New releases: Tor,, and

by nickm | February 3, 2021

We have a new stable release today. If you build Tor from source, you can download the source code for on the download page. Packages should be available within the next several weeks, with a new Tor Browser later this month.

We're also releasing updates for older stable release series. You can download (changelog) and (changelog) from Note that the 0.4.3.x series will no longer be supported after 15 February.

Tor backports numerous bugfixes from later releases, including one that made v3 onion services more susceptible to denial-of-service attacks, and a feature that makes some kinds of DoS attacks harder to perform.

Changes in version - 2021-02-03

  • Major bugfixes (onion service v3, backport from
    • Stop requiring a live consensus for v3 clients and services, and allow a "reasonably live" consensus instead. This allows v3 onion services to work even if the authorities fail to generate a consensus for more than 2 hours in a row. Fixes bug 40237; bugfix on
  • Major feature (exit, backport from
    • Re-entry into the network is now denied at the Exit level to all relays' ORPorts and authorities' ORPorts and DirPorts. This change should help mitgate a set of denial-of-service attacks. Closes ticket 2667.


  • Minor feature (build system, backport from
    • New "make lsp" command to generate the compile_commands.json file used by the ccls language server. The "bear" program is needed for this. Closes ticket 40227.
  • Minor features (compilation, backport from
    • Disable deprecation warnings when building with OpenSSL 3.0.0 or later. There are a number of APIs newly deprecated in OpenSSL 3.0.0 that Tor still requires. (A later version of Tor will try to stop depending on these APIs.) Closes ticket 40165.
  • Minor features (crypto, backport from
    • Fix undefined behavior on our Keccak library. The bug only appeared on platforms with 32-byte CPU cache lines (e.g. armv5tel) and would result in wrong digests. Fixes bug 40210; bugfix on Thanks to Bernhard Übelacker, Arnd Bergmann and weasel for diagnosing this.
  • Minor bugfixes (compatibility, backport from
    • Strip '\r' characters when reading text files on Unix platforms. This should resolve an issue where a relay operator migrates a relay from Windows to Unix, but does not change the line ending of Tor's various state files to match the platform, and the CRLF line endings from Windows end up leaking into other files such as the extra-info document. Fixes bug 33781; bugfix on 0.0.9pre5.
  • Minor bugfixes (compilation, backport from
    • Fix a compilation warning about unreachable fallthrough annotations when building with "--enable-all-bugs-are-fatal" on some compilers. Fixes bug 40241; bugfix on
  • Minor bugfixes (SOCKS5, backport from
    • Handle partial SOCKS5 messages correctly. Previously, our code would send an incorrect error message if it got a SOCKS5 request that wasn't complete. Fixes bug 40190; bugfix on
  • Minor bugfixes (testing, backport from
    • Fix the `config/parse_tcp_proxy_line` test so that it works correctly on systems where the DNS provider hijacks invalid queries. Fixes part of bug 40179; bugfix on
    • Fix our Python reference-implementation for the v3 onion service handshake so that it works correctly with the version of hashlib provided by Python 3.9. Fixes part of bug 40179; bugfix on
    • Fix the `tortls/openssl/log_one_error` test to work with OpenSSL 3.0.0. Fixes bug 40170; bugfix on


Please note that the comment area below has been archived.

February 04, 2021


When using ExcludeNodes and listing a country such as {us} WHY does the country {us} appear as one of the countires on the circuit when it was excluded ?

How is the circuit region selected by TOR. I notice a bounce among geographically close countries of a more constant apparances of 1 or 2 countries.