Tor Weekly News — June 4th, 2014
Welcome to the twenty-second issue of Tor Weekly News in 2014, the weekly newsletter that covers what is happening in the Tor community.
Tails moves to Wheezy
The Tails live system is a Debian derivative aiming at preserving the privacy and anonymity of its users.
The first Tails releases were based on Debian Lenny (2009-2012); since version 0.7, Tails has been based on Debian Squeeze (2011-). Meanwhile, Debian has released a new stable version dubbed Wheezy, and the upcoming Tails 1.1 will be the first release to be based on the latter.
The general set of features should not change much from the previous Tails release, but almost every software component has been updated. On
May 30th, the Tails team released a beta image; given the number of changes, testing is even more welcome than usual.
Testers can also try out the new UEFI support, which enables Tails to boot on recent hardware and on Macs.
Several issues with the current beta image have already been identified, so be sure to have a look at the list before reporting.
The details of the release schedule are still being discussed at the time of writing, but Tails 1.1 is likely to be out by the end of July. Please help make it a great release!
Stem 1.2 brings interactive interaction with the Tor daemon
On June 1st, Damian Johnson announced the release of Stem 1.2. Stem is a Python library for interacting with the Tor daemon. It is now used by several applications like the arm status monitor and Philipp Winter’s exit scanner.
The new version brings an interactive control interpreter, “a new method for interacting with Tor’s control interface that combines an interactive python interpreter with raw access similar to telnet”. This should make Tor hackers happy by saving them from having to manually poke the control port through telnet or create complete Stem scripts.
For the complete list of changes, head over to the changelog.
Monthly status reports for May 2014
The wave of regular monthly reports from Tor project members for the month of May has begun. Pearl Crescent released their report first, followed by Sherief Alaa, Damian Johnson, Nick Mathewson, Colin C., Georg Koppen, Lunar, Arlo Breault, and Matt Pagan.
Lunar also reported on behalf of the help desk, while Arturo Filastò did likewise for the OONI team, and Mike Perry for the Tor Browser team.
Miscellaneous news
Pups, a chat system implemented by Sherief Alaa for real-time invitation-based user support, has gone live, and can now be used by Tor’s support assistants when that method promises a quicker resolution of an issue.
In response to a question about the writing of unit tests for tor, Nick Mathewson shared a brief guide to identifying lines in tor’s codebase that have not yet been covered by tests.
Nick also put out a call (relayed by Moritz Bartl) for Tor relay operators running version 0.2.5.4-alpha or later to profile their relays, in order to identify potential bottlenecks. Basic instructions for doing so on Debian and Ubuntu can be found in the comments to the relevant ticket.
During a discussion on the role of JavaScript hooks in Tor Browser, Mike Perry clarified the merits of writing direct C++ Firefox patches over using such hooks, as well as the possibility of incorporating Torbutton’s privacy features into either Firefox itself or a dedicated add-on.
Andrew Lewman reported on his trip to Stockholm to address Sida and the Stockholm Internet Forum.
Juha Nurmi sent the second weekly report for the ahmia.fi Google Summer of Code project .
Marc Juarez is working on website fingerprinting countermeasures in the form of a pluggable transport. Marc wants to “implement a set of primitives that any link padding-based defense would benefit of” and is looking for feedback on the envisaged primitives.
Philipp Winter announced that Atlas, the web application to learn about currently running Tor relays, will now display information about a relay’s IPv6 exit policy, as well as the already-existing IPv4 exit summary.
Tor help desk roundup
Sometimes users with no network obstacles will email the help desk to ask how to configure their Tor Browser. Often these users will not need to configure anything, and clicking “Connect” is all that is necessary. Discussion on this problem is taking place on the bug tracker.
Easy development tasks to get involved with
The bridge distributor BridgeDB populates its database from the cached descriptor files copied over from the bridge authority. There’s a small bug in BridgeDB where a line that is included in two different cached descriptor files gets added twice to the database. The ticket says this bug is easily reproducible and even contains commands for reproducing it. If you enjoy digging into unknown Python/Twisted codebases to find the few spots that need fixing, this bug may be for you. Be sure to comment on the ticket when you have a fix!
This issue of Tor Weekly News has been assembled by harmony, Lunar, Matt Pagan and Karsten Loesing.
Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!
Comments
Comments are closed.