Skip to main content
Home

The Tor Project Blog

Enter the terms you wish to search for.

Main menu

  • About Tor
  • Donate

Updates from the Tor Project

Tor 0.3.1.2-alpha is out (with notes about 0.3.1.1-alpha)

by nickm | May 26, 2017

Hello again! This post announces the second alpha in the 0.3.1.x series, which I just released today. And since the blog was down when the first alpha came out, I'm posting the changelog for 0.3.1.1-alpha below too.

Tor 0.3.1.2-alpha is the second release in the 0.3.1.x series. It fixes a few bugs found while testing 0.3.1.1-alpha, including a memory corruption bug that affected relay stability.

Since this is an alpha release, you can expect more bugs than usual.

If you build Tor from source, you can find Tor 0.3.1.2-alpha at the usual place at the Download page on our website. Otherwise, you'll probably want to wait until packages are available. The next Tor Browser alpha release with this version of Tor will likely come out in mid-June.

Changes in version 0.3.1.2-alpha - 2017-05-26

  • Major bugfixes (crash, relay):
    • Fix a memory-corruption bug in relays that set MyFamily. Previously, they would double-free MyFamily elements when making the next descriptor or when changing their configuration. Fixes bug 22368; bugfix on 0.3.1.1-alpha.
  • Minor bugfixes (logging):
    • Log a better message when a directory authority replies to an upload with an unexpected status code. Fixes bug 11121; bugfix on 0.1.0.1-rc.
  • Minor bugfixes (memory leak, directory authority):
    • When directory authorities reject a router descriptor due to keypinning, free the router descriptor rather than leaking the memory. Fixes bug 22370; bugfix on 0.2.7.2-alpha.

Changes in version 0.3.1.1-alpha - 2017-05-22

Tor 0.3.1.1-alpha is the first release in the 0.3.1.x series. It reduces the bandwidth usage for Tor's directory protocol, adds some basic padding to resist netflow-based traffic analysis and to serve as the basis of other padding in the future, and adds rust support to the build system.

It also contains numerous other small features and improvements to security, correctness, and performance.

Below are the changes since 0.3.0.7.

  • Major features (directory protocol):
    • Tor relays and authorities can now serve clients an abbreviated version of the consensus document, containing only the changes since an older consensus document that the client holds. Clients now request these documents when available. When both client and server use this new protocol, they will use far less bandwidth (up to 94% less) to keep the client's consensus up-to-date. Implements proposal 140; closes ticket 13339. Based on work by Daniel Martí.
    • Tor can now compress directory traffic with lzma or with zstd compression algorithms, which can deliver better bandwidth performance. Because lzma is computationally expensive, it's only used for documents that can be compressed once and served many times. Support for these algorithms requires that tor is built with the libzstd and/or liblzma libraries available. Implements proposal 278; closes ticket 21662.
    • Relays now perform the more expensive compression operations, and consensus diff generation, in worker threads. This separation avoids delaying the main thread when a new consensus arrives.
  • Major features (experimental):
    • Tor can now build modules written in Rust. To turn this on, pass the "--enable-rust" flag to the configure script. It's not time to get excited yet: currently, there is no actual Rust functionality beyond some simple glue code, and a notice at startup to tell you that Rust is running. Still, we hope that programmers and packagers will try building Tor with Rust support, so that we can find issues and solve portability problems. Closes ticket 22106.

 

  • 17 comments
  • Add new comment

Tor 0.3.0.7 was released last week!

by nickm | May 26, 2017

Hello! This release came out 11 days ago, but since the blog was down at the time, I was only able to announce on the tor-announce@ mailing list. Nevertheless, I'm copying it here in case anyone didn't see it.

Tor 0.3.0.7 fixes a medium-severity security bug in earlier versions of Tor 0.3.0.x, where an attacker could cause a Tor relay process to exit. Relays running earlier versions of Tor 0.3.0.x should upgrade; clients are not affected.

If you build Tor from source, you can find it at the usual place on the website. Packages should be ready over the next weeks.

  • 5 comments
  • Add new comment

The State of Internet Censorship in Indonesia

by agrabeli | May 23, 2017

Today, in collaboration with Sinar Project, the Open Observatory of Network Interference (OONI) released a new research report: The State of Internet Censorship in Indonesia.

  • 1 comment
  • Add new comment

Tor Browser 7.0a4 is released

by boklm | May 16, 2017

Tor Browser 7.0a4 is now available from the Tor Browser Project page and also from our distribution directory.

This will probably be the last alpha before the first stable release in the 7.0 series.

  • 5 comments
  • Add new comment

We are upgrading our blog!

by hiro | May 15, 2017

In the next few days we will be in the process of upgrading blog.torproject.org. While we get prepared to refurbish the space, the current blog will be frozen for new content, starting now. This includes posts and comments and, if everything goes as planned, it should only last a few days.

Thanks in advance for your patience. See you on the other side.

  • 22 comments
  • Add new comment

Pagination

  • Current page 1
  • Page 2
  • Page 3
  • Page 4
  • …
  • Next page Next ›
  • Last page Last »

Upcoming Events

Alex and others at BornHack
August 22, 2017 - August 29, 2017

https://www.bornhack.dk/bornhack-2017/

FOCI and Usenix Security, Vancouver
August 14, 2017 - August 19, 2017

https://www.usenix.org/conference/usenixsecurity17

Alex and others at SHA2017
August 04, 2017 - August 08, 2017

https://sha2017.org

See All Upcoming Events

Recent Updates

Tor 0.3.1.2-alpha is out (with notes about 0.3.1.1-alpha)

by nickm | May 26, 2017

Hello again! This post announces the second alpha in the 0.3.1.x series, which I just released today. And since the blog was down when the first alpha came out, I'm posting the changelog for 0.3.1.1-alpha below too.

Tor 0.3.1.2-alpha is the second release in the 0.3.1.x series. It fixes a few bugs found while testing 0.3.1.1-alpha, including a memory corruption bug that affected relay stability.

Since this is an alpha release, you can expect more bugs than usual.

If you build Tor from source, you can find Tor 0.3.1.2-alpha at the usual place at the Download page on our website. Otherwise, you'll probably want to wait until packages are available. The next Tor Browser alpha release with this version of Tor will likely come out in mid-June.

Changes in version 0.3.1.2-alpha - 2017-05-26

  • Major bugfixes (crash, relay):
    • Fix a memory-corruption bug in relays that set MyFamily. Previously, they would double-free MyFamily elements when making the next descriptor or when changing their configuration. Fixes bug 22368; bugfix on 0.3.1.1-alpha.
  • Minor bugfixes (logging):
    • Log a better message when a directory authority replies to an upload with an unexpected status code. Fixes bug 11121; bugfix on 0.1.0.1-rc.
  • Minor bugfixes (memory leak, directory authority):
    • When directory authorities reject a router descriptor due to keypinning, free the router descriptor rather than leaking the memory. Fixes bug 22370; bugfix on 0.2.7.2-alpha.

Changes in version 0.3.1.1-alpha - 2017-05-22

Tor 0.3.1.1-alpha is the first release in the 0.3.1.x series. It reduces the bandwidth usage for Tor's directory protocol, adds some basic padding to resist netflow-based traffic analysis and to serve as the basis of other padding in the future, and adds rust support to the build system.

It also contains numerous other small features and improvements to security, correctness, and performance.

Below are the changes since 0.3.0.7.

  • Major features (directory protocol):
    • Tor relays and authorities can now serve clients an abbreviated version of the consensus document, containing only the changes since an older consensus document that the client holds. Clients now request these documents when available. When both client and server use this new protocol, they will use far less bandwidth (up to 94% less) to keep the client's consensus up-to-date. Implements proposal 140; closes ticket 13339. Based on work by Daniel Martí.
    • Tor can now compress directory traffic with lzma or with zstd compression algorithms, which can deliver better bandwidth performance. Because lzma is computationally expensive, it's only used for documents that can be compressed once and served many times. Support for these algorithms requires that tor is built with the libzstd and/or liblzma libraries available. Implements proposal 278; closes ticket 21662.
    • Relays now perform the more expensive compression operations, and consensus diff generation, in worker threads. This separation avoids delaying the main thread when a new consensus arrives.
  • Major features (experimental):
    • Tor can now build modules written in Rust. To turn this on, pass the "--enable-rust" flag to the configure script. It's not time to get excited yet: currently, there is no actual Rust functionality beyond some simple glue code, and a notice at startup to tell you that Rust is running. Still, we hope that programmers and packagers will try building Tor with Rust support, so that we can find issues and solve portability problems. Closes ticket 22106.

 

Tor 0.3.0.7 was released last week!

by nickm | May 26, 2017

Hello! This release came out 11 days ago, but since the blog was down at the time, I was only able to announce on the tor-announce@ mailing list.

The State of Internet Censorship in Indonesia

by agrabeli | May 23, 2017

Today, in collaboration with Sinar Project, the Open Observatory of Network Interference (OONI) released a new re

Tor Browser 7.0a4 is released

by boklm | May 16, 2017

Tor Browser 7.0a4 is now available from the Tor Browser Project page and also from our

© 2017 The Tor Project

Footer

  • The Tor Project
  • RSS
  • Donate