Tor is released!

by nickm | March 29, 2018

Hi! There's a new alpha release available for download. If you build Tor from source, you can download the source code for from the usual place on the website. If you don't build Tor from source, don't worry! Updated packages should be available over the coming weeks, with a new alpha Tor Browser release some time in April.

Tor includes various bugfixes for issues found during the alpha testing of earlier releases in its series. We are approaching a stable release: more testing is welcome!

Changes in version - 2018-03-29

  • New system requirements:
    • When built with Rust, Tor now depends on version 0.2.39 of the libc crate. Closes tickets 25310 and 25664.
  • Major bugfixes (relay, connection):
    • If we have failed to connect to a relay and received a connection refused, timeout, or similar error (at the TCP level), do not try that same address/port again for 60 seconds after the failure has occurred. Fixes bug 24767; bugfix on 0.0.6.


  • Minor features (geoip):
    • Update geoip and geoip6 to the March 8 2018 Maxmind GeoLite2 Country database. Closes ticket 25469.
  • Minor features (log messages):
    • Improve log message in the out-of-memory handler to include information about memory usage from the different compression backends. Closes ticket 25372.
  • Minor features (sandbox):
    • Explicitly permit the poll() system call when the Linux seccomp2-based sandbox is enabled: apparently, some versions of libc use poll() when calling getpwnam(). Closes ticket 25313.
  • Minor bugfixes (C correctness):
    • Fix a very unlikely (impossible, we believe) null pointer dereference. Fixes bug 25629; bugfix on Found by Coverity; this is CID 1430932.
  • Minor bugfixes (channel, client):
    • Better identify client connection when reporting to the geoip client cache. Fixes bug 24904; bugfix on
  • Minor bugfixes (compilation):
    • Fix a C99 compliance issue in our configuration script that caused compilation issues when compiling Tor with certain versions of xtools. Fixes bug 25474; bugfix on
  • Minor bugfixes (controller, reliability):
    • Avoid a (nonfatal) assertion failure when extending a one-hop circuit from the controller to become a multihop circuit. Fixes bug 24903; bugfix on
  • Minor bugfixes (networking):
    • Tor will no longer reject IPv6 address strings from TorBrowser when they are passed as hostnames in SOCKS5 requests. Fixes bug 25036, bugfix on Tor
    • string_is_valid_hostname() will not consider IP strings to be valid hostnames. Fixes bug 25055; bugfix on Tor
  • Minor bugfixes (onion service v3):
    • Avoid an assertion failure when the next the next onion service descriptor rotation type is out of sync with the consensus's valid-after time. Instead, log a warning message with extra information, so we can better hunt down the cause of this assertion. Fixes bug 25306; bugfix on
  • Minor bugfixes (testing):
    • Avoid intermittent test failures due to a test that had relied on onion service introduction point creation finishing within 5 seconds of real clock time. Fixes bug 25450; bugfix on
    • Rust crates are now automatically detected and tested. Previously, some crates were not tested by `make test-rust` due to a static string in the `src/test/` script specifying which crates to test. Fixes bug 25560; bugfix on
  • Minor bugfixes (testing, benchmarks):
    • Fix a crash when running benchmark tests on win32 systems. The crash was due to a mutex that wasn't initialized before logging and options were initialized. Fixes bug 25479; bugfix on
  • Minor bugfixes (warnings, ipv6):
    • Avoid a bug warning that could occur when trying to connect to a relay over IPv6. This warning would occur on a Tor instance that downloads router descriptors, but prefers to use microdescriptors. Fixes bug 25213; bugfix on
  • Code simplification and refactoring:
    • Remove the old (deterministic) directory retry logic entirely: We've used exponential backoff exclusively for some time. Closes ticket 23814.
  • Documentation:
    • Improved the documentation of AccountingStart parameter. Closes ticket 23635.
    • Update the documentation for "Log" to include the current list of logging domains. Closes ticket 25378.


Please note that the comment area below has been archived.

March 30, 2018



Long time no see! (oh, we've never met with each other...)

This time my irregular report is as follows.

  1. I was surprised that Tor network throughput had been improved a lot! Thank you so much.
  2. I also found that this torproject website does not embed Web Beacon at all. You're gentle to us!
  3. I have been getting used to using Linux distro little by little because I found a slightly better way than the previous one to study it...I already know how to surf, find, download and open a targeted file via Tor Browser in a simple and secure way unless I cannot find its URL.

If I have any requests to you and there is no ticket to deal with them, I will create a ticket at Trac.
Thank you again!

I was surprised that Tor network throughput had been improved a lot! Thank you so much.

Many thanks to dgoulet for designing and implementing the DDoS protection which helped a lot and even scared the DDoSers into pausing their DDoS.

April 01, 2018


If the two recent TAILS updates are so important, why aren't they posting updates news here?

April 03, 2018


Hello, thanks for all the good work! But in the future could you think about releasing a Arm version of TOR browser? It would help a lot all the RPi users around the world!!! Anyways, thanks for the good work!!!

April 03, 2018


Sooooo... when will TorProject be opening up to crypto donations? Or should we start our own tor fork?

April 10, 2018


Hi nickm,

I have a few questions to you because you are probably responsible for me.

    If I create a new online account to have a direct communication channel with you with my real name, may I send a message to you?
    I am interested in Mozilla Fellowship job. Do you think I am talented for this job?