Tor Browser 7.0a2-hardened is released

by boklm | March 8, 2017

A new hardened Tor Browser release is available. It can be found in the 7.0a2-hardened distribution directory and on the download page for hardened builds.

This release features important security updates to Firefox.

This hardened alpha release mainly contains updates to several of our Tor Browser components: Firefox got updated to 45.8.0esr, Tor to 0.3.0.4-rc, OpenSSL to 1.0.2k, and HTTPS-Everywhere to 5.2.11.

Additionally, we updated the bridges we ship with Tor Browser and fixed some regressions that came with our last release.

In the previous release we introduced filtering of content requests to resource:// and chrome:// URIs in order to neuter a fingerprinting vector. This change however breaks the Session Manager addon. Users who think having extensions like that one working is much more important than avoiding the possible information leakage associated with that can now toggle the 'extensions.torbutton.resource_and_chrome_uri_fingerprinting' preference, setting it to 'true' to disable our defense against this type of fingerprinting.

Another known regression is the resizing of the window. We are currently working on a fix for this issue.

The full changelog since Tor Browser 7.0a1-hardened is:

  • All Platforms
    • Update Firefox to 45.8.0esr
    • Tor to 0.3.0.4-rc
    • OpenSSL to 1.0.2k
    • Update Torbutton to 1.9.7.1
      • Bug 21396: Allow leaking of resource/chrome URIs (off by default)
      • Bug 21574: Add link for zh manual and create manual links dynamically
      • Bug 21330: Non-usable scrollbar appears in tor browser security settings
      • Bug 21324: Don't update NoScript button with timer update
      • Translation updates
    • Update HTTPS-Everywhere to 5.2.11
    • Bug 21514: Restore W^X JIT implementation removed from ESR45
    • Bug 21536: Remove scramblesuit bridge
    • Bug 21342: Move meek-azure to the meek.azureedge.net backend and cymrubridge02 bridge
    • Bug 21326: Update the "Using a system-installed Tor" section in start script
  • Build system
    • Bug 17034: Use our built binutils and GCC for building tor
    • Code clean-up

Comments

Please note that the comment area below has been archived.

March 08, 2017

Permalink

OpenSSL to 1.0.1k
and
OpenSSL to 1.0.2k
referred in article. One reference is wrong. Please update article.

March 21, 2017

In reply to boklm

Permalink

;)

Are you talking about the hardened version or just the regular version? Since the latter is already available in mobile (Orbot+Orfox for Android and Onion Browser by Mike Tigas for iOS).

March 08, 2017

Permalink

Twitter RT and Like button don't work on tor browser .
"Sorry Something gonna wrong" info appered

March 10, 2017

Permalink

Does Tor have any vulnerabilities that were highlighted in the Wikileaks dump?

March 10, 2017

Permalink

What the ,exe files of Tor Browser need to unlock in a firewall?

I can't to connect to the Tor Network.

Help please, I'm a journalist.

March 11, 2017

Permalink

all of my history and bookmarks have been deleted when I did the update!!!!
solutions please !!

March 11, 2017

Permalink

Launching './Browser/start-tor-browser --detach --debug'...
==9686==Shadow memory range interleaves with an existing memory mapping. ASan cannot proceed correctly. ABORTING.
...

Does hardened Tor Browser work in hardened Linux?

yawning

March 11, 2017

In reply to by Anonymous (not verified)

Permalink

> Does hardened Tor Browser work in hardened Linux?

No. ASan and PaX are incompatible with each other. Of the two, PaX is more useful.

March 12, 2017

In reply to yawning

Permalink

Firefox though works fine in hardened Linux. Will there be a version of Tor Browser for hardened Linux?

> Firefox though works fine in hardened Linux.

If your definition of "works fine" is "need to disable MPROTECT" then sure? Firefox isn't built with ASan either, and likewise would be incompatible with PaX if it were.

> Will there be a version of Tor Browser for hardened Linux?

Anything that's not built with ASan works as well as normal firefox does.

I'm using apparmor over tor-browser.tor-browser_en-US.start-tor-browser.desktop

270 lines, generated during couple of hours.... works well..

It is asking sometimes for update, however, I have deny such options... etc...

March 11, 2017

Permalink

How to increase the number of middle nodes? I'm aware of the trade-off between security and speed. Thanks.

March 12, 2017

Permalink

Confused about when future editions of Tor Browser and Tails will use/require:

o various hardening features (selfrando, PAX)

o based on Debian 9 (stretch, soon to be the new stable)

Also confused about how these changes will affect the onion mirrors for people who use Debian OS and update using the onion mirrors. Also confused about the security of installing from Debian repos--- someone said in this blog that there is no security except for the bare bones Debian and no-one has contradicted this. I hope that person was wrong.

Any information would be appreciated!

March 16, 2017

Permalink

IS THERE NOT ONE BROWSER THAT IS JUST BASIC AND DOES THE JOB WITH PRIVACY AND SECURITY INSTEAD OF CONTSANTLY REQUIRING OR NEEDING TO BE UPDATED? AFTER ALL ITS JUST BASIC CODES AND ALL RIGHT? ISN"T THERE A SIMPLE METHOD TO JUST BLOCK EVERYTHING AND THATS IT? A SILVER BULLET? MAYBE ITS MORE COMPLICATED THAN PEOPLE THINK?

This is an alpha version testing new hardening features and helping us to debug things. I think it might be worthwhile using the stable Tor Browser instead in your case.

March 28, 2017

Permalink

Hey there,
are you planning to switch to the next ESR version (Firefox 52) in the near future?

March 29, 2017

Permalink

A few days ago suddenly v 6.5 would not connect to the onion network so downloaded 7.2 still no luck even if I try changing to bridges. Works fine in normal non onion sites so anyone else got this and a fix? Using Win XP could that be the reason?

April 02, 2017

Permalink

You can try running with ASAN_OPTIONS=fast_unwind_on_malloc=0 to get complete stack traces.