Tor Weekly News — November 20th, 2013
Welcome to the twenty-first issue of Tor Weekly News, the weekly newsletter that covers what is happening in the Tor community.
tor 0.2.4.18-rc is out
On the 16th of November, Roger Dingledine released the fourth release candidate for the tor 0.2.4.x series . As Roger puts it: “It takes a variety of fixes from the 0.2.5.x branch to improve stability, performance, and better handling of edge cases.” Readers curious for more details can look at the announcement for the complete list of changes.
USB Sticks for Tails
It is often recommended to run Tails from a read-only medium in order to prevent any malware to permanently mess with the system. “CD is best, but many devices these days don’t have an optical drive, and handling CDs is not as convenient as a USB stick” wrote Moritz Bartl on tor-talk.
It looks like one of the very few specific brand of USB sticks available in Germany that had a proper hardware protection switch can no longer be used to boot Tails. Moritz ended up contacting various Chinese suppliers. “Even there, the selection of sticks with write protection is very limited” but eventually one model was found acceptable. Moritz intend to re-sell a bulk of them at the upcoming 30C3 in Hamburg.
Feel free to join the discussion or contact Moritz privately for more details.
New version of check.torproject.org
On the 15th of November, regular users of the Tor Browser Bundle have probably noticed a change in their preferred welcome page. Andrew Lewman had just switched check.torproject.org to a new version written by Arlo Breault in Go. The new codebase should allow the service to better handle the increasingly high number of connections. Several fixes were also made during the reimplementation regarding wording, translations and other meaningful details.
Please report any issues you encounter to the “Tor Check” component of the Tor bug tracker.
Current state of the proposals
In 2007, Tor developers settled on a formal process for changes in Tor specifications or other major changes. At this heart of this process in the “proposal” documents that are discussed on the tor-dev mailing list and archived in the “torspec” Git repository.
Last week, Nick Mathewson took a closer look at what have changed since the last round up he did in June last year. Since then, 16 proposals has been implemented in tor 0.2.3, 0.2.4 and 0.2.5 and two have been superseded or deemed unhelpful.
Nick subsequently posted a review of all “open”, “needs-revision”, and “needs-research” proposals. They are many different tasks to be picked by someone who wishes to help Tor in these 42 proposals, be it by doing research, code, leading discussions or more in-depth analysis.
Radu Rădeanu came up with a workaround for Tor users on Ubuntu 13.10 which temporarily fixes keyboard bug in 64-bit Tor Browser Bundles when used in combination with IBus.
Roger Dingledine called for help in the collection of the new Tor related articles in the press. “According to the website the last time there was a meaningful article about Tor was July 1st. This is very far from the case.” If you want to help, just edit the wiki page.
Firefox 24 is soon going to replace version 17 as “stable” supported release by Mozilla. intrigeri has completed his work in updating Tails’ browser to the point where it “is good enough for Tails 0.22”. Builds from the “feature/ff24” are available for wider testing.
Andreas Jonsson released initial sandboxed version of the TBB 3.0 series which is ready for testing. This security feature should prevent an exploit from stealing user data : the Tor Browser will not be allowed to execute any programs, nor will it be allowed to read or modify data on disk except in the users “downloads”-folder and its own profile. The sandbox is currently only supported on OS X 10.9 “but making it work all the way down to 10.6 is not unlikely”.
Check Mike Perry’s latest report to see what he has been up to in October.
Tor help desk roundup
Users have asked the help desk for support connecting to IRC through Tor. There are some guides on sending IRC traffic through Tor on the wiki (1, 2). Tails also comes with Pidgin preconfigured for IRC. However, it will not matter if the IRC client is correctly configured if the if the intended IRC network blocks all Tor users. For example, users trying to connect to synIRC through Tor will receive a message telling them their computer is part of a botnet.
Users will occasionally ask for support using Tor on ChromeOS. ChromeOS is based on Linux, so it is theoretically possible to run the Linux Tor Browser Bundle on ChromeOS. In practice, the Chromebook prevents users from executing new software on their computers without putting their Chromebook into developer mode, and making other modifications to their device. Anyone who has successfully run the Tor Browser Bundle on ChromeOS is invited to describe their experiences on the Tor Project wiki. As of this writing, there is no documented way of running Tor Browser Bundle on ChromeOS.
This issue of Tor Weekly News has been assembled by Lunar, dope457, Matt Pagan, and Andreas Jonsson.
Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!