alpha release

New Firefox 17.0.4esr and Tor 0.2.4.11-alpha bundles

We've updated the stable and alpha Tor Browser Bundles with Firefox 17.0.4esr and Tor 0.2.4.11-alpha. These releases have numerous bug fixes and a new Torbutton as well.

https://www.torproject.org/download

Tor Browser Bundle (2.3.25-5)

  • Update Firefox to 17.0.4esr
  • Update NoScript to 2.6.5.8
  • Update HTTPS Everywhere to 3.1.4
  • Fix non-English language bundles to have the correct branding (closes: #8302)
  • Firefox patch changes:
    • Remove "This plugin is disabled" barrier
      • This improves the user experience for HTML5 Youtube videos:
        They "silently" attempt to load flash first, which was not so silent
        with this barrier in place. (closes: #8312)
    • Disable NoScript's HTML5 media click-to-play barrier (closes: #8386)
    • Fix a New Identity hang and/or crash condition (closes: #6386)
    • Fix crash with Drag + Drop on Windows (closes: #8324)
  • Torbutton changes:
    • Fix Drag+Drop crash by using a new TBB drag observer (closes: #8324)
    • Fix XML/E4X errors with Cookie Protections (closes: #6202)
    • Don't clear cookies at shutdown if user wants disk history (closes: #8423)
    • Leave IndexedDB and Offline Storage disabled. (closes: #8382)
    • Clear DOM localStorage on New Identity. (closes: #8422)
    • Don't strip "third party" HTTP auth from favicons (closes: #8335)
    • Localize the "Spoof english" button strings (closes: #5183)
    • Ask user for confirmation before enabling plugins (closes: #8313)
    • Emit private browsing session clearing event on "New Identity"

Tor Browser Bundle (2.4.11-alpha-1)

  • Update Firefox to 17.0.4esr
  • Update Tor to 0.2.4.11-alpha
  • Update NoScript to 2.6.5.8
  • Update HTTPS Everywhere to 4.0development.6
  • Update PDF.js to 0.7.236
  • Fix non-English language bundles to have the correct branding (closes: #8302)
  • Firefox patch changes:
    • Remove "This plugin is disabled" barrier
      • This improves the user experience for HTML5 Youtube videos:
        They "silently" attempt to load flash first, which was not so silent
        with this barrier in place. (closes: #8312)
    • Disable NoScript's HTML5 media click-to-play barrier (closes: #8386)
    • Fix a New Identity hang and/or crash condition (closes: #6386)
    • Fix crash with Drag + Drop on Windows (closes: #8324)
  • Torbutton changes:
    • Fix Drag+Drop crash by using a new TBB drag observer (closes: #8324)
    • Fix XML/E4X errors with Cookie Protections (closes: #6202)
    • Don't clear cookies at shutdown if user wants disk history (closes: #8423)
    • Leave IndexedDB and Offline Storage disabled. (closes: #8382)
    • Clear DOM localStorage on New Identity. (closes: #8422)
    • Don't strip "third party" HTTP auth from favicons (closes: #8335)
    • Localize the "Spoof english" button strings (closes: #5183)
    • Ask user for confirmation before enabling plugins (closes: #8313)
    • Emit private browsing session clearing event on "New Identity"

New Bundles

UPDATE: Don't upgrade to these bundles. The version of OpenSSL in these bundles -- even though it fixes some bugs -- introduces new bugs that will prevent Tor from working on many computers. See the following links for more information:

Please continue using the old bundles. All of the download links have been downgraded to the previous version. We will release updated bundles in a few days. Thanks.


All of the bundles have been updated. The alpha bundles contain the latest Tor 0.2.4.10-alpha and all of the bundles have received an OpenSSL update (1.0.1d for everything except the PPC Vidalia bundles which have 0.9.8y). The regular obfsproxy bundles have been discontinued but pyobfsproxy/flashproxy bundles are available from the obfsproxy page. We plan to begin shipping these as part of the regular release cycle within the next month or two.

https://www.torproject.org/download

Tor Browser Bundle (2.3.25-3)

  • Update OpenSSL to 1.0.1d
  • Update HTTPS Everywhere to 3.1.3
  • Update NoScript to 2.6.4.4

Tor Browser Bundle (2.4.10-alpha-1)

  • Update Tor to 0.2.4.10-alpha
  • Update OpenSSL to 1.0.1d
  • Update NoScript to 2.6.4.4
  • Add PDF Viewer (PDF.js) to README

New Tor Browser Bundles

The stable Tor Browser Bundles have all been updated to the latest Firefox 10.0.6esr release.

The alpha Tor Browser Bundles have also (finally) been updated with numerous new pieces of software, including the latest Tor release candidate (0.2.3.19-rc).

All users are strongly urged to upgrade.

https://www.torproject.org/download

Tor Browser Bundle (2.2.37-2)

  • Update Firefox to 10.0.6esr
  • Update Vidalia to 0.2.20
  • Update NoScript to 2.4.8
  • Disable Firefox crashreporter
  • Windows: Fix Firefox transparency problems with Aero theme (closes: #4795.)

Tor Browser Bundle (2.3.19-alpha-1)

  • Update Tor to 0.2.3.19-rc
  • Update Firefox to 14.0.1
  • Update libevent to 2.0.19-stable
  • Update OpenSSL to 1.0.1c
  • Update zlib to 1.2.7
  • Update Torbutton to 1.4.6
  • Update NoScript to 2.4.9
  • Update HTTPS Everywhere to 3.0development.5
  • Downgrade Vidalia to 0.2.20
  • Update libpng to 1.5.12
  • December 2011 Progress Report

    Our progress report for December 2011 is available as a pdf with pretty graphs and text file. Highlights are on hidden services fixes, openssl fixes, obfuscating proxy progress, and general updates on advocacy and releases.

    Tor 0.2.3.9-alpha is out

    Tor 0.2.3.9-alpha introduces initial IPv6 support for bridges, adds
    a "DisableNetwork" security feature that bundles can use to avoid
    touching the network until bridges are configured, moves forward on
    the pluggable transport design, fixes a flaw in the hidden service
    design that unnecessarily prevented clients with wrong clocks from
    reaching hidden services, and fixes a wide variety of other issues.

    https://www.torproject.org/download

    Changes in version 0.2.3.9-alpha - 2011-12-08
    Major features:

    • Clients can now connect to private bridges over IPv6. Bridges
      still need at least one IPv4 address in order to connect to
      other relays. Note that we don't yet handle the case where the
      user has two bridge lines for the same bridge (one IPv4, one
      IPv6). Implements parts of proposal 186.
    • New "DisableNetwork" config option to prevent Tor from launching any
      connections or accepting any connections except on a control port.
      Bundles and controllers can set this option before letting Tor talk
      to the rest of the network, for example to prevent any connections
      to a non-bridge address. Packages like Orbot can also use this
      option to instruct Tor to save power when the network is off.
    • Clients and bridges can now be configured to use a separate
      "transport" proxy. This approach makes the censorship arms race
      easier by allowing bridges to use protocol obfuscation plugins. It
      implements the "managed proxy" part of proposal 180 (ticket 3472).
    • When using OpenSSL 1.0.0 or later, use OpenSSL's counter mode
      implementation. It makes AES_CTR about 7% faster than our old one
      (which was about 10% faster than the one OpenSSL used to provide).
      Resolves ticket 4526.
    • Add a "tor2web mode" for clients that want to connect to hidden
      services non-anonymously (and possibly more quickly). As a safety
      measure to try to keep users from turning this on without knowing
      what they are doing, tor2web mode must be explicitly enabled at
      compile time, and a copy of Tor compiled to run in tor2web mode
      cannot be used as a normal Tor client. Implements feature 2553.
    • Add experimental support for running on Windows with IOCP and no
      kernel-space socket buffers. This feature is controlled by a new
      "UserspaceIOCPBuffers" config option (off by default), which has
      no effect unless Tor has been built with support for bufferevents,
      is running on Windows, and has enabled IOCP. This may, in the long
      run, help solve or mitigate bug 98.
    • Use a more secure consensus parameter voting algorithm. Now at
      least three directory authorities or a majority of them must
      vote on a given parameter before it will be included in the
      consensus. Implements proposal 178.

    Major bugfixes:

    • Hidden services now ignore the timestamps on INTRODUCE2 cells.
      They used to check that the timestamp was within 30 minutes
      of their system clock, so they could cap the size of their
      replay-detection cache, but that approach unnecessarily refused
      service to clients with wrong clocks. Bugfix on 0.2.1.6-alpha, when
      the v3 intro-point protocol (the first one which sent a timestamp
      field in the INTRODUCE2 cell) was introduced; fixes bug 3460.
    • Only use the EVP interface when AES acceleration is enabled,
      to avoid a 5-7% performance regression. Resolves issue 4525;
      bugfix on 0.2.3.8-alpha.

    Privacy/anonymity features (bridge detection):

    • Make bridge SSL certificates a bit more stealthy by using random
      serial numbers, in the same fashion as OpenSSL when generating
      self-signed certificates. Implements ticket 4584.
    • Introduce a new config option "DynamicDHGroups", enabled by
      default, which provides each bridge with a unique prime DH modulus
      to be used during SSL handshakes. This option attempts to help
      against censors who might use the Apache DH modulus as a static
      identifier for bridges. Addresses ticket 4548.

    Minor features (new/different config options):

    • New configuration option "DisableDebuggerAttachment" (on by default)
      to prevent basic debugging attachment attempts by other processes.
      Supports Mac OS X and Gnu/Linux. Resolves ticket 3313.
    • Allow MapAddress directives to specify matches against super-domains,
      as in "MapAddress *.torproject.org *.torproject.org.torserver.exit".
      Implements issue 933.
    • Slightly change behavior of "list" options (that is, config
      options that can appear more than once) when they appear both in
      torrc and on the command line. Previously, the command-line options
      would be appended to the ones from torrc. Now, the command-line
      options override the torrc options entirely. This new behavior
      allows the user to override list options (like exit policies and
      ports to listen on) from the command line, rather than simply
      appending to the list.
    • You can get the old (appending) command-line behavior for "list"
      options by prefixing the option name with a "+".
    • You can remove all the values for a "list" option from the command
      line without adding any new ones by prefixing the option name
      with a "/".
    • Add experimental support for a "defaults" torrc file to be parsed
      before the regular torrc. Torrc options override the defaults file's
      options in the same way that the command line overrides the torrc.
      The SAVECONF controller command saves only those options which
      differ between the current configuration and the defaults file. HUP
      reloads both files. (Note: This is an experimental feature; its
      behavior will probably be refined in future 0.2.3.x-alpha versions
      to better meet packagers' needs.)

    Minor features:

    • Try to make the introductory warning message that Tor prints on
      startup more useful for actually finding help and information.
      Resolves ticket 2474.
    • Running "make version" now displays the version of Tor that
      we're about to build. Idea from katmagic; resolves issue 4400.
    • Expire old or over-used hidden service introduction points.
      Required by fix for bug 3460.
    • Move the replay-detection cache for the RSA-encrypted parts of
      INTRODUCE2 cells to the introduction point data structures.
      Previously, we would use one replay-detection cache per hidden
      service. Required by fix for bug 3460.
    • Reduce the lifetime of elements of hidden services' Diffie-Hellman
      public key replay-detection cache from 60 minutes to 5 minutes. This
      replay-detection cache is now used only to detect multiple
      INTRODUCE2 cells specifying the same rendezvous point, so we can
      avoid launching multiple simultaneous attempts to connect to it.

    Minor bugfixes (on Tor 0.2.2.x and earlier):

    • Resolve an integer overflow bug in smartlist_ensure_capacity().
      Fixes bug 4230; bugfix on Tor 0.1.0.1-rc. Based on a patch by
      Mansour Moufid.
    • Fix a minor formatting issue in one of tor-gencert's error messages.
      Fixes bug 4574.
    • Prevent a false positive from the check-spaces script, by disabling
      the "whitespace between function name and (" check for functions
      named 'op()'.
    • Fix a log message suggesting that people contact a non-existent
      email address. Fixes bug 3448.
    • Fix null-pointer access that could occur if TLS allocation failed.
      Fixes bug 4531; bugfix on 0.2.0.20-rc. Found by "troll_un".
    • Report a real bootstrap problem to the controller on router
      identity mismatch. Previously we just said "foo", which probably
      made a lot of sense at the time. Fixes bug 4169; bugfix on
      0.2.1.1-alpha.
    • If we had ever tried to call tor_addr_to_str() on an address of
      unknown type, we would have done a strdup() on an uninitialized
      buffer. Now we won't. Fixes bug 4529; bugfix on 0.2.1.3-alpha.
      Reported by "troll_un".
    • Correctly detect and handle transient lookup failures from
      tor_addr_lookup(). Fixes bug 4530; bugfix on 0.2.1.5-alpha.
      Reported by "troll_un".
    • Use tor_socket_t type for listener argument to accept(). Fixes bug
      4535; bugfix on 0.2.2.28-beta. Found by "troll_un".
    • Initialize conn->addr to a valid state in spawn_cpuworker(). Fixes
      bug 4532; found by "troll_un".

    Minor bugfixes (on Tor 0.2.3.x):

    • Fix a compile warning in tor_inet_pton(). Bugfix on 0.2.3.8-alpha;
      fixes bug 4554.
    • Don't send two ESTABLISH_RENDEZVOUS cells when opening a new
      circuit for use as a hidden service client's rendezvous point.
      Fixes bugs 4641 and 4171; bugfix on 0.2.3.3-alpha. Diagnosed
      with help from wanoskarnet.
    • Restore behavior of overriding SocksPort, ORPort, and similar
      options from the command line. Bugfix on 0.2.3.3-alpha.

    Build fixes:

    • Properly handle the case where the build-tree is not the same
      as the source tree when generating src/common/common_sha1.i,
      src/or/micro-revision.i, and src/or/or_sha1.i. Fixes bug 3953;
      bugfix on 0.2.0.1-alpha.

    Code simplifications, cleanups, and refactorings:

    • Remove the pure attribute from all functions that used it
      previously. In many cases we assigned it incorrectly, because the
      functions might assert or call impure functions, and we don't have
      evidence that keeping the pure attribute is worthwhile. Implements
      changes suggested in ticket 4421.
    • Remove some dead code spotted by coverity. Fixes cid 432.
      Bugfix on 0.2.3.1-alpha, closes bug 4637.

    Lots of new Tor and Vidalia packages

    New Vidalia and Tor releases mean lots and lots of new packages. You can download most of them from the download page.

    RPM users: we'll have all of the RPMs up within the next 24 hours. Everyone else, read on for Tor Browser Bundle changelogs and other packages.

    Bridge-by-Default Bundle

    Tor Browser Bundle with Firefox 4

    Tor Browser Bundle (2.2.24-1) alpha; suite=osx

    • Update Tor to 0.2.2.24-alpha
    • Update Vidalia to 0.2.12
    • Update NoScript to 2.1.0.1

    Tor Browser Bundle (2.2.24-1) alpha; suite=linux

    • Update Tor to 0.2.2.24-alpha
    • Update Vidalia to 0.2.12
    • Update NoScript to 2.1.0.1
    • Fix missing extensions by putting them in the right location (closes: #2828)
    • Disable plugin searching (closes: #2827)

    Tor Browser Bundle with Firefox 3.6

    https://www.torproject.org/projects/torbrowser

    Windows 1.3.23: Released 2011-04-13

    • Update Vidalia to 0.2.12
    • Fix langpack mistake that made Firefox only use English

    Linux 1.1.7: Released 2011-04-12

    • Update Tor to 0.2.2.24-alpha
    • Update Vidalia to 0.2.12
    • Update NoScript to 2.1.0.1

    OS X 1.0.15: Released 2011-04-11

    • Update Tor to 0.2.2.24-alpha
    • Update Vidalia to 0.2.12
    • Update NoScript to 2.1.0.1

    Tor 0.2.2.22-alpha is out

    https://www.torproject.org/download/download

    Changes in version 0.2.2.22-alpha - 2011-01-25
    Major bugfixes:

    • Fix a bounds-checking error that could allow an attacker to
      remotely crash a directory authority. Bugfix on 0.2.1.5-alpha.
      Found by "piebeer".
    • Don't assert when changing from bridge to relay or vice versa
      via the controller. The assert happened because we didn't properly
      initialize our keys in this case. Bugfix on 0.2.2.18-alpha; fixes
      bug 2433. Reported by bastik.

    Minor features:

    • Adjust our TLS Diffie-Hellman parameters to match those used by
      Apache's mod_ssl.
    • Provide a log message stating which geoip file we're parsing
      instead of just stating that we're parsing the geoip file.
      Implements ticket 2432.

    Minor bugfixes:

    • Check for and reject overly long directory certificates and
      directory tokens before they have a chance to hit any assertions.
      Bugfix on 0.2.1.28 / 0.2.2.20-alpha. Found by "doorss".

    Tor 0.2.2.21-alpha is out (security patches)

    Note to 64-bit Linux Tor Browser Bundle users: The previous bundles contained Tor 0.2.2.20-alpha. Please upgrade to 1.1.3-1 (sig).

    Tor 0.2.2.21-alpha includes all the patches from Tor 0.2.1.29, which
    continues our recent code security audit work. The main fix resolves
    a remote heap overflow vulnerability that can allow remote code
    execution (CVE-2011-0427). Other fixes address a variety of assert
    and crash bugs, most of which we think are hard to exploit remotely.

    All Tor users should upgrade.

    https://www.torproject.org/download/download

    Changes in version 0.2.2.21-alpha - 2011-01-15
    Major bugfixes (security), also included in 0.2.1.29: read more »

    Torbutton-alpha 1.3.1 released for testing

    Torbutton 1.3.1-alpha has been released at:
    https://www.torproject.org/dist/torbutton/torbutton-1.3.1-alpha.xpi and .asc

    This release features a fix for the nasty pref dialog issue in 1.3.0 (bug #2011), as well as Firefox 4.0 support. Thanks to new APIs in Firefox 3.5 and better privacy options in Firefox 4, Torbutton has now been simplified as well. While we still provide a number of XPCOM components, the number of native Firefox components we replace has shrunk from 5 to just one.

    However, the amount of changes involved in supporting Firefox 4 were substantial, and it is likely that these changes as well as the removal of old code has introduced new bugs. We've done our best to test out operation on Firefox 3.6 and 4.0, but we have not tested Firefox 3.0, and may have missed other issues as well. Please report any issues you notice on our bugtracker: https://trac.torproject.org/projects/tor/report/14

    Here is the complete changelog: read more »

    Tor 0.2.2.19-alpha is out

    Yet another OpenSSL security patch broke its compatibility with Tor:
    Tor 0.2.2.19-alpha makes relays work with OpenSSL 0.9.8p and 1.0.0.b.

    https://www.torproject.org/download/download

    The original announcement is at http://archives.seul.org/or/talk/Nov-2010/msg00172.html

    Changes in version 0.2.2.19-alpha - 2010-11-21
    Major bugfixes:

    • Resolve an incompatibility with openssl 0.9.8p and openssl 1.0.0b:
      No longer set the tlsext_host_name extension on server SSL objects;
      but continue to set it on client SSL objects. Our goal in setting
      it was to imitate a browser, not a vhosting server. Fixes bug 2204;
      bugfix on 0.2.1.1-alpha.
    • Minor bugfixes: read more »

    • Try harder not to exceed the maximum length of 50 KB when writing
    Syndicate content Syndicate content