The documents in questionÂ[3] offer, alongside characteristically entertaining illustrationsÂ[4], an overview of the Tor network from the point of view of the intelligence agencies, as well as a summary of attacks against Tor users and the network as a whole that they have considered or carried out. Despite the understandable concern provoked among users by these disclosures, Tor developers themselves were encouraged by the often relatively basic or out-of-date nature of the attacks described. In response to one journalist's request for comment, Roger Dingledine wrote that âwe still have a lot of work to do to make Tor both safe and usable, but we don't have any new work based on these slidesâÂ[5]. Have a look at the documents yourself, and feel free to raise any questions with the community on the mailing lists or IRC channels. [2]Âhttps://blog.torproject.org/blog/tor-nsa-gchq-and-quick-ant-speculation [3]Âhttp://media.encrypted.cc/files/nsa [4]Âhttps://twitter.com/EFF/status/386291345301581825 [5]Âhttps://blog.torproject.org/blog/yes-we-know-about-guardian-article#comment-35793 tor 0.2.5.1-alpha is out ------------------------ Roger Dingledine announcedÂ[6] the first alpha release in the tor 0.2.5.x series, which among many other improvements introduces experimental support for syscall sandboxing on Linux, as well as statistics reporting for pluggable transports usage on compatible bridges. Roger warned that âthis is the first alpha release in a new series, so expect there to be bugs. Users who would rather test out a more stable branch should stay with 0.2.4.x for now.â 0.2.5.1-alpha will not immediately appear on the main download pages, in order to avoid having too many versions listed at once. Please feel free to test the new releaseÂ[7], and report any bugs you find! [6]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030269.html [7]Âhttps://www.torproject.org/dist/ How did Tor achieve reproducible builds? ---------------------------------------- At the end of June, Mike Perry announcedÂ[8] the first release of the Tor Browser Bundle 3.0 alpha series, featuring release binaries âexactly reproducible from the source code by anyoneâ. In a subsequent blog postÂ[9] published in August, he explained why it mattered. Mike has just published the promised follow-up pieceÂ[10] describing how this feat was achieved in the new Tor Browser Bundle build process. He explains how GitianÂ[11] is used to create a reproducible build environment, the tools used to produce cross-platform binaries for Windows and OS X from a Linux environment, and several issues that prevented the builds from being entirely deterministic. The latter range from timestamps to file ordering differences when looking up a directory, with an added 3 bytes of pure mystery. There is more work to be done to âprevent the adversary from compromising the (substantially weaker) Ubuntu build and packaging processesâ currently used for the toolchain. Mike also wrote about making the build of the compiler and toolchain part of the build process, cross-compilation between multiple architectures, and the work being done by Linux distributions to produce deterministic builds from their packages. If you are interested in helping, or working on your own software project, there is a lot to be learned by reading the blog post in full. [8]Âhttps://blog.torproject.org/blog/tor-browser-bundle-30alpha2-released [9]Âhttps://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise [10]Âhttps://blog.torproject.org/blog/deterministic-builds-part-two-technical-details [11]Âhttp://gitian.org/howto.html Toward a new Tor Instant Messaging Bundle ----------------------------------------- A first meeting last week kicked-off the âAttentive Otter projectâÂ[12] which aims to come up with a new bundle for instant messaging. The first meeting mainly consisted in trying to enumerate the various options. In the end, people volunteered to research three different implementation ideas. Thijs Alkemade and Jurre van Bergen explored the possibilty of using Pidgin/libpurpleÂ[13] as the core component. Jurre also prepared an analysis of xmpp-clientÂ[14], together with David Goulet, Nick Mathewson, Arlo Breault, and George Kadianakis. As a third option, Mike Perry took a closer look at Instantbird/ThunderbirdÂ[15] with Sukhbir Singh. All the options have their pros and cons, and they will probably be discussed on the tor-dev mailing list and at the next âAttentive Otterâ meeting. [12]Âhttps://trac.torproject.org/projects/tor/wiki/org/sponsors/Otter/Attentive [13]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005544.html [14]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005546.html [15]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005555.html More monthly status reports for September 2013 ---------------------------------------------- The wave of regular monthly reports from Tor project members continued this week with submissions from George KadianakisÂ[16], LunarÂ[17], Sathyanarayanan GunasekaranÂ[18], Ximin LuoÂ[19], Matt PaganÂ[20], Pearl CrescentÂ[21], Colin C.Â[22], Arlo BreaultÂ[23], Karsten LoesingÂ[24], Jason TsaiÂ[25], the Tor help deskÂ[26], Sukhbir SinghÂ[27], Nick MathewsonÂ[28], Mike PerryÂ[29], Andrew LewmanÂ[30], Aaron GÂ[31], and the Tails folksÂ[32]. [16]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000346.html [17]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000347.html [18]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000348.html [19]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000349.html [20]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000350.html [21]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000351.html [22]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000352.html [23]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000353.html [24]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000354.html [25]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000355.html [26]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000356.html [27]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000357.html [28]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000358.html [29]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000359.html [30]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000360.html [31]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000361.html [32]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000362.html Tor Help Desk Roundup --------------------- A number of users wanted to know if Tor was still safe to use given the recent news that Tor users have been targeted by the NSA. We directed these users to the Tor Project's official statement on the subjectÂ[33]. One of the most popular questions the help desk receives continues to be whether or not Tor is available on iOS devices. Currently there is no officially supported solution, although more than one project has been presentedÂ[34, 35]. The United Kingdom is now one of the countries where citizens request assistance circumventing a national firewallÂ[36]. [33]Âhttps://blog.torproject.org/blog/yes-we-know-about-guardian-article [34]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005542.html [35]Âhttps://trac.torproject.org/projects/tor/ticket/8933 [36]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-July/029054.html Miscellaneous news ------------------ Thanks to GrozdanÂ[37], Simon Gattner from Netzkonstrukt BerlinÂ[38], WollomaticÂ[39], and HaskellÂ[40] for setting up new mirrors of the Tor project website. [37]Âhttps://lists.torproject.org/pipermail/tor-mirrors/2013-September/000366.html [38]Âhttps://lists.torproject.org/pipermail/tor-mirrors/2013-September/000370.html [39]Âhttps://lists.torproject.org/pipermail/tor-mirrors/2013-October/000374.html [40]Âhttps://lists.torproject.org/pipermail/tor-mirrors/2013-October/000375.html Arlo Breault sent out a request for comments on a possible new version of the check.torproject.org pageÂ[41]. [41]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030253.html Runa Sandvik announcedÂ[42] that the Tor Stack Exchange page has moved from private beta to public beta. If you'd like to help answer Tor-related questions (or ask them), get involved now!Â[43] [42]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030269.html [43]Âhttp://tor.stackexchange.com/ Philipp Winter sent out a call for testing (and installation instructions) for the ScrambleSuit pluggable transports protocolÂ[44]. [44]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030252.html Not strictly Tor-related, but Mike Perry started an interesting discussionÂ[45] about the âweb of trustâ system, as found in OpenPGP. The discussion was also held on the MonkeySphere mailing list, which prompted Daniel Kahn Gilmor to reply with many clarifications regarding the various properties and processes of the current implementation. To sum it up, Ximin Luo startedÂ[46] a new documentation projectÂ[47] âto describe and explain security issues relating to identity, in (hopefully) simple and non-implementation-specific languageâ. [45]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-September/030235.html [46]Âhttps://lists.riseup.net/www/arc/monkeysphere/2013-10/msg00000.html [47]Âhttps://github.com/infinity0/idsec/ The listmaster role has been better definedÂ[48] and is now performed by a team consisting of Andrew Lewman, Damian Johnson, and Karsten Loesing. Thanks to them! [48]Âhttps://trac.torproject.org/projects/tor/wiki/org/operations/Infrastructure/lists.torproject.org Roger Dingledine released an official statement on the Tor project blogÂ[49] regarding the takedown of the Silk Road hidden service and the arrest of its alleged operator. [49]Âhttps://blog.torproject.org/blog/tor-and-silk-road-takedown Fabio Pietrosanti askedÂ[50] for reviews of âexperimental Tor performance tuning for a Tor2web node.â Feel free to have a lookÂ[51] and provide feedback. [50]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030405.html [51]Âhttps://github.com/globaleaks/Tor2web-3.0/wiki/Performance-tuning Claudiu-Vlad Ursache announcedÂ[52] the initial release of CPAProxyÂ[53], âa thin Objective-C wrapper around Torâ. This is the first component of a project to ârelease a free open-source browser on the App Store that uses this wrapper and Tor to anonymize requests.â Claudiu-Vlad left several questions open, and solicited opinions on the larger goal. [52]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005545.html [53]Âhttps://github.com/ursachec/CPAProxy Upcoming events --------------- Oct 09-10 | Andrew speaking at Secure Poland 2013 | Warszawa, Poland | http://www.secure.edu.pl/ | Oct 11 | Kelley @ Journalist Training Event | Helsiniki, Finland | http://www.journalistiliitto.fi/jp13/ | Nov 04-05 | 20th ACM Conference on Computer and Communications Security | Berlin, Germany | http://www.sigsac.org/ccs/CCS2013/ This issue of Tor Weekly News has been assembled by Lunar, harmony, dope457 and Matt Pagan. Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project pageÂ[54], write down your name and subscribe to the team mailing listÂ[55] if you want to get involved! [54]Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews [55]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk