Tor Weekly News — March 5th, 2014
Welcome to the ninth issue of Tor Weekly News in 2014, the weekly newsletter that covers what is happening in the Tor community.
Tor 0.2.4.21 is out
Roger Dingledine announced the release of Tor 0.2.4.21, whose major new feature is the forced inclusion of at least one NTor-capable relay in any given three-hop circuit as a defence against adversaries who might be able to break 1024-bit encryption; this feature was first seen in the latest alpha release (0.2.5.2-alpha) three weeks ago, but is here incorporated into the current stable series.
You can find full details of this release’s other features and bugfixes in Roger’s announcement.
Tor in Google Summer of Code 2014
As has been the case over the past several years, Tor will once again be participating in Google’s annual Summer of Code program — aspiring software developers have the chance to work on a Tor-related project with financial assistance from Google and expert guidance from a core Tor Project member. Several prospective students have already contacted the community with questions about the program, and Damian Johnson took to the Tor Blog to give a brief summary of what students can expect from the Summer of Code, and what the Tor Project expects from its students.
In particular, Damian encouraged potential applicants to discuss their ideas with the community on the tor-dev mailing list or IRC channel before submitting an application: “Communication is essential to success in the summer of code, and we’re unlikely to accept students we haven’t heard from before reading their application.”
If you are hoping to contribute to Tor as part of the Summer of Code program, please have a look through Damian’s advice and then, as he says, “come to the list or IRC channel and talk to us!”
Two ways to help with Tails development
One of the most interesting upcoming additions to the Tails operating system is the ability to thwart attempts at tracking the movements of network-enabled devices by spoofing the MAC address on each boot. As part of the testing process for this new feature, the Tails developers have released an experimental disk image which turns it on by default, alongside a step-by-step guide to trying it out and reporting any issues encountered. However, as the developers state, “this is a test image. Do not use it for anything other than testing this feature.” If you are willing to take note of this caveat, please feel free to download the test image and let the community know what you find.
Turning to the longer-term development of the project, the team also published a detailed set of guidelines for anyone who wants to help improve Tails itself by contributing to the development of Debian, the operating system on which Tails is based. They include advice on the relationship between the two distributions, tasks in need of attention, and channels for discussing issues with the Tails community; if you are keen on the idea of helping two free-software projects at one stroke, please have a look!
Monthly status reports for February 2014
The wave of regular monthly reports from Tor project members for the month of February has begun. Georg Koppen released his report first, followed by reports from Sherief Alaa, Pearl Crescent, Nick Mathewson, Colin C., Lunar, Kelley Misata, Damian Johnson, George Kadianakis, Philipp Winter, and Karsten Loesing.
Members of the Prosecco research team released a new attack on the TLS protocol — dubbed “Triple Handshake” — allowing impersonation of a given client when client authentication is in use together with session resumption and renegotiation. Nick Mathewson published a detailed analysis of why Tor is not affected, and also outlines future changes to make Tor resistant to even more potential TLS issues.
Mike Perry announced the start of a weekly Tor Browser developer’s meeting, to be held on
irc.oftc.net. These meetings are tentatively scheduled for 19:00 UTC on Wednesdays. Details on the format and flow of the meetings can be found on the tor-dev and tbb-dev mailing lists.
Roger Dingledine and Nick Mathewson were among the signatories of an open letter published by the EFF which offers ten principles for technology companies to follow in protecting users from illegal surveillance.
Nick Mathewson also detailed a change in the way that the core Tor development team will use the bugtracker’s “milestone” feature to separate tickets marked for resolution in a given Tor version from those that can be deferred to a later release.
Nick then sent out the latest in his irregular series of Tor proposal status updates, containing summaries of each open proposal, guidance for reviewers, and notes for further work. If you'd like to help Tor’s development by working on one of these proposals, start here!
On the subject of proposals, two new ones were sent to the tor-dev list for review: proposal 228, which offers a way for relays to prove ownership of their onion keys as well as their identity key, and proposal 229 based on Yawning Angel’s unnumbered submission from last week, which concerns improvements to the SOCKS5 protocol for communication between clients, Tor, and pluggable transports.
Nicholas Merrill wrote to the Liberationtech list to announce that xmpp.net now lists XMPP servers that are reachable over hidden services, and that xmpp.net’s server scanner works with these as well.
Patrick Schleizer announced the release of version 8 of Whonix — an operating system focused on anonymity, privacy and security based on the Tor anonymity network, Debian and security by isolation. The curious should take a look at the long changelog.
Kelley Misata wrote up an account of her talk “Journalists — Staying Safe in a Digital World”, which she delivered at the Computer-Assisted Reporting Conference in Baltimore.
Having co-authored a paper in 2012 on usability issues connected with
the Tor Browser Bundle, Greg Norcie drew attention to a follow-up study named Why Johnny Can’t Blow the Whistle, which focuses on verifying the conclusions of the earlier tests while exploring a number of other possible usability improvements. The study was, however, carried out before the release of Tor Browser version 3, which improved the bundle’s usability based on earlier suggestions.
David Rajchenbach-Teller from Mozilla reached out to the Tor Browser developers about their overhaul of the Firefox Session Restore mechanism. This is another milestone in the growing collaboration between the Tor Project and Mozilla.
On the “anonymity is hard” front, David Fifield reported a fingerprinting issue on the Tor Browser. Fallback charsets can be used to learn the user locale as they vary from one to another. The next release of the Tor Browser will use “windows-1252” for all locales, as this matches the impersonated “User-Agent” string (Firefox — English version — on Windows) that it already sends in its HTTP headers.
Yawning Angel called for help in testing and reviewing obfsclient-0.0.1rc2, the second obfsclient release candidate this week: “assuming nothing is broken, this will most likely become v0.0.1, though I may end up disabling Session Ticket handshakes.”
David Fifield published a guide to patching meek, an HTTP pluggable transport, so that it can be used to send traffic via Lantern, a censorship circumvention system which “acts as an HTTP proxy and proxies your traffic through trusted friends.”
Fortasse started a discussion on tor-talk about using HTTPS Everywhere to redirect Tor Browser users to .onion addresses when available. Several people commented regarding the procedure, its security, or how it could turn the Tor Project or the EFF into some kind of registrar.
anonym has been busy adapting the configuration interface from the Tor Browser — called “Tor Launcher” — to Tails’ needs. Preliminary results can already be seen in the images built from the experimental branch.
Virgil Griffith sent a draft proposal for changes to improve the latency of hidden services when using the “Tor2web” mode. Roger Dingledine commented that one of the proposed changes actually opened a new research question regarding the actual latency benefits.
David Goulet released the fourth candidate of his Torsocks rewrite. This new version comes after “a big code review from Nick and help from a lot of people contributing and testing”. But more reviews and testing are now welcome!
Tor help desk roundup
Often users email the help desk when the Tor Browser’s Tor client fails somehow. There are many ways for the Tor Browser to fail in such a way that the Tor log is inaccessible. Since antivirus programs, firewalls, system clock skew, proxied internet connections, and internet censorship have all been known to cause Tor failures, it is not always easy to determine the source of the problem. Thankfully, the Tor Browser team is working on making the logs easier to access in case of failures (#10059, #10603).
News from Tor StackExchange
Janice needs to be able to connect from an IP address in a specific city and wanted to know if Tor can be used to do so. Several users suggested that this is not possible with Tor. For city-level IP addresses, it might better to use other services like a proxy or a tunnel, provided one does not require anonymity.
The Tor Browser Bundle sets the default font to Times New Roman 16pt and allows pages to use their own fonts. User joeb likes to change the settings and wondered how this increases the possibility to fingerprint a user. gacar suggested that this will facilitate fingerprinting attacks. Several important sites use font probing to fingerprint their users, and changing the default fonts is likely to make a user stand out from the common anonymity set.
Kristopher Ives wondered if Tor uses some kind of compression. Several users searched the source code archives for “gzip” and found code which deals with directory information. Jens Kubieziel argued that Tor operates on encrypted data and compressing encrypted data usually results in a increase in size, so it makes no sense to compress this data.
Stackexchange uses bounties to award higher reputations to answers. By using this one can attract attention and get better answers or an answer at all. The question about using DNSSEC and DNScrypt over Tor is probably the first to receive a bounty: an answer to this question would be rewarded with 50 points. However, they have not been earned yet, so if you know an answer, please enlighten the rest of the community.
This issue of Tor Weekly News has been assembled by harmony, Lunar, qbi, Matt Pagan, Karsten Loesing, Mike Perry, dope457, and Philipp Winter.
Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!