Tor Browser 7.0a3 is released

Tor Browser 7.0a3 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

This is the first alpha release which is based on Firefox ESR 52. We updated all of our patches that did not get upstreamed yet and made Torbutton and Tor Launcher multiprocess (e10s) compatible. After the first nightly build based on ESR52 went out we already fixed a number of bugs associated with this switch. But more remain, please help!

We hope having e10s and Mozilla's content sandbox enabled will be one of the major new features in the upcoming Tor Browser 7.0 series, both security- and performance-wise. While we are still working on the sandboxing part for Windows, both Linux and macOS have e10s and content sandboxing enabled by default in Tor Browser 7.0a3. There are already a number of bugs related to that on our radar which can be found on our bug tracker and which are tagged with the `tbb-e10s` keyword. If you find more, please report them!

The switch to Firefox ESR 52 raises the system requirements for Tor Browser on Windows and macOS. Computers running Windows and are not SSE2-capable are not supported anymore. On Apple computers with OS X < 10.9 Tor Browser won't run anymore either.

We updated our toolchains during the ESR transition as well. In particular we retired the old GCC-based one for our macOS cross-compilation and rely solely on clang/cctools now. As with previous releases building 7.0a3 is fully reproducible on all three supported platforms, even though we needed to deploy a last minute patch for Linux bundles this time.

Apart from switching to the new ESR and dealing with related issues we included a new Tor alpha (0.3.0.5-rc) and updated our NoScript (5.0.2) and HTTPS-Everywhere versions (5.2.14). The Sandboxed Tor Browser for Linux got updated to 0.0.6 making sure it is compatible with Firefox ESR 52.

As in Tor Browser 6.5.2 we provide a fix for Tor Browser crashing on github.com on Windows and for Twitter issues that got reported already a while ago. We update our security slider as well taking newer JIT preferences into account.

A note to Windows users: We signed the .exe files with a new codesigning certificate as the old one is about to expire. If there are issues with that new certificate, e.g. scary warnings showing up after downloading a Tor Browser .exe file and double-clicking on it, please let us know.

The full changelog since Tor Browser 7.0a2 is:

  • All Platforms
    • Update Firefox to 52.1.0esr
    • Tor to 0.3.0.5-rc
    • Update Torbutton to 1.9.7.2
      • Bug 21865: Update our JIT preferences in the security slider
      • Bug 21747: Make 'New Tor Circuit for this Site' work in ESR52
      • Bug 21745: Fix handling of catch-all circuit
      • Bug 21547: Fix circuit display under e10s
      • Bug 21268: e10s compatibility for New Identity
      • Bug 21267: Remove window resize implementation for now
      • Bug 21201: Make Torbutton multiprocess compatible
      • Translations update
    • Update Tor Launcher to 0.2.12
      • Bug 21920: Don't show locale selection dialog
      • Bug 21546: Mark Tor Launcher as multiprocess compatible
      • Bug 21264: Add a README file
      • Translations update
    • Update HTTPS-Everywhere to 5.2.14
    • Update NoScript to 5.0.2
    • Update sandboxed-tor-browser to 0.0.6
      • Bug 21764: Use bubblewrap's `--die-with-parent` when supported
      • Fix e10s Web Content crash on systems with grsec kernels
      • Bug 21928: Force a reinstall if an existing hardened bundle is present
      • Bug 21929: Remove hardened/ASAN related code
      • Bug 21927: Remove the ability to install/update the hardened bundle
      • Bug 21244: Update the MAR signing key for 7.0
      • Bug 21536: Remove asn's scramblesuit bridge from Tor Browser
      • Add back old MAR signing key to not break updating Tor Browser stable
      • Add `prlimit64` to the firefox system call whitelist
      • Fix compilation with Go 1.8
      • Use Config.Clone() to clone TLS configs when available
    • Update Go to 1.7.5 (bug 21709)
    • Bug 21555+16450: Don't remove Authorization header on subdomains (e.g. Twitter)
    • Bug 21887: Fix broken error pages on higher security levels
    • Bug 21876: Enable e10s by default on all supported platforms
    • Bug 21876: Always use esr policies for e10s
    • Bug 20905: Fix resizing issues after moving to a direct Firefox patch
    • Bug 21875: Modal dialogs are maximized in ESR52 nightly builds
    • Bug 21885: SVG is not disabled in Tor Browser based on ESR52
    • Bug 17334: Hide Referer when leaving a .onion domain (improved patch)
    • Bug 3246: Double-key cookies
    • Bug 8842: Fix XML parsing error
    • Bug 16886: 16886: "Add-on compatibility check dialog" contains Firefox logo
    • Bug 19192: Untrust Blue Coat CA
    • Bug 19955: Avoid confusing warning that favicon load request got cancelled
    • Bug 20005: Backport fixes for memory leaks investigation
    • Bug 20755: ltn.com.tw is broken in Tor Browser
    • Bug 21896: Commenting on website is broken due to CAPTCHA not being displayed
    • Bug 20680: Rebase Tor Browser patches to 52 ESR
    • Bug 21917: Add new obfs4 bridges
    • Bug 21918: Move meek-amazon to d2cly7j4zqgua7.cloudfront.net backend
  • Windows
    • Bug 21795: Fix Tor Browser crashing on github.com
    • Bug 12426: Make use of HeapEnableTerminationOnCorruption
    • Bug 19316: Make sure our Windows updates can deal with the SSE2 requirement
    • Bug 21868: Fix build bustage with FIREFOX_52_0_2esr_RELEASE for Windows
  • OS X
    • Bug 21723: Fix inconsistent generation of MOZ_MACBUNDLE_ID
    • Bug 21724: Make Firefox and Tor Browser distinct macOS apps
    • Bug 21931: Backport OSX SetupMacCommandLine updater fixes
    • Bug 15910: Don't download GMPs via the local fallback
  • Linux
    • Bug 21907: Fix runtime error on CentOS 6
    • Bug 21748: Fix broken Snowflake build and update bridge details
    • Bug 21954: Snowflake breaks the 7.0a3 build
    • Bug 15910: Don't download GMPs via the local fallback
  • Build system
    • Windows
      • Bug 21837: Fix reproducibility of accessibility code for Windows
      • Bug 21240: Create patches to fix mingw-w64 compilation of Firefox ESR 52
      • Bug 21904: Bump mingw-w64 commit to help with sandbox compilation
      • Bug 18831: Use own Yasm for Firefox cross-compilation
    • OS X
      • Bug 21328: Updating to clang 3.8.0
      • Bug 21754: Remove old GCC toolchain and macOS SDK
      • Bug 19783: Remove unused macOS helper scripts
      • Bug 10369: Don't use old GCC toolchain anymore for utils
      • Bug 21753: Replace our old GCC toolchain in PT descriptor
      • Bug 18530: ESR52 based Tor Browser only runs on macOS 10.9+
    • Linux
      • Bug 21930: NSS libraries are missing from mar-tools archive
      • Bug 21239: Adapt Linux Firefox descriptor to ESR52 (use GTK2)
      • Bug 21960: Linux bundles based on ESR 52 are not reproducible anymore
      • Bug 21629: Fix broken ASan builds when switching to ESR 52

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

When will we be able to run Snowflake bridges?

You mean when you will be able to use Snowflake? If you have Tor Browser alpha this is available on Linux only for now. The Snowflake folks are working on getting it integrated into macOS and Windows bundles as well.

Indeed it does seem that the effects are pretty noticeable! Youtube is much more smoother than it used to be on earlier version! :)

Is the content process sandbox for Firefox 52 on Windows the same one that is used in Chromium?

Roughly, yes. Mozilla imports Google's code and adapts it to their needs. I am not sure whether the sandbox in Mozilla provides the same protections yet but the codebase is the same.

Thanks!

When I went to about:addons and then "Get Add-ons" and I choosed uBlock to install it, it told me "Firefox blocked this site from attempting to install add-on" or something allong those lines

This doesn't happen with Tor Browser 6.5.2

You should not install any extra add-ons it makes it easier to fingerprint you, which in turn affects your anonymity.

Yes, but I was wondering what may have caused that problem which was not found in the previous release (6.5.2).

Since there is no mention of it I'd assume Thunderbird/IceW with TorBirdie is still not working in the 7.0x platform

We need Tor Mail (Bundle), based on this TBB!

Please clarify your announcement about now requiring SSE2-capable processors : is it for the *browser* component only, or is it applicable to the core Tor proxy (viz, tor.exe on Windows 32 bits) ?

That's just the browser component.

[NoScript HTTPS] AUTOMATIC SECURE on https://safebrowsing.google.com: NID=101=%removed_id%
Do they identify us?

About your note to Windows users: what exes do you sign? It is distributive only. No code signing found. And what could be wrong with it?

The installer, e.g.: https://dist.torproject.org/torbrowser/7.0a3/torbrowser-install-7.0a3_en-US.exe. You should get a usual "downloaded-from-the-internet"-dialog with a clickable link to the Tor Project certificate details.

19:23:17.896 XML Parsing Error: undefined entity
Location: jar:file:///x:/Tor%20Browser/Browser/omni.ja!/chrome/toolkit/content/mozapps/extensions/pluginPrefs.xul
Line Number 10, Column 3: 1 pluginPrefs.xul:10:3
19:23:17.932 TypeError: libLabel is null 1 PluginProvider.jsm:85:32

Very crashy on windows. Managed to crash it from the hamburger menu's Customize feature and crashed again when trying to post a comment on this very page. Looks like some very strong improvements otherwise, keep up the great work

crashy, hehe, that's what e10s means ;-)

Do you have steps to reproduce any of your crashes? If so, please let us know them, so we have a chance to get those issues fixed in the next (alpha) release. Thanks.

Both crashes happened within minutes of a fresh install. I'm happy to go more in-depth, but when the crashes are that easy to experience I ponder the value of reporting when just a few minutes of experimenting with the UI and browsing around some sites such as the tor blog can provoke several. The browser totally freezed when typing a comment in the comment box of this blog, for one. Another crash I experience happened after clicking the hamburger menu, then clicking Customize, then dragging some icons to and from (and on either side of) the address bar. IIRC the crash happened after dragging the search bar off and placing it off the browser (to the dock of unused items just above the cut/copy/paste entries). I experienced another crash when opening about:config, and another crash when changing my download folder location from the Options screen. Also, many UI elements are missing throughout the browser (such as the little dots that indicate a selected option from the General section of the Options menu where the Downloads folder may be changed). Sorry if all of this is brief. I don't get any crashes in 7.0a2 or in the new 6.5.2. I greatly anticipate being able to use the new e10s features and hope a lot of this can be ironed out for 7.0a4. Platform is Win 10 64bit with creators update.

Warning: ‘nsIOService::NewChannel()’ deprecated, please use ‘nsIOService::NewChannel2()’ aboutTor.js:42:18
Warning: ‘nsIAboutModule->newChannel(aURI)’ deprecated, please use ‘nsIAboutModule->newChannel(aURI, aLoadInfo)’ NetUtil.jsm:357:15

There are so many changes in FPI, so could you change Torbutton's INFOs about violations of it into warnings about it?

What violations are you talking about? Could you give an example of what you want to see changed?

Everything that violates FPI and goes through catch-all or noname circuits should be logged at higher logging level of Torbutton (now it's too noisy by INFO messages).

Antivirus AVG told me TOR was behaving suspicuously. I hit the wrong button, lost my TOR and cannot reinstall on Win 10. Merde!

Yes, antivirus tools are bad news:
https://www.torproject.org/docs/faq#VirusFalsePositives

(I'm not saying you shouldn't use them, if you're stuck on Windows. But they're still bad news.)

*All* Sound in Linux is broken now after update, :-(
I updated from the hardend version to
"7.0a3 (based on Mozilla Firefox 52.1.0) (64-bit)"

What does `pulseaudio --check -v` say?

Hi, we dont use pulse audio, Alsa only.

https://bugzilla.mozilla.org/show_bug.cgi?id=1247056

Complain to Mozilla about it.

Hi Yawning
Yes,
It looks really bad at the moment, from the multiple bug reports and even articles on the net it seems that they are very firm on to this track now,

they do not want to listen to the users that ,without warning, lost their websound, the solution they tell is add pulseaudio and make your system bad or "then you have to switch distro" , many many of the users in this situation can or will not add on the pulseaudio-layers now,

Therefore users will probably look for another browser instead? But as far as I know noscript and more is only for firefox, so that is not an option for some users that still care not to run all kind of not so nice scripts by default.

Same on Gentoo after installing Pulseaudio. No more sound. Pulseaudio doesn't detect my Xonar card. All it shows is the dummy-sink.

Hmm

This is probably not the optimal way to go now for security, but if mozillafox really have decided that it must use a "man in the middle", is there some other easy way to use or make a small and more secure middle-ware, that now ONLY redirects firefox audio to use alsa as normal,

and maybe even without using JACK, ..if JACK is the normal system setup..
So if our program just pretend to be pulseaudio, what happens? can we then get sound back again without having all the bloaty scary downsides with pulseaudios insecurity and the other damages to the sound quality/latency problems in our systems?

(It seems so, as kxstudio have some option to run both JACK and Pulse in parallel (?) as I understand the solutions it will always be another program layer on top of alsa and not direct to alsa as usual, But why use pulseaudio at all then? Only because of the browser.. )

so if possible (maybe it have been done already by someone?), would this "minipulse" middleman be the second best alternative after having a future "pulsefree" Firefox version?

/Cw

People that want to use JACK, can setup JACK as a PulseAudio source/sink.

https://www.freedesktop.org/wiki/Software/PulseAudio/Documentation/User/Modules/#index9h2

I mean, if you want to re-implement PulseAudio, go nuts I guess. I'm personally happier that Firefox can't write to /dev/snd/*, but maybe that's just me.

Hi,
sorry I dont know much about that problem with firefox,
is that "worse" than a possible memory and audio-snooping trough pulseaudio?

But the point was more from a security perspective, as I see it.
How to get rid of as much unknown software in the middle as possible.
Not to install truckloads more of them :-)

/ Cw

I can't download files throguh TOR in this version. The page gets blank before asking to save file, then I get the "window crashed" warning (and ALL windows actually crash).

Keep an eye on https://bugs.torproject.org/21766

Here is the popup-link with all the info about the latest Tor-updates no sound-problem:
https://support.mozilla.org/1/firefox/52.1.0/Linux/en-US/fix-common-audio-and-video-issues

THX alot for all your work! :-)

Unfortunately, the latest TBB (tor-browser-linux64-7.0a3_en-US.tar) crashes immediately when clicking in the addons-page on, for example, 'get-addons' or 'appearance'.
System: Fedora 25, (kernel 4.10.10-200.fc25.x86_64)

Is this with the security slider set to high?

Keep an eye on https://bugs.torproject.org/21962

yes it is!

DOJ CIA AND FBI WANTS TO TAKE DOWN WIKILEAKS! WIKILEAKS EXPOSED CORRUPT GOVERNMENT! GOVERNMENT IS HIGHLY CORRUPT! RELEASED INFO IS JUST SCRATCHING THE SURFACE!

Report: DOJ Prepares Charges Against WikiLeaks, Assange
Charges could include theft of government property, conspiracy or violations of the Espionage Act

https://wikileaks.org/

[04-21 13:03:43] Torbutton INFO: tor SOCKS: https://duckduckgo.com/favicon.ico via
duckduckgo.com:2467dcceb919f0e420f0238f35125055
[04-21 13:03:43] Torbutton INFO: tor SOCKS: https://noscript.net/noscript.ico via
--unknown--:2980d224968e92fc76c9654c3cab5ff3
[04-21 13:03:43] Torbutton INFO: tor SOCKS: https://trac.torproject.org/images/favicon.ico via
--unknown--:2980d224968e92fc76c9654c3cab5ff3

SSL Observatory WARN: Failed to initialize NSS component:Error: couldn't find function symbol in library

14:29:36.196 TypeError: categories.setAttribute is not a function 1 preferences.js:76:7
init_all/< chrome://browser/content/preferences/in-content/preferences.js:76:7

On macOS Sierra, when I open 7.0a3, I get a warning about my window being in full screen, even though it's not in full screen. I have version 6 installed, and I'm opening version 7 directly from the .dmg

You're not supposed to run any of them directly from the DMG:
https://bugs.torproject.org/21445

OK, well, that should definitely be made clear. I was under the assumption it was self-contained and I could run it from anywhere

thanks for the update! great work!

When "Save Link As..."
[04-22 17:46:39] Torbutton INFO: New domain isolation for --unknown--: 58dc48b1e371d4881a82551e1b70600a
[04-22 17:46:39] Torbutton INFO: tor SOCKS: https://noscript.net/getit#devel via
--unknown--:58dc48b1e371d4881a82551e1b70600a

Any news regarding Orfox, I.e. TOR browser for android? It hasn't received any updates for several months, which makes me worried about its security. I use it nearly for all my browsing.

nice but I have a question: when I go to the settings I can't mark any options. I only see blank squares but can't mark them when I click on them. why?

Phishing with Unicode Domains
https://www.xudongz.com/blog/2017/idn-phishing/

Post new comment

  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <em> <strong> <cite> <code> <ul> <ol> <li> <b> <i> <strike> <p> <br>

More information about formatting options

Syndicate content Syndicate content