Tor Browser 6.5.2 is released

Tor Browser 6.5.2 is now available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

This should be the last minor release in the 6.5 series. This release updates Firefox to 45.9.0esr, Noscript to 5.0.2, and HTTPS-Everywhere to 5.2.14.

Moreover, we included a fix for the broken Twitter experience and worked around a Windows related crash bug. To improve our censorship resistance we additionally updated the bridges we ship.

Here is the full changelog since 6.5.1:

  • All Platforms
    • Update Firefox to 45.9.0esr
    • Update HTTPS-Everywhere to 5.2.14
    • Update NoScript to 5.0.2
    • Bug 21555+16450: Don't remove Authorization header on subdomains (e.g. Twitter)
    • Bug 19316: Make sure our Windows updates can deal with the SSE2 requirement
    • Bug 21917: Add new obfs4 bridges
    • Bug 21918: Move meek-amazon to d2cly7j4zqgua7.cloudfront.net backend
  • Windows
    • Bug 21795: Fix Tor Browser crashing on github.com

Why doesn't Tails allow users with persistence enabled to save entry guards? I've been waiting for this feature for years now and my colleagues and I use Tails daily and we're very worried that we're going to end up using a malicious guard node one day (if we haven't already).

Updated to 6.5.2 via "check for Tor browser update"

Every time computer rebooted,
every time "New Identity",
every time "New Tor Circuit for this site "

The first Tor circuit relay is U.S. 74.208.220.222

2nd and 3rd change up however not getting relay circuit bridges that are all over the globe in different countries as prior.
(which worked well)

I'm not liking this at all.

So what is the issue?
corrupt, virus?

Do I need a fresh 6.5.2 install, and delete the old with all the updates to 6.5.2?

No, it sounds like it's working fine.

You can read about your guard here:
https://atlas.torproject.org/#details/4AA22235F0E9B3795A33930343CBB3EDA…

See the above links for why guards are needed for security.

By "relay circuit bridges that are all over the globe in different countries as prior", do you mean that in an earlier version of Tor Browser, your first hop varied a lot? It's true that in earlier versions (several years back), there were three guards, not one -- so it didn't actually vary a lot, it just rotated among those three. See this paper for how we moved from three to one:
https://petsymposium.org/2014/papers/Dingledine.pdf
And see the above "improvements to guard parameters" blog post for *why* we moved from three to one.

Same issue for me every since this update! 1st circuit is ALWAYS USA and 23.254.166.222 with the second and third changing. Get new identity - Not Really - Same first circuit other two different!

I've not set any strict nodes or changed anything but now 1st is always USA, yesterday I noticed this after the update and now today.

I've also got Tor hardened (that's not been updated yet) and its fine as usual with three different circuits

On my other laptop prior to the update Tor (non-hardened) prior to the 6.5.2 update give three different changing exit relays?

WHAT THE HELL IS GOING ON???? This defeats the point of Tor if you get a static IP.

> I've also got Tor hardened (that's not been updated yet) and its fine as usual with three different circuits

The entry node (aka Guard) not being fixed would be a bug, and totally broken.

> WHAT THE HELL IS GOING ON????

As linked before, this is intended behavior (https://www.torproject.org/docs/faq#EntryGuards).

> This defeats the point of Tor if you get a static IP.

Given that systems that don't use Guards provide worse anonymity, not using the guards would defeat the point of Tor.

Anonymous

April 20, 2017

Permalink

Thankyou team and developers, as your services are greatly appreciated. May you continue giving your services to the people who need it for correct reasons morally. Best wishes.

Anonymous

April 21, 2017

Permalink

09:03:50.144 1492765430100 addons.xpi-utils ERROR Unable to read anything useful from the database1 Log.jsm:751:0

why no one seem to be taking this post exploit seriously ?

just think for one moment, one could uni-code expliot this website, which could have serious implications. this is NOT just only this website by the way.

various parties are working ways to over come this, but in the meantime tor team in my opinion should at least display some kind of flag waving on this issue.

Anonymous

April 21, 2017

Permalink

When trying to open TOR from my desktop,(os 7) I get an error code re firefox.exe Oxc0000022. This has never happened before came out of no where. Is it possible your update addressed this?? The same problem does not happen on my Laptop OS10.

Could you check whether you have an Antivirus/Firewall software installed that is interfering with Tor Browser? The easiest way to do that is to uninstall it (disabling is often not enough) and to try to use Tor Browser then.

Anonymous

April 23, 2017

Permalink

Is there a way to turn off automatic updating of Tor Browser? I want to update manually, but I do want notifications when new updates are available.

Couldn't that feature be exploited by someone running a fake Tor update service to force code onto your computer?

> Is there a way to turn off automatic updating of Tor Browser?

Yes.

> I want to update manually, but I do want notifications when new updates are available.

Not like that though.

> Couldn't that feature be exploited by someone running a fake Tor update service to force code onto your computer?

The updates are signed with an RSA key that's hard coded into the code that applies the update. So someone with a fake Tor update service (with the right magic TLS cert) and nothing else could withold updates, but not force updates.

How do we turn off automatic update? In about:config (entered manually as the URL) I see app.update.auto. Set that to false? Are any other changes required?

With app.update.auto = false, we will still be notified when an update is ready to install?

Anonymous

April 24, 2017

Permalink

In which files of Tor Browser are there stored full filepaths to files in the install folders?

If I want to change the folder from which Tor is started, which files do I need to patch up to make that change?

As a feature request (if this is not already present), it would be nice if all of the paths were expressed as relative paths to the install folder rather than absolute paths. That way you could freely move the entire install and not lose anything like bookmarks.

Which operating system are you using? I think you can just move the bundle to a different directory on Linux and Windows and everything is still working. Those bundles are meant to be portable. We moved away from that on macOS due to codesigning problems (and plan to move away for Linux and Windows, too) to a model that more resembles "normal" browser usage: you have your binaries in one location and your profile directory somewhere in your user home directory.

Anonymous

April 24, 2017

Permalink

Dear Sir/ Ma'am,

I was told by a friend of mine, with a degree in "Computer Science" (specializing in Linux systems), that the "Tor" browser had been hacked/ evaded by the FBI paying Carnegie Mellon to do the work; if there's any truth in this I would appreciate your correspondence at: . Thank you.

Kind regards, Mark

CMU went quiet, I guess out of fear of lawsuits or something because of their sketchy behavior.

You can read more about it here:
https://blog.torproject.org/blog/did-fbi-pay-university-attack-tor-users

The good news is that it's all in the past (that is, that attack no longer works). The bad news is that some of the issues it raises, like "can the feds pay a university to do what amounts to a search and seizure, without getting a warrant, and it's fine because it's technically not the feds doing the search and seizure?", remain open questions.

Anonymous

April 25, 2017

Permalink

Great !!

Anonymous

April 26, 2017

Permalink

Please consider building choosing entry node option in Torbrowser

I do not want to be halted at border control just because I have used an entry node in a specific country while traveling.
Therefor I do not want to use some entry nodes from some countries, I do not trust it and it is not worth the risk.
But because this option is not in Torbrowser it is also not an option in Tails and that is a pity.
Please consider tot build this option so people can manage their personal security and have the possibility to use Torbrowser and also Tails..

Thank you very much

Anonymous

April 27, 2017

Permalink

Hej Tor!
For a short while I have got a little warning window with: "You know you close two tabs" (or something like that), when closing down Tor, when I only have one side up?
Thanks for asking.
ingemar

Anonymous

May 01, 2017

Permalink

Thank you for your TOR Browser ... it helps. Wished to make another smal donation - I'm poor' but saw n place to do so...

Anonymous

May 02, 2017

Permalink

I am having problem login in. I cannot us my TOR browser for the same reason! How do I fix it?? thanks

Anonymous

May 03, 2017

Permalink

Network distortion?
For already a long time I get the impression that as soon as an exit, entry or also middle node from United Kingdom is taking part, I experience problems with Tor connections.

With exit nodes I experience on a regular basis that pages are slow loading or not loaded at all, broken ssl messages and warnings of some sort in the blank browser window.
When they appear as a middle node a lot of times the connection gets slow and it is very hard to renew the Tor circuit, it just hangs for a long time on the same circuit or end up over and over again with United Kingdom middle nodes.
Very very attached to the UK.

Now, some people believe in coincidences, others don't.
While I actually do believe in coincidence I think it is at least remarkable and worth noting the Tor troubles here.
No, I did not only see red cars today in the streets, there were a lot of yellow ones too.

Anyway, I would not be surprised if there are some unwanted construction work attempts all along that UK-node line.
But question is, can they succeed in disturbing/slowing down/breaking Torcircuit?
Have other people seen these Tor cricuit/network issues too?

Sure, if a misbehaving relay is on your circuit, it can mess with your circuit. (It can't change the bytes that you receive unless it's the exit relay, but it can slow things down, break connections, etc.)

I wonder if there is a particularly fast relay in the UK that is mis-measured by the bandwidth authorities.

Anonymous

May 05, 2017

Permalink

Using Torbrowser on Ubuntu 16.04LTS it is clearly linked to Firefox 53. If I open Torbrowser then go to the task bar I see indicator icons that Firefox is open. If I close Firefox from the task bar the Torbrowser closes.

this link shoud not exist.

Anonymous

May 06, 2017

Permalink

Wrong format ?!
Printing a page to A3 format is not allowed anymore.
It gives a long statement about being a wrong format, someone sponsored by A4 (anti A3) manufacturers?
What is the funny but actually highly annoying story behind this?
Please make it possible again to print on A3 paper size format again or give us an about config solution for circumventing this strange paper size management dictatorship.
Circumventing is again a key word for Torbrowser.
Thanks.

Does this happen with a normal Firefox as well or is this Tor Browser specific? If the former then opening a bug at https://bugzilla.mozilla.org/ might be a good start.

EDIT: You could test the alpha build as well (https://archive.torproject.org/tor-package-archive/torbrowser/7.0a3/) as this is the first one based on Firefox 52 ESR. Maybe your issue got fixed meanwhile in Mozilla's code?

Anonymous

May 07, 2017

Permalink

Tor version 6.5.2
on that stupid FireFox start page, a google link got added that contains an IP address.

It seems something is wrong with your Tor Browser as you should not get a Firefox startup page to begin with. Neither should you get any non-empty preview panels if you are opening a new tab.

Does this happen as well if you download clean, new Tor Browser 6.5.2?