======================================================================== Tor Weekly News October 30th, 2013 ======================================================================== Welcome to the eighteenth issue of Tor Weekly News, the weekly newsletter that covers what is happening in the Tor community. A few highlights from this yearâs Google Summer of Code ------------------------------------------------------- The Google Summer of Code 2013 program is over since the end of September. While Nick, Moritz and Damian attended the GSoC Mentor SummitÂ[1] at Googleâs main campus last week, here are a few highlights from three of the five projects that were carried through the summer. [1]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html Robert worked on enhancing Torâs Path Selection algorithm. The enhancementÂ[2] uses active measurements of the Round-Trip-Time of Tor circuits. Rejecting the slowest circuits will improve the average latency of Tor circuits. The results of this work will hopefully be integrated into Tor 0.2.5.x and should then be usable by users. Robert wrote: âWorking with the Tor community is very encouraging since there are highly skilled and enthusiastic people around. I am really happy to have made that decision and can definitely recommend doing so to others.â [2]Âhttps://bitbucket.org/ra_/tor-rtt Johannes FÃrmann created a censorship simulation tool that facilitates testing of applications in a simulated network which can be configured and extended to behave like censorship infrastructure in various countries. EvilGeniusÂ[3] can be used to do automated âsmoke testingâ, i.e. find out if code still works properly if a node in the network manipulates traffic in different ways. Other than that, it can be used to automatically test decentralized network applications. âOverall, working with Tor was a great experience and I hope to be able to work with the Tor community againâ said Johannes. [3]Âhttps://github.com/TheTorProject/EvilGenius Kostas JakeliÅnas worked on creating a searchable and scalable Tor Metrics data archiveÂ[4]. This required implementing a Tor relay consensus and descriptor search backend that can encompass most of the archival data available (as of now, the currently running backend covers relays from 2008 up until now). Those curious to browse Tor relay archives â searching for a needle in the very large haystack or just looking around â might enjoy playing with the current test platformÂ[5]. It can run powerful queries on the large dataset without query parameter/span restrictions. Many use cases are supportedÂ[6] â for example, since the newest consensus data is always available, the backend can be used in an ExoneraTor-like fashion. Together with Karsten Loesing, Kostas hopes to integrate this system with the current OnionooÂ[7], hopefully further empowering (and eventually simplifying) the overall Tor Metrics ecosystem. Kostas described the project as âan interesting and challenging one â a lot of workÂ[â] to make it robust and truly scalable.â He also added: âWorking with Tor was a great experience: I found the developer community to be welcoming indeed, comprised of many people who are professionals in their field. It should be noted that where there are interesting problems and a clear cause, great people assemble.â [4]Âhttp://github.com/wfn/torsearch [5]Âhttp://ts.mkj.lt:5555/ [6]Âhttps://github.com/wfn/torsearch/blob/master/docs/use_cases_examples.md [7]Âhttps://www.torproject.org/projects/onionoo.html Collecting data against network level adversaries ------------------------------------------------- âThe anonymity of a connection over Tor is vulnerable to an adversary who can observe it in enough places along its route. For example, traffic that crosses the same country as it enters and leaves the Tor network can potentially be deanonymized by an authority in that country who can monitor all network communication.â Karsten Loesing, Anupam Das, and Nikita Borisov began their call for help to Tor relay operators [8] by stating a problem that has recently attracted some interest by the research community. The question âwhich part of the Internet does a Tor relay lie inâ is easy enough to answer, but âdetermining routes with high confidence has been difficultâ so far. The best source of information could come from the relay operators, as Karsten et al. wrote: âTo figure out where traffic travels from your relay, weâd like you to run a bunch of âtraceroutesâ â network measurements that show the paths traffic takes.â This one-time experiment â for nowÂâ is meant to be used by âseveral researchers, but the leads are Anupam Das, a Ph.D. student at the University of Illinois at Urbana-Champaign, and his advisor Nikita Borisov.â In order to participate, shell scripts are available which automate most of the process. They have been reviewed with care from several members of the Tor community and are available from a Git repositoryÂ[9]. Since their initial email, Anupam Das has assembled a FAQ regarding scope, resource consumption, and other topicsÂ[10]. Be sure to run the scripts if you can. As Karsten, Anupam, and Nikita concluded, âwith your help, we will keep improving to face the new challenges to privacy and freedom online.â [8]Âhttps://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html [9]Âhttps://bitbucket.org/anupam_das/traceroute-from-tor-relays [10]Âhttp://web.engr.illinois.edu/~das17/tor-traceroute_v1.html#faq Tor Help Desk Roundup --------------------- Using the Tor Browser Bundle is still proving to be tricky for many Ubuntu users who upgraded from Ubuntu 13.04 to 13.10. The commonly reported error is that users cannot enter text in any of the browserâs text fields, including the URL and search bars. So far this problem appears to be resolved by removing ibus with apt-get before running the Tor Browser. Users who need ibus can try running `export GTK_IM_MODULE=xim`, as documented in Trac ticket #9353Â[11]. [11]Âhttps://bugs.torproject.org/9353 Miscellaneous news ------------------ David Goulet is asking for a final round of reviews of his rewrite of torsocksÂ[12] so it can replace the old implementation. Lunar has updated the package in Debian experimental to encourage testing [13]. A few portability bugs and a deadlockÂ[14] has already been ironed out in the process. [12]Âhttps://trac.torproject.org/projects/tor/ticket/10007 [13]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html [14]Âhttps://github.com/dgoulet/torsocks/commit/e55eae3d3 The next Tails contributor meeting will be held on November 6thÂ[15]. The present agenda has âfirewall exceptions for user-run local servicesâ, âdecide what kind of questions go into the FAQâ, among other topics. [15]Âhttps://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html Matthew Finkel has sent a draft proposalÂ[16] with possible solutions for Hidden Services backed by multiple servers. Several comments have been made already, with Nick Mathewson giving a heads-up on the work he has started on merging thoughts and discussions in a new specificationÂ[17]. [16]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html [17]Âhttps://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt James B. reportedÂ[18] a tutorial on bsdnow.tvÂ[19] describing how to setup Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their last weekâs podcast called âA Brief IntorductionâÂ[20] features a live demonstration (beginning at 43:52). [18]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html [19]Âhttp://www.bsdnow.tv/tutorials/tor [20]Âhttp://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction The Guardian Project has made a new release of its chat application for Android systems. ChatSecure v12 (previously known has Gibberbot) contains several new featuresÂ[21] and is fully integrated with Orbot. [21]Âhttps://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/ Upcoming events --------------- Nov 04 | Workshop on Privacy in the Electronic Society | Berlin, Germany | http://wpes2013.di.unimi.it/ | Nov 05-07 | 20th ACM Conference on Computer and Communications Security | Berlin, Germany | http://www.sigsac.org/ccs/CCS2013/ This issue of Tor Weekly News has been assembled by Lunar, dope457, Matt Pagan, Kostas JakeliÅnas, ra, Johannes FÃrmann, Karsten Loesing, and Roger Dingledine. Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project pageÂ[22], write down your name and subscribe to the team mailing listÂ[23] if you want to get involved! [22]Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews [23]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk