Tor Weekly News — November 6th, 2013
Welcome to the nineteenth issue of Tor Weekly News, the weekly newsletter that covers what is happening in the up-to-date Tor community.
Tails 0.21 is out
The Tails developers anounced the 34th release of the live system based on Debian and Tor that preserves the privacy and anonymity of its users.
The new version fixes two holes that gave too much power to the POSIX user running the desktop: Tor control port cannot be directly accessed anymore to disallow configuration changes and IP address retrieval, and the persistence settings now requires privileged access. On top of these specific changes, the release include security fixes from the Firefox 17.0.10esr release and for a few other Debian packages.
More visible improvements include the ability to persist printer settings, support for running from more SD card reader types, and a panel launcher for the password manager. For the curious, more details can be found in the full changelog.
As with every releases: be sure to upgrade!
New Tor Browser Bundles based on Firefox 17.0.10esr
Erinn Clark released new versions of the Tor Browser Bundle on November 1st. The previously “beta” bundles have moved to the “release candidate” stage and are almost identical to the stable ones, except for the version of the tor daemon. A couple of days later, David Fifield also released updated “pluggable transport“ bundles.
The new bundles include all security fixes from Firefox 17.0.10esr, and updated versions of libpng, NoScript and HTTPS Everywhere. It also contains a handful of improvements and fixes to the Tor Browser patches.
Users of older version of the Tor Browser bundles should already have been reminded to upgrade by the notification system. Don't forget about it!
This should be the last bundles based on the 17 branch of Firefox as it is going to be superseded by the 24 branch as the new long-term supported version in 6 weeks. Major progress has already been made by Mike Perry and Pearl Crescent to update the Tor Browser changes and review the new code base.
Monthly status reports for October 2013
The wave of regular monthly reports from Tor project members for the
month of October has begun early this time to reach the tor-reports
mailing-list: Damian Johnson, Linus Nordberg, Karsten Loesing, Philipp Winter, Ximin Luo, Lunar, Kelley Misata, Matt Pagan, Sherief Alaa, Nick Mathewson, Pearl Crescent, George Kadianakis, Colin Childs, Arlo Breault, and Sukhbir Singh.
Tor Help Desk Roundup
One person asked why the lock icon on the Tor Project's website was not outlined in green. Sites that use HTTPS can purchase different types of SSL certificates. Some certificate issuers offer certificates that supply ownership information, such as the physical address of the website operator, for a higher price. Sites that use these certificates get the lock icon by their URL outlined in green. The Tor Project adds protection to the validity of our SSL certificate a different way, by supplying our SSL certificate fingerprint on our FAQ page. You can double check that fingerprint on any of the Tor Project's mirror pages as well.
One person wanted to known why a website they were visiting over Firefox was telling them that they were not using Tor, even though Vidalia told them that Tor was running. By default, the Tor Browser Bundle does not anonymize all the traffic on your computer. Only the traffic you send through the Tor Browser Bundle will be anonymized. If you have Firefox and the Tor Browser open at the same time, the traffic you send through Firefox will not be anonymous. Using Firefox and Tor Browser Bundle at the same time is not a great idea because the two interfaces are almost identical, and it is easy to get the two browsers mixed up, even if you know what you are doing.
starlight reported on running a Tor relays with the daemon compiled with the AddressSanitizer memory error detector available since GCC 4.8.
Isis Lovecruft has sent two proposals for improvements to BridgeDB. One is finished and addresses the switch to a “Distributed Database System and RDBMS”. The second is still in draft stage and “specifies a system for social distribution of the centrally-stored bridges within BridgeDB”.
Karsten Loesing announced the availability of a new tech report he wrote with Steven J. Murdoch, and Rob Jansen: Evaluation of a libutp-based Tor Datagram Implementation. Be sure to have a look if you are interested in one of the “promising approach to overcome Tor’s performance-related problems”.
Christian is working on a new round of improvements for Globe, a web application to learn about relays and bridges of the Tor network. The project seems close to be mature enough to replace Atlas according to some.
A discussion on the tor-relays mailing list prompted Roger Dingledine to ask about changing the current default exit policy of the tor daemon. The current “restricted exit node” policy has been in place since 2003. As this has surprised some operators, switching the default policy to “middle node” is under consideration.
This issue of Tor Weekly News has been assembled by Lunar, dope457, Matt Pagan, and Philipp Winter.
Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!