Archive

UN Special Rapporteur: Anonymity Is Gateway to Free Expression

We at the Tor Project have long said that Tor is a technology for free expression. Today, that view was endorsed by UN Special Rapporteur David Kaye in a new report on encryption and anonymity. The report, a close look at international law and its relation to technology, concludes that encryption and anonymity technologies are essential to the protection of human rights to privacy and freedom of expression and opinion:

Encryption and anonymity, separately or together, create a zone of privacy to protect opinion and belief. For instance, they enable private communications and can shield an opinion from outside scrutiny, particularly important in hostile political, social, religious and legal environments. Where States impose unlawful censorship through filtering and other technologies, the use of encryption and anonymity may empower individuals to circumvent barriers and access information and ideas without the intrusion of authorities. Journalists, researchers, lawyers and civil society rely on encryption and anonymity to shield themselves (and their sources, clients and partners) from surveillance and harassment. The ability to search the web, develop ideas and communicate securely may be the only way in which many can explore basic aspects of identity, such as one’s gender, religion, ethnicity, national origin or sexuality. Artists rely on encryption and anonymity to safeguard and protect their right to expression, especially in situations where it is not only the State creating limitations but also society that does not tolerate unconventional opinions or expression.

The report points to the Tor network specifically, noting that anonymity is critical to protect privacy against identification through metadata analysis. "A common human desire to protect one’s identity from the crowd, anonymity may liberate a user to explore and impart ideas and opinions more than she would using her actual identity." In the protection of free expression, anonymity technology is thus a necessary counterpart to encryption, giving the individual the ability to choose both what to say and to whom to reveal that she is saying it.

The Kaye Report recognizes that technologies can be used for harm as well as for good, but that does not mean they may be banned. Rather, human rights law offers a strict framework for evaluation of government-imposed limits: "Restrictions on encryption and anonymity, as enablers of the right to freedom of expression... must be provided for by law; may only be imposed for legitimate grounds; and must conform to the strict tests of necessity and proportionality." That means that legal restrictions must be publicly and transparently legislated, with judicial safeguards on their application; they must be applied narrowly; and they must be proportional to the objectives of the law. "Because anonymity facilitates opinion and expression in significant ways online, States should protect it and generally not restrict the technologies that provide it."

The Tor Project is pleased to have contributed to the report, and we heartily endorse its conclusion:

The use of encryption and anonymity tools and better digital literacy should be encouraged. The Special Rapporteur, recognizing that the value of encryption and anonymity tools depends on their widespread adoption, encourages States, civil society organizations and corporations to engage in a campaign to bring encryption by design and default to users around the world and, where necessary, to ensure that users at risk be provided the tools to exercise their right to freedom of opinion and expression securely.

Tor is recruiting an Executive Administrator (a talented, organized office person)

The Tor Project is evaluating our needs and resources as we transition to a new era and begin our search for a new Executive Director. We have decided that we need better systems for sharing information and coordinating the incredibly diverse work of the Tor community.

We are recruiting an executive administrator to be at the hub of our leadership team. We seek an intuitive problem solver who can impose just the right amount of order on the ways that internal Tor communicates, makes decisions, and generally takes care of business. Our geographically and functionally diverse team has many stakeholders. A person who can step in to build processes, make connections, and provide support from all angles will be essential. The successful applicant will have the ability to translate objectives from diverse teams to a central framework that promotes better communication and support for all.

We hope and expect that applicants from many kinds of backgrounds will apply. We are not likely to find one person who meets all of our criteria for this role, but we recognize that particular strengths will make up for lack of experience in other areas. For example, a strong background in project management within the free and open source software movement might overcome lack of experience in formal office administration. We invite each candidate to make the case for how his or her skill set, knowledge, and attitude would assist in fulfilling the overall objectives of the role.

Please review the posting here: https://www.torproject.org/about/jobs-execadmin.html.en and consider sharing it within your networks. This is a phenomenal opportunity for a motivated, organized professional to make an immediate impact working at the forefront of anonymous and secure communications!

Tor Weekly News — May 28th, 2015

Welcome to the twenty-first issue in 2015 of Tor Weekly News, the weekly newsletter that covers what’s happening in the Tor community.

New faces in the Tor community

Since the beginning of the year, the Tor Project, Inc. has made two exciting new additions to its core team. Kate Krauss is Tor’s new Director of Communications, working with journalists and activists to make sure information about the Tor Project’s work gets to groups in need and to the public at large. She has two decades’ worth of experience in non-profit communications and outreach, earned at pioneering AIDS advocacy groups ACT UP and the AIDS Policy Project, and has also contributed to projects working against censorship and surveillance.

Isabela Bagueros is Tor’s new Project Manager, coordinating the numerous moving parts of Tor’s research, development, and outreach activities, and ensuring smooth interaction between funders, developers, users, and other communities. An active member of the free software community both in Brazil and internationally, she contributed to the migration of Brazilian government IT systems to free software, and has spent the last four years working on growth and internationalization at Twitter. See the press release on the Tor blog to learn more about Kate and Isabela, and the experience they bring to Tor.

Another newly-launched collaboration is that between the Tor Project and Sue Gardner, former executive director of the Wikimedia Foundation and award-winning activist for Internet freedom, transparency, and investigative journalism. Sue will be expanding on her recent informal advisory role to help develop a long-term organizational strategy for Tor; this will involve public consultations with members of the Tor Project and the wider Tor community “to develop a plan for making Tor as effective and sustainable as it can be”, as Roger Dingledine wrote on the Tor blog. Thanks to First Look Media for making this project possible!

These new relationships are already bearing fruit in many areas of Tor’s day-to-day operation. More new arrivals are expected in the near future, too: while the board of directors handles the process of transitioning to a new Executive Director following the departure of Andrew Lewman, the Tor Project is looking for an Executive Administrator to help meet its administrative and organizational needs in a time of rapid growth and development. If this sounds like something you want to be in on, please see the job description for the full details and instructions for applying.

Miscellaneous news

Nick Mathewson explained what the recently-disclosed “Logjam”/“weakdh” attack against SSL might mean for Tor. In short: not a lot, but you should take it as an opportunity to update Tor and OpenSSL if you haven’t done so already. See Nick’s post for the technical explanation.

Damian Johnson published a tutorial covering techniques for fine-grained handling of Tor circuits and streams using the Stem controller library.

Donncha O’Cearbhaill, one of the students in Tor’s first-ever Summer of Privacy program, introduced his project for the summer — improving the resilience and scalability of Tor onion services — and asked for feedback from onion service operators concerning “the use-cases, priorities and limitations for people who are experiencing the current limitations of the onion service subsystem”.

Arturo Filastò sent out status reports for the OONI team, covering its activities in March and April.

This week in Tor history

A year ago this week, Yawning Angel announced the development of obfs4, a next-generation censorship-circumvention system based on ScrambleSuit but using djb crypto, which (since you asked) means “a combination of Curve25519, Elligator2, HMAC-SHA256, XSalsa20/Poly1305 and SipHash-2-4”. The now-mature obfs4 was recently made the default pluggable transport offered to users requesting bridge relay addresses from the BridgeDB service, and has gained over a thousand regular users since its inclusion in the stable Tor Browser series this time last month.

Also celebrating its one-year anniversary is Micah Lee’s simple onion service-based filesharing tool, OnionShare, whose fans include national security journalists and unnamed Tor Project members


This issue of Tor Weekly News has been assembled by Harmony.

Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!

Tor Weekly News — May 22nd, 2015

Welcome to the twentieth issue in 2015 of Tor Weekly News, the weekly newsletter that covers what’s happening in the aleatoric Tor community.

Tor 0.2.6.8 is out

Nick Mathewson announced a new release in the current stable branch of the core Tor software. Tor 0.2.6.8 stops directory authorities from giving the HSDir flag to relays without a DirPort configured, which was causing accessibility problems for some hidden services. It also fixes a bug that could have allowed a Tor client to crash an onion service in a very small number of cases where the service was making use of Tor’s “client authorization” feature.

If you are running one of the Tor network’s nine directory authorities, you should upgrade as soon as possible. If you aren’t one of those people, no urgent action is required.

Tor Browser 4.5.1 and 5.0a1 are out

Mike Perry announced new releases by the Tor Browser team in both the stable and alpha series. Tor Browser 4.5.1 relaxes the “first-party isolation” system slightly, in order to solve some usability issues affecting websites that host their content on several subdomains. In addition, NoScript’s ClearClick anti-clickjacking feature is disabled, as it had been causing frequent false positives, especially on pages serving captchas.

In addition to those fixes, Tor Browser 5.0a1 includes several new privacy-preserving features. The automatic window-resizing feature from 4.5a4 is reintroduced here, and JavaScript’s ability to take precise timings of some activities has been limited, in order to defend against browser fingerprinting attacks.

See Mike’s announcements for full changelogs, download instructions, and advice on reporting any issues you experience. Both releases include important security updates to Firefox, so please upgrade as soon as you can!

Fixing the Tor network’s bandwidth measurement system

When a Tor relay is first set up, it performs a test to estimate its own ability to handle Tor traffic, and then reports this figure to the directory authorities — the so-called “advertised bandwidth”. In the earliest versions of the Tor network, the directory authorities used this advertised value directly when creating the consensus, even though the amount of bandwidth available to relays is sometimes greater or lesser than the reported figure. This led to poor balancing of the traffic load across the Tor network, and to the overwhelming impression that Tor is just “slow”.

In 2009, therefore, Mike Perry introduced the “bandwidth authority” (or “bwauth”) scripts as part of his TorFlow suite of tools. Computers that are configured to run as bwauths regularly scan the relays that make up the Tor network to see if the bandwidth they advertise corresponds to their real capacity. If not, the consensus will adjust the advertised bandwidth up or down to reflect the measurements taken by the bwauths; this adjusted value is the “consensus weight”, and clients using the consensus weight to select their Tor circuits experience much less of the lag that plagued the Tor network in its infancy.

At least, that’s how it should work. For some time, the bwauth scripts have been unmaintained, leading to problems for their operators, and more recently they appear to have broken in a way that is hard to diagnose. As nusenu pointed out, a significant number of Tor relays are now unmeasured, which means that some Tor relay operators are contributing bandwidth which the network is not using in the most efficient way.

In the short term, work is underway to patch up the bwauth scripts so that they can once again scan all the relays in the network: Tom Ritter announced that new bwauths have been brought online to provide the necessary measurements, and the scripts are being investigated to see if differences between consensuses are causing scanners to miss some relays.

A more permanent fix, however, might involve a total rewrite of the bwauth scripts if, as Roger Dingledine suggested, the design itself is flawed. Tor Project contributor Aaron Gibson will hopefully be addressing this issue as part of an upcoming fellowship with OTF, and a number of other research groups are also working towards a more robust design for the bandwidth measurement system.

Be sure to sign up to the tor-relays mailing list for further information. Thanks to all relay operators for their patience while the problem-solving continues!

Stopping onion service DoS attacks by limiting connections

George Kadianakis published an experimental workaround for onion services affected by a newly-discovered denial-of-service attack. “In this attack”, as George explained, “the adversary forces a hidden service to create thousands of connections to its underlying application (e.g. the webserver), which overwhelms both Tor and the underlying application”.

Onion service operators who want to test the fix will need to recompile their Tor from a special git branch, then configure the new settings in their torrc file to set an upper limit on the number of TCP connections a client can make. “Let us know if this works for you, by sending an email to this list, or commenting on the trac ticket. If it works for people, we might incorporate it in a Tor release soon”, wrote George.

What is the value of anonymous communication?

Researchers at Drexel University in Philadelphia are investigating the ways in which Tor users “write blog posts, edit Wikipedia articles, contribute to open source projects on GitHub, post on discussion forums, comment on news articles, Tweet, write reviews, and many other things” as part of their online activity, and whether or not they are inhibited by obstacles such as captchas, IP blacklists, or other blocking mechanisms, as Kate Krauss explained on the Tor blog.

According to Professor Rachael Greenstadt, one of the co-authors: “By understanding the contributions that Tor users make, we can help make a case for the value of anonymity online”.

One of the biggest threats to Tor’s success, as Roger Dingledine wrote last year, is the “siloing” of the Internet caused by the “growing number of websites [that] treat users from anonymity services differently”, so it’s more important than ever to demonstrate the many contributions to online projects made by Tor users. If you are a Tor user and don’t mind sharing your experiences of using Tor to communicate anonymously online, please see Kate’s post for more information on how to participate in the study.

Miscellaneous news

Damian Johnson put out a new release of Stem, the Tor controller library in Python. Stem 1.4 brings another increase in the speed of document parsing (now that descriptors are not validated by default), and includes support for Tor’s new “ephemeral onion service” and descriptor handling features. See Damian’s announcement for the full changelog.

Alec Muffett, the lead engineer behind Facebook’s onion service, contributed some notes on his experiences to a thread about serving the same site as both an onion service and a regular website.

Jesse Victors, one of the students participating in the first-ever Tor Summer of Privacy, explained in greater detail his proposal for “OnioNS”, a method of creating human-memorable yet secure addresses for onion services.

Colin C. sent out the Tor Help Desk report for April.

Thanks to Matt Hoover and spriver for running mirrors of the Tor Project website and software archive!

Micah Lee discovered a bug that is causing OnionShare, the onion service-based file-sharing application, to crash the entire Tor process when run using Tails.

Martin Florian discussed the problems caused by onion services that change their IP address during operation, such as those hosted on mobile devices. “Some logic needs to be included for forgetting about rendevouz points that have failed once…Am I on the right track? Is this a good idea? And how do I forget about RPs?”

This week in Tor history

A year ago this week, Anders Andersson wondered about the problems that Tor would face if the .onion top-level domain (TLD) were to be sold by ICANN for public registration, in the same way as the large number of new “generic” TLDs. This question had already been the subject of a submission to the Internet Engineering Task Force co-authored by the Tor Project’s Jacob Appelbaum, arguing that the .onion suffix should be one of several TLDs set aside for special use by peer-to-peer software.

This week, Jacob and Facebook’s Alec Muffett submitted another Internet-draft to the IETF, specifically requesting the registration of .onion as a special-use TLD now that it is in wide use. If it is approved, the .onion suffix will be reserved for use by Tor, ensuring that no conflicts arise later which might break the onion service naming system or enable attacks on users.


This issue of Tor Weekly News has been assembled by Harmony, Karsten Loesing, and Roger Dingledine.

Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!

Tor 0.2.6.8 is released

Hi, I've just put out a new stable Tor release. It is not a high-urgency item for most clients and relays, but directory authorities should upgrade. Right now, the source is available on the website, and packages should become available one their maintainers build them.

Tor 0.2.6.8 fixes a bit of dodgy code in parsing INTRODUCE2 cells, and fixes an authority-side bug in assigning the HSDir flag. All directory authorities should upgrade.

Changes in version 0.2.6.8 - 2015-05-21
  • Major bugfixes (hidden services, backport from 0.2.7.1-alpha):
    • Revert commit that made directory authorities assign the HSDir flag to relay without a DirPort; this was bad because such relays can't handle BEGIN_DIR cells. Fixes bug 15850; bugfix on tor-0.2.6.3-alpha.
  • Minor bugfixes (hidden service, backport from 0.2.7.1-alpha):
    • Fix an out-of-bounds read when parsing invalid INTRODUCE2 cells on a client authorized hidden service. Fixes bug 15823; bugfix on 0.2.1.6-alpha.
  • Minor features (geoip):
    • Update geoip to the April 8 2015 Maxmind GeoLite2 Country database.
    • Update geoip6 to the April 8 2015 Maxmind GeoLite2 Country database.

Study: What is the value of anonymous communication?

Drexel University researchers in Philadelphia, Pennsylvania are recruiting Tor users for an interview study to see how they use Tor while creating things online—how they write blog posts, edit Wikipedia articles, contribute to open source projects on GitHub, post on discussion forums, comment on news articles, Tweet, write reviews, and many other things.

The researchers want to investigate the ways in which various limits, like CAPTCHAs, or even blocking access to sites entirely, inhibit or don’t inhibit Tor users’ ability to create things online. They hope to identify times when people are forced to modify their behavior to achieve the privacy they want. They want to measure the value of anonymous participation and then begin to talk to service providers and others to optimize the participation of Tor users.

“By understanding the contributions that Tor users make, we can help make a case for the value of anonymity online,” said Associate Professor Rachel Greenstadt, an investigator on the study.

The researchers are also interested in hearing from Tor users about other impediments to their anonymous participation that they have encountered while online.

“It’s critical for online projects to support contributions from anyone eager to participate,” said Assistant Professor Andrea Forte, principal investigator.

For more information about joining the study, see: The Tor Study (http://andreaforte.net/tor.html)

Tor Weekly News — May 14th, 2015

Welcome to the nineteenth issue in 2015 of Tor Weekly News, the weekly newsletter that covers what’s happening in the Tor community.

Tor 0.2.7.1-alpha is out

Nick Mathewson announced the first alpha release in the Tor 0.2.7.x series. The most notable new feature in this release is the ability to create, delete, control, and get information about onion services and their descriptors via a Tor controller. It also fixes a bug that assigned the HSDir flag to relays that would not function properly as directories, affecting the availability of some onion services over the past few weeks.

The source code is available as usual from the distribution directory; as with any alpha release, “please expect bugs”.

Tails 1.4 is out

The Tails team announced version 1.4 of the anonymous live operating system. Most notable in this release is the inclusion of Tor Browser 4.5, meaning Tails users can now take advantage of the security slider, enhanced anti-tracking protection, and other exciting new features in the latest stable Tor Browser series.

Another user-facing enhancement is the addition of Paperkey, a program that lets you back up the secret part of your GPG key on the one storage medium that never goes out of fashion.

For a full list of changes, see the team’s announcement. This release contains important security updates, so head to the download page (or the incremental updater) as soon as possible.

Tor Cloud is retired

The Tor Cloud project, which offered prospective Tor relay operators an easy way of setting up a bridge relay on Amazon’s EC2 cloud computing platform, has been discontinued, as Karsten Loesing explained on the Tor blog.

“The main reason for discontinuing Tor Cloud is the fact that software requires maintenance, and Tor Cloud is no exception”, wrote Karsten. Several serious bugs have rendered Tor Cloud unusable, and no solution could be found for its continued maintenance, so the service will no longer be offered for new relays.

This doesn’t mean, however, that existing Tor Cloud relays will be shut down as well — those will continue to run as long as their operators want them to. Similarly, everyday Tor Browser users do not need to worry about this announcement: it will have no effect on the working of software that uses the Tor network.

If you want to help grow the Tor network and strengthen the protection it offers to Internet users around the world, but don’t have the resources to set up a relay from scratch, please consider donating to a Tor relay organization like Torservers.net, Nos Oignons, or another of their partners. These experienced Tor relay operators will run the services on your behalf, ensuring they stay secure, efficient, and up-to-date. Please see the organizations’ donation pages for more details!

Relay operators: please enable IPv6!

“We still have a depressingly low number of relays that support IPv6 (currently only ~120 of ~1900 relays)”, wrote Moritz Bartl in a post to the tor-relays mailing list. If your host supports the new protocol, enabling it on your Tor relay is as simple as a change to your torrc file: please see Moritz’ post for the full details.

More monthly status reports for April 2015

The wave of regular monthly reports from Tor project members for the month of April continued, with reports from Karsten Loesing (coordinating translations and reports for SponsorO, researching onion service statistics, and developing Onionoo), Noel Torres (responding to Tor help desk requests), Sukhbir Singh (developing Tor Messenger), Isabela Bagueros (overall project management), and Arlo Breault (also working on Tor Messenger).

David Goulet sent out the report for the SponsorR team, who are researching Tor onion services and working on improvements to their security and stability.

Miscellaneous news

meejah announced version 0.13.0 of txtorcon, the Twisted-based asynchronous Tor controller. This version brings with it speed improvements, as well as support for “basic” and “stealth” onion service authentication; see meejah’s announcement for full details.

The Tails team published their monthly report for April 2015. Take a look for news of recent development work, summaries of ongoing discussions, upcoming events, and more.

Lunar gave an interview (in French) to lundimatin on the subject of the French government’s “Bill on Intelligence” and what it means for the Tor network.

Jacob Appelbaum took part in a panel discussion at re:publica 15 entitled “A Deeper Frontier of Freedom: The State of the Deepweb”.


This issue of Tor Weekly News has been assembled by Harmony, the Tails team, and Karsten Loesing.

Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!

Stem Release 1.4

in

Greetings wonderful carbon-based residents of the Internet. I'm pleased to announce the 1.4.0 release of Stem!

What is Stem, you ask? For those who aren't familiar with it Stem is a Python library for interacting with Tor. With it you can script against your relay, descriptor data, or even write applications similar to Nyx and Vidalia.

https://stem.torproject.org/

So what's new in this release?


Ephemeral Hidden Services and Descriptors

Tor's 0.2.7.1 release is bringing with it new hidden service capabilities, most notably ADD_ONION and HSFETCH. Ephemeral hidden services let you easily operate a hidden service that never touches disk.

This latest Tor release also brought with it the ability to retrieve a hidden service's descriptor information. Stem knows how to parse, validate, and decrypt these documents.


Faster Descriptor Parsing

When reading descriptors without validation (which is the new default), documents are now lazily parsed. This provides a very substantial speedup depending on the document's type...

  • Server descriptors: 27% faster
  • Extrainfo descriptors: 71% faster
  • Microdescriptors: 43% faster
  • Consensus: 37% faster

Prefer to keep validation? No problem! Just include 'validate = True' and
you'll be good to go.


As always this is just the tip of the iceberg. For a full rundown on the myriad of improvements and fixes in this release see...

https://stem.torproject.org/change_log.html#version-1-4

Syndicate content