Tor Weekly News — October 9th, 2013
New tranche of NSA/GCHQ Tor documents released
After a cameo appearance in previous leaked intelligence documents, Tor found itself at the center of attention in the latest installment of the ongoing Snowden disclosures after a series of stories were published in the Guardian and the Washington Post that detailed alleged attempts by NSA, GCHQ, and their allies to defeat or circumvent the protection that Tor offers its users. A number of source materials, redacted by the newspapers, were published to accompany the articles.
The documents in question offer, alongside characteristically entertaining illustrations, an overview of the Tor network from the point of view of the intelligence agencies, as well as a summary of attacks against Tor users and the network as a whole that they have considered or carried out.
Despite the understandable concern provoked among users by these disclosures, Tor developers themselves were encouraged by the often relatively basic or out-of-date nature of the attacks described. In response to one journalist's request for comment, Roger Dingledine wrote that “we still have a lot of work to do to make Tor both safe and usable, but we don't have any new work based on these slides”.
Have a look at the documents yourself, and feel free to raise any questions with the community on the mailing lists or IRC channels.
tor 0.2.5.1-alpha is out
Roger Dingledine announced the first alpha release in the tor 0.2.5.x series, which among many other improvements introduces experimental support for syscall sandboxing on Linux, as well as statistics reporting for pluggable transports usage on compatible bridges.
Roger warned that “this is the first alpha release in a new series, so expect there to be bugs. Users who would rather test out a more stable branch should stay with 0.2.4.x for now.” 0.2.5.1-alpha will not immediately appear on the main download pages, in order to avoid having too many versions listed at once. Please feel free to test the new release, and report any bugs you find!
How did Tor achieve reproducible builds?
At the end of June, Mike Perry announced the first release of the Tor Browser Bundle 3.0 alpha series, featuring release binaries “exactly reproducible from the source code by anyone”. In a subsequent blog post published in August, he explained why it mattered.
Mike has just published the promised follow-up piece describing how this feat was achieved in the new Tor Browser Bundle build process.
He explains how Gitian is used to create a reproducible build environment, the tools used to produce cross-platform binaries for Windows and OS X from a Linux environment, and several issues that prevented the builds from being entirely deterministic. The latter range from timestamps to file ordering differences when looking up a directory, with an added 3 bytes of pure mystery.
There is more work to be done to “prevent the adversary from compromising the (substantially weaker) Ubuntu build and packaging processes” currently used for the toolchain. Mike also wrote about making the build of the compiler and toolchain part of the build process, cross-compilation between multiple architectures, and the work being done by Linux distributions to produce deterministic builds from their packages.
If you are interested in helping, or working on your own software project, there is a lot to be learned by reading the blog post in full.
Toward a new Tor Instant Messaging Bundle
A first meeting last week kicked-off the “Attentive Otter project” which aims to come up with a new bundle for instant messaging. The first meeting mainly consisted in trying to enumerate the various options.
In the end, people volunteered to research three different implementation ideas. Thijs Alkemade and Jurre van Bergen explored the possibilty of using Pidgin/libpurple as the core component. Jurre also prepared an analysis of xmpp-client, together with David Goulet, Nick Mathewson, Arlo Breault, and George Kadianakis. As a third option, Mike Perry took a closer look at Instantbird/Thunderbird with Sukhbir Singh.
All the options have their pros and cons, and they will probably be discussed on the tor-dev mailing list and at the next “Attentive Otter” meeting.
More monthly status reports for September 2013
The wave of regular monthly reports from Tor project members continued this week with submissions from George Kadianakis, Lunar, Sathyanarayanan Gunasekaran, Ximin Luo, Matt Pagan, Pearl Crescent, Colin C., Arlo Breault, Karsten Loesing, Jason Tsai, the Tor help desk, Sukhbir Singh, Nick Mathewson, Mike Perry, Andrew Lewman, Aaron G, and the Tails folks.
Tor Help Desk Roundup
A number of users wanted to know if Tor was still safe to use given the recent news that Tor users have been targeted by the NSA. We directed these users to the Tor Project's official statement on the subject.
One of the most popular questions the help desk receives continues to be whether or not Tor is available on iOS devices. Currently there is no officially supported solution, although more than one project has been presented (1, 2).
The United Kingdom is now one of the countries where citizens request assistance circumventing a national firewall.
Arlo Breault sent out a request for comments on a possible new version of the check.torproject.org page.
Philipp Winter sent out a call for testing (and installation instructions) for the ScrambleSuit pluggable transports protocol.
Not strictly Tor-related, but Mike Perry started an interesting discussion about the “web of trust” system, as found in OpenPGP. The discussion was also held on the MonkeySphere mailing list, which prompted Daniel Kahn Gilmor to reply with many clarifications regarding the various properties and processes of the current implementation. To sum it up, Ximin Luo started a new documentation project “to describe and explain security issues relating to identity, in (hopefully) simple and non-implementation-specific language”.
The listmaster role has been better defined and is now performed by a team consisting of Andrew Lewman, Damian Johnson, and Karsten Loesing. Thanks to them!
Roger Dingledine released an official statement on the Tor project blog regarding the takedown of the Silk Road hidden service and the arrest of its alleged operator.
Claudiu-Vlad Ursache announced the initial release of CPAProxy, “a thin Objective-C wrapper around Tor”. This is the first component of a project to “release a free open-source browser on the App Store that uses this wrapper and Tor to anonymize requests.” Claudiu-Vlad left several questions open, and solicited opinions on the larger goal.
This issue of Tor Weekly News has been assembled by Lunar, harmony, dope457 and Matt Pagan.
Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!