======================================================================== Tor Weekly News August 14th, 2013 ======================================================================== Welcome to the seventh issue of Tor Weekly News, the weekly newsletter that covers what is happening in the fast-paced Tor community. New Tor Browser Bundle releases ------------------------------- Mozilla released Firefox version 17.0.8esrÂ[1] on August 6th, fixing several release critical bugs. Three days later, the stable, beta and alpha versions of the Tor Browser Bundle were updated, along with Tails (see below). The stable 2.3.25-11 and 2.4.15-beta-2 also updates HTTPS Everywhere, PDF.js, NoScript and libpng to their latest version. Both bundles had a localization issue which was fixed in the subsequently released 2.3.25-12 and 2.4.16-beta-1Â[2]. Before updating your browser to the latest version, please pause and admire the enhanced download pageÂ[3]. Kudos to J.M. Todaro for the design and patchesÂ[4] and Andrew for the final integration. The pluggable transports bundles have also been updated to 2.4.15-beta-2-pt1Â[5]. Like previously, they contains flash proxy and obfsproxy configured to run by default. Using flash proxy requires a few extra stepsÂ[6], as before. For more experimental matters, the new 3.0 series has seen the release of alpha3Â[7]. On top of the previous updates, several other small improvements were made: in the new launcher and build system, in fingerprinting fixes and in a possible anonymity threat for Windows users coming from cloud anti-virus solutionsÂ[8]. This is another opportunity to play with the new build system that should produce byte-to-byte identical results. Please have a tryÂ[9] and report any discrepancies with Mike Perryâs builds. [1]Âhttps://www.mozilla.org/en-US/firefox/17.0.8/releasenotes/ [2]Âhttps://blog.torproject.org/blog/new-tor-02416-rc-packages-and-updated-stable-tor-browser-bundles [3]Âhttps://www.torproject.org/projects/torbrowser.html.en#downloads [4]Âhttps://blog.torproject.org/blog/pluggable-transports-bundles-2415-beta-2-pt1-firefox-1708esr [5]Âhttps://trac.torproject.org/projects/tor/wiki/FlashProxyHowto [6]Âhttps://trac.torproject.org/projects/tor/ticket/2109#comment:7 [7]Âhttps://blog.torproject.org/blog/tor-browser-bundle-30alpha3-released [8]Âhttps://bugs.torproject.org/9195 [9]Âhttps://gitweb.torproject.org/builders/tor-browser-bundle.git/blob/HEAD:/README Tails 0.20 has been released ---------------------------- The 32nd release of Tails is outÂ[10]. It fixes several security issues, and all users are advised to upgradeÂ[11]. Among other small bugfixes, minor improvements and translation updates, this release tightens the security around Pidgin â by removing support for protocols other than IRC and XMPP â and restricting access to the ptrace(2) system call for unprivileged users. DownloadÂ[12], burn, and upgradeÂ[13]! [10]Âhttps://tails.boum.org/news/version_0.20/ [11]Âhttps://tails.boum.org/security/Numerous_security_holes_in_0.19/ [12]Âhttps://tails.boum.org/download/ [13]Âhttps://tails.boum.org/doc/first_steps/usb_upgrade/ New release candidate for the 0.2.4 tor branch ---------------------------------------------- Roger Dingledine announced the release of tor 0.2.4.16-rcÂ[14], the latest incarnation of the 0.2.4 series. This release include several major and minor bugfixes. The most important one is probably a crash that can be triggered remotely via badly formatted INTRODUCE1 cells. Roger advises: âAnybody running a hidden service on the experimental 0.2.4.x branch should upgradeâ. Erinn Clark has updated the beta version of the Tor Browser BundleÂ[2] for a wider audience of testers. [14]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-August/029344.html About Tor Browser usability --------------------------- Last week events [15] sparked a good amount of discussions on Tor Browser usability. Several discussions on tor-talk and in other places revolved around the idea that âJavaScript should be disabled by defaultâ. scarp wrote a good summaryÂ[16] on why it is not so simple: âI understand that JavaScript was enabled globally in the Tor Browser Bundle for usability reasons as well as to prevent browser fingerprinting. [â] If the torproject were to disable it by default, that would not ensure that users are protected in the future by similar methods. Sites can be written in a way that if you do not allow JavaScript they simply wonât work at all. If I was writing an exploit Iâd do this to frustrate users so hopefully they enable JavaScript and accept my exploit.â Roger Dingledine also improvedÂ[17] the relevant question in Tor FAQÂ[18]. One possible solution to satisfy contradicting requirements would be to add a âsecurity sliderâÂ[19] that would allow users to easily trade off web compatibility over security. The slider would have three or four different positions that would gradually deactivate more and more features of the browser. One has to understand that the âmost secureâ should probably disable loading of any pictures. This also impacts the Tor Browser anonymity set but this is probably a trade off that can be afforded given the actual size of the Tor Browser user base. scarp had also pined another big usability problem related to updating: âThis exploit wasnât new. [â] Users running the latest Tor Browser Bundle didnât have any issues as their browsers had been patched. It is inappropriate for a web browser to not be automatically updated.â Nick Mathewson went backÂ[20] on the latest plan that was discussed during the last summer dev. meetingÂ[21] to simply build upon Firefox update mechanism. The next step is to do a proper review. Hopefully, given it is âmature and widespreadâ and has been âproven to update Firefoxâ, we will not ârun screaming for the hillsâ when looking at the disadvantages. On a more general level, an unexpected comment came from Brendan Eich (Mozillaâs chief technology officer) on TwitterÂ[22]: âMaybe we should just adopt, support, and bundle Tor in Firefox...â David Dahl subsequently opened a bug report in Mozillaâs tracker to discuss a way forwardÂ[23]. Mike Perry commented on a threadÂ[24] on the liberationtech mailing list: âIn short, I am excited by this news, and I look forward to improving our communication and cooperation with Mozilla on this front.â [15]Âhttps://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-august-7th-2013 [16]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-August/029266.html [17]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-August/029364.html [18]Âhttps://www.torproject.org/docs/faq.html.en#TBBJavaScriptEnabled [19]Âhttps://bugs.torproject.org/9387 [20]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-August/005228.html [21]Âhttps://trac.torproject.org/projects/tor/wiki/org/meetings/2013SummerDevMeeting/BundleUpdatePlan [22]Âhttps://twitter.com/BrendanEich/status/364265592112414720 [23]Âhttps://bugzilla.mozilla.org/show_bug.cgi?id=901614 [24]Âhttps://mailman.stanford.edu/pipermail/liberationtech/2013-August/010650.html Tails 2013 summit ----------------- The Tails team has sent a report on their 2013 development summitÂ[25] for which âa bunch of people spend a dozen days together in Julyâ. Read the report in full for all the details. Some highlights: task tracking have been moved to RedmineÂ[26], tasks fit for new contributors has been better identifiedÂ[27], progress has been made to move Tails to the current Debian stable releaseÂ[28], the roadmap has been updatedÂ[29]. Communication channels are going to change a little bit âto ease involvement of new contributors, to make more workload sharing possible, and to be able to provide better user supportâ. As a start a new user support mailing list was createdÂ[30]. Subscribe if you have questions or want to help fellow Tails users. A lot of discussions revolved around âthe growth of the project: given the growing number of users and our super-short release cycle, it is a challenge to keep the project sustainable and maintainable in the mid/long term.â Give the current project exposure, the report rightfully concludes: âTails is living decisive times, so we expect the next year to be pretty interesting. You can perhaps make the difference, so do not hesitate joining the danceÂ[31]!â. [25]Âhttps://tails.boum.org/news/summit_2013/ [26]Âhttps://labs.riseup.net/code/projects/tails [27]Âhttps://labs.riseup.net/code/projects/tails/issues?query_id=112 [28]Âhttps://labs.riseup.net/code/issues/6015 [29]Âhttps://labs.riseup.net/code/projects/tails/roadmap [30]Âhttps://tails.boum.org/support/tails-support/ [31]Âhttps://tails.boum.org/contribute/ Three new proposals ------------------- On Monday, Nick Mathewson robbed everyone of his âIâm a little teapotâ performanceÂ[32] by releasing the following three new proposals: Proposal 219Â[33] has been written a year ago by Ondrej Mikle. It is currently at draft stage. Its goal is to make Tor support any DNS query type and also support full DNSSEC resolution. The latter is important as it provides âprotection against DNS cache-poisoning attacksâ but is made tricky given a routine hostname resolution with DNSSEC âcan require dozens of round trips across a circuitâ. In another draft proposalÂ[34], Nick Mathewson describes a plan for a smooth transition from the current 1024-bit RSA keys used for router identity and TLS links to Ed25519-SHA-512Â[35] keys. Several small details still have to be ironed out. This proposal does not address hidden service keys. They will have to be addressed in another proposal once an agreement has been reached regarding the best crypto schemeÂ[36]. Now that the ntor onionskin handshakeÂ[37] has been implemented in 0.2.4, we could get better forward secrecy by having clients top sending CREATE_FAST cells. Nick Mathewson has issued proposal 221Â[38] to detail the reasons and the implications of such change. All these proposals are now up for discussions on the tor-dev mailing list. [32]Âhttps://twitter.com/nickm_tor/status/365527533627777025 [33]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/219-expanded-dns.txt [34]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/220-ecc-id-keys.txt [35]Âhttps://bugs.torproject.org/8106 [36]Âhttp://ed25519.cr.yp.to/ [37]Âhttps://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/216-ntor-handshake.txt [38]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/221-stop-using-create-fast.txt Miscellaneous news ------------------ Jens Kubieziel researched how to get a GnuPG version for Windows in a secure wayÂ[39], something needed for users that would like to properly verify the Tor Browser Bundle signatures on Windows systems. [39]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-August/029256.html George Kadianakis wrote on âhow to deploy your very own pluggable transportâÂ[40] explaining what to do before, while and after coding a new pluggable transport. Given they were designed to be âpluggableâ, âit should be easy to write new [ones]â. So be sure to read these advices and start experimenting! [40]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-August/005231.html A new round of GSoC reports arrived to the tor-dev mailing list: Johannes FÃrmann about EvilGeniusÂ[41], Cristian-Matei Toader about Tor capabilitiesÂ[42], Hareesan about the Steganography Browser ExtensionÂ[43], and Kostas Jakeliunas about the searchable metrics archiveÂ[44]. All of them seems to be making good progress. Letâs wish them success for the last six weeks! [41]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-August/005237.html [42]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-August/005238.html [43]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-August/005243.html [44]Âhttps://lists.torproject.org/pipermail/tor-dev/2013-August/005244.html More reports came from the July 2013 wave: the Tor Help Desk by Runa SandvikÂ[45], and Moritz BartlÂ[46]. [45]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-August/000310.html [46]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-August/000311.html Andrew Lewman gave a talk during the US National Network to End Domestic Violenceâs (NNEDV) annual technology summit. His presentationÂ[47] covered âa quick overview of Tor, why Iâm here talking about domestic violence and intimate partner abuse, and what weâre doing to help.â. Be sure to read his reportÂ[48] in full. [47]Âhttps://svn.torproject.org/svn/projects/presentations/2013-07-30-NNEDV-Presentation.pdf [48]Âhttps://blog.torproject.org/blog/nnedv-tech-summit-2013-report Thanks to Paul Templeton from CoffsWiFiÂ[49], and nsaneÂ[50] for running new Tor website mirrors. [49]Âhttps://lists.torproject.org/pipermail/tor-commits/2013-August/060352.html [50]Âhttps://lists.torproject.org/pipermail/tor-commits/2013-August/060583.html Several people are trying to assemble localization teams for Tails: Miriam Matar for ArabicÂ[51], irregulator for GreekÂ[52], hemlockii for TurkishÂ[53]. Tails policy regarding website translationsÂ[54] specifies that âa team of translators, not just one person, is necessaryâ, so please join if you can help! [51]Âhttps://mailman.boum.org/pipermail/tails-l10n/2013-August/000637.html [52]Âhttps://mailman.boum.org/pipermail/tails-l10n/2013-August/000646.html [53]Âhttps://mailman.boum.org/pipermail/tails-l10n/2013-August/000652.html [54]Âhttps://tails.boum.org/contribute/how/translate/ Help Desk Roundup ----------------- Below is a summary of some frequent questions received at the Tor help desk this past week: Users are frequently confused by the message they receive from GetTor. Currently the Tor Browser Bundle is too large to send over GetTor, so users instead receive three mirrors with a link to a page with all available translations of the Tor Browser Bundle. Many users email the help desk unsure of what this page means or which package they need. A number of users asked whether or not they needed to disable JavaScript in the Tor Browser Bundle. While the vulnerability in Firefox does not affect the latest Tor Browser Bundle, disabling JavaScript globally will reduce oneâs risk of being affected by future JavaScript exploits. Users were asked to choose for themselves between greater protection inside the browser or a browsing experience with more functionality enabled. Upcoming event -------------- Aug 14 | Roger at 22nd USENIX Security Symposium | Washington, DC, USA | https://www.usenix.org/conference/usenixsecurity13 This issue of Tor Weekly News has been assembled by Lunar, malaparte, mttp, Phoul, Tails developers, David Fifield, Nick Mathewson, and Karsten Loesing. Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project pageÂ[55], write down your name and subscribe to the team mailing listÂ[56] if you want to get involved! [55]Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews [56]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk